SlideShare a Scribd company logo
1 of 8
Download to read offline
Experiences of SCORM Implementation Process in Cyber Security Course Content




Experiences of SCORM Implementation
Process in Cyber Security Course Content

Rajshekhar AP (refer pg 118)                            Abstract
C-DAC Hyderabad
                                                        Content is the king in the context of any form
                                                        of learning; with no exception to e-learning.
G.Radha (refer pg 118)
                                                        In this paper we address various issues
C-DAC Hyderabad
                                                        related to content development and offering
                                                        in e-learning mode. Various issues related
Dr.Sarat Chandra Babu (refer pg 127)                    with content are Reusability, Accessibility,
C-DAC Hyderabad                                         Interoperability        and          Durability.
                                                        Implementation of content standards during
                                                        the content development process would
                                                        result in reducing the content related issues.
                                                        There are various worldwide standards
                                                        available among which Sharable Content
                                                        Object reference Model (SCORM) has
                                                        gained wide acceptance. The authors are
                                                        involved in developing the content for Cyber
                                                        Security course to offer in e-learning mode.
                                                        This paper presents a specific case study in
                                                        developing content to be offered in the e-
                                                        learing mode for “Cyber Security” course.
Rajesh R. Nair                                          This course is intended to be offered for
C-DAC Hyderabad                                         network system administrators, Information
                                                        Security officers and general users. This
Rajesh Ravindra Nair is working as a Multimedia         paper describes the implementation of
Developer in C-DAC Hyderabad. He completed              SCORM standards in developing the content
M.Sc in Mathematics in 2001 from MDS Univ
                                                        which includes generating metadata, content
Ajmer and Diploma in Advanced Computer Arts
                                                        aggregation and content packaging. The
in 2003 from National Multimedia Resource
                                                        authors gained experience using ADL’s tools
Centre (C-DAC) Pune. Presently he is working in
                                                        for SCORM conformance test.
e-learning project. His areas of interest are
Graphic Designing, 3D modeling, 2D animation
and other multimedia related areas.                     1. Introduction

                                                        At present, in the world of distance
                                                        education e-learning is in the forefront. As in
                                                        any form of education, content is the crux in
                                                        e-learning too. Content development is a
                                                        systematic approach to gather, analyze,
                                                        design and interpret the information for a
                                                        particular topic in a specified manner. Since
                                                        the     content      evolves     over     time,
                                                        maintainability of the content has to be
                                                        considered. This allows easy management
                                                        of the content. Among other issues central
                                                        to the content development, portability and
                                                        interoperability take the spotlight. The
                                                        solution for this problem is standardization of
                                                        the content development process. The
                                                        process of standardization wraps all other

ELELTECH INDIA 2005                                                                                     138
Experiences of SCORM Implementation Process in Cyber Security Course Content



processes involved in the development of                adapted and integrated with one another to
content to address the above said issues.               form a more complete and easier-to-
                                                        implement model. SCORM has implemented
                                                        the Learning Object Metadata (LOM) from
Standards impose certain order, providing               IEEE standards and content packaging
more uniform and precise access and                     specifications from IMS. SCORM has
manipulation to e-learning resources and                become      widely   accepted     e-Learning
data. Designers and developers of on-line               standard in content development and most
learning materials have a variety of software           of the vendors are providing support in their
tools at their disposal for creating learning           products to test SCORM compliant content.
content.    These      tools    range    from           It defines a Web based learning Content
presentation software packages to more                  Aggregation Model and a Runtime
complex authoring environments. They are                Environment for learning objects. Content
very useful by giving the opportunity to the            Aggregation Model Content Aggregation
developers to create learning resources that            Model (CAM) provides means to identify and
might     otherwise      require    extensive           describe the learning content. Asset and
programming skills. Unfortunately, a number             Sharable Content Object (SCO) are the
of software tools available from a wide                 components of the content as defined under
variety of vendors produce instructional                CAM. Asset is an electronic representation
materials that do not share a common                    of media, text, images, sound, web pages,
mechanism for finding and using the                     assessment objects or other pieces of data
resources. In addition to this, the content             that can be delivered to a Web client. A
developed for one Learning Management                   SCO represents a collection of one or more
System (LMS) may or may not be launched                 Assets that include a launching mechanism
by another LMS. So there is need for                    through SCORM Run-Time environment
standards to define the framework for e-                (RTE) to communicate with LMS. A SCO
learning content. So standards are desirable            represents the lowest level granular learning
for interoperability, convenience, flexibility,         resource that can be tracked by an LMS
and efficiency in the design, delivery and              using the RTE.       Asset and SCO are
management of the learning content.                     associated with metadata to identify and
                                                        describe the content and to make them
                                                        reusable.
2.     Content    development
Standards and SCORM
                                                        The SCORM Content Aggregation Model
                                                        further defines how learning content can be
There are number of organizations working               aggregated into a course or portion of a
to develop specifications and standards                 course.     Content Organizations provides
such as IMS, ADL, ARIADNE, IEEE, ISO etc                different paths of learning by aggregating
to provide framework for e-learning                     different SCOs. Content packaging provides
architectures, to facilitate interoperability,          a standardized way to exchange SCOs
content management, Learning Object Meta                between different systems or tools. Content
data, course sequencing, content packaging              Packaging also defines the structure and the
etc. One of the widely accepted content                 intended behavior of content organizations.
development standards is Sharable Content
Object Reference Model (SCORM) defined
                                                        3. Run-Time Environment
by Advanced Distributed Learning (ADL)
initiative.
                                                        The purpose of the SCORM Run-time
SCORM is a suite of technical standards
                                                        Environment is to provide a means for
that enable e-learning environments to find,
                                                        interoperability between SCORM content
import, share, reuse, and export learning
                                                        packages and LMS. A requirement of the
content in a standardized way. SCORM
                                                        SCORM is that learning content should be
provides      adilities  such  as    content
                                                        interoperable    across   multiple   LMSs
Reusability, Accessibility, Interoperability,
                                                        regardless of the tools used to create the
and       Durability.   SCORM     references
                                                        content.
specifications, standards and guidelines
                                                        For this to be possible, there must be a
developed by other organizations and
                                                        common way to launch learning content, to

