Abilities

  • A0004: Ability to develop curriculum that speaks to the topic at the appropriate level for the target audience.
  • A0013: Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
  • A0015: Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
  • A0018: Ability to prepare and present briefings.
  • A0019: Ability to produce technical documentation.
  • A0022: Ability to apply principles of adult learning.
  • A0024: Ability to develop clear directions and instructional materials.
  • A0032: Ability to develop curriculum for use within a virtual environment.
  • A0054: Ability to apply the Instructional System Design (ISD) methodology.
  • A0055: Ability to operate common network tools (e.g., ping, traceroute, nslookup).
  • A0057: Ability to tailor curriculum that speaks to the topic at the appropriate level for the target audience.
  • A0058: Ability to execute OS command line (e.g., ipconfig, netstat, dir, nbtstat).
  • A0063: Ability to operate different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).
  • A0070: Ability to apply critical reading/thinking skills.
  • A0083: Ability to evaluate information for reliability, validity, and relevance.
  • A0089: Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
  • A0105: Ability to tailor technical and planning information to a customer’s level of understanding.
  • A0106: Ability to think critically.
  • A0112: Ability to monitor advancements in information privacy technologies to ensure organizational adaptation and compliance.
  • A0114: Ability to develop or procure curriculum that speaks to the topic at the appropriate level for the target.
  • A0118: Ability to understand technology, management, and leadership issues related to organization processes and problem solving.
  • A0119: Ability to understand the basic concepts and issues related to cyber and its organizational impact.
  • A0171: Ability to conduct training and education needs assessment. 

Knowledge

  • K0001: Knowledge of computer networking concepts and protocols, and network security methodologies. 
  • K0002: Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). 
  • K0003: Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. 
  • K0004: Knowledge of cybersecurity and privacy principles. 
  • K0005: Knowledge of cyber threats and vulnerabilities. 
  • K0006: Knowledge of specific operational impacts of cybersecurity lapses. 
  • K0059: Knowledge of new and emerging information technology (IT) and cybersecurity technologies. 
  • K0124: Knowledge of multiple cognitive domains and tools and methods applicable for learning in each domain. 
  • K0146: Knowledge of the organization's core business/mission processes.
  • K0147: Knowledge of emerging security issues, risks, and vulnerabilities.
  • K0204: Knowledge of learning assessment techniques (rubrics, evaluation plans, tests, quizzes). 
  • K0208: Knowledge of computer based training and e-learning services.
  • K0213: Knowledge of instructional design and evaluation models (e.g., ADDIE, Smith/Ragan model, Gagne’s Events of Instruction, Kirkpatrick’s model of evaluation).
  • K0216: Knowledge of learning levels (i.e., Bloom’s Taxonomy of learning).
  • K0217: Knowledge of Learning Management Systems and their use in managing learning.
  • K0220: Knowledge of modes of learning (e.g., rote learning, observation).
  • K0239: Knowledge of media production, communication, and dissemination techniques and methods, including alternative ways to inform via written, oral, and visual media.
  • K0243: Knowledge of organizational training and education policies, processes, and procedures.
  • K0245: Knowledge of principles and processes for conducting training and education needs assessment.
  • K0246: Knowledge of relevant concepts, procedures, software, equipment, and technology applications.
  • K0250: Knowledge of Test & Evaluation processes for learners. 
  • K0252: Knowledge of training and education principles and methods for curriculum design, teaching and instruction for individuals and groups, and the measurement of training and education effects.
  • K0287: Knowledge of an organization's information classification program and procedures for information compromise. 
  • K0628: Knowledge of cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations. 

Skills

  • S0064: Skill in developing and executing technical training programs and curricula.
  • S0066: Skill in identifying gaps in technical capabilities.
  • S0070: Skill in talking to others to convey information effectively.
  • S0102: Skill in applying technical delivery capabilities.
  • S0166: Skill in identifying gaps in technical delivery capabilities.
  • S0296: Skill in utilizing feedback to improve processes, products, and services.

