Explore BrainMass

Developing Network for Training Programs

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Sid Davidson is the personnel director of Babson and Willcount, a company that specializes in consulting and research. One of the training programs that Sid is considering for the middle-level managers of Babson and Willcount is leadership training. Sid has listed a number of activities that must be completed before a training program of this nature could be conducted. The activities and immediate predecessors appear in the following table seen in the attachment.

© BrainMass Inc. brainmass.com October 25, 2018, 1:24 am ad1c9bdddf


Solution Summary

This solution contains a step-by-step tutorial to determine the network for the Babson and Willcount training program with a network diagram.

See Also This Related BrainMass Solution

Security Education and Training Awareness Programs

I am tasked to help develop a security and training awareness program for my small-to-medium organization (see scenario below).


"The Business Organisation is an information holdings with about 600 staff. A recent audit of the organisation's information security management system found it to be deficient in some key areas, notably incident response, disaster recovery and business continuity, social engineering exploitation of personnel, an apparent lack of personnel awareness of the various threats to information, and poor password security. Technical systems were found to be reasonably effective in maintaining database and document management security, and were well serviced by the IT team"

The proposed plan should include:
1. Objectives
2. Topics to be covered
3. Level of learning (knowledge, skill or competence)
4. Recommended Instructional methods and media to use/support
5. Example of learning activities and exercises
6. Evaluation criteria

Some theory sources:



? The plan should be based on real commercial security education techniques, and your best knowledge and expertise in security education.

? Answers should not be theoretical definitions

? As far as possible, please avoid too much word-quoting from sources. Minor citation allowed

? Any citation must be from credible sources.

View Full Posting Details