Want to create interactive content? It’s easy in Genially!

Get started free

Diploma Course

Ewan “EGV”

Created on October 29, 2024

Professional Diploma in Digital Learning Design

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

PDF DOCUMENT OF THIS COURSE For you to reference ->

By Ewan Logue

Security Awareness Training - Course Design

Professional Diploma in Digital Learning Design

Digital Learning Experience Design Project

Select this icon at the top right of the screen to see any interactive elements on a slide

You can also use the next and previous buttons to move through the slides

Select the intelliflo logo top-left of the screen to return to the index

Navigtion

Navigation

My project will focus on an in-house security awareness course. Currently, the business purchases our security awareness courses from third-party organisations, which do not fit the company security standards and are not created with our staff or business needs in mind. The results has been continual poor engagement with these courses and Increasing negative attitudes from staff towards security awareness and other compliance related courses. There is also reputational damage towards the instructional design team who are preceived to have created these courses. The aim of this project is to create an in-house security awareness course that staff can complete annually and which aligns with our business security standards and brand guidelines whilst also addressing concerns around reducing the time and clicks required to complete the course, improving the layout and structure of the information and providing relevant assessment questions.

Introduction

Part 3

Implement and Evaluate

Part 2

Micro Design & Development

Part 1

Analyse and Design

Click for more info

Click for more info

Click for more info

A.D.D.I.E

Index

For the purposes of this project I have decided upon using the A.D.D.I.E model as this is inline with how we currently produce content within our Instructional design team and is something I feel comfortable using.

Rachel

Darren

Dianne

Personas

Select a staff member for more information:

Who is intelliflo intelliflo is a fintech software company that provides financial advisory software to help financial advisors manage client relationships, financial planning, reporting, and portfolios more efficiently. The only UK office is our head office in Wimbledon, London with around 650 employees in the UK. Most staff work remotely across the country and surrounding islands. Since COVID, the office capacity has been scaled down, with only a few hundred desks available. Anyone wanting to work onsite needs to book a desk or meeting room in advance. There’s no dedicated in-house training team, so managers handle most of the on-the-job training for staff. To stay compliant with company policies, all employees must complete the Security Awareness Course once a year. This ensures that everyone is up to speed on key business processes and security procedures.

The Who of learning

To start this process i looked at the business as a whole and from here looked at our staff and what their goals and aspirations and perceptions of digital learning where. This process was made easier by the creation of personas which allowed me to gain insight into our learners and how to best deliver this course.

Experience: Whilst staff are overall positive about learning created in house many are unsure due to previous bad experiences on third party courses. Some younger staff also may also have never encountered this style of learning as have only been with the business a short period of time. I will need to ensure my course flows nicely and that I address the complaints made in previous feedback to ensure staff can easily complete and retain the required information.

Accessibility: Many staff only have laptops available to them and not all staff are able to be on site in Wimbledon. The course will therefore need to be compatible with this device primarily and if possible multiple devices.

Video Content: Previous feedback on third party course has been that there is too much text to be consumed by staff and too much clicking. For this reason I believe some of the content could be made into shorter bite-sized videos to help retain staff attention and reduce cognitive load by alter the methods of interactivity and how they encounter previous large chunks of data on the course.

Asynchronous Learning: The majority of staff prefer this style due to the amount of content being covered and need for them to complete the course when they have time available to them also there is no inhouse delivery team available and many staff work from home.

317 word count

The Who Commentary

To create my personas I used a mixture of data from staff members within the organisation and Chat GPT to assist in creating the images for my personas and assisting with refining the barriers to learning these users may encounter, and technology considerations based on existing data. I found this process of creating my learning personas really helpful in understanding the varied skills and experience and needs that people in my organization have.Key ConsiderationsFrom the data, I was able to ascertain that during the creation of his course my key considerations would be:

Outcomes

Barriers

Learning Gap

Click the buttons to see more information

Operational disruption: As a breach could result in our systems needed to be shutdown whilst specialist IT staff look to locate the breach and any viruses, Trojans or keyloggers left behind. Loss of Intellectual property: As the market leader we could lose highly sensitive information. Customer Trust Erosion: Any potential breach would likely lead to customers losing trust in us as a business to protect their and their customers data leading to a loss of sales or contract negotiations for customers wanting to leave. Employee Morale: Staff morale could also be affected especially if sensitive data has been leaked which would also affect our ability to retain and aquire talent in the organisation.

The risks to the business

The risks of being online are increasing every year, with 77% of companies experiencing at least one cyber incident in the last two years. It's crucial for businesses to implement and maintain strong security measures to help reduce these risks. Additionally, intelliflo faces a heightened risk in the financial services industry, which accounts for 18.2% of cyber attacks.

The business need

The Why of learning allowed me to see why this course is important for the business and what learning gaps exist along with any barriers that users are encountering.

The Why of learning

264 word count

Course Outcomes When creating the outcomes for this course I looked to use the SMART model to make sure each outcome was: Specific, Measurable, Achievable, Relevant and Timely. I then made use of Blooms Taxonomy to categories these outcomes into their correct cognitive domain to help ensure my learning objectives aligned with the course goals and assess the effectiveness of the course.

Staff Behaviour Many staff understand and appreciate the need for security awareness training however feedback and data showed us the time to complete, poor layout and large amounts of information to consume in just a text format was to much for many to take onboard and resulted in dis-engagement with they information. A course designed to engage with staff on this topic and make use of more interactive content such as video, audio and images as well as being inline with our brand image and guidelines will help to maintain their focus throughout the learning.

Why was this course required by the business Feedback from all levels of our business was that the third-party solutions were negatively affecting staff interaction with the content and that this was increasing the risk to the company. There was also internal reputational damage to the existing instructional design team, whom staff thought had created the course, which was not the case. The use of the third-party solution decreased engagement and increased negative attitudes towards security awareness. The need to bring this training in-house and for the analysis, design, development, implementation and evaluation to be done by staff who understand the organisation and its staff was clear.

The Why Commentary

Dealing with Threats

Cyber Security Risks

Information Security Risks

The Basics of Information and Cyber Security

Module

Module

Module

Module

In this section we look at the what of learning and what will be included in this course. The course itself will be made up a modular framework with its associated topics and linked to an associated one or more learning outcome. I used a Top-down approach to assist in the framework for the course to ensure the content met the learning objectives set out and ensure delegates have the required knowledge, skills by the end of the course. Select each of the tiles below for more information on each module.

The What of learning

150 word count

Outcomes The existing content and the course outcomes helped ensure the key information and points of learning for each module was at the forefront of the design process when creating the framework.

Approach to the design The initial steps for putting this course together were rather simple to as the business had much of the information that was needed already available allowing me to build the modular framework for the course with short meetings with SMEs to ascertain what key information should be focused on and structure of the topics being covered. The content was therefore split into four modules with four key topics in each breaking the information down further. I agreed with the SMEs the linear structure of the modules would allow staff to complete the learning in their time and that we would restructure the formats of large pieces of text into more accessible and engaging content such as video, imagery and other activities.

The What Commentary

Mode of Delivery

When deciding the mode of delivery I took into consideration that a vast majority of staff work from home and often have busy schedules. This means they need to flexible in their learning and be able to complete the learning when they have time available. For this reason i decided upon an Asynchronous design approach. In addition as there is no in-house delivery team and cost factors with bringing staff into the office so the mode of delivery will be via the intelliflo academy our in-house Learning Management System (absorb).This will ensure the course is accessible and enable staff throughout the UK to complete the course online, in their own time and reduce costs to the business.

In this part of the project, I looked at the following areas:

The How of learning

60 mins

Mandatory

  1. Quiz
  2. Simulations
  3. Feedback
  1. Knowledge check
  1. Multimedia elearning
  2. Instructional videos
  3. Infographics

Assessment

Activity

Content

Building Blocks and formats

Each module will be created using the following elements:

The How of learning

Select each of the tiles below for more information on each module.

