SlideShare a Scribd company logo
1 of 11
Applying Competency-based
Credentials
About Us
CaSS (www.cassproject.org)
The future of competencies
Competency
Repositories
Competency
Profiles
Eduworks
(www.eduworks.com)
Solutions that unlock human potential
Text and document analysis
Credential Engine
Applications
The Problem
Determine “what’s next” (or “who’s next”)
Degrees
Courses
Certificates
Experience ?
!Knowledge
Skills
Abilities
The Solution
Determine “what do I know” and “what can I do”
Details
Use Case:
Career Pathways
A.S. Computer
Science
100%
B.S Computer
Science
100%
M.S Computer
Science
72%
Graduate Cert
Cybersecurity
20%
M.S Health
Informatics
45%
More...
More...
My Profile
 Degrees
 Courses
 Certificates
 Experience
KeyCompetencies
A.S. Computer
Science
100%
B.S Computer
Science
100%
M.S Computer
Science
72%
Graduate Cert
Cybersecurity
20%
M.S Health
Informatics
45%
More...
More...
A.S Computer Science
 Assembling
Computers
 App Design
 Web Development
B.S Computer Science
 Data Structure
Programming
 Operating System
Development
 UI/UX Design
M.S Computer Science
 Managing Teams
× Usability Analysis
× Infrastructure
Programming
× Oral & Written
Communication
Search Credentials
My Profile
 Degrees
 Courses
 Certificates
 Experience
Use Case:
Career Pathways
Personalized Credential Search
cybersecuritySearch
Graduate Certificate in Cybersecurity
The Graduate Certificate in Cybersecurity - Critical Infrastructure blends both information
technology (IT) and operational technology (OT) and focuses specifically on securing critical
infrastructures in sectors such as energy, water, gas and transportation.
You have 2 of 5 competencies associated with this credential:
 100
Analyze new technology and identify/develop solution sets for cybersecurity
vulnerability concerns.
 100 Apply appropriate models for security risk mitigation.
85 Develop cybersecurity solution requirements for IT/OT vendors and suppliers.
47 Implement industry best practices for existing and future systems.
28
Integrate security into the entire system life cycle (planning, architecture, design,
development, implementation/operation, maintenance and disposal).
Evidence
Evidence
Details
Details
Details
Personalized Credential Search
cybersecuritySearch
Graduate Certificate in Cybersecurity
The Graduate Certificate in Cybersecurity - Critical Infrastructure blends both information
technology (IT) and operational technology (OT) and focuses specifically on securing critical
infrastructures in sectors such as energy, water, gas and transportation.
You have 2 of 5 competencies associated with this credential:
 100
Analyze new technology and identify/develop solution sets for cybersecurity
vulnerability concerns.
Validated by C Marty at SecForce-3 Cybersolutions based on work experience.
Expires in 3 years.
 100 Apply appropriate models for security risk mitigation.
85 Develop cybersecurity solution requirements for IT/OT vendors and suppliers.
47 Implement industry best practices for existing and future systems.
Evidence
Details
Details
Hide
January 18, 2016
Personalized Credential Search
cybersecuritySearch
Graduate Certificate in Cybersecurity
The Graduate Certificate in Cybersecurity - Critical Infrastructure blends both information
technology (IT) and operational technology (OT) and focuses specifically on securing critical
infrastructures in sectors such as energy, water, gas and transportation.
You have 2 of 5 competencies associated with this credential:
 100
Analyze new technology and identify/develop solution sets for cybersecurity
vulnerability concerns.
 100 Apply appropriate models for security risk mitigation.
Implement industry best practices for existing and future systems.
Related Knowledge, Skills, and Abilities:
• Knowledge of End to End encryption – Some evidence in your profile
• Create and update a threat analysis – Some evidence in your profile
• Monitor and respond to CVE reports – No evidence in your profile
Evidence
Evidence
Hide
47
• Degrees, courses, badges are associated with competencies (data in CE)
• Experience is associated with competencies (manual or automated)
• Competencies are cross-walked (manual or automated)
• Matches are analyzed
(algorithmically)
How this works
Degrees
Courses
Certificates
Experience
Knowledge
Skills
Abilities
Credential Engine
Competencies
Cross-
walk
Analysis
Bottom Line
Associating credentials with
competencies supports
• Career exploration
• Credential search
• Staffing and recruiting
Automated tools are available for
• Cross-walking competencies
• Cross-walking credentials

More Related Content

Similar to CASS Application

CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowInfosec
 
CRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptxCRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptxSpoclearn Inc.
 
CRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptxCRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptxSpoclearn Inc.
 
cert_softwaredevelopment_oct32014
cert_softwaredevelopment_oct32014cert_softwaredevelopment_oct32014
cert_softwaredevelopment_oct32014Mina Hatami
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examInfosec
 
2.Public Vulnerability Databases
2.Public Vulnerability Databases2.Public Vulnerability Databases
2.Public Vulnerability Databasesphanleson
 
Data Science Full Course | Edureka
Data Science Full Course | EdurekaData Science Full Course | Edureka
Data Science Full Course | EdurekaEdureka!
 
Certifications in IT fields
Certifications in IT fieldsCertifications in IT fields
Certifications in IT fieldsankur bhalla
 
CRISC Certification Training Brochure.pdf
CRISC Certification Training Brochure.pdfCRISC Certification Training Brochure.pdf
CRISC Certification Training Brochure.pdfSpoclearn Inc.
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Joshua Fonseca
 
Cloud Security Engineer Skills, Roles Responsibilities Salary Trends.pdf
Cloud Security Engineer Skills, Roles  Responsibilities  Salary Trends.pdfCloud Security Engineer Skills, Roles  Responsibilities  Salary Trends.pdf
Cloud Security Engineer Skills, Roles Responsibilities Salary Trends.pdfInfosec Train
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookCalvin Sam
 
future of a computer litrate
future of a computer litratefuture of a computer litrate
future of a computer litratePooja Tanwar
 
CISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdfCISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdfInfosec Train
 
Matthew Coles - Izar Tarandach - Security Toolbox
Matthew Coles - Izar Tarandach - Security ToolboxMatthew Coles - Izar Tarandach - Security Toolbox
Matthew Coles - Izar Tarandach - Security ToolboxSource Conference
 
HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?Terro White
 
Top learnings from AWS Security.pdf
Top learnings from AWS Security.pdfTop learnings from AWS Security.pdf
Top learnings from AWS Security.pdfinfosec train
 

Similar to CASS Application (20)

CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
 
CompTIA CASP Course and Training details
CompTIA CASP Course and Training detailsCompTIA CASP Course and Training details
CompTIA CASP Course and Training details
 
CRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptxCRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptx
 
CRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptxCRISC Certification Training Brochure.pptx
CRISC Certification Training Brochure.pptx
 
cert_softwaredevelopment_oct32014
cert_softwaredevelopment_oct32014cert_softwaredevelopment_oct32014
cert_softwaredevelopment_oct32014
 
CompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new examCompTIA CASP+ | Everything you need to know about the new exam
CompTIA CASP+ | Everything you need to know about the new exam
 
2.Public Vulnerability Databases
2.Public Vulnerability Databases2.Public Vulnerability Databases
2.Public Vulnerability Databases
 
Data Science Full Course | Edureka
Data Science Full Course | EdurekaData Science Full Course | Edureka
Data Science Full Course | Edureka
 
Certifications in IT fields
Certifications in IT fieldsCertifications in IT fields
Certifications in IT fields
 
CRISC Certification Training Brochure.pdf
CRISC Certification Training Brochure.pdfCRISC Certification Training Brochure.pdf
CRISC Certification Training Brochure.pdf
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)
 
Cloud Security Engineer Skills, Roles Responsibilities Salary Trends.pdf
Cloud Security Engineer Skills, Roles  Responsibilities  Salary Trends.pdfCloud Security Engineer Skills, Roles  Responsibilities  Salary Trends.pdf
Cloud Security Engineer Skills, Roles Responsibilities Salary Trends.pdf
 
The Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification HandbookThe Ultimate EC Council Certification Handbook
The Ultimate EC Council Certification Handbook
 
Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 
future of a computer litrate
future of a computer litratefuture of a computer litrate
future of a computer litrate
 
CISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdfCISSP Vs. CISA Which is better for you.pdf
CISSP Vs. CISA Which is better for you.pdf
 
Matthew Coles - Izar Tarandach - Security Toolbox
Matthew Coles - Izar Tarandach - Security ToolboxMatthew Coles - Izar Tarandach - Security Toolbox
Matthew Coles - Izar Tarandach - Security Toolbox
 
File1
File1File1
File1
 
HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?HOW TO EARN CISSP CERTIFICATION?
HOW TO EARN CISSP CERTIFICATION?
 