ELELTECH INDIA 2005                                                                                     139
Experiences of SCORM Implementation Process in Cyber Security Course Content



communicate with an LMS and a predefined                 activities of this course development include
language or vocabulary forming the basis of             formulation of course syllabus based on
the communication. These three aspects of               SCORM standards, Identification of SCOs,
the RTE are Launch, Application Program                 Identification of metadata specific to the
Interface (API) and Data Model. The Launch              course, defining a learning path for content
mechanism defines a common way for                      delivery and evaluation methodology.
LMSs to start learning content. The
communication protocols are standardized                4.2 Design of Course Syllabus
through the use of a common API. The API
is the communication mechanism for                      The syllabus of the course was designed in
informing the LMS of the state of the                   consultation with domain experts. The
learning content such as initialized, finished          structure of the course is also important as it
or in an error condition. Also the getting and          defines the learning paths for different target
setting data (e.g., score, time limits, etc.)           audience. Design of course syllabus is the
between the LMS and the SCO is achieved                 basis for identifying the SCOs.
through the APIs. A Data Model defines
elements that both the LMS and SCO are                  4.3 Identifying the SCO
expected to “know” about such as the status
of the learning content.                                A SCO can contain a single learning object
                                                        or a collection of learning objects, tests,
Understanding the importance of standards               scenarios etc. Additional aspect of SCO
conformance in a e-learning course, we                  that one has to keep in mind while designing
decided to implement SCORM in the Cyber                 it is, a SCO must be standalone. This
Security course.                                        restricts a SCO from having any
                                                        dependencies with other SCOs.
                                                        The contents of Cyber Security is structured
4. Design and development of an
                                                        in a hierarchical fashion. Unit is at the
e-Learning course with SCORM
                                                        highest level of this hierarchy and lesson at
specifications                                          the lowest level. In this hierarchy a lesson by
                                                        itself can provide learning experience to the
To develop a course that follows the                    user. So we have identified lesson as a
specifications of SCORM, we need to                     SCO as it forms the most granular object
implement the process to perform all the                that can be tracked and delivered by an
steps involved. The process is discussed                LMS. The structure of a unit is shown here.
here.
                                                        4.4 Course: Cyber Security
4.1 Development of Cyber             Security
Course confirming to SCORM                              Unit – 2: Network Security
                                                        Module-1: Access Control Systems and
We have developed course content for                    Methodologies
Cyber Security, which is intended for                           Lesson-1:Identification         and
System administrators and Information                           Authentication Techniques
security officers. This course has a                            Lesson-2:Various Identification and
requirement of being offered through e-                         Authentication Techniques
learning mode. In view of delivery of the                       Lesson-3: Access Control Issues
course in e-learning mode, we took an
approach to implement the SCORM                         Module-2: Virtual Private Network
standards to make it interoperable with                       Lesson-1: Introduction to VPN
LMSs. This activity required a study to                       Lesson-2: Cryptography for VPNs
understand SCORM in depth, chalking out a                     Lesson-3: Layer-3 IP VPNs
process to implement it specific to the                       Lesson-4: Securing Application
course and meeting the course objectives at                   Streams
the same time. After thorough study of                        Lesson-5: IPSec VPN Design &
SCORM, we have come out with a process                        Deployment and VPN Case Study
for implementing it in the course. The major



