Cyber Instructional Curriculum Developer Job Profile

Discover more salary details for

What is a Cyber Instructional Curriculum Developer?

The Cyber Instructional Curriculum Developer develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.

Cyber Instructional Curriculum Developer must know

  • computer networking concepts and protocols, and network security methodologies.
  • risk management processes (e.g., methods for assessing and mitigating risk).
  • laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • cybersecurity and privacy principles.
  • cyber threats and vulnerabilities.
  • specific operational impacts of cybersecurity lapses.
  • new and emerging information technology (IT) and cybersecurity technologies.
  • multiple cognitive domains and tools and methods applicable for learning in each domain.
  • the organization’s core business/mission processes.
  • emerging security issues, risks, and vulnerabilities.
  • learning assessment techniques (rubrics, evaluation plans, tests, quizzes).
  • computer based training and e-learning services.
  • instructional design and evaluation models (e.g., ADDIE, Smith/Ragan model, Gagne’s Events of Instruction, Kirkpatrick’s model of evaluation).
  • learning levels (i.e., Bloom’s Taxonomy of learning).
  • Learning Management Systems and their use in managing learning.
  • modes of learning (e.g., rote learning, observation).
  • organizational training and education policies, processes, and procedures.
  • media production, communication, and dissemination techniques and methods, including alternative ways to inform via written, oral, and visual media.
  • principles and processes for conducting training and education needs assessment.
  • relevant concepts, procedures, software, equipment, and technology applications.
  • Test & Evaluation processes for learners.
  • training and education principles and methods for curriculum design, teaching and instruction for individuals and groups, and the measurement of training and education effects.
  • an organization’s information classification program and procedures for information compromise.
  • cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations.
  • Key skills Cyber Instructional Curriculum Developer include:

    • developing and executing technical training programs and curricula.
    • identifying gaps in technical capabilities.
    • talking to others to convey information effectively.
    • applying technical delivery capabilities.
    • identifying gaps in technical delivery capabilities.
    • utilizing feedback to improve processes, products, and services.

    Cyber Instructional Curriculum Developer must able to

    • develop curriculum that speaks to the topic at the appropriate level for the target audience.
    • communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
    • conduct vulnerability scans and recognize vulnerabilities in security systems.
    • prepare and present briefings.
    • produce technical documentation.
    • apply principles of adult learning.
    • develop clear directions and instructional materials.
    • develop curriculum for use within a virtual environment.
    • apply the Instructional System Design (ISD) methodology.
    • tailor curriculum that speaks to the topic at the appropriate level for the target audience.
    • operate common network tools (e.g., ping, traceroute, nslookup).
    • tailor curriculum that speaks to the topic at the appropriate level for the target audience.
    • execute OS command line (e.g., ipconfig, netstat, dir, nbtstat).
    • operate different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).
    • apply critical reading/thinking skills.
    • evaluate information for reliability, validity, and relevance.
    • function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
    • tailor technical and planning information to a customer’s level of understanding.
    • think critically.
    • monitor advancements in information privacy technologies to ensure organizational adaptation and compliance.
    • develop or procure curriculum that speaks to the topic at the appropriate level for the target.
    • understand technology, management, and leadership issues related to organization processes and problem solving.
    • understand the basic concepts and issues related to cyber and its organizational impact.
    • conduct training and education needs assessment

    Our Revolution

    We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

    We recommend always using caution when following any link

    Are you sure you want to continue?