Top learnings from AWS Security.pdf
Top learnings from AWS Security.pdfTop learnings from AWS Security.pdf
Top learnings from AWS Security.pdf
 

More from Credential Engine

Innovate+Educate Application
Innovate+Educate ApplicationInnovate+Educate Application
Innovate+Educate ApplicationCredential Engine
 
CourseNetworking Application
CourseNetworking ApplicationCourseNetworking Application
CourseNetworking ApplicationCredential Engine
 
U.S. Chamber of Commerce Foundation Application
U.S. Chamber of Commerce Foundation ApplicationU.S. Chamber of Commerce Foundation Application
U.S. Chamber of Commerce Foundation ApplicationCredential Engine
 
Credential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry PartnersCredential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry PartnersCredential Engine
 
Expressing Concept Schemes & Competency Frameworks in CTDL
Expressing Concept Schemes & Competency Frameworks in CTDLExpressing Concept Schemes & Competency Frameworks in CTDL
Expressing Concept Schemes & Competency Frameworks in CTDLCredential Engine
 
Credential Finder Prototype App Demonstration
Credential Finder Prototype App DemonstrationCredential Finder Prototype App Demonstration
Credential Finder Prototype App DemonstrationCredential Engine
 
Credential Transparency Initiative - On the Road to Improving the Credentiali...
Credential Transparency Initiative - On the Road to Improving the Credentiali...Credential Transparency Initiative - On the Road to Improving the Credentiali...
Credential Transparency Initiative - On the Road to Improving the Credentiali...Credential Engine
 
CTI Pilot-site Partner Orientation November 2015
CTI Pilot-site Partner Orientation November 2015CTI Pilot-site Partner Orientation November 2015
CTI Pilot-site Partner Orientation November 2015Credential Engine
 
CTI Technical Advisory Committee (TAC) Meeting December 1, 2015
CTI Technical Advisory Committee (TAC) Meeting December 1, 2015CTI Technical Advisory Committee (TAC) Meeting December 1, 2015
CTI Technical Advisory Committee (TAC) Meeting December 1, 2015Credential Engine
 
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015Credential Engine
 

More from Credential Engine (20)

Virgil Holdings Application
Virgil Holdings ApplicationVirgil Holdings Application
Virgil Holdings Application
 
Vantage Point Application
Vantage Point ApplicationVantage Point Application
Vantage Point Application
 
Innovate+Educate Application
Innovate+Educate ApplicationInnovate+Educate Application
Innovate+Educate Application
 
CourseNetworking Application
CourseNetworking ApplicationCourseNetworking Application
CourseNetworking Application
 
Verif-y Application
Verif-y ApplicationVerif-y Application
Verif-y Application
 
LRNG Application
LRNG ApplicationLRNG Application
LRNG Application
 
NOCTI Application
NOCTI ApplicationNOCTI Application
NOCTI Application
 
Bright Hive Application
Bright Hive ApplicationBright Hive Application
Bright Hive Application
 
Credly Application
Credly ApplicationCredly Application
Credly Application
 
U.S. Chamber of Commerce Foundation Application
U.S. Chamber of Commerce Foundation ApplicationU.S. Chamber of Commerce Foundation Application
U.S. Chamber of Commerce Foundation Application
 
Parchment Application
Parchment ApplicationParchment Application
Parchment Application
 
AcademyOne Application
AcademyOne ApplicationAcademyOne Application
AcademyOne Application
 
Smart Catalog Application
Smart Catalog ApplicationSmart Catalog Application
Smart Catalog Application
 
Credential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry PartnersCredential Transparency Initiative - Orientation for Registry Partners
Credential Transparency Initiative - Orientation for Registry Partners
 
Expressing Concept Schemes & Competency Frameworks in CTDL
Expressing Concept Schemes & Competency Frameworks in CTDLExpressing Concept Schemes & Competency Frameworks in CTDL
Expressing Concept Schemes & Competency Frameworks in CTDL
 
Credential Finder Prototype App Demonstration
Credential Finder Prototype App DemonstrationCredential Finder Prototype App Demonstration
Credential Finder Prototype App Demonstration
 
Credential Transparency Initiative - On the Road to Improving the Credentiali...
Credential Transparency Initiative - On the Road to Improving the Credentiali...Credential Transparency Initiative - On the Road to Improving the Credentiali...
Credential Transparency Initiative - On the Road to Improving the Credentiali...
 
CTI Pilot-site Partner Orientation November 2015
CTI Pilot-site Partner Orientation November 2015CTI Pilot-site Partner Orientation November 2015
CTI Pilot-site Partner Orientation November 2015
 
CTI Technical Advisory Committee (TAC) Meeting December 1, 2015
CTI Technical Advisory Committee (TAC) Meeting December 1, 2015CTI Technical Advisory Committee (TAC) Meeting December 1, 2015
CTI Technical Advisory Committee (TAC) Meeting December 1, 2015
 