ELELTECH INDIA 2005                                                                                     140
Experiences of SCORM Implementation Process in Cyber Security Course Content



                                                        10.   lifecycle entity
Module-3: Intrusion Detection Systems
                                                        11.   lifecycle date
and Vulnerability Assessment systems
       Lesson-1: Overview of IDS                        12.   metametadata identifier entry
       Lesson-2:IDS Types (Host Based                   13.   metametadata identifier catalog
       IDS & Network Based IDS)                         14.   technical format
       Lesson-3: Monitoring, Logging,                   15.   technical size
       responding to an Attack &                        16.   technical location
       Vulnerability Assessment                         17.   technical requirement orcomposite type
       Lesson-4: Intrusion Prevention                         OS
       Systems                                          18.   technicalrequirement
                                                              orcompositetypebrowser
                                                        19.   technical otherplatformrequirements
Module-4: Firewalls
        Lesson-1: Overview of Firewall                  20.   technical duration
        Lesson-2: Types of firewalls                    21.   educational interactivitytype
        (Packet     Filtering,     Application          22.   educational learingresourcetype
        Gateways & Stateful Inspection)                 23.   educational intendedenduserrole
        Lesson-3: De Militarised Zones &                24.   educational difficulty
        Firewall Features                               25.   educational typicallearningtime duration
                                                        26.   rights cost
Module-5: Server Management
        Lesson-1: User Management &                     27.   rights copyright and otherrestrictions
        Setting up User Privileges                      28.   rights description
        Lesson-2: DNS Security & Load
        Balancing
                                                        4.6 Naming and storing the Files:
Module-6:       Telecommunications           &
Internet Security
                                                        When content development is being done,
        Lesson-1: Fax Security
                                                        many people would handle the content. So it
        Lesson-2: Security Risk Analysis
                                                        is always better to have a Content
        for voice-over-Internet
                                                        Repository. Along with it some naming
        Lesson-3:       Next       Generation
                                                        conventions have to be followed.
        Networks
                                                        For example, presentation material in
        Lesson-4:Voice-over-packet service
                                                        Lesson1 of Topic1 of Module1 and Unit1
        architectures,         standards     &
                                                        could     be     given    the    name      as
        emerging products, which address
                                                        Unit1_Module1_Topic1_Lesson1.ppt. It is
        key security issues
                                                        important to keep in mind that underscores
                                                        should be used as separator as some
4.5 Identifying the metadata attributes
                                                        operating systems may not be able to
The metadata forms the basis of SCORM.
                                                        identify a filename with blank spaces or any
The mandatory metadata attributes specified
                                                        other delimiters as separators. Also the
by SCORM and a subset of optional
                                                        content should be stored in a central
metadata attributes specific to the course
                                                        repository with the       directory structure
were considered. The list of the metadata
                                                        following the same naming convention.
attributes for a SCO i.e Basics of
Communication Systems & Issues in
                                                        4.7 Metadata Repository
Computer Networking are
1. general identifier
                                                        The SCORM implementation guide specifies
2. general identifier entry
                                                        creation of a central repository for the
3. general identifier catalog
                                                        content metadata. We have developed a
4. general title
                                                        central repository for the metadata using MS
5. general description
                                                        Access. The metadata of all the SCOs are
6. general keyword
                                                        entered into this repository. The metadata
7. lifecycle version
                                                        repository schema is shown in fig.2
8. lifecycle status
9. lifecycle role




ELELTECH INDIA 2005                                                                                     141
Experiences of SCORM Implementation Process in Cyber Security Course Content




                             Figure 2 Metadata repository schema


                                                      entry of all the metadata values and
4.8 Generating the Metadata
                                                      generates an XML file for the inputs given.
For the purpose of generating the metadata,           Below is the snapshot of the interface
a web-based application has been                      developed for generating metadata in XML
developed. It provides the GUI to facilitate          format.