Dealing with Threats

Cyber Security Risks

Information Security Risks

The Basics of Information and Cyber Security

Module

Module

Module

Module

The course modules will follow a linear flow, with video and context provided throughout with supporting information. Each module focuses on a key section of learning such as Basic information, Information and Cyber risks and how to deal with threats this will allow uses to dip into each module as and when they are available and focus on a key topic one at a time.

The Learning Pathway

The Learning Experience For the Learning Experience, I aimed to make sure each module could be completed within 15 minutes. I focused on using videos, images, and infographics to make my content delivery more engaging to help maintain the learners focus. Previously, users had to read through lengthy text and deal with numerous clicks and animation delays, so this approach aimed to improve this. The assessment questions ensure users are retaining the key information but again making use of hotspot questions to maintain engagement of the learner.

248 word count

The Learning Pathway The Learning Pathway and flow of the course was created as asynchronous and split into four modules to enable learners to complete the learning in their own time. The course content was naturally split into these four modules based on the content of the topics in each module. The start of each module will now have a short piece of video content and then take users through additional context and supporting resources which will then be followed by a short assessment before they progress to the next module.

Mode of delivery The Mode of delivery was decided upon due to a number of factors, the first being that the vast majority of staff are home workers and all staff have access to a work laptop. I also decided upon this mode of delivery because there is no in-house delivery team and the costs for travel, accommodation that would need to be associated with delivery at our only UK office in Wimbledon.

The How Commentary

Digital Learning Institute 2023, Exemplar 4 https://cdn.embedly.com/widgets/media.html?https%3A%2F%2Fview.genially.com%2F660fb7d072443d00146f32e8&display_name=Genially&url

LearnUpon Blog, Synchronous Vs Asynchronous Learning https://www.learnupon.com/blog/synchronous-learning-asynchronous-learning/

intelliflo brand hub, Stock images and logos (internal site)

Flaticon, Stock images https://www.flaticon.com/

Empower - Banks and financial institutions https://www.embroker.com/blog/cyber-attack-statistics/#:~:text=According%20to%20IBM's%202024%20Threat,has%20grown%20rapidly%20since%202019.

Digital Learning Institute, Module 2: Digital Principles - Module Wrap Up https://courses.digitallearninginstitute.com/courses/take/(2024)-module-2-design-principles/multimedia/50466094-module-2-toolkit

Digital Learning Institute, Module 1: Digital Learning Fundamentals - Module Wrap Up https://courses.digitallearninginstitute.com/courses/take/(2024)-module-1-digital-learning-fundamentals/multimedia/50466065-module-1-toolkit

Kaspersky (What is security awareness training?) https://www.kaspersky.com/resource-center/definitions/what-is-security-awareness-training

Part 1 - References

The scoping stage of this project enabled me to look more closely at my learners via the Personas that were created. I then took time to confirm the objectives for the course and looked to map the Learning Outcomes in a clear and structured manner so as to ensure learners are not overly saturated with information. This helped define in more detail the content and wireframe for the modules as well as video being the main delivery method for learners. This ensures the learning outcomes meets the needs to my learners.

Content Structure

Video content

Learning Outcomes

Target Audience

Scoping process

Outro

Why its everyones business

Show how security involved a mix of elements to be successful. People, Processes and Technology work in collaboration to maintain security.

The Consequences of a Cyber Attack

Explain the possible and far reaching consequences of a cyber attacks at Operational, Financial, Reputational and Legal level.

Information Security and Safeguarding Data

Explain to learners the CIA of information Confidentiality, Integrity and Availablility.

Basics of information and Cyber Security

Next Step

Module Summary

Outline the basic of information security and cyber security and systems and devices used for protecting your information.

Message leading the learner to the next module and what they about to see next.

Outline the key messaging and points learners should take away from the module.

Core Content

Outline of the topics to be covered in this module

Learning Outcomes

Explanation to users that by the end of this module you will be able to "Recall three examples of why cyber and information security is important in protecting company data."

Agenda

Hook

Introduction

Show a image of system hacked with a short introduction text with statistic of number of cyber attacks that take place every few seconds.

Security Awareness Course

At this point in the project I am looking to create a visual layout of the various elements of the course which will show the full module and how it will flow and guide users through the relevant information and how it is to be structured.

Wireframe

Security Awareness Course

Outro

Why its everyones business

Show how security involved a mix of elements to be successful. People, Processes and Technology work in collaboration to maintain security.

The Consequences of a Cyber Attack

Explain the possible and far reaching consequences of a cyber attacks at Operational, Financial, Reputational and Legal level.

Information Security and Safeguarding Data

Explain to learners the CIA of information Confidentiality, Integrity and Availablility.

Basics of information and Cyber Security

Next Step

Module Summary

Outline the basic of information security and cyber security and systems and devices used for protecting your information.

Message leading the learner to the next module and what they about to see next.

Outline the key messaging and points learners should take away from the module.

Content

Outline of the topics to be covered in this module

Learning Outcomes

Explanation to users that by the end of this module you will be able to: "Recall three examples of why cyber and information security is important in protecting company data."

Agenda

Hook

Introduction

Show a image of system hacked with a short introduction text with statistic of number of cyber attacks that take place every few seconds.

With the structure established, I moved on to planning the storyboard and scripting for the course. At this stage I selecting the visual content for the video, following the layout outlined below. My focus was on creating content that is engaging yet consistent for users, ensuring a cohesive look and feel aligned with our brand guidelines. I aimed to keep the visuals simple and clear while leveraging audio to enhance the overall experience.

Storyboard and Scripting

Below is the prototype design for this the first module in the course.

Prototype

869 word count

Video Considerations I opted for video content in these modules because the previous format relied heavily on interactivity, requiring multiple clicks and slow animations before users could access key information. User feedback highlighted that this made the content feel unnecessarily long and frustrating, with some sections requiring up to six clicks just to reach the relevant material. By switching to video, I aimed to streamline the experience, reducing wait times and making the content more engaging. For visuals, most imagery was sourced from our internal brand hub. However, some key assets were missing, so I supplemented them with free external resources where necessary. The voiceover was created using Wellsaid.io, which provides a more natural and engaging tone compared to Amazon Polly. In previous projects, Polly’s robotic sound received negative feedback, so this switch is a clear improvement. However, like most AI-generated voiceovers, pronunciation isn’t always perfect. As a company, we’re exploring better solutions, but in the meantime, I spent time refining the script and adjusting pronunciation to ensure the best possible outcome. The video elements were produced using Camtasia 2021, keeping animations clear, simple, and aligned with brand guidelines. I used smooth fade transitions to create a natural flow while ensuring the screens remained visually engaging but not overcrowded. The goal was to enhance the learning experience by making content easy to follow while maintaining a professional and polished look.

Develop Comments

Reflections The video covers the four main topics of this module, starting with a strong hook. I used the statistic that a hack occurs every 39 seconds, displaying a timer on-screen as the voiceover introduces the topic. The timer stops at 39 seconds, transitioning into the agenda. The goal here is to immediately grab learners’ attention and highlight the real-time relevance of cybersecurity even as they complete the course. The core content focuses on the types of information hackers target. To keep learners engaged without overwhelming them, I kept on-screen imagery minimal, showing only the key areas at risk and not showing text that was already being voiced. This approach ensures learners stay focused on the most critical threats without being overloaded with visuals or text on screen. Each section is designed to reinforce the foundational knowledge of what hackers seek, helping learners recall three key reasons why cyber and information security are essential for protecting company data. The final section of the module explores the consequences of a cyber attack. Here, we reflect on the potential financial, reputational, and operational impacts of a successful breach. This not only reinforces the importance of cybersecurity but also sets up a natural transition into Module 2, which dives deeper into identifying information security risks and where they can be found.

