Program Speakers for
|
|
||
This presentation will discuss a structured On-the-Job Training Program for System Administrators developed at the National Security Agency. This is an ongoing effort between the Subject Matter Experts in the customer organization and internal consultants from the National Cryptologic School. The presenters will provide: a history of the program, an overview of how to develop a structured OJT program, a listing of the duties and tasks and how they are used for employee development, countless lessons learned and contacts for those attendees who are interested in the program. We also strongly believe in audience participation!! |
Program Speakers for
|
|
||
|
|
||
The computer has been employed as a tool for delivering and enhancing various educational disciplines for more than 20 years. Recently there has been a paradigm shift to include more interactive multimedia as an effective platform. In this presentation we will explore the role of the new technologies and the direction of educational software and computer enhanced education. |
|
||
A study was conducted at Los Alamos National Laboratory (LANL) to evaluate the effectiveness of a specialized computer security briefing. Due to changes in the LANL environment, the training program now serves a substantially different pool of employees. This paper presents the philosophy and methodology of evaluating training programs. This paper also reports on the final results of the study, with conclusions, recommendations, and subsequent changes to computer security training at LANL. |
Program Speakers for
|
|
||
The course gives emphasis on why Computer Security Management is becoming a paramount concern in EVERY computer environment. And is aimed at the future computer practitioner or manager who must be aware of all tenets of computer security in order to protect their organization's most vital asset -- their information. |
|
||
What is Web-based security training? How does it differ from computer-based training (CBT) methods? What are the issues, costs and retention when doing awareness in this manner? What is important: graphics, pace, flexibility, patience-factors, response formats, reports or cost? To answer these questions, Jim will present the concepts, real-world applications, successes, challenges, and solutions experienced when deploying Web-based awareness programs. Additionally, he will talk about how to increase retention through the creative use of SIREs, (Student Information Reinforcement Exercises). |
Top
of Page
Back to FISSEA Page
Back to Organization's Page
Please send comments or suggestions to
webmaster-csrc@nist.rip.
Last Modified: July 25, 2001.