Workplace Security

Background

Security at the workplace can be unintentionally compromised when employees are unaware of or fail to follow appropriate physical and cybersecurity measures. The consequences can range from affecting an individual employee, a team, or an entire division to compromising the entire organization, with potential repercussions extending to clients, vendors, and business partners. The duration and severity of the damage depend on the type of security breach experienced, which may range from a few hours to days or even weeks. A security breach—whether digital or physical—can result in severe consequences, including unauthorized access to facilities, theft of sensitive data, operational disruptions, financial losses, identity theft, ransomware attacks, and the exposure of proprietary technology and other confidential information.

The Primary Goal

Empowering Learners to Strengthen Workplace Security

This course provides more than just knowledge—it equips learners with practical skills to recognize, respond to, and prevent security threats in their work environment. Whether it’s identifying physical security risks or staying ahead of digital threats, learners will gain the confidence to apply best practices in their daily work.

The Audience

This training equips personnel across all departments and roles—whether new employees or seasoned professionals—with essential workplace security knowledge. Covering both physical security protocols and cybersecurity best practices, the course ensures that everyone, from frontline staff to leadership, understands how to protect organizational data, assets, and infrastructure. By fostering security awareness company-wide, this training empowers employees in diverse roles to contribute to a safer and more resilient workplace.

Scenario-Based Learning

A scenario-based learning approach immerses learners in real-world workplace security challenges, allowing them to make critical decisions and experience realistic consequences—all within a safe and controlled environment. By engaging in lifelike scenarios, learners actively apply security principles, strengthening their understanding through experience rather than passive instruction. This method not only maximizes engagement but also ensures the content remains memorable, equipping learners with practical skills they can confidently use in their daily work.

The Process

This course was developed using the Successive Approximation Model (SAM), ensuring an agile, iterative process that enhances engagement and learning effectiveness. Rather than following a rigid development structure, course elements were refined through continuous feedback, expert collaboration, and user testing, creating a dynamic and responsive learning experience.

Responsibilities

  • Instructional Design
  • eLearning Development
  • Scripting
  • Visual Design
  • Video Production
  • Video Editing

Tools

  • Storyline 360
  • Vyond Studio
  • Create Studio
  • Copilot
  • Camtasia Studio
  • Photoshop
  • Illustrator
  • Gimp
  • Inkscape
  • PowerPoint
  • Word

Preparation

Collaborated with SMEs across physical and cybersecurity domains to deliver the most fundamental, accurate, and relevant security training. AI-powered tools were also leveraged to research current workplace security challenges and solutions.

Video-centric instruction was chosen at the beginning to create an immersive experience that enhances learner engagement. While this approach requires greater production efforts, the result is a learning experience that is visually compelling, interactive, and impactful —guiding learners through realistic security situations they might encounter on the job.

Scripting

Once the training topics were finalized in collaboration with SMEs, scripts were developed to guide the video production process. These scripts provided structured prompts and outlined plausible outcomes for each scenario, ensuring realistic and engaging learning experiences. As a byproduct of this scripting process, handouts were created to summarize key learning content, offering learners a convenient reference for review.

Video Production

Vyond and Create Studio were selected for video production to create engaging and memorable content. Some clips were manually crafted from the outset for precision, while others leveraged AI-powered tools to refine prompts and streamline the text-to-video generation process. Although AI-generated videos required further refinement before reaching final production quality, the technology played a crucial role in accelerating the prototyping phase and demonstrating its value in an iterative design approach.

eLearning Development

After the initial video production was completed, the content was swiftly integrated into Articulate Storyline 360, incorporating a series of interactive triggers across slides and layers. The prototype then underwent rapid cycles of review, development, and refinement, ensuring continuous improvements to both the structure and content of the project. The process also included producing additional clips, video editing, adjusting background music, and troubleshooting malfunctioning triggersto reach the final version.