                        Figure 3 Metadata Generator for SCO metadata




ELELTECH INDIA 2005                                                                                   142
Experiences of SCORM Implementation Process in Cyber Security Course Content




                                                      functions      loadPage(),      unloadPage()
4.9 Packaging the Content:
                                                      provided in SCOFunctions.js file.
Once metadata has been generated, the                 The next step in this process is sequencing
SCO has to interact with the LMS so that it           and packaging the content. Default
can be launched by the LMS. For this, each            sequencing as per the course structure was
SCO must be embedded with JavaScript                  defined before packaging the course
functions that would communicate with the             content. Using the Reload Editor the
LMS. Each Lesson of Cyber Security                    contents were arranged into organizations
Content, has been embedded with the                   and these organizations have been
JavaScript functions that are provided by             packaged as a zip file. A package descriptor
ADL. There are two JavaScript files                   (imsmanifest.xml) has been created by the
available for this purpose- SCOFunctions.js           Reload Editor for this zipped content. The
and APIWrapper.js. We have made the                   content organization created using Reload
content launchable by embedding the                   editor for unit 2 is shown in Fig.4.




               Figure 4 content organizations of Cyber Security Course Contents




ELELTECH INDIA 2005                                                                                   143
Experiences of SCORM Implementation Process in Cyber Security Course Content




                                                    Metadata Generator for all the SCOs and
4.9 Validating the SCO metadata and the
                                                    the package descriptor generated by Reload
Package Descriptor using ADL Test Suite
                                                    Editor after packaging the content have
ADL has provided a test suite using which           passed the ADL SCORM conformance
the SCO metadata and Package descriptor             tests.
can be validated. In this cyber security
course, the SCO metadata generated by the




                             Figure 5 Conformance Test Suite




ELELTECH INDIA 2005                                                                                 144
Experiences of SCORM Implementation Process in Cyber Security Course Content



To carry out conformance test, ADL also                http://www.edtech.vt.edu/edtech/id/index.ht
provides a sample RTE that can deliver a               ml
content package if the package is SCORM                http://www.lsal.cmu.edu/lsal/expertise/paper
conforming. The Cyber Security content                 s/presentations/techlearnisd2002/techlearnis
package was imported successfully and                  d2002.pdf
delivered in the Sample RTE.

We have also ported this course content
onto Atutor which is a open source e-
learning tool. The RTE implementation of
Atutor has delivered the course package
according to the default sequence provided
in the imsmanifest file.

Conclusion
Developing online courses using SCOs has
a lot of future potential. This provides the
ability to access a repository for anytime,
anywhere and reusable learning content. At
the same time we should be conscious
about the issues related with the
implementation. They are, identifying SCO,
which can be standalone and reused and
repurposed in different contexts. Next is the
selection of metadata specific to the course.
Development or using the existing tools for
metadata repository and learning content
repository decide the ease of maintaining
the course. Based on our design team
experiences, we believe these efforts are
possible     for   implementing      SCORM
standards in e-learning course content
development.

References

http://www.rhassociates.com/scorm.htm
http://www.lsal.cmu.edu/lsal/expertise/projec
ts/developersguide/
http://www.edutools.info/course/productinfo/i
ndex.jsp
http://www.centra.com/products/index.asp
http://www.adl.org/adl.asp
http://www.lsal.cmu.edu/lsal/expertise/techn
ologies/index.html
http://www.techniques.org/product.php
http://www.e-learningzone.co.uk/links.html
http://www.cetis.ac.uk/
http://www.jointadlcolab.org/v2/lit.htm
http://www.learninglab.org.uk/ADL/homepag
e.asp
http://www.ieee.org/organizations/eab/tutoria
ls/refguide/mms01.htm



ELELTECH INDIA 2005                                                                                    145

More Related Content

What's hot

AN ADAPTIVE REUSABLE LEARNING OBJECT FOR E-LEARNING USING COGNITIVE ARCHITECTURE
AN ADAPTIVE REUSABLE LEARNING OBJECT FOR E-LEARNING USING COGNITIVE ARCHITECTUREAN ADAPTIVE REUSABLE LEARNING OBJECT FOR E-LEARNING USING COGNITIVE ARCHITECTURE
AN ADAPTIVE REUSABLE LEARNING OBJECT FOR E-LEARNING USING COGNITIVE ARCHITECTUREacijjournal
 
Design and Implementation of Efficient Search Methodology for Content-Based R...
Design and Implementation of Efficient Search Methodology for Content-Based R...Design and Implementation of Efficient Search Methodology for Content-Based R...
Design and Implementation of Efficient Search Methodology for Content-Based R...IDES Editor
 
