|Training: Training design II
|Kind of learning session
|Train of trainers +
|Getting accustomed to adjusting training schedules and workshop styles dependent upon the profile of participants. +
Put the participants into groups, and give …
Put the participants into groups, and give each group a different time frame, ranging from 1 day to 5 days. Give the group the participant profile, and ask each group to design a security and privacy training for this person. In addition to the specific training schedule, ask each group to keep a note of any challenges that they come across. After 30-40 minutes in small groups, bring the participants back to plenary, and ask them to share any major challenges that they faced. Get one person from each small group to talk the rest of the group through the training schedule that they came up with – try and keep these report backs reasonably short.keep these report backs reasonably short. +
Facilitators should be experienced in desi …
Facilitators should be experienced in designing and carrying out trainings. Prepare beforehand a participant profile – ideally one that either the facilitators are familiar with – with lots of details about what the person likes, and their background, both professional and personal.ackground, both professional and personal. +
|Title of the tutorial
|Training design II: planning sessions +
|Has improper value for
"Has improper value for" is a predefined property to track input errors for irregular value annotations that was likely caused by type or allowed value restrictions.
|Number of facilitators involved +
This property is a special property in this wiki.
|27 August 2015 18:14:45 +
|hide properties that link here
|No properties link to this page.