Since 2016, I've been proud to lend my skills to Future Kings, a non-profit that's doing incredible work to empower the next generation. As the lead curriculum designer, I've had the privilege of shaping the educational experiences that inspire these young minds to reach for the stars. It's more than just creating lesson plans; it's about crafting a pathway for these future leaders to discover their passion for STEM.
But my role extends beyond the classroom. As a strategic partner with Future Kings, I've been instrumental in maintaining powerful collaborations with organizations like Google, MITRE, AWS, and countless others who share our commitment to providing underserved communities with access to quality STEM education. It's about building a network of support that stretches from our local community to national and even international levels. It's about ensuring that every child, regardless of their background, has the opportunity to dream big and achieve even bigger.
The Employability Roadmap is a strategic initiative I designed to help prompt aspiring cybersecurity professionals to obtain the essential skills, knowledge, and experience needed to excel in any cybersecurity work role. I recognize the urgent need for skilled cybersecurity talent I work to create comprehensive programs to meet that need.
Future Kings STEM Academy is an after-school program that provides college-level STEM education, industry-standard certifications, and entrepreneurship mentorship through Applied Learning to kids in grades 6-12 from underserved and marginalized communities. The Academy creates a pipeline of talent from under-served communities into emerging technologies. The goal of the Academy is to shrink the opportunity gap by having young men and women of color use STEM to maximize their career opportunities.
Here Louis is talking about his time in the Cyber's Future program!!
Here's something different. I created this narrative as part of the G3CS Innovation Pathways program. Here, I'm sharing Network+ concepts through an immersive story about a Mars mission.
This, and all the other short, focused videos, were designed to complement, not replace, the learner's CompTIA study materials. Since they already had comprehensive technical resources, each video is intentionally brief, giving listeners enough to spark curiosity and complement their primary study materials. This Mars mission narrative, for example, isn't just about telling a space story - it's about inviting the listener to wonder 'what if?' and inspiring them to see networking concepts from a fresh perspective.
In all the narratives I created for ITF+, A+, Network+ and Security+ I'm inviting the listener to:
Connect these concepts to the knowledge they already have
See how networking and other IT and cybersecurity principles can show up in unexpected places
Build bridges between existing experience and new learning
This is just one example of how I approach learning and development differently. I believe in questioning even the answers we think we already have and finding unexpected connections that make complex technical concepts accessible, memorable, and inspiring. When we look at familiar concepts through new lenses, we often discover a deeper understanding.
Other narratives in this CompTIA series include:
Network Design & A New Job
Network Security & Dodge Chargers
Securing the Super Bowl
Three Little Pigs Decode Security Concepts
A stay-at-home Mom's Reliance on Linux
If you want your school or organization to participate in this program, read more about it here G3CS Innovation Pathways.
I partnered with GCubed Inc. and G3 Community Services to create an innovative, first-of-its-kind virtual training program in collaboration with CompTIA. Over six months, I worked with a team of fabulous individuals to develop a comprehensive curriculum covering the complete CompTIA certification pathway:
IT Fundamentals+
A+ (Hardware & Software)
Network+
Security+
This pioneering initiative, funded by the Go Virginia Grant for Region 6, helps high school students accelerate their path to IT and Cybersecurity careers. I authored all narration and served as the program's narrator, creating engaging video lessons that present technical concepts through creative scenarios.
The program is available through the G3CS Website. This project represents one of my most significant professional achievements, combining educational innovation with technical expertise to create an accessible pathway for students entering the IT field. You can also visit the Jason Learning Website to read more about my role in this initiative.
Cybersecurity balances managing risks with seizing opportunities in technology. It's about having control over our digital information and systems.
Organizations need security professionals to protect their assets while helping teams work better and faster. They don't need security experts who block progress - they need enablers who help achieve goals safely.
My original Proficiency-Based Cybersecurity Work & Learning Model develops professionals who accelerate missions instead of slowing them down. They protect while enabling progress.