869 word count

Scoping Learner feedback from previous courses on this topic highlighted a lack of engagement and frustration with the content layout. The overuse of interactive elements and animations often led to long delays or excessive clicking just to access key information. To address these issues, I transitioned much of the content into video format. This change not only resolved the frustrations learners had raised but also helped keep them engaged while delivering the core messages more effectively. The goal was to ensure that learners could absorb and retain the key information from each module with simple onscreen graphics and voiceover.

Develop Comments

Visual design principles I applied key visual design principles using the C.R.A.P. framework (Contrast, Repetition, Alignment, and Proximity) to ensure a clean, professional, and engaging design for this module. Contrast: Ensured strong contrast between fonts and background for readability while maintaining a clear visual hierarchy using different font sizes and colors for headings and subheadings. Repetition: Maintained consistency in design by using the same fonts, colors, and branding elements throughout. This included aligning with the company’s prescribed imagery and graphical guidelines to create a cohesive look wherever possible. Alignment: Checked that all elements were properly aligned to keep the design structured and visually balanced. Proximity: Grouped related elements together to create logical connections and improve content flow, making it easier for learners to process the information. By following these principles, the design remains visually appealing, accessible, and aligned with both instructional best practices and our internal brand guidelines.

869 word count

Instructional design principles For this module, I focused on the preferences of my target audience (personas) and made sure to use relatable content when covering the fundamentals of information and cybersecurity. From the start, I set a clear and measurable learning outcome to keep the course structured and goal-driven. To engage learners right away, I incorporated a strong hook at the beginning, drawing them into the importance of the topic from the outset.

Develop Comments

Logos:

Color Palette:

Font: Athletics, Inter, Arial

Design Considerations My content design is somewhat restricted by our business brand guidelines. While I followed these guidelines as closely as possible, some elements required alternative imagery due to limited resources in our brand hub. We are currently in discussions with our brand team to expand these resources to better support future projects. Our internal brand guidelines specify that fonts must follow:

869 word count

Cognitive load management When designing this course, I kept cognitive load in mind, especially after feedback from the previous course. To make the content more manageable and engaging: I split information down into smaller, digestible sections to avoid overwhelming learners. Used clear headings, bullet points, and visuals to structure content effectively and improve readability. This approach helps learners absorb key information more easily without feeling overloaded.

Develop Comments

Digital Learning Institute 2023, Exemplar 4 https://cdn.embedly.com/widgets/media.html?https%3A%2F%2Fview.genially.com%2F660fb7d072443d00146f32e8&display_name=Genially&url

Digital Learning Institute, Module 6: Digital Learning Fundamentals - Video Based Learning Elective https://courses.digitallearninginstitute.com

Digital Learning Institute, Module 4: Digital Learning Fundamentals - Multimedia eLearning Design https://courses.digitallearninginstitute.com

Camtasia - Used to put together the prototype video (https://www.techsmith.com/)

ChatGPT (Ai assistance with making scripting suggestions or pronunciation alterations)

Wellsaid.iO: Used to create the Ai Voiceover elements https://www.wellsaid.io/

intelliflo brand hub, Stock images and logos (internal site)

Flaticon, Stock images https://www.flaticon.com/

Vecteezy - online free video content - used for short images used in prototype https://www.vecteezy.com

Digital Learning Institute, Module 3: Digital Learning Fundamentals - Learning Experience Design https://courses.digitallearninginstitute.com

A. James Clark - School of engineering - News story - Study Hackers attack every 39 seconds https://eng.umd.edu/news/story/study-hackers-attack-every-39-seconds?

Part 2 - References

The next step in this process is to focus on the implementation stage, ensuring a smooth and effective rollout. This involved several key considerations:

  • Learning Platform – Evaluating our platform and how it will fit with the course, considering its features and functionality and how this might support learner engagement.
  • Staff and Resources – Identifying the necessary support, including technical assistance and instructional resources, to facilitate a seamless launch.
  • Go-Live Plan – Structuring a clear rollout plan to fit the specific needs of this course.
  • Learner Engagement – How I plan to encourage participation and retention, with a focus on their effectiveness and relevance to the learners. This stage ensures that all elements are in place to maximize the course's impact and create a positive learning experience.

Implementation

Click the interactive elements below to see more details on the various sections:

Staff

Accessibility

Learning Platform

Assessment & Feedback

Reporting

Layout of the course

Learner Engagement

Go Live Plan

Resources

Implementation

Staff

User Access

LMS

664 word count

Reflection:Up until three years ago, I never really thought much about the implementation phase. Our usual approach was to launch a course and expect users to complete it—a kind of "build it and they will come" mindset. However, in recent years, our Instructional Design Manager and Senior Management have encouraged us to take a more proactive approach. Now, we focus on driving engagement through internal marketing, Slack channels, and targeted notifications to management teams. This ensures key stakeholders are aware of the work being done and helps get others just as invested in the course's success as the Instructional Design team.I feel its important to think about the overall effects of rollout plans can have as it really does affect our business given we have such small teams. It also allows us to start looking at engagement and harder points to quantify such as actual return on investment from the interventions we create.

Implementation Commentary

664 word count

Cognitive Load - Death by powerpoint

I’ve really enjoyed learning about Instructional Design Principles, Multimedia Learning Design, and frameworks like C.R.A.P. (Contrast, Repetition, Alignment, and Proximity). These concepts have given me a deeper understanding of how to design more effective and engaging learning experiences. In my current work environment, cognitive load is particularly relevant. We often deal with large amounts of information on a very dry subject Finance, so finding ways to distill content into clear, concise messaging is essential for learner retention. A great example of cognitive load that resonated with me is linked below—something my line manager introduced me to, and I’ve found it extremely useful in my own approach to learning design. This course has also made me reflect further on the limitations of our LMS, particularly around question types. Having a wider range of interactive assessments, such as hotspot simulations and drag-and-drop activities, would significantly improve learner engagement compared to traditional multiple-choice questions. Additionally, I believe we could leverage our internal system-generated phishing attacks as a real-world learning tool. Simulating how hackers attempt to access personal and business data would provide practical, hands-on experience for users and reinforce cybersecurity awareness. I think this is an area worth exploring further as a business.

Implementation Commentary

Outcome based evaluation allows me to look at the impact the learning has had on the learners knowledge, skills and behaviours. looking at the application of these on-the-job.

Process based evaluation we look at each stage of the ADDIE process and obtain feedback from the key stakeholders to assess the Analysis, Design, Development and Implementation and If they have been successful and what further improvements or tweaks could be made in future iterations.

Goal-based evaluation helps me determine whether my solution, in its current format, effectively addresses the business need and closes the learning gap.

Outcome Based

Process Based

Goal Based

In this final stage of ADDIE I looked at the evaluation process and the three type of evaluation which are Goal based, Process based and Outcome based.

Evaluation Types

Learner results will be assessed on if staff have an increased understanding of security awareness and actively using the internal tools and reporting structure when issues arise.

Learner behaviour will be evaluated via management and tested with simulated emails simulating attacks to assess if staff behaviour identifies these threats and action them accordingly.

Level 4: Results

Level 4: Results

Level 3: Behaviour

Level 3: Behaviour

Level 2: Learning

Learner learning will be assessed via knowledge checks after each module and a final assessment to evaluate learning objectives.

Learners reactions will be assessed via the knowledge checks in the course and the feedback at the end of the course.

Level 2: Learning

Level 1: Reaction

Level 1: Reaction

I have chosen the Kirkpatrick model to evaluate this course as its the most widely used frameworks and allows be to access learners at four levels.

