Human-Centric Cybersecurity

  1. Security Training and Awareness
    1. Evolution of Security Training
      1. Traditional Compliance Training
        1. Behavior-Based Training Models
          1. Personalized Learning Approaches
            1. Continuous Learning Paradigms
            2. Learning Theory Applications
              1. Adult Learning Principles
                1. Andragogy
                  1. Self-Directed Learning
                    1. Experience-Based Learning
                    2. Cognitive Load Management
                      1. Spaced Repetition
                        1. Active Learning Techniques
                          1. Social Learning Theory
                          2. Training Program Design
                            1. Needs Assessment
                              1. Learning Objectives Definition
                                1. Content Development
                                  1. Delivery Method Selection
                                    1. Assessment and Evaluation
                                    2. Interactive Training Methods
                                      1. Gamification Elements
                                        1. Points and Badges
                                          1. Leaderboards
                                            1. Challenges and Quests
                                              1. Narrative and Storytelling
                                              2. Simulation-Based Training
                                                1. Phishing Simulations
                                                  1. Incident Response Exercises
                                                    1. Role-Playing Scenarios
                                                    2. Microlearning Approaches
                                                      1. Just-in-Time Training
                                                        1. Bite-Sized Content
                                                          1. Mobile Learning
                                                        2. Phishing Simulation Programs
                                                          1. Program Design and Setup
                                                            1. Scenario Development
                                                              1. Frequency and Timing
                                                                1. Difficulty Progression
                                                                  1. Feedback Mechanisms
                                                                    1. Metrics and Reporting
                                                                      1. Ethical Considerations
                                                                      2. Measuring Training Effectiveness
                                                                        1. Kirkpatrick Model Application
                                                                          1. Behavioral Change Metrics
                                                                            1. Knowledge Retention Testing
                                                                              1. Skill Application Assessment
                                                                                1. Long-Term Impact Evaluation