This model differs from what's currently out there because it focuses on real work situations vs. virtual environments. Learners adapt to unexpected changes, work with teams, and use actual technical and non-technical security tools and frameworks in virtual and production environments. They validate their skills through their work, not through tests. It's a practical way to build genuine proficiency, which employers need.
This is the culmination of over a decade of research and work in training, development, and evaluation...I've now made it specific to cybersecurity.
I'm testing the model with a nonprofit and a small business to enhance their internship program projects. So far, the results are fantastic!
Below are the Cybersecurity Defenders representing the 4 Proficiency Groups in the model. With my specific directions, my AI tool did a very nice job creating these. More on these later!!
Novice-The Scout
Sharp and curious newcomers ready to dive into cybersecurity and build their skills.
Intermediate-The Cultivator
Growing professionals who tackle more significant challenges and strengthen their expertise.
Advanced-The Strategist
Skilled specialists who handle complex problems and guide security strategies.
Expert-The Catalyst
Innovative experts who drive change, mentor teams, and help shape the future of cybersecurity.
Through my volunteer work with the Future Kings nonprofit organization, I DESIGNED the content and the evaluation process for the Prince William County Technology Inclusion Initiative (2021) This program was target to unserved and underserved County residents.
This was the first time that I'd designed training content specifically meant for older adults (60 years and older). It was a fabulous experience!
Below you will see the evaluation report for the first session with recommendations for the next session.
In collaboration with Jim and Wendy Kirkpatrick and several federal agencies and team members, I led the design of this Training Evaluation Field Guide. A step-by-step roadmap for organizations to measure their training effectiveness. The guide emphasizes that evaluation serves a practical purpose: it provides information that helps organizations manage knowledge risk and prevent knowledge failure. Knowledge failure occurs when required action isn't taken because critical information is:
Unknown
Known but not used
Underutilized
Misapplied, or
Unavailable when and where needed
In this video, I narrate the field guide and its applications while my colleagues film and create supporting illustrations.
I authored this observation document to provide a comprehensive evaluation of the "Getting the Most Out of Your Android Smartphone" training program, meticulously examining various aspects to assess its effectiveness and identify areas for improvement.
The document begins with general observations and then delves into specific areas such as the registration process, quality and relevance of materials, and the setup of the learning environment. It critically analyzes the instructional practices employed, including a detailed breakdown of the timing and activities involved in the training.
A key focus of the observation is participant engagement, evaluating the level of interaction, participation, and attentiveness throughout the training. The document concludes with an in-depth analysis of the observations, providing recommendations for enhancing the program's overall quality and impact.
This structured approach ensures a thorough assessment of all key elements of the training, enabling a comprehensive understanding of its strengths and weaknesses. Including specific sections like "Times and Activities" and "Participant Engagement" allows for a detailed analysis of how the training was delivered and received, contributing to a more nuanced and insightful evaluation.
Again, training design is crucial. Without a well-crafted plan, your efforts can miss the mark, and the results will show it. I had the exciting opportunity to partner with the Women's Society of Cyberjutsu to refresh their Cyberjutsu Girls Academy (CGA) cybersecurity curriculum.
This involved enhancing and updating projects in robotics, Python programming, Wireshark analysis, computer hardware deconstruction/ reconstruction, and other IT and cybersecurity STEM activities.
To illustrate the depth of this redesign, I'm including the logic model (below) I developed for the program. This model showcases the thoughtful planning and design considerations that went into creating a truly impactful and engaging learning experience for young women exploring STEM fields.
A logic model is a visual representation of how a program is intended to work. It's a roadmap that connects the resources, activities, outputs, and outcomes of a program, showing the logical flow of how those elements are expected to lead to the desired changes.
Think of it like a flowchart that explains the "if-then" relationships within a program: If we have these resources (inputs)...Then we can do these activities...Which will lead to these outputs (direct products of the activities)...Which will ultimately contribute to these outcomes (short-term, intermediate, long term).
I enjoy creating escape room challenges because they add realistic pressure and urgency to cyber environments--necessary components for learning when developing technical, non-technical and interpersonal skill.