Kirkpatricks Model

Community
Comms and Connections
Reflective Design
Behavioural Design
Text
Elements
Images

For the UX evaluation, I’m using the UXDL Honeycomb model to assess the user experience. As the instructional designer for this course, it’s my responsibility to work with the SME to ensure all information is accurate and correct, including any reworded or simplified sections. Whilst we will refine and improve the content based on testers feedback at soft launch and improve the course fore go live upon go live further updates based on user feedback will need to be scheduled in for update unless there is a significant issue identified due to limited time and resources within the business. Click the icons to see more information based upon the UCDL Honeycomb Model Checklist:

UX Evaluation

Executive Functions

Expression & Communication

Physical Action

Comprehension

Language & Other Expressions

Perception

Self Regulation

Sustaining Effort and Persistence

Sustaining Interest

Action & Expression
Representation
Engagement

I have chosen the Universal Design for Learning (UDL) Evaluation checklist provided during Module 11 to evaluate learner Engagement, Representation and Action & Expression and how well the learning experience aligns with the UDL principles. Within our business, Either an Instructional Designer or the ID manager is responsible for tracking and evaluating these areas for the team and the business however will also be able to link with SMEs and other line managers if required.

UDL Evaluation

Source Data

Monitor the data

Gather Insights

Analyse the data

Take Action

The Learning Analytics will be used to support our learning design and improve our learning outcomes.this will be done via a step-by-step analytics process of Sourcing data, Analysing the data, Monitoring this data for patterns or preferences, Gather insights to develop learning personas and lastly take action based upon the insights gained before starting the process again.

Learning Analytics

715 word count

Reflection:The evaluation stage of the course is something I have found to be really difficult. This is due to much of the data I need to get that is valuable is not in a ready to use format and has to be manipulated before it starts to become useful.Within our small team time is not something we have a great deal of and often aspect such as this get overlooked.I enjoyed looking at the evaluation process in three stages and also the learning analytics stages and its clear the massive benefit these can have of the learning we create and updates that are made.This module re-affirms my belief that the systems we are currently using are not fit for their purpose and that are outdated and lacking the functionality we need as a business. LMS: Currently our Absorb LMS presents several challenges for us, particularly around customization and reporting. While it offers some flexibility, its customization options are limited and basic functions provided by its competitors are a paid addon with absorb, making it difficult to tailor the platform to our specific needs. Additionally, its reporting and analytics capabilities lack the depth and flexibility required to extract meaningful insights for our business. Beyond these limitations, we want to create a more integrated learning environment by seamlessly connecting our knowledge base in intelliflo connect with our LMS. Absorb does not provide the level of integration we need, which has led us to explore alternative solutions as we move towards the end of our contract. As a result, we have a consensus among team members that Intellum, which offers stronger customization, reporting, and integration capabilities to better support our goals for both a knowledge base and LMS.

Evaluation Commentary

715 word count

Evaluation Approaches:I was well aware of Kirkpatricks model having been in learning and development for the past 20 years and has therefore always been one I have come across the most often. I had heard of Kaufmans 5 and Ciro however LTEM is not one have have come across before and does interest me as measuring ROI is something I have always found difficult. Within intellifo effectiveness of our learning interventions using Kirkpatrick’s model presents a few challenges our business is a financial software business. While the model's four levels Reaction, Learning, Behavior, and Results give us a well structured approach for measuring real impact its difficult in a software environment where many of our customers must self-serve to learn the software. Level 1 (Reaction), we can gather feedback on course satisfaction, but this doesn’t indicate actual learning. Level 2 (Learning) is harder to assess when users engage with different learning resources across various platforms where data is harder to access and need to be manipulated before real results can be assessed. The biggest challenge is at Level 3 (Behavior) and Level 4 (Results), Its extremely difficult to tracking how customers apply learning in real-world scenarios especially when they use multiple learning interventions for large topics. Understanding the true effectiveness of our training and its impact on customer success is hard hense why we are looking to bring a more connected LMS and community platform together to hopefully attack and address some of these issues better. I will be interested to look at LTEM and explore alternative evaluation models that better align with our environment, focusing more on engagement analytics, learning support, and long-term user success.

Evaluation Commentary

715 word count

Learning Analytics:This was a particularly engaging part of the course for me, as it highlights an area where we face significant challenges in our current business. Data collection and analysis remains a time-consuming process for us. It often requires extensive manual effort. At present, gathering statistics takes longer than it should, and much of the data we need for quick decision-making is either inaccessible or fragmented across different systems. Having real-time insights readily available would be an amazing benefit to have, currently we frequently have to download data and manipulate it in Excel or other tools just to generate even basic analytics. This process not only delays our ability to act on insights but also increases the risk of errors and inconsistencies. Ideally, we need a more streamlined, automated reporting system that allows us to access and visualize key metrics on dashboard for our specific department which would enabling us to make more informed, data-driven decisions and be far more efficient. With our current dataset, we should be able to extract valuable insights from user interactions, SME feedback, and assessment results. Additionally, we can create discussion forums to gather community and SME input and align on future updates, ensuring that any course improvements are informed by real user needs before implementation.

Evaluation Commentary

Kirkpatricks Evaluation Model https://www.kirkpatrickpartners.com/the-kirkpatrick-model/

Intellumhttps://www.intellum.com/

Digital Learning Institute 2023, Exemplar 4 https://cdn.embedly.com/widgets/media.html?https%3A%2F%2Fview.genially.com%2F660fb7d072443d00146f32e8&display_name=Genially&url

University of Waterloo, User Experience Design for Learning (UXDL), articles and honeycomb icon https://cms.cel.uwaterloo.ca/honeycomb/index.aspx

Digital Learning Institute, Module 11: Digital Learning Fundamentals - Multimedia eLearning Design https://courses.digitallearninginstitute.com

intelliflo brand hub, Stock images and logos (internal site)

Absorb LMS https://www.absorblms.com/

Digital Learning Institute, Module 10: Digital Learning Fundamentals - Learning Experience Design https://courses.digitallearninginstitute.com

Digital Learning Institute 2023, Exemplar 1 https://view.genially.com/64c23580b923220018f5ca29/presentation-dli-project-phonics-training-for-families

Part 3 - References

Scene: In this video, we will be looking at four key areas that are essential to understanding and maintaining security in today’s digital world: 1. Information and Cyber Security – What these terms mean and their importance in protecting our business. 2. Information Security and Safeguarding Data – How to protect sensitive and valuable information from threats. 3. The Consequences of a Cyber Attack – What happens when security is breached and how it can impact our organization. 4. Why It’s Everyone’s Business – Understanding the role each of us plays in building a secure environment. Let’s dive in and explore how we can all contribute to keeping our business and its data safe.

Script

Scene: 50secs Blue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Image on screen Text on screen showing titles of each section animated in.

Agenda - Storyboard

The data gathered during the source data phase will require further manipulation before it can be assessed. Charts and graphs for the data will need to be created using other tools within the business such as excel and other reporting tools the data can be fed into. Other data such as video analytics within wistia can be viewed within this platform as can the user feedback and quiz results.

Analyse the data

The Instructional Design team at Intelliflo has been operating for three years, and we're a small but dedicated team of four—one Instructional Design Manager and three Instructional Designers. However, only one team member has extensive experience in this role, while two others are still building their expertise—one of whom has a 16-year background in training. Over the past few years, much of our focus has been on establishing solid instructional design processes and workflows to create a consistent and efficient approach to not just course but also content development as a whole. This course has given me a new perspective on just how lean our department is and the many hats we all have to wear—balancing content creation, answering queries, and managing multiple responsibilities. It’s also made me reflect on potential future roles as the team continues to grow.

Staff

Scene: By the end of this module you will be able to recall three examples of why cyber and information security is important in protecting company data.

