Going a step beyond ADDIE

The ADDIE model has served as a cornerstone for course development by instructional designers and training developers. Consisting of Analysis, Design, Development, Implementation and Analysis, the model has served Raytheon Professional Services well in the thousands of courses we have designed and executed over the years – including our latest Cyber Security Training Programmes.

Applying ADDIE to cyber security development

When implemented effectively, ADDIE establishes dynamic and flexible guidelines for course design that provides developers with structure while allowing for a high degree of freedom in delivering a bespoke course. ADDIE comprises the following five phases:

Analysis

The project starting point, this phase focuses on clarifying the challenges that the course will need to overcome, existing skills and knowledge among the participants, and any goals and objectives for the course participants and their employer. At RPS, our training courses are always operationally focused, with the priority being to deliver mission ready professionals who are able to put their new security skills to use immediately.

Design

The design phase involves setting out the user experience and designing any interface elements and visual design. Our cyber security courses make use of secure and scalable virtual training environments, which enable us to deliver training exercises to either individuals or teams as required.

Development

This is the point where the assets for courses are created, including any testing or debugging that may be needed for technical aspects. This is particularly important for cyber training, where there is a strong emphasis on practical training use simulated environments.  

Implementation

With development complete, it’s time to begin rolling the course out. This includes appointing course facilitators and getting the required resources in place.

Evaluation

The final phase of the ADDIE model focuses on reviewing how the course performed, including feedback received from facilitators and learners, and whether it met the goals set out in the analysis phase.

Maintenance – taking ADDIE a step further

One of the most common issues highlighted with the ADDIE model is that it is too front-loaded on the early analysis, design and development processes and leaves little room for adjustment once a course is underway.

We decided to address this issue by adding Maintenance as a sixth step. Unlike the Evaluation phase, Maintenance looks to gauge the success of the course and gather feedback from facilitators and learners throughout the course – rather than once it has finished. This means that the course can be refined and evolved while it is running as needs and priorities change.

As such, we are able to take into account both changing circumstances for participants and their employers, as well as external factors before the course ends. This agility is especially important for a fast-moving field like cyber security, where any given day could introduce a game-changing new threat.

Reach out to our team now to discover how we can use our ADDIE-M approach to create a flexible, adaptive cyber training programme to meet your organisation’s needs.