Experiences of SCORM Implementation Process in Cyber Security Course Content
communicate with an LMS and a predefinedlanguage or vocabulary forming the basis ofthe communication. These three aspects ofthe RTE are Launch, Application ProgramInterface (API) and Data Model. The Launchmechanism defines a common way forLMSs to start learning content. Thecommunication protocols are standardizedthrough the use of a common API. The APIis the communication mechanism forinforming the LMS of the state of thelearning content such as initialized, finishedor in an error condition. Also the getting andsetting data (e.g., score, time limits, etc.)between the LMS and the SCO is achievedthrough the APIs. A Data Model defineselements that both the LMS and SCO areexpected to “know” about such as the statusof the learning content.Understanding the importance of standardsconformance in a e-learning course, wedecided to implement SCORM in the CyberSecurity course.
4. Design and development of ane-Learning course with SCORMspecifications
To develop a course that follows thespecifications of SCORM, we need toimplement the process to perform all thesteps involved. The process is discussedhere.
4.1 Development of Cyber SecurityCourse confirming to SCORM
We have developed course content forCyber Security, which is intended forSystem administrators and Informationsecurity officers. This course has arequirement of being offered through e-learning mode. In view of delivery of thecourse in e-learning mode, we took anapproach to implement the SCORMstandards to make it interoperable withLMSs. This activity required a study tounderstand SCORM in depth, chalking out aprocess to implement it specific to thecourse and meeting the course objectives atthe same time. After thorough study ofSCORM, we have come out with a processfor implementing it in the course. The majoractivities of this course development includeformulation of course syllabus based onSCORM standards, Identification of SCOs,Identification of metadata specific to thecourse, defining a learning path for contentdelivery and evaluation methodology.
Design of Course Syllabus
The syllabus of the course was designed inconsultation with domain experts. Thestructure of the course is also important as itdefines the learning paths for different targetaudience. Design of course syllabus is thebasis for identifying the SCOs.
4.3 Identifying the SCO
A SCO can contain a single learning objector a collection of learning objects, tests,scenarios etc. Additional aspect of SCOthat one has to keep in mind while designingit is, a SCO must be standalone. Thisrestricts a SCO from having anydependencies with other SCOs.The contents of Cyber Security is structuredin a hierarchical fashion. Unit is at thehighest level of this hierarchy and lesson atthe lowest level. In this hierarchy a lesson byitself can provide learning experience to theuser. So we have identified lesson as aSCO as it forms the most granular objectthat can be tracked and delivered by anLMS. The structure of a unit is shown here.
4.4 Course: Cyber SecurityUnit – 2: Network SecurityModule-1: Access Control Systems andMethodologies
Identification andAuthentication Techniques
Various Identification andAuthentication Techniques
: Access Control Issues
Module-2: Virtual Private NetworkLesson-1:
Introduction to VPN
: Cryptography for VPNs
: Layer-3 IP VPNs
: Securing ApplicationStreams
: IPSec VPN Design &Deployment and VPN Case Study
ELELTECH INDIA 2005 140