Industry-recognized certifications such as
CISSP
,
CompTIA Security+
,
Certified Ethical Hacker (CEH)
, or
GIAC Certifications
(e.g., GSEC, GCIH).
By starting with the end results in mind, CyberVigilant and
EduTech use an evidence-based practice for adult learners
known as backward design: reviewing the job description for
the mid-level security analyst role, included relevant
competencies listed on Credential Engine’s Credential Finder,
and built the cybersecurity job role matrix to describe the
ideal competencies for cybersecurity analysts at CyberVigilant
by employment level. Now, EduTech can design the digital
credential curriculum that fills learning outcome gaps that
are missing by most applicants for CyberVigilant’s mid-level
cybersecurity analyst role.
EduTech crosswalks existing curricula outcomes to
CyberVigilant’s mid-level cybersecurity analyst requirements.
For example, throughout the year, CyberVigilant offers
professional development opportunities to its entry-level
cybersecurity analysts. EduTech notices that one of the
professional development opportunities that CyberVigilant
regularly offers might prepare existing analysts to meet some
requirements for the mid-level cybersecurity analyst role. The
table below is a crosswalk showing how learners who
successfully complete the CyberVigilant ID10T-101 training
meet some specific requirements listed in the detailed job
description.