
This data breach example is was developed as an adventure throughout a call center as a new hire.
According to a recent study by Gartner, traditional compliance training is almost always looked on by front-line employees and managers alike as a necessary evil.
This module introduces learners to information security topics in a fun and engaging way by introducing several characters and narrators encountered while exploring a corporate campus in an open-world format. Adaptive learning paths embedded in each environment ensure that learners who already understand the material may move through the module more directly than learners who are unfamiliar, and who are presented with additional examples based on their answers to a series of preliminary assessments on each topic.
My service includes the full cycle of development:
– Video editing/screencast/explainers
– Instructional design
– Storyboarding/scenarios
– Graphic design (UI/UX)
– Development in authoring tools
– Quality Assurance
– Integration into LMS
My usual workflow:
Step #1. To get the raw content from a client in any form that exists from their side (Raw Video, Slides, Docs, Brand Guides, etc).
Step #2. To identify goals and audiences.
Step #3. Instructional design and storyboard preparation.
Step #4. Graphic design and development in small pieces.
My development tools:
– Graphic design/prototyping: Adobe Photoshop/Illustrator, Canva, PowerPoint
– Course Development: Articulate Storyline/Rise, Adobe Captivate
– Animation/video editing: TechSmith Camtasia, Adobe Premiere/After Effects
– Audio editing: Audacity, Adobe Audition
– Storyboarding: Microsoft PowerPoint, Google Docs, TechSmith SnagIt