Tasks

  • T0230: Support the design and execution of exercise scenarios.
  • T0247: Write instructional materials (e.g., standard operating procedures, production manual) to provide detailed guidance to relevant portion of the workforce.
  • T0248: Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.
  • T0249: Research current technology to understand capabilities of required system or network.
  • T0345: Assess effectiveness and efficiency of instruction according to ease of instructional technology use and student learning, knowledge transfer, and satisfaction.
  • T0352: Conduct learning needs assessments and identify requirements.
  • T0357: Create interactive learning exercises to create an effective learning environment.
  • T0365: Develop or assist in the development of training policies and protocols for cyber training.
  • T0367: Develop the goals and objectives for cyber curriculum.
  • T0380: Plan instructional strategies such as lectures, demonstrations, interactive exercises, multimedia presentations, video courses, web-based courses for most effective learning environment in conjunction with educators and trainers.
  • T0437: Correlate training and learning to business or mission requirements.
  • T0442: Create training courses tailored to the audience and physical environment.
  • T0450: Design training curriculum and course content based on requirements.
  • T0451: Participate in development of training curriculum and course content.
  • T0534: Conduct periodic reviews/revisions of course content for accuracy, completeness alignment, and currency (e.g., course content documents, lesson plans, student texts, examinations, schedules of instruction, and course descriptions).
  • T0536: Serve as an internal consultant and advisor in own area of expertise (e.g., technical, copyright, print media, electronic media).
  • T0926: Develop or assist with the development of privacy training materials and other communications to increase employee understanding of company privacy policies, data handling practices and procedures and legal obligations