Thinking Critically about Classroom Technologies using the TPCK Framework
Thinking Critically about Classroom Technologies using the TPCK FrameworkThinking Critically about Classroom Technologies using the TPCK Framework
Thinking Critically about Classroom Technologies using the TPCK Frameworkkslovesbooks
 
The concept and architecture of learning cell
The concept and architecture of learning cellThe concept and architecture of learning cell
The concept and architecture of learning cellWei Cheng
 
Teacher matrix for 21st century skills
Teacher matrix for 21st century skillsTeacher matrix for 21st century skills
Teacher matrix for 21st century skillsChristine Sitter
 
Advances in defense sector learning
Advances in defense sector learningAdvances in defense sector learning
Advances in defense sector learningeXact learning
 
standardization for highschool e-learning
standardization for highschool e-learningstandardization for highschool e-learning
standardization for highschool e-learningWolf Spalteholz
 
2010-04-14 EDUCON eMadrid UMH (UPM) Oscar Martínez
2010-04-14 EDUCON eMadrid UMH (UPM) Oscar Martínez2010-04-14 EDUCON eMadrid UMH (UPM) Oscar Martínez
2010-04-14 EDUCON eMadrid UMH (UPM) Oscar MartínezeMadrid network
 
Report for research ethics
Report for research ethicsReport for research ethics
Report for research ethicsssuser7fcce2
 
TPACK - Systemtic Integration of Technology
TPACK - Systemtic Integration of TechnologyTPACK - Systemtic Integration of Technology
TPACK - Systemtic Integration of TechnologyMark Fijor
 
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...eLearning Papers
 
Personalised learning
Personalised learningPersonalised learning
Personalised learningJames Ballard
 
Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...eLearning Papers
 
Managing Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business EnvironmentsManaging Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business EnvironmentseLearning Papers
 
Learning Design Implementations for Distance e-Learning
Learning Design Implementations for Distance e-LearningLearning Design Implementations for Distance e-Learning
Learning Design Implementations for Distance e-LearningM I Santally
 
GGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual LearningGGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual LearningeLearning Papers
 
Integrating ICT in Pre-service Teacher Training
Integrating ICT in Pre-service Teacher TrainingIntegrating ICT in Pre-service Teacher Training
Integrating ICT in Pre-service Teacher TrainingKristina D.C. Hoeppner
 
Jurnal an implementable architecture of an e-learning system
Jurnal   an implementable architecture of an e-learning systemJurnal   an implementable architecture of an e-learning system
Jurnal an implementable architecture of an e-learning systemUniversitas Putera Batam
 
Uses of Technology in Teacher Education
Uses of Technology in Teacher EducationUses of Technology in Teacher Education
Uses of Technology in Teacher Educationjunius
 

What's hot (20)

AN ADAPTIVE REUSABLE LEARNING OBJECT FOR E-LEARNING USING COGNITIVE ARCHITECTURE
AN ADAPTIVE REUSABLE LEARNING OBJECT FOR E-LEARNING USING COGNITIVE ARCHITECTUREAN ADAPTIVE REUSABLE LEARNING OBJECT FOR E-LEARNING USING COGNITIVE ARCHITECTURE
AN ADAPTIVE REUSABLE LEARNING OBJECT FOR E-LEARNING USING COGNITIVE ARCHITECTURE
 
Design and Implementation of Efficient Search Methodology for Content-Based R...
Design and Implementation of Efficient Search Methodology for Content-Based R...Design and Implementation of Efficient Search Methodology for Content-Based R...
Design and Implementation of Efficient Search Methodology for Content-Based R...
 
Thinking Critically about Classroom Technologies using the TPCK Framework
Thinking Critically about Classroom Technologies using the TPCK FrameworkThinking Critically about Classroom Technologies using the TPCK Framework
Thinking Critically about Classroom Technologies using the TPCK Framework
 
The concept and architecture of learning cell
The concept and architecture of learning cellThe concept and architecture of learning cell
The concept and architecture of learning cell
 
Teacher matrix for 21st century skills
Teacher matrix for 21st century skillsTeacher matrix for 21st century skills
Teacher matrix for 21st century skills
 
Advances in defense sector learning
Advances in defense sector learningAdvances in defense sector learning
Advances in defense sector learning
 
standardization for highschool e-learning
standardization for highschool e-learningstandardization for highschool e-learning
standardization for highschool e-learning
 
2010-04-14 EDUCON eMadrid UMH (UPM) Oscar Martínez
2010-04-14 EDUCON eMadrid UMH (UPM) Oscar Martínez2010-04-14 EDUCON eMadrid UMH (UPM) Oscar Martínez
2010-04-14 EDUCON eMadrid UMH (UPM) Oscar Martínez
 
Report for research ethics
Report for research ethicsReport for research ethics
Report for research ethics
 
TPACK - Systemtic Integration of Technology
TPACK - Systemtic Integration of TechnologyTPACK - Systemtic Integration of Technology
TPACK - Systemtic Integration of Technology
 
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
OER in the Mobile Era: Content Repositories’ Features for Mobile Devices and ...
 
