Methodology

The five symbols below are to be used as guides throughout this curriculum to indicate to the Digital Security Trainer each time there is a need to engage participants in either of the five core ADIDS elements.

Activity (easing into the topic): Each module begins with an Activity that illustrates the material that is to follow. These act as “icebreakers” for new participants and will ease them into thinking about a topic that may be new to them. 

Discussion (providing context): Discussion sessions follow each of the Activity sessions. These sessions are designed to engage participants in a conversation about the topic (and the preceding session). 

Input (interacting): After the two previous steps (Activity and Discussion) the participants will be guided through an effective Input session in which participants are engaged with a range of materials, including case studies, that will facilitate a give-and-take in knowledge sharing between the trainer and the participants. 

Deepening (hands-on activities): This session includes the application of skills, software and learning to use them. This is possibly the most important session in the training, as this is where participants learn new skills by doing them. It follows the previous three segments so that the participants understand why they are learning a particular skill. 

Synthesis (reflection): Lessons benefit from practice and review, and learning is reinforced by reflecting on the knowledge acquired. In this session the knowledge and skills that have just been addressed are summarized, with the participants encouraged to ask questions and seek clarification.