Script

Scene: 10secs Blue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Outcome text shown on the screen animated in

Storyboard

Comprehension

Activate Prior Knowledge

  • Link back to previous modules to reinforce learning.
  • Enable access to past training sessions within the LMS platform.
  • Use integrated learning pathways to guide learners through their learning journey.
Organize Offerings Visually
  • Provide different course outlines for various offerings.
  • Clearly distinguish between different courses or programs.
  • Use visual banners to represent offerings effectively.
  • Structure courses in a way that ensures easy navigation.
  • Utilize built-in platform features to enhance navigation.
Maximize Transfer
  • Use checklists to support learners in their studies.
  • Provide templates for assessments and skill-based learning activities.
  • Allow learners to revisit completed materials and review past content.
  • Ensure a clear and efficient enrollment process for platform access.

Steps

Staff

The Instructional Design team is responsible for rolling out courses but can request support from other areas within the broader L&D team when needed however the majority of roles such as UXD etc is our ID team. Digital Instructional Design Manager – Oversees the project, manages the Jira board for course creation, and monitors progress. They work closely with stakeholders to ensure a smooth rollout and that key milestones are met. Instructional Designers – Handle the course testing phase, gather feedback from a sample user group, and make necessary adjustments. They collaborate with SMEs on any complex issues they cannot resolve independently. Additional Responsibilities of Instructional Designers – Beyond testing, they are responsible for content creation, user experience design, and developing course materials and resources. They also build the course within the LMS, with one instructional designer specifically overseeing reporting and compliance requirements. Community Manager – Is responsible for the running of our intelliflo community mainly for client facing customers however is also able to manage community pages for the internal staff within the business who would be completing the course and would be responsible for messaging and linking into marketing for communication.

Quiz

Knowledge check

Video

15 mins

Mandatory

Assessment

Activity

Content

Module 3 Cyber Security Risks

  • Are the icons meaningful and do they enhance learning?
  • Are the elements used consistently?
  • Are all elements properly aligned?
  • Is the overall design consistent?
  • Have brand guidelines been applied effectively?
Elements

Our experience with Absorb LMS has highlighted several challenges, as many features that are considered basic functionality in other LMS platforms are treated as add-ons in Absorb. While we are currently tied into a contract, we have been actively discussing the possibility of switching to a more capable LMS one that better meets our needs and offers greater flexibility for the business. A key consideration is integration with our knowledge base, ensuring the LMS not only supports training but also enhances user engagement and accessibility to key resources. This course has given me a deeper understanding of the limitations of our current LMS and how these gaps impact user engagement, adoption, and overall platform management for both staff and administrators.

LMS

  • Have all Learning Outcomes been addressed in the design?
  • Are Learning Outcomes assessed through formative or summative methods?
  • Have both macro (holistic) and micro Learning Outcomes been designed?
  • Are learners aware of the Learning Outcomes?
Reflective Design

Sustaining interest

Optimizing Autonomy

  • Offer a choice of learning material formats (e.g., videos and written content on the same topic).
  • Enable learners to adjust their profile settings within the platform.
  • Provide flexibility in assignment submission formats to accommodate different learning preferences.
Enhancing Relevance
  • Use diverse sources of information that are inclusive of different ages, cultures, and genders.
  • Design activities that clearly align with learning outcomes.
  • Create e-tivities that promote active participation, exploration, and experimentation.
  • Incorporate opportunities for complex and creative activities within the platform and programs.
Minimizing Distractions
  • Utilize platform features like calendars and schedules to help learners stay organized.
  • Establish clear communication channels and set routines for announcements, notifications, chats, and teleconferencing.
  • Keep platform design clear and focused, avoiding unnecessary or ambiguous content.

  • Are learners aware of all communication channels with instructors?
  • Are learners informed about communication channels with their peers?
  • Have discussion forums and FAQs been provided for common questions?
  • Is there a dedicated space for sharing opinions and ideas within the program?
Comms and Connections

Users access the LMS through Single Sign-On (SAML), which is managed by our internal system and automated workflows in Salesforce. When a user is created in the system, workflows automatically assign them to the appropriate group and role. This setup allows for auto-enrollment in courses and also gives managers additional permissions to track their team's activity and completion reports. Managers can ensure all staff have completed required training, follow up with those who haven't, and provide support to anyone struggling with the course content or LMS navigation.

User Access

Module Overview: We look at how information security can be compromised. It looks at common threats and weaknesses within organizations and the risks associated with user accounts and access privileges for users. Learning Outcome: Identify ways in which information security can be breached Topics: 1. Threats to information security 2. Potential Organisational vulnerabilities 3. Areas at risk 4. User Accounts and Privileges

Module 2

Scene: Great job on completing module one! Up next, in module two, we’ll dive into Information Security Risks.

Script

Scene: 15 secs Blue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Title on screen: Next Steps Text on screen: Great job on completing module one! Up next, in module two, we’ll dive into Information Security Risks.

Next Steps- Storyboard

Expression & Communication

Multiple Media for Communication

  • Offer various assessment submission formats beyond written responses.
  • Enable embedding of external tools within the platform.
Multiple Tools for Construction and Composition
  • Integrate spell and grammar check tools within the platform.
  • Utilize built-in functionalities for calculations.
  • Allow integration of web applications.
  • Support text-to-speech capabilities.
Scaffolding Support
  • Provide multiple feedback methods, including audio feedback.
  • Offer learning pathways that adapt to different skill levels and learner needs.

Sustaining effort and persistence

Focus on Learning Outcomes

  • Provide a dedicated space on the learning platform to display Learning Outcomes.
  • Use a checklist for Learning Outcomes, allowing learners to track and tick off achievements.
Foster Collaboration and Community
  • Create online spaces that support and encourage community building.
  • Provide clear instructions for group work expectations.
  • Encourage learners to participate in online discussions.
  • Moderate online spaces to ensure engagement and appropriate interactions.
  • Consider grading online interactions to promote meaningful participation.
Increase Feedback Opportunities
  • Utilize all available feedback tools, such as rubrics, individual feedback, group feedback, and audio feedback.
  • Provide timely feedback to support learner progress.
  • Ensure the learning platform retains copies of feedback for future reference.

Content

Content will be delivered to learners via various multimedia such as: Onscreen text The use of upbeat and casual tone of voice and text to engage learners and to help support accessibility. Instructional videos To help simplify content and help assist in retention of key topics. Infographics Will be used to visualise data and break down information into bite-sized chunks.

Scene: Every 39 seconds, a cyber attack occurs. Imagine… it could be your business operations, your customer data, or even your reputation at stake. Cyber criminals don’t discriminate; they exploit vulnerabilities wherever they find them. In today’s interconnected world, protecting sensitive information and systems isn’t just a technical responsibility. it’s a business imperative. Whether it’s safeguarding your organization’s data or mitigating the consequences of a breach, cyber security is no longer just an IT department concern it’s a shared responsibility. Let’s explore why building a culture of security awareness is critical to protecting your business and how every individual can contribute to a stronger, safer workplace.

Script

Scene: 48 seconds Blue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Timer counting up to 39 seconds and stopping with videos of hackers in background.

Hook - Storyboard

The data gathered during this process will enable us to develop and create personas more in touch with our learners. and allow us to gain insights into:

  • Is the time spent on the course show users are engaging with content or trying to fly through the info.
  • Course completion times will show if learners are spending time to understand the content.
  • Course Progess will show if learners are having issues or if the flow of the content is making them disengage.
  • Learner and SME Feedback will let us see if they feel the course is engaging and helping them understand the risks to the business and how they might be affected.
  • Video watch time Analytics lets us see if users watch or skip through the content.
  • Assessment \ knowledge check results let us see if the questions are too easy and if users are understanding the risks to the business and how we want them to act.