Personalised learning
Personalised learningPersonalised learning
Personalised learning
 
Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...Designing and Developing Mobile Learning Applications in International Studen...
Designing and Developing Mobile Learning Applications in International Studen...
 
Managing Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business EnvironmentsManaging Training Concepts in Multicultural Business Environments
Managing Training Concepts in Multicultural Business Environments
 
Learning Design Implementations for Distance e-Learning
Learning Design Implementations for Distance e-LearningLearning Design Implementations for Distance e-Learning
Learning Design Implementations for Distance e-Learning
 
E LEARNING
E LEARNINGE LEARNING
E LEARNING
 
GGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual LearningGGULIVRR: Touching Mobile and Contextual Learning
GGULIVRR: Touching Mobile and Contextual Learning
 
Integrating ICT in Pre-service Teacher Training
Integrating ICT in Pre-service Teacher TrainingIntegrating ICT in Pre-service Teacher Training
Integrating ICT in Pre-service Teacher Training
 
Jurnal an implementable architecture of an e-learning system
Jurnal   an implementable architecture of an e-learning systemJurnal   an implementable architecture of an e-learning system
Jurnal an implementable architecture of an e-learning system
 
Uses of Technology in Teacher Education
Uses of Technology in Teacher EducationUses of Technology in Teacher Education
Uses of Technology in Teacher Education
 

Similar to SCORM implementation in elearning course

Group A Standards
Group A StandardsGroup A Standards
Group A Standardsbsanchez44
 
White paper drupal for edu
White paper   drupal for eduWhite paper   drupal for edu
White paper drupal for eduKevin Davison
 
Tpackpontiac
TpackpontiacTpackpontiac
Tpackpontiacehelfant
 
Jurnal an implementable architecture of an e-learning system
Jurnal   an implementable architecture of an e-learning systemJurnal   an implementable architecture of an e-learning system
Jurnal an implementable architecture of an e-learning systemRatzman III
 
Jurnal an implementable architecture of an e-learning system
Jurnal   an implementable architecture of an e-learning systemJurnal   an implementable architecture of an e-learning system
Jurnal an implementable architecture of an e-learning systemRatzman III
 
An introduction to SCORM 2004
An introduction to SCORM 2004An introduction to SCORM 2004
An introduction to SCORM 2004Teeled
 
Design and development of e learning contents and online activities
Design and development of e learning contents and online activitiesDesign and development of e learning contents and online activities
Design and development of e learning contents and online activitiesMUHAMMAD SABRI SAHRIR
 
Design principles for digital repostories March 2005
Design principles for digital repostories March 2005Design principles for digital repostories March 2005
Design principles for digital repostories March 2005Mark Childs
 
2010 Ncce Pd 2 0 Final
2010 Ncce Pd 2 0 Final2010 Ncce Pd 2 0 Final
2010 Ncce Pd 2 0 FinalJason Neiffer
 
2010 Ncce Pd 2 0 Final
2010 Ncce Pd 2 0 Final2010 Ncce Pd 2 0 Final
2010 Ncce Pd 2 0 FinalJason Neiffer
 
Development of an E-Learning System Incorporating Semantic Web
Development of an E-Learning System Incorporating Semantic WebDevelopment of an E-Learning System Incorporating Semantic Web
Development of an E-Learning System Incorporating Semantic WebIJORCS
 
SCORM - Suit of e-Learning
SCORM - Suit of e-LearningSCORM - Suit of e-Learning
SCORM - Suit of e-LearningCacheWorks©
 
Formats of e-content - R.D.Sivakumar
Formats of e-content - R.D.SivakumarFormats of e-content - R.D.Sivakumar
Formats of e-content - R.D.SivakumarSivakumar R D .
 
