Sponsors

 

No pictures to show

 

Follow Us

Upcoming events

Menu
Log in


Download the State of and Trends in Cybersecurity Capability Working Paper: "Designing and evaluating the effectiveness of CBML Curriculum"

  • May 31, 2033
  • Online

Registration

  • Click the "Register" button below. Once you successfully complete the form, you'll be provided with a link to download the working paper.

Register



Hire Harford First: Designing and evaluating the effectiveness of adapting courses in an Information Assurance and Cybersecurity degree program to a Competency-Based Mastery Learning curriculum

This Advanced Technological Education (ATE) project, entitled Hire Harford First, sought to “develop curriculum and educational materials that are based on ATE-funded CyberWatch Center's practices, and to disseminate curricula, course materials, and best practices to the ATE and broader educational community, including insights whether competency-based learning produces graduates who are better capable of making immediate positive contributions upon entering the workplace.” HHF was a three-year study in the design, development, and implementation of innovative curriculum designed to foster Competency-Based Mastery Learning (CBML). The results showed “the strong potential to…produce more graduates, since it will reduce attrition, encourage persistence, and attract more participants based on its reputation of success.” When fully-implemented, CBML instructional design and associated instructional methods that “flip the classroom” whereby faculty become success coaches rather than instructors for students produced proficiency improvement, on average, of 1.94 sigma. Additionally, this research revealed important constraints to fully achieving the benefits of CBML instructional designs. 

This material is based on work supported by the National Science Foundation (NSF) under Grant Number DUE-1204533DUE-1601150, and DUE-2054753Any opinions, findings, conclusions, or recommendations expressed in this material are those of the author(s) and do not necessarily reflect those of NSF.

© 2025 National CyberWatch Center PRIVACY POLICY / TERMS OF USE



Powered by Wild Apricot Membership Software