Gathering Insights

Assessment and Feedback

Although Absorb LMS is limited to multiple-choice questions for assessments—unless subscribed to Absorb Create, which we don’t currently have we can bridge this gap using Genially. This tool allows us to create more interactive assessments, including multiple-choice, drag-and-drop, and hotspot simulations, enhancing the evaluation process. Absorb does offer question banks, enabling randomized question pools. If a learner fails, they won’t necessarily see the same questions again, encouraging a deeper understanding of the topic rather than rote memorization. Each question can also include customized feedback, helping learners understand why an answer is incorrect and guiding them to the correct response. Where necessary, feedback can direct learners to relevant course sections or external resources to reinforce learning. Assessment data, such as the number of attempts and time spent, can be reviewed to identify trends—like learners rushing through content. These insights can be shared with managers to address engagement or comprehension concerns.

Data will be able to be sourced from the intelliflo academy (Absorb LMS) from its course database assessment results and feedback forms with Wistia our video hosting platform also providing video analytics.The type of data we will be able to collect will be:

  • Time spent On the course
  • Course completion times
  • Course Progess
  • Learner and SME Feedback
  • Video watch time Analytics
  • Assessment \ Quiz results

Source Data

Quiz

Knowledge Check

Video

15 mins

Mandatory

Assessment

Activity

Content

Module 2 Information Security Risks

Scene: Information security isn’t just an IT issue, it’s a business-wide responsibility. It impacts every part of the organization and requires collaboration between People, Processes, and Technology to be effective. Let’s break it down: 1. People – Each individual has a role to play. Users must follow basic security principles, like choosing strong passwords, avoiding writing them down, being cautious with email attachments, and identifying suspicious websites or links. 2. Processes – Organizations need clear policies and procedures. This includes having an incident response plan to handle cyber attacks, whether they’re successful or not. For instance, a network technician should have a defined process to securely build and configure workstations to reduce risks. 3. Technology – The right tools are essential. Firewalls, antivirus software, and other security technologies help protect businesses and individuals from cyber threats."

Script

Scene: 1 minBlue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Text on Screen: Why its everyones business Image: Image of 3 cogs on screen for People,Processes and Technology Transition to Image: Cog People Transition to Image: Cog Processes Transition to Image: Cog Technology

Why its everyones business - Storyboard

Activity

The activity sections will be where learners are asked to complete a knowledge check or complete a onscreen simulation to demonstrate their understanding and comprehension of the topic covered.

Accessibility

Video – Videos will have functionality, including screen enlargement, adjustable picture quality, and closed captions for accessibility, as well as a transcript. Images – All images used will be high-quality images in the prototype from external sites and will be sent to an external agency to create on-brand imagery. Text – Video text and Course text will be: The agreed Brand font and sizing. The course structure will include headings to improve learners' navigation and readability. Brand colours and guidelines will be followed to ensure good contrast between text and background for accessibility. Hyperlinks will be clearly labelled to ensure they make sense in context. Devices – The LMS and all course content will be fully accessible on PCs, laptops and tablets for flexibility in learning. Assessments – A variety of assessment formats will be used to keep engagement high. Feedback to users will be clear and precise, with examples given to ensure understanding.

Resources

Absorb has been the main LMS for the business for a number of years and for this reason various elements do not need to be addressed such as:

  • Customisation of themes: The themes have been in place and are set for various area of the business including internal staff seeing one thing and external clients seeing another theme.
  • User access: All new staff and new clients automatically gain access to the intelliflo academy (absorb) as part of user setup within the business this is a fully automated process.
  • Administrators of the LMS - The LMS is administrated by the Instructional Design Team and we have all been proficient in using the system for a number of years.
Paid licences for applications for course creation are also in place.

Scene: Let’s recap the key points from this module and focus on three examples of why cyber and information security is so important in protecting company data. First, Preventing Security Breaches and Disruptions: A security breach can disrupt business operations, causing delays, loss of productivity, and frustration among employees. By protecting systems and data, we ensure continuity and efficiency. Second, Mitigating Financial and Legal Risks: Cyber attacks can lead to theft, ransom payments, and costly repairs. Protecting sensitive data reduces the risk of financial losses and legal penalties. And third, Preserving Reputation and Customer Trust: A breach can harm your company’s reputation, leading to lost customers and strained partnerships. Strong security practices maintain trust and ensure long-term success. By focusing on these three key areas, we can better understand how cyber and information security safeguard not just data, but the overall health and success of the business.

Script

Scene: 1 min 10secs Blue background (intelliflo blue): #002dd4Text font (intelliflo): Athletic Text on Screen: Summary with text for three key points also Image: Shield Icon next to each point

Summary - Storyboard

References section below:

Commentary section below:

Analysis and Design section below:

📇 References

🎤 The What Commentary

🎤 The Why Commentary

🎤 The How Commentary

🎤 The Who Commentary

📄 The What of Learning

📄 The Why of Learning

📄 The How of Learning

📄 The Who of Learning

Analysis and Design

Language & Other Expressions

Vocabulary and Symbols

  • Utilize a glossary function to support learning.
  • Ensure platform terminology aligns with organizational language (e.g., "grading" vs. "marking").
Sentence Structures and Language Support
  • Enable options for multiple languages and different writing systems.
  • Activate additional language settings if needed.
Decoding Text, Math, and Symbols
  • Provide Text-to-Speech functionality within the platform.
  • Ensure all math symbols are properly recognized by the system.

Scene: The financial cost of a cyber attack can be staggering. A breach can lead to: Theft of valuable or financial information, Ransom payments, Inability to conduct online transactions, Repair costs for systems and devices, often involving hundreds of work hours. On top of that, businesses may face: Regulatory fines, Legal costs, Compensation claims from customers or staff And, lost revenue. A security breach can also severely harm your company’s reputation. resulting in: Negative press coverage Loss of customers and contracts A drop in share price And even a knock-on effect on suppliers and partners Rebuilding trust with customers and stakeholders takes significant time and resources.

Script

Scene: 50 secs Blue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Text on Screen: Financial Impact Image: Icon for financial impact on screen Text on Screen: Reputational Impact Image: Icon for Reputational impact on screen

The Consequences of a Cyber Attack - Storyboard

The Learning Gap

Previously using third party organizations to provide this training has resulted in poor staff engagement with the content and increased negative attitudes to this subject. Feedback from delegates has been that there is too much text on screen and a extremely large number of clicks require just to work through the content and long delays due to animations and transitions meaning staff struggled to retain the information and as a result increasing the risks to the business.

The aim of this course is to help staff understand the types of risks they may encounter on a daily basis across the business and the processes they should follow if they suspect that an unauthorized third party has gained access to or breached our data and security.

  • A large majority of staff are home workers with their only access to work systems being via a work laptop.
  • Many staff have busy schedules and other external influences meaning they have limited available time to complete courses.
  • Many of our staff have a technical IT background and feel as they are tech savvy they would not fall for certain attacks no matter how sophisticated they might be.
  • A small number of staff have never taken an elearning course but have heard of the negative feedback directed towards previous courses.
Barriers to learning

Scene: So, what does information security have to do with you? A security breach can affect not only the business but also your personal and professional life. Financial losses from a breach could impact company operations—and even jobs. By staying aware of security risks, you can help support your organization’s security efforts and avoid preventable mistakes. Remember, information security is the responsibility of everyone in the organization. From locking devices to being mindful of where you discuss sensitive information, small actions make a big difference."