Learning&collaboration
Learning&collaboration Learning&collaboration
Learning&collaboration Samir Dash
 
Instructional Design for the Semantic Web
Instructional Design for the Semantic WebInstructional Design for the Semantic Web
Instructional Design for the Semantic Webguest649a93
 
04 distance learning standards-scorm specification
04 distance learning standards-scorm specification04 distance learning standards-scorm specification
04 distance learning standards-scorm specification宥均 林
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global softwareijseajournal
 

Similar to SCORM implementation in elearning course (20)

Group A Standards
Group A StandardsGroup A Standards
Group A Standards
 
White paper drupal for edu
White paper   drupal for eduWhite paper   drupal for edu
White paper drupal for edu
 
Scorm
ScormScorm
Scorm
 
Tpackpontiac
TpackpontiacTpackpontiac
Tpackpontiac
 
Jurnal an implementable architecture of an e-learning system
Jurnal   an implementable architecture of an e-learning systemJurnal   an implementable architecture of an e-learning system
Jurnal an implementable architecture of an e-learning system
 
Jurnal an implementable architecture of an e-learning system
Jurnal   an implementable architecture of an e-learning systemJurnal   an implementable architecture of an e-learning system
Jurnal an implementable architecture of an e-learning system
 
An introduction to SCORM 2004
An introduction to SCORM 2004An introduction to SCORM 2004
An introduction to SCORM 2004
 
Design and development of e learning contents and online activities
Design and development of e learning contents and online activitiesDesign and development of e learning contents and online activities
Design and development of e learning contents and online activities
 
Tioli Software
Tioli SoftwareTioli Software
Tioli Software
 
Design principles for digital repostories March 2005
Design principles for digital repostories March 2005Design principles for digital repostories March 2005
Design principles for digital repostories March 2005
 
2010 Ncce Pd 2 0 Final
2010 Ncce Pd 2 0 Final2010 Ncce Pd 2 0 Final
2010 Ncce Pd 2 0 Final
 
2010 Ncce Pd 2 0 Final
2010 Ncce Pd 2 0 Final2010 Ncce Pd 2 0 Final
2010 Ncce Pd 2 0 Final
 
Development of an E-Learning System Incorporating Semantic Web
Development of an E-Learning System Incorporating Semantic WebDevelopment of an E-Learning System Incorporating Semantic Web
Development of an E-Learning System Incorporating Semantic Web
 
SCORM - Suit of e-Learning
SCORM - Suit of e-LearningSCORM - Suit of e-Learning
SCORM - Suit of e-Learning
 
Formats of e-content - R.D.Sivakumar
Formats of e-content - R.D.SivakumarFormats of e-content - R.D.Sivakumar
Formats of e-content - R.D.Sivakumar
 
Learning&collaboration
Learning&collaboration Learning&collaboration
Learning&collaboration
 
Instructional Design for the Semantic Web
Instructional Design for the Semantic WebInstructional Design for the Semantic Web
Instructional Design for the Semantic Web
 
04 distance learning standards-scorm specification
04 distance learning standards-scorm specification04 distance learning standards-scorm specification
04 distance learning standards-scorm specification
 
S4 eea
S4 eeaS4 eea
S4 eea
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 

More from Rajesh R. Nair

More from Rajesh R. Nair (12)

10 Design Factors with Linkedin
10 Design Factors with Linkedin10 Design Factors with Linkedin
10 Design Factors with Linkedin
 
Game Artist - Rakesh Resume
Game Artist - Rakesh ResumeGame Artist - Rakesh Resume
Game Artist - Rakesh Resume
 
Basics of Multimedia Content
Basics of Multimedia ContentBasics of Multimedia Content
Basics of Multimedia Content
 
Storyboarding an existing concept
Storyboarding an existing conceptStoryboarding an existing concept
Storyboarding an existing concept
 
Smart Parking
Smart ParkingSmart Parking
Smart Parking
 
Multimedia Presentation
Multimedia PresentationMultimedia Presentation
Multimedia Presentation
 
Blogging
BloggingBlogging
Blogging
 
Multimedia Course
Multimedia CourseMultimedia Course
Multimedia Course
 
SEO
SEOSEO
SEO
 
Definition Of Design
Definition Of DesignDefinition Of Design
Definition Of Design
 
My Canvas
My CanvasMy Canvas
My Canvas
 
Flash
FlashFlash
Flash
 

Recently uploaded

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Recently uploaded (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

