Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
- 15.4.1. Description of the Training Programme
- 15.4.2. Learning Outcome of the Training Module
- 15.4.3. Teaching and Learning Strategies
- 15.4.4. Student Participation
- 15.4.5. Overview of Assessments and Training Levels
- 15.4.6. Study Plan (Learning Schedule)
- 15.4.7. Resources Required to Complete the Training
- 15.4.8. Benchmarking of the Module
- Quiz 15.4 5 questions
Well done!
You have completed (UPI) Chapter 15: Cyber-Security Training and Continuous Adaptation of Programmes!
Instruction
15.4.3. Teaching and Learning Strategies
The process begins by establishing a training program tailored to the specific needs of the organization. The overall "learning path" is modeled, starting from basic to advanced training. The trainee starts the process, is continuously evaluated, and the learning procedures are adapted to their needs. Figure 8 outlines the overall process, which is detailed in the following subsections.
...