I am a dedicated Cybersecurity Specialist with over twenty years of hands-on experience in the field. As an Information Technology instructor, I am committed to fostering student success by specializing in Network and System Infrastructures, Project Management, and the Auditing and Implementation of Security Policies and Procedures. Leveraging my extensive background, I try to empower students to excel in certification examinations by delivering engaging lessons that incorporate real-world scenarios drawn from current corporate, business, and federal contexts. My goal is to equip the next generation of cybersecurity professionals with the knowledge and skills necessary to navigate the complexities of the digital landscape.
My partner in crime his superpower is to sleep all day.
As a cybersecurity instructor, my goal in using case-based assessments is to cultivate critical thinking, ethical reasoning, and real-world problem-solving. I design cases that reflect current threats, such as social engineering, breaches, and insider risk, to help students apply technical knowledge in complex, ambiguous scenarios. These assessments aim to:
Bridge theory and practice through authentic, hands-on analysis
Encourage ethical decision-making in high-stakes situations
Support diverse learners through guided scaffolds and multiple response formats (UDL)
Develop learners' ability to communicate security recommendations clearly and professionally
Promote collaboration, reflection, and adaptive learning strategies
The quality of my Cybersecurity Lessons is grounded in three core pillars: real-world relevance, instructional rigor, and inclusive design.
Authentic, Case-Based Content
Each lesson is anchored in current cybersecurity threats, such as phishing, insider threats, and social engineering. Students engage in scenario-driven tasks that mirror the complexity of professional decision-making. For example, in a lesson on social engineering, learners analyze attacker behavior, evaluate organizational vulnerabilities, and develop multi-layered defense strategies.
Research-Based Instructional Design
I use Backward Design to ensure every lesson is aligned with clear, measurable outcomes. Lessons are scaffolded for skill progression, integrating formative assessments and guided inquiry. I incorporate UDL (Universal Design for Learning) to support learners of varied backgrounds, abilities, and learning preferences, offering multiple means of engagement, representation, and expression.
Evidence of Learning and Engagement
My assessments go beyond recall; they require learners to demonstrate applied knowledge through incident response plans, ethical justification, or policy recommendations. Reflection prompts and peer feedback are embedded to encourage metacognition and critical dialogue.
Continuous Improvement and Feedback
I routinely revise lessons based on learner feedback, accessibility audits, and emerging threats. I also share materials under open licenses, inviting peer review and collaborative improvement across the instructional design community.
With over three decades in the cybersecurity field, my teaching practice is built on a foundation of technical rigor, ethical responsibility, and inclusive pedagogy. I see cybersecurity education not just as a transfer of knowledge but as a process of shaping analytical, ethical professionals prepared for an evolving digital landscape.
I design every learning experience with intentionality, using frameworks like Backward Design to ensure alignment between learning outcomes, instructional methods, and assessment strategies. I rely on case-based learning to simulate real-world challenges. These scenarios demand that students apply theory in context, make ethical decisions under pressure, and justify their reasoning from both technical and human-centered perspectives.
Inclusivity is at the heart of my approach. By applying Universal Design for Learning (UDL) principles, I offer multiple ways for students to engage with content and demonstrate understanding. Whether through scaffolded templates, interactive labs, or peer collaboration, I aim to lower barriers and increase learner autonomy.
I reflect regularly on the effectiveness of my instruction through learner feedback, formative assessments, and evolving field trends. This reflective cycle drives continual improvement. I also share my work publicly when possible, inviting feedback and contributing to the broader community of cybersecurity educators.
Ultimately, I teach intending to empower learners to think critically, act ethically, and grow continually, so they can both defend systems and uphold the trust placed in them as cybersecurity professionals.