Script

Scene: 40secsBlue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Text on Screen: What does information security have to do with you? Image: Image of Business icon and individual person icon

Why its everyones business - Storyboard

Quiz

Knowledge check

Video

15 mins

Mandatory

Assessment

Activity

Content

Module 4 Dealing with threats

Images
  • Do the images support learning?
  • Are there any unnecessary or redundant images?
  • Have you ensured the images are appropriate and not offensive?
  • Do the images enhance understanding of the content?
  • Are any images being cropped, and if so, does it impact their effectiveness?
  • Is the learning experience designed for easy navigation?
  • Can all materials be accessed easily?
Behavioural Design

Learning Outcomes

Learning Outcomes

I also took time to review the course content and its outcomes to ensure learners would understand the subject of information and cyber security and be able to then meet the learning outcomes set out in the course for each topic being covered.

Perception

Customized Interfaces

  • Allow learners to adjust text size, images, and tables for better readability.
  • Provide options to change contrast between the platform and text.
  • Enable settings to manage video and audio preferences.
  • Ensure print functionality is available and customizable.
Visual and Auditory Options
  • Include descriptions for images to improve accessibility.
  • Provide captions for audio and video content.
  • Ensure the platform meets accessibility standards.

Scene: Bank Details: These include bank statements, online banking log-in details or data, sort codes, account numbers, or any correspondence between your organization and its bank. Personal Details: Information that identifies an individual, like copies of passports, job applications, or contact details. HR Records: Details such as salary information, staff absences, and disciplinary records. Financial Records: These include company accounts and sales contracts and individual client records. Business Records: Client data, business plans, and management documents are critical to the success of the organization. Intellectual Property: Unique business processes, designs, and patents that give us a competitive edge. Protecting this information isn’t just about compliance it’s about ensuring the success, trust, and resilience of our business. Remember, information security is everyone’s responsibility.

Scene: 1 min Blue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic White icons animate in around a shield as each point is narrated

Scene: Information security is essential for protecting our business. It safeguards the confidentiality, integrity, and availability of our most valuable information against risks. But what exactly qualifies as 'valuable information'? Let’s take a closer look at some examples."

Script

Scene: 20secs Blue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Title on screen: Basics of information and Cyber Security

Basics of information and cyber security - Storyboard

Module Overview: An overview of the importance of information and cyber security in protecting company data. It includes best practices for data protection, the impact of cyber attacks, and the role everyone plays in keeping data secure. Learning Outcome: Recall three examples of why cyber and information security is important in protecting company data. Topics: 1. Information and cyber security 2. Information security and safeguarding data 3. The consequences of a cyber attack 4. Why its everyone's business

Module 1

Scene: Information security and cyber security are essential for protecting one of the most important organizational assets - information. This involves safeguarding the Confidentiality, Integrity, and Availability of information, often referred to as the CIA Triad, as well as the platforms where this information is stored." Without protecting these three critical elements, an organization cannot function effectively. Whether the information is digital or in hard copy, compromising confidentiality, integrity, or availability can cause serious harm to the organization. Let’s explore each element of the CIA Triad." First, Confidentiality: This ensures that information is not disclosed or made available to unauthorized individuals, entities, or processes. Protecting confidentiality means ensuring sensitive information is accessed only by those who are authorized. Next, Integrity: This ensures the information is accurate and complete. It’s about maintaining and safeguarding the trustworthiness of data throughout its lifecycle.

Script

Scene: 1min 15secs Blue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Shield icon on screen Fade in the CIA triad image on screen Each section is highlighted as points are narrated.

Information Security and Safeguarding Data - Storyboard

Features of Absorb Absorb LMS is designed to be intuitive and easy to navigate. It’s mobile-friendly and allows for personalized learning paths, so users can access courses anytime, anywhere. Assessments and quizzes offers us limited question type of multiple choice, You can also set up adaptive learning paths based on quiz results, apply time limits, and even randomize questions. Reporting & Analytics allow for real-time insights with custom dashboards to track learner progress, and the ability to automate compliance and certification reporting or to Scheduled reports which can be sent automatically. Customisable Theme is also possible with internal learners seeing or One intelliflo brand theme and external learners seeing the intelliflo theme based on custom branding. Multi-Device Access – Learners can access courses on desktop, tablet, and mobile devices, making it easy to learn on the go. Offline learning options are also available. Automated Notifications – Keep learners on track with automated reminders for assessment deadlines, upcoming course completions, and certifications that need renewal.

Absorb LMS intelliflo currently have a signed agreement with the Absorb LMS Software. This is used to deliver internal and external courses to staff and our customers.

Learning Platform

As learners enroll in the course, I can pull data from Absorb to track their progress. This includes their department, completion date, section scores, and time spent in each module. All of this information can also be exported to Excel, making it easy to expand reporting or share insights with department managers or senior management who do not have admin access to the LMS.

Reporting

Scene: A successful cyber attack can cause major damage to a business, disrupting operations, damaging finances, and eroding trust. But what exactly is a security breach, and what are the potential consequences? A security breach occurs when sensitive information, whether personal or business, is accessed, lost, changed, destroyed, or disclosed without authorization or by accident. It’s a single event, but its impacts can ripple across every area of a business. Let’s break down these impacts into four key categories." Operational disruptions often trigger other forms of damage. A breach can lead to: Business process interruptions A loss of productivity Staff being unable to work And, frustration for employees and co-workers. These disruptions affect day-to-day activities, potentially grinding operations to a halt.

Script

Scene: 1 min Blue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Title on screen: Consequences of a Cyber Attack Image: Laptop which transitions to security shield breaking Text on Screen: What is a Security Breach? Text on Screen: Operational Disruption Image: Icon for operational disruption on screen

The Consequences of a Cyber Attack - Storyboard

  • Have you monitored learning patterns and community development?
  • Are you actively fostering online communities?
  • Is there moderation in online discussions?
  • Have you provided opportunities for learners to connect, such as introductions?
  • Are you checking in with students who are falling behind?
  • Are you responding to queries and feedback on the course/program?
Community

Physical action

Navigation and Response Options

  • Adjust assessment settings to allow flexibility in time and speed, including extra time for learners with specific needs.
  • Enable free navigation so learners can access materials at their own pace.
  • Ensure learning materials can be accessed using different input methods, such as hand, voice, or joystick.
Optimize Assistive Technology
  • Enable platform features that support integration with various assistive tools and technologies.

Scene: Businesses are legally required to protect personal and financial data under national and international regulations. Failure to deploy proper security measures can result in: Fines and sanctions from regulators Court cases and legal costs And in severe cases, even imprisonment Cyber attacks are more than just IT issues, they’re business risks with far-reaching consequences. By understanding the impact of a breach, we can take proactive steps to safeguard our organization, protect our data, and maintain trust with our customers and stakeholders.

Script

Scene: 30secs Blue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Text on Screen: Legal / Regulatory Impact Image: Icon for legal on screen Image: Shield appears on screen

The Consequences of a Cyber Attack - Storyboard

Module Overview: This module highlights how users can safeguard our people and assets, looking at identifying suspicious activities, and understanding the process for reporting potential security threats. Learning Outcome: Explain the ways in which our organisation can protect staff and our assets. Demonstrate how to recognise and report cyber and information security threats. Topics: 1. Protecting staff and assets 2. Spotting malicious activity 3. If something looks suspicious 4. Important Documentation

Module 4

Recall three examples of why cyber and information security is important in protecting company data.

The content within the video will cover 4 main topics.. This will ensure the key information for each topic is covered and learners will have sufficient knowledge to achieve the outcomes of the course.

Why its everyone's business

The Consequences of a Cyber Attack

Information Security and Safeguaring data

Information and Cyber Security

The Basics of information and Cyber security

Learning Outcomes

Topics

Key:

Content Structure

Content Structure

With this data and insights, we can make informed decisions and implement changes to enhance the learner experience for future users. Potential improvements include:

  • Adjusting course length – Extending or shortening content as needed.
  • Refining structure – Reorganizing sections for better clarity and flow.
  • Enhancing content – Modifying text, images, or messaging for greater impact.
  • Updating assessments – Improving knowledge checks to address key business challenges.
  • Adding support – Incorporating additional resources to better assist learners.