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

CASS Application

  • 2. About Us CaSS (www.cassproject.org) The future of competencies Competency Repositories Competency Profiles Eduworks (www.eduworks.com) Solutions that unlock human potential Text and document analysis Credential Engine Applications
  • 3. The Problem Determine “what’s next” (or “who’s next”) Degrees Courses Certificates Experience ?
  • 4. !Knowledge Skills Abilities The Solution Determine “what do I know” and “what can I do”
  • 5. Details Use Case: Career Pathways A.S. Computer Science 100% B.S Computer Science 100% M.S Computer Science 72% Graduate Cert Cybersecurity 20% M.S Health Informatics 45% More... More... My Profile  Degrees  Courses  Certificates  Experience
  • 6. KeyCompetencies A.S. Computer Science 100% B.S Computer Science 100% M.S Computer Science 72% Graduate Cert Cybersecurity 20% M.S Health Informatics 45% More... More... A.S Computer Science  Assembling Computers  App Design  Web Development B.S Computer Science  Data Structure Programming  Operating System Development  UI/UX Design M.S Computer Science  Managing Teams × Usability Analysis × Infrastructure Programming × Oral & Written Communication Search Credentials My Profile  Degrees  Courses  Certificates  Experience Use Case: Career Pathways
  • 7. Personalized Credential Search cybersecuritySearch Graduate Certificate in Cybersecurity The Graduate Certificate in Cybersecurity - Critical Infrastructure blends both information technology (IT) and operational technology (OT) and focuses specifically on securing critical infrastructures in sectors such as energy, water, gas and transportation. You have 2 of 5 competencies associated with this credential:  100 Analyze new technology and identify/develop solution sets for cybersecurity vulnerability concerns.  100 Apply appropriate models for security risk mitigation. 85 Develop cybersecurity solution requirements for IT/OT vendors and suppliers. 47 Implement industry best practices for existing and future systems. 28 Integrate security into the entire system life cycle (planning, architecture, design, development, implementation/operation, maintenance and disposal). Evidence Evidence Details Details Details
  • 8. Personalized Credential Search cybersecuritySearch Graduate Certificate in Cybersecurity The Graduate Certificate in Cybersecurity - Critical Infrastructure blends both information technology (IT) and operational technology (OT) and focuses specifically on securing critical infrastructures in sectors such as energy, water, gas and transportation. You have 2 of 5 competencies associated with this credential:  100 Analyze new technology and identify/develop solution sets for cybersecurity vulnerability concerns. Validated by C Marty at SecForce-3 Cybersolutions based on work experience. Expires in 3 years.  100 Apply appropriate models for security risk mitigation. 85 Develop cybersecurity solution requirements for IT/OT vendors and suppliers. 47 Implement industry best practices for existing and future systems. Evidence Details Details Hide January 18, 2016
  • 9. Personalized Credential Search cybersecuritySearch Graduate Certificate in Cybersecurity The Graduate Certificate in Cybersecurity - Critical Infrastructure blends both information technology (IT) and operational technology (OT) and focuses specifically on securing critical infrastructures in sectors such as energy, water, gas and transportation. You have 2 of 5 competencies associated with this credential:  100 Analyze new technology and identify/develop solution sets for cybersecurity vulnerability concerns.  100 Apply appropriate models for security risk mitigation. Implement industry best practices for existing and future systems. Related Knowledge, Skills, and Abilities: • Knowledge of End to End encryption – Some evidence in your profile • Create and update a threat analysis – Some evidence in your profile • Monitor and respond to CVE reports – No evidence in your profile Evidence Evidence Hide 47
  • 10. • Degrees, courses, badges are associated with competencies (data in CE) • Experience is associated with competencies (manual or automated) • Competencies are cross-walked (manual or automated) • Matches are analyzed (algorithmically) How this works Degrees Courses Certificates Experience Knowledge Skills Abilities Credential Engine Competencies Cross- walk Analysis
  • 11. Bottom Line Associating credentials with competencies supports • Career exploration • Credential search • Staffing and recruiting Automated tools are available for • Cross-walking competencies • Cross-walking credentials

Editor's Notes

  1. So we take all of that data and jam it into some software that walks the crosswalks from where the learner is at to the requirements of each credential in the Credential Engine. What we get back is this. 50% qualified, 38% qualified, here’s how to qualify, here’s the job title if you do qualify. Salaries would be nice. Maybe a demand meter? I get ahead of myself. So then I can click on the details here…
  2. So we take all of that data and jam it into some software that walks the crosswalks from where the learner is at to the requirements of each credential in the Credential Engine. What we get back is this. 50% qualified, 38% qualified, here’s how to qualify, here’s the job title if you do qualify. Salaries would be nice. Maybe a demand meter? I get ahead of myself. So then I can click on the details here…
  3. So we take all of that data and jam it into some software that walks the crosswalks from where the learner is at to the requirements of each credential in the Credential Engine. What we get back is this. 50% qualified, 38% qualified, here’s how to qualify, here’s the job title if you do qualify. Salaries would be nice. Maybe a demand meter? I get ahead of myself. So then I can click on the details here…