2 hours 23 minutes
Understanding and reversing the forgetting curve.
Welcome to the first of the four lessons in module to Module one dealt primarily with the delivery of content so that it appeared meaningful and relevant to participants and showed how exponential learning approaches can be incorporated into education content delivery. This module
addresses the challenge of maintaining our colleagues threat recognition levels
and creating a management system that allows us to draw conclusions about the organization's threat recognition capabilities as a whole
and looks at the question. What happens after training ends?
Once your colleagues have finished their training program, what's next? Often there is no active reinforcement taking place on. The result is that most of the knowledge and skills that have been talked doing training are for gotten within the first weeks or even days after the training session.
So how do you prevent forgetting? A structured program is needed to amplify and continue education and skills acquisition after the learning cause our live classroom training has ended.
An effective reinforcement program should take your learning goals into consideration. What do you want your learns to start doing or do more off after the training is finished in this case, we want them to be significantly more skilled at recognizing threats and to know what action to take when they see them.
So why do we forget things that we have learned?
If your response was something along the lines off lack of practice, you'll be absolutely correct. If we don't apply things that we have learned, we forget them. Fax can be difficult enough to recall, but something that skill based whether it requires manual dexterity
or the use of a mental process,
such as the ability to recognize risk in a given situation. Our skill erodes rapidly if we don't have the opportunity to practice it frequently. This process has a name. It's called the forgetting curve on. It's the main topic of this lesson
in this first lesson of module to we're going to focus on a principle known as the forgetting curve, where you'll understand the circumstances that causes to rapidly forget things. We have been told on how we can reverse that process.
The forgetting curve was developed by Herman having house a German psychologist, and it hypothesizes the decline of memory retention over time.
This curve shows how information is lost over time when there is no attempt or opportunity to retain it.
A typical graph of the forgetting curve shows that humans tend to 1/2 their memory of newly learned knowledge in a matter of days or weeks, unless they consciously review the material are are given the opportunity to employ it.
It's a case of use it or lose it.
The relevance of this disciple security threat recognition is that classroom based training or once a year, online training courses have very limited effect in the longer term, put in the context of an ever present and evolving threat, it's no wonder our end users are the most commonly compromised attack vector
because they don't have sufficient opportunity to practice
on built their skills.
Your colleagues face real challenges in their day to day activities when it comes to maintaining their levels of cyber security awareness because they have dozens of other issues competing for their attention. Faced with threats that are never present and evolving without continuous support to assist with learning retention
on advise of emerging threats, it's no wonder that threat recognition capabilities both decline
and failed to adapt over time.
Our challenge is to stop that decline occurring
on. We can do this by applying the concept of reinforcement. Let's take a few moments to run through how reinforcement works and identified the different types of reinforcement that can be used in a cyber security education program.
The forgetting curve can be reversed by the use of reinforces, which are delivered as a series of short, ongoing micro learning interventions that provide the opportunity to refresh and review key concepts on to build on existing knowledge in the light of new developments.
The short, periodic with preys of a topic delivered using experiential learning techniques, provides a short term boost which assists with knowledge retention by providing participants with the opportunity to use and practice their skills.
Basically, there were two main categories of learning reinforcement that could be used as part of an education framework for cyber security awareness and threat recognition.
Micro learning reinforces.
These are either short activity based refreshers of key concepts from the main training course material, or they can be used to extend knowledge or increased levels of preparedness and vigilance for new types of threat.
Ambient reinforcement is slightly different. The purpose of these is to reinforce key messages by encountering a familiar message in an unfamiliar context.
The objective is to deliver a message at an unexpected moment, which adds an element of surprise aiding memory retention.
Both approaches have their place in your cyber security awareness program, as we will see in the next lesson where we will be looking at some specific examples of reinforcement for cyber security education.
Having now covered the concept of the forgetting curve,
How do we reverse it?
Well, if you said regular reinforces, that's absolutely correct.
Okay, let's now move on to the summary for this lesson.
Let's just recap on the concepts that we've run through in this lesson before we move on to Lesson two.
We first looked at the psychological concept of the forgetting curve, how and why it occurs on why we need a reinforcement framework to reverse it.
We then had a general overview of the different types of reinforces micro learning and ambient reinforces
reinforces involved. More than cutting up your training materials into smaller pieces on pushing them out to your colleagues. They need to be designed to remind and amplify existing knowledge, as well as extending knowledge further,
both timing and content contribute to creating lasting impact
and to facilitate knowledge and skills retention by building on newly acquired knowledge and developing skills from it.
So reinforcement starts with your traditional training sessions. End
after training is your learner's should not only understand and remember what they just learned, but also be coached and encouraged to apply their new knowledge and skills.
Now let's go on to the next lesson where we will look at some specific examples of reinforcement on how they are applied specifically to security education.
That's it for this lesson of making it stick.
Thanks for watching, and I'll look forward to seeing you in Lesson two.
Course Assessment - Creating Effective User Awareness Training
CompTIA Linux+ Old
Our self-paced online CompTIA Linux+ course prepares students with the knowledge to become a certified ...
10 CEU/CPE Hours Available
Certificate of Completion Offered
Become a Cyber Security Engineer
In this program, you will learn what it takes to become a Security Engineer. According ...