{"id":10,"date":"2025-05-11T20:56:59","date_gmt":"2025-05-11T20:56:59","guid":{"rendered":"https:\/\/blogs.oregonstate.edu\/willemvanderhorstmgmt453\/?p=10"},"modified":"2025-05-11T20:56:59","modified_gmt":"2025-05-11T20:56:59","slug":"hrm-wk5-training","status":"publish","type":"post","link":"https:\/\/blogs.oregonstate.edu\/willemvanderhorstmgmt453\/2025\/05\/11\/hrm-wk5-training\/","title":{"rendered":"HRM Wk5 &#8211; Training"},"content":{"rendered":"\n<p>Reflecting on my experience working in the IT department of a federal university, I\u2019ve participated in several training sessions, some highly effective, others not so much. One training that stood out as particularly beneficial was a cybersecurity awareness workshop. This session was well-structured, following the Analyze, Design, Develop, Implement, Evaluate (ADDIE) model highlighted in this week&#8217;s materials. The workshop covered real-world threats, phishing simulations, and hands-on exercises that mirrored potential breaches we might encounter. It didn\u2019t just provide information; it simulated actual attack scenarios, allowing us to apply what we learned in real-time. This hands-on experience reinforced the knowledge, making it both relevant and memorable. Additionally, the training was evaluated using the Pre-\/Post-Measure method, which allowed us to see our progress and areas for improvement. This level of structured evaluation ensured the training was not only effective but also measurable.<\/p>\n\n\n\n<p>In contrast, one training that fell short was an IT ticketing system workshop. Unlike the cybersecurity session, it was purely lecture-based with minimal interaction. The material was delivered through PowerPoint slides with little real-world application or practical engagement. According to this week\u2019s readings, effective training requires opportunities for hands-on practice and a clear link to job tasks. This session lacked both, making it challenging to connect concepts with actual work tasks. Furthermore, there was no follow-up or evaluation to measure effectiveness, so any learning that did occur was not tracked or reinforced.<\/p>\n\n\n\n<p>If I could advise on improvements, I would suggest integrating simulation exercises for the ticketing system training, similar to what was done in the cybersecurity workshop. This would create an opportunity to practice ticket resolution in a risk-free environment, enhancing learning retention and job readiness. Proper evaluation, like Pre-\/Post-Measures, would also ensure knowledge transfer and identify gaps early on. This approach would align with best practices for effective training design and significantly improve learning outcomes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reflecting on my experience working in the IT department of a federal university, I\u2019ve participated in several training sessions, some highly effective, others not so much. One training that stood out as particularly beneficial was a cybersecurity awareness workshop. This session was well-structured, following the Analyze, Design, Develop, Implement, Evaluate (ADDIE) model highlighted in this [&hellip;]<\/p>\n","protected":false},"author":14836,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-10","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.oregonstate.edu\/willemvanderhorstmgmt453\/wp-json\/wp\/v2\/posts\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.oregonstate.edu\/willemvanderhorstmgmt453\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.oregonstate.edu\/willemvanderhorstmgmt453\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/willemvanderhorstmgmt453\/wp-json\/wp\/v2\/users\/14836"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/willemvanderhorstmgmt453\/wp-json\/wp\/v2\/comments?post=10"}],"version-history":[{"count":1,"href":"https:\/\/blogs.oregonstate.edu\/willemvanderhorstmgmt453\/wp-json\/wp\/v2\/posts\/10\/revisions"}],"predecessor-version":[{"id":11,"href":"https:\/\/blogs.oregonstate.edu\/willemvanderhorstmgmt453\/wp-json\/wp\/v2\/posts\/10\/revisions\/11"}],"wp:attachment":[{"href":"https:\/\/blogs.oregonstate.edu\/willemvanderhorstmgmt453\/wp-json\/wp\/v2\/media?parent=10"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/willemvanderhorstmgmt453\/wp-json\/wp\/v2\/categories?post=10"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.oregonstate.edu\/willemvanderhorstmgmt453\/wp-json\/wp\/v2\/tags?post=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}