Take action

Learner Engagement

As part of the roll out learner engagement will be required to ensure the course is a success and this will require work with many managers and teams to ensure it reaches all areas of the business:

  • Slack Posting - As the live launch date approached we will use communal chat channels within slack to notify users that the course is due for completion shortly and of its new look and feel.
  • Emails - On go live users will receive a email notification that they have been enrolled within the course and that their new certificate must be updated accordingly.
  • LMS - within the LMS all staff required to complete the course will see the course within their main course bar notifying them it is due for completion.
  • Internal Confluence Intranet pages - Internal pages will be updated to notify users that the course has been released and re-designed.
Content within the course will use of stats and messaging to keep learners engaged on each topic making the information relatable with real examples.

Assessment

The assessment portion will take place at the end of the course where learners will be asked to complete a 20 question assessment.This will include multiple choice questions as well as simulated hot spot questions for learners to answer. Feedback will also be provided to delegates as part of the online assessment to facilitate their comprehension of topics.

The ID team and ID team manager will be responsible for monitoring this data across various platforms and tools, with senior management receiving regular updates. Some data will also need to be collated and presented in an engaging, visual format for clarity and impact.

Monitor the data

Scene: Finally, Availability: This ensures that information is accessible and usable on demand by authorized entities. In other words, the right people have the right access to the right information when they need it. By safeguarding the Confidentiality, Integrity, and Availability of information, we ensure the security of our organizational assets and maintain the trust and functionality of our business. Together, these three elements form the foundation of strong information and cyber security.

Script

Scene: 30secs Blue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Points are highlighted as narrated

Information Security and Safeguarding Data - Storyboard

'Recall three examples of why cyber and information security is important in protecting company data.'Specific as it states to recall and asks for three specific examples. Measurable as it can be assessed via a quiz or activity. Achievable as it should be able to be done with he content provided within the course. Relevant as it aligns to the course and its outcomes. Timely as it should be able to be achieved easily after completion of the module.

When creating the outcomes for this course, I used the SMART model and Blooms taxonomy to categorise these outcomes into their cognitive domain to help ensure learning objectives are reached.

Demonstrate how to recognise and report cyber and information security threats.

Explain the ways in which our organisation can protect staff and our assets.

Identify ways in which information security can be breached.

Identify ways in which our cyber security can be breached.

Recall three examples of why cyber and information security is important in protecting company data.

Level 3 - Apply

Level 2 - Understand

Level 2 - Understand

Level 2 - Understand

Level 1 - Remember

The learning outcomes for this course are:

Blooms Taxonomy Level
Outcomes
  • Text is an accessible font with sufficient contrast against the background.
  • Text is used effectively for clarity and readability.
  • Headings and subheadings used to create a clear visual hierarchy.
Text

Module Overview: This module looks at the various ways cybersecurity can be compromised, focusing on malware, phishing attacks, safe browsing practices, and the potential risks users face from social media. Learning Outcome: Identify ways in which our cyber security can be breached. Topics: 1. Malware 2. Phishing 3. Safe Browsing 4. Social Media Risks

Module 3

Video content

As part of this module there will be one video which covers the 4main topics of the course. The aim is for this video to be no longer than 10mins or to split each section into its own video to ensure learners remain engaged in the content throughout as it covers the topics needed.

Video content

Quiz

Knowledge check

Video

15 mins

Mandatory

Assessment

Activity

Content

Module 1 The Basics of Information and Cyber Security

Executive functions

Goal Setting

  • Provide learners with easily accessible Learning Objectives within the program.
  • Include checklists for self-reflection.
Supporting Planning and Managing Information
  • Offer checklists to support notetaking.
  • Utilize bookmarking and curation functionalities within the platform.
  • Implement knowledge checks to reinforce learning.
Enhancing Monitoring
  • Enable a learner reporting dashboard to track progress.
  • Use surveys to gather feedback preferences and formats.
  • Provide assessment checklists and rubrics with exemplars.

Target Audience

Target Audience

As part of the process, Personas were reviewed to identify that this course is intended for a wide range of staff, including both new hires and long-term team members. Many of these employees work from home, and while most recognize the importance of security awareness, previous courses have led to disengagement due to the overwhelming amount of information presented. This lead me to look at the use of video elements in this course to streamline the delivery of content, making it more engaging and easier to understand. This approach addresses common user complaints about lengthy completion times and delays caused by excessive clicking and animations.

Users can then start their enrolment for the course is not already done automatically and view the course within the LMS.

When users first access the course via the main menu they are presented with the splash screen that provides users with the basic information of the course

Layout of course

References section below:

Micro Design & Development sections below:

🎤 Cognitive load and Design Considersations

🎤 Instructional Design and Visual Design Principles

🎤 Scoping and Reflections

🎤 Video Considersations

📇 References

Commentary sections below:

📄 Storyboard & Scripting

📄 Wireframe

📄 Prototype

📄 Scoping Process

Micro Design & Development

Go Live

Once final adjustments have been made and the Instructional Design Manager gives approval, the course will be published in the LMS for the live environment. Users will receive an automated email notification informing them that the course is available. Learners can then access and complete the course within the LMS. As they progress, they will submit feedback, which will be collected and analyzed to determine if any further updates or improvements are needed.

Soft Launch

The soft launch of the course will be conducted with a small group of staff, including SMEs and managers, using a restricted-access version of the course. The Instructional Design (ID) team will handle any questions from testers and gather feedback directly from participants. The Instructional Design Manager and ID team members will then review the feedback and make any necessary adjustments to the course before the full rollout.

Rollout Plan

🎤 Learning Analytics

🎤Evaluation Approaches

📄 Learning Analytics

📄 UDL Evaluation

📄 UX Evaluation

Evaluate sections below:

🎤Reflections and LMS

Evaluation Commentary sections below:

📄 Kirkpatricks Model

📄 Evaluation Types

References section below:

Implement sections below:

🎤 Implementations commentary

📇 References

Implement Commentary sections below:

📄 Implementation Part 2

📄 Implementation Part 1

Implement and Evaluate

Scene: Devices like Laptops, Desktops, and Mobile Devices – The tools we use every day to access and manage information, making them prime targets for cyber threats. Networks, Servers, and Cloud Services – The infrastructure that stores, processes, and transmits your data, requiring strong defenses to prevent unauthorized access and disruptions. Protecting these critical components helps to secure your business operations, sensitive information, and overall organizational integrity. By safeguarding these essential areas, you can protect your business, your data, and your reputation in an increasingly connected world.

Scene: 50secs Blue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Images of Laptop, Desktop PC, Mobile Device animate in Images of Network, Server and Cloud Services animate in Shield icon animates in at end.

Scene: Cyber security is all about protecting networks, systems, and applications from a wide range of internal and external digital threats. In today’s world, where technology drives nearly every aspect of business, securing these elements is critical to staying safe and operational. Let’s take a look at some of the key areas that need to be safeguarded to ensure your organization’s cyber security is robust and effective:

Script

Scene: 30secs Blue background (intelliflo blue): #002dd4 Text font (intelliflo): Athletic Video of female on laptop typing.

Basics of information and cyber security - Storyboard

Self regulation

Promote Expectations

  • Set up self-assessment surveys within the LMS.
  • Use rubrics to guide self-assessment and reflection within the LMS.
Facilitate Coping Skills
  • Utilize LMS platform features to identify and support areas where learners need help.
  • Provide resources to help learners troubleshoot common technical issues.
Develop Self-Assessment
  • Use platform functionalities to showcase self-development, such as reports from self-assessment surveys or quizzes.
  • Explore learner curation tools to enhance engagement.
  • Enable bookmarking functionality within the platform if available.