Capability Indicators

Capability Indicators for Cyber Instructional Curriculum Developer
Category Entry Intermediate Advanced
Credentials/Certifications
  • Recommended: No
  • Example Types: N/A
  • Example Topics: N/A
  • Recommended: Not essential but may be beneficial
  • Example Types: N/A
  • Example Topics: Certifications addressing IT fundamentals, instructional design, training delivery, performance improvement, evaluating learning impact, managing learning programs, coaching, integrated talent management, change management, knowledge management, learning technologies, global mindset, foundational instructional design theories, application(s) for developing learning experiences for digital platforms (including project planning, content expertise, communication, writing, and technology), understanding of pertinent technology, programs, and methods (including interactive media, video, editing, digital design, and digital narrative), knowledge in focused topic areas (such as website development, web programming, and content management systems site development), e-learning design, practical knowledge, conducting a needs assessment for learning programs that aligns organizational objectives and the learning opportunity (aligns organizational objectives and the learning opportunity, address target populations' specific needs, identify constraints and/or problems affecting design success, basic outcomes of the learning solution linked to business problems or opportunities), designing learning solutions that reflect adult learning theories, and best address the needs of the learners and the organization through formal classroom training, blended learning, online learning, and informal approaches, use a collaborative approach with stakeholders (such as internal clients and SMEs) throughout a learning design project (plan and design the solution, select and/or create effective learning materials, establishing sign-off and approval processes for each step of the design process), creating complete learning solutions (measurable learning objectives, instructional content that reflects the diversity of the learners, a variety of learning methods and emerging technologies to reach learning outcome), identifying appropriate evaluation techniques and apply them to measure the impact of the learning solution, gamification, security and risk management, asset security, security engineering, communications and network security, identity and access management, security assessment and testing, security operations, software development security, enterprise security, risk management and incident response, research and analysis, integration of computing, communications and business disciplines as well as technical integration of enterprise components, reducing production costs, application vulnerabilities and delivery delays, and secure software concepts, requirements, design, implementation/coding, testing, software acceptance, software deployment, operations, maintenance, disposal supply chain, and software acquisition, change management and incident handling for managers, common attacks and malware, managing access control, managing defense in depth and security policy, managing disaster recovery and contingency planning, managing employees and total cost of ownership, managing operational security, managing physical security and facility safety, managing privacy and web security, managing risk and ethics, managing security awareness and protecting intellectual property, managing the network infrastructure, managing quality and growth of the security organization, managing the use of cryptography, managing vulnerabilities, managing wireless security, network and endpoint security technologies, network protocols for managers, project management and business situational awareness, selling and managing the mission, analyzing course materials and learner information, assuring preparation of the instruction site, establishing and maintaining instructor credibility, managing the learning environment, demonstrating effective communication skills, demonstrating effective presentation skills, demonstrating effective questioning skills and techniques, responding appropriately to learner's needs for clarification and feedback, providing positive reinforcement and motivational incentives, using instructional methods appropriately, using media effectively, evaluating learner performance, evaluating delivery of instruction, reporting evaluation information
  • Recommended: Yes
  • Example Topics: Certifications addressing security and risk management, asset security, security engineering, communications and network security, identity and access management, security assessment and testing, security operations, software development security, systems security engineering, C&A/ RMF, technical management, U.S. government information assurance-related policies and issuances, security and risk management, asset security, security engineering, communications and network security, identity and access management, security assessment and testing, security operations, software development security, access control systems and methodology, communications and network security, cryptography, security architecture analysis, technology-related BCP and DRP, physical security considerations, analyzing course materials and learner information, assuring preparation of the instruction site, establishing and maintaining instructor credibility, managing the learning environment, demonstrating effective communication skills, demonstrating effective presentation skills, demonstrating effective questioning skills and techniques, responding appropriately to learner's needs for clarification and feedback, providing positive reinforcement and motivational incentives, using instructional methods appropriately, using media effectively, evaluating learner performance, evaluating delivery of instruction, reporting evaluation information, instructional design, training delivery, performance improvement, evaluating learning impact, managing learning programs, coaching, integrated talent management, change management, knowledge management, learning technologies, global mindset, evaluative concepts
Continuous Learning
  • Recommended: Yes
  • Examples: 40 hours annually (may include attending conferences, in cybersecurity/IT cybersecurity preferred to gain technical background, curriculum-specific learning, mentoring, participation and award group collaborative environment, professional membership
  • Recommended: Yes
  • Examples: 40 hours annually (may include mentoring others, receiving mentoring, cybersecurity and instructional design workshops, applying gamification, staying up-to-date on new technology and generational learning, business proposal writing, identifying and designing remediation plans)
  • Recommended: Yes
  • Examples: 40 hours annually (may include mentoring others, speaking at events [e.g., panels, conference presentations], championing projects, leading teams, gaining exposure to enterprise-wide cybersecurity training needs and solutions [e.g., rotations, details])
Education
  • Recommended: Yes
  • Example Types: Associate's, Bachelor's
  • Example Topics: Psychology, instructional design, telecommunications, economics, information technology, communications, journalism, information security
  • Recommended: Yes
  • Example Types: Bachelor's
  • Example Topics: Psychology, instructional design, telecommunications, economics, information technology, communications, journalism, information security
  • Recommended: Yes
  • Example Types: Bachelor's, Master's, Ph.D.
  • Example Topics: IT, instructional design, information security
Experiential Learning
  • Recommended: No
  • Examples: N/A
  • Recommended: Yes (Navy data does not recommend)
  • Examples: 2-3 years of hands-on experience, internship, instructional designer frameworks, 508 training, evaluative concepts, adult learning styles, learning cycles, cyber or tech curriculum development experience
  • Recommended: Yes
  • Examples: 5-7+ years of hands-on experience including internships, instructional designer frameworks, 508 compliance training, evaluative concepts, exposure to different types of audiences and learning styles, technical cyber curriculum development, managerial experience, training delivery strategy, technical and user-specific content
Training
  • Recommended: Yes
  • Example Types: N/A
  • Example Topics: Talent development, human resources, technical, instructional designer, learning, graphic design
  • Recommended: Yes
  • Example Types: N/A
  • Example Topics: IT, cyber, instructional design, learning, graphic design, vendor (e.g., virtual learning environment and course management system, rapid responsive authoring tools used for creating e-learning content, and online teaching and training software trainings), 508 compliance, learning management systems
  • Recommended: Yes
  • Example Types: N/A
  • Example Topics: Instructional design, workforce development, learning styles, IT