SCORM implementation in elearning course

  • 1. Experiences of SCORM Implementation Process in Cyber Security Course Content Experiences of SCORM Implementation Process in Cyber Security Course Content Rajshekhar AP (refer pg 118) Abstract C-DAC Hyderabad Content is the king in the context of any form of learning; with no exception to e-learning. G.Radha (refer pg 118) In this paper we address various issues C-DAC Hyderabad related to content development and offering in e-learning mode. Various issues related Dr.Sarat Chandra Babu (refer pg 127) with content are Reusability, Accessibility, C-DAC Hyderabad Interoperability and Durability. Implementation of content standards during the content development process would result in reducing the content related issues. There are various worldwide standards available among which Sharable Content Object reference Model (SCORM) has gained wide acceptance. The authors are involved in developing the content for Cyber Security course to offer in e-learning mode. This paper presents a specific case study in developing content to be offered in the e- learing mode for “Cyber Security” course. Rajesh R. Nair This course is intended to be offered for C-DAC Hyderabad network system administrators, Information Security officers and general users. This Rajesh Ravindra Nair is working as a Multimedia paper describes the implementation of Developer in C-DAC Hyderabad. He completed SCORM standards in developing the content M.Sc in Mathematics in 2001 from MDS Univ which includes generating metadata, content Ajmer and Diploma in Advanced Computer Arts aggregation and content packaging. The in 2003 from National Multimedia Resource authors gained experience using ADL’s tools Centre (C-DAC) Pune. Presently he is working in for SCORM conformance test. e-learning project. His areas of interest are Graphic Designing, 3D modeling, 2D animation and other multimedia related areas. 1. Introduction At present, in the world of distance education e-learning is in the forefront. As in any form of education, content is the crux in e-learning too. Content development is a systematic approach to gather, analyze, design and interpret the information for a particular topic in a specified manner. Since the content evolves over time, maintainability of the content has to be considered. This allows easy management of the content. Among other issues central to the content development, portability and interoperability take the spotlight. The solution for this problem is standardization of the content development process. The process of standardization wraps all other ELELTECH INDIA 2005 138
  • 2. Experiences of SCORM Implementation Process in Cyber Security Course Content processes involved in the development of adapted and integrated with one another to content to address the above said issues. form a more complete and easier-to- implement model. SCORM has implemented the Learning Object Metadata (LOM) from Standards impose certain order, providing IEEE standards and content packaging more uniform and precise access and specifications from IMS. SCORM has manipulation to e-learning resources and become widely accepted e-Learning data. Designers and developers of on-line standard in content development and most learning materials have a variety of software of the vendors are providing support in their tools at their disposal for creating learning products to test SCORM compliant content. content. These tools range from It defines a Web based learning Content presentation software packages to more Aggregation Model and a Runtime complex authoring environments. They are Environment for learning objects. Content very useful by giving the opportunity to the Aggregation Model Content Aggregation developers to create learning resources that Model (CAM) provides means to identify and might otherwise require extensive describe the learning content. Asset and programming skills. Unfortunately, a number Sharable Content Object (SCO) are the of software tools available from a wide components of the content as defined under variety of vendors produce instructional CAM. Asset is an electronic representation materials that do not share a common of media, text, images, sound, web pages, mechanism for finding and using the assessment objects or other pieces of data resources. In addition to this, the content that can be delivered to a Web client. A developed for one Learning Management SCO represents a collection of one or more System (LMS) may or may not be launched Assets that include a launching mechanism by another LMS. So there is need for through SCORM Run-Time environment standards to define the framework for e- (RTE) to communicate with LMS. A SCO learning content. So standards are desirable represents the lowest level granular learning for interoperability, convenience, flexibility, resource that can be tracked by an LMS and efficiency in the design, delivery and using the RTE. Asset and SCO are management of the learning content. associated with metadata to identify and describe the content and to make them reusable. 2. Content development Standards and SCORM The SCORM Content Aggregation Model further defines how learning content can be There are number of organizations working aggregated into a course or portion of a to develop specifications and standards course. Content Organizations provides such as IMS, ADL, ARIADNE, IEEE, ISO etc different paths of learning by aggregating to provide framework for e-learning different SCOs. Content packaging provides architectures, to facilitate interoperability, a standardized way to exchange SCOs content management, Learning Object Meta between different systems or tools. Content data, course sequencing, content packaging Packaging also defines the structure and the etc. One of the widely accepted content intended behavior of content organizations. development standards is Sharable Content Object Reference Model (SCORM) defined 3. Run-Time Environment by Advanced Distributed Learning (ADL) initiative. The purpose of the SCORM Run-time SCORM is a suite of technical standards Environment is to provide a means for that enable e-learning environments to find, interoperability between SCORM content import, share, reuse, and export learning packages and LMS. A requirement of the content in a standardized way. SCORM SCORM is that learning content should be provides adilities such as content interoperable across multiple LMSs Reusability, Accessibility, Interoperability, regardless of the tools used to create the and Durability. SCORM references content. specifications, standards and guidelines For this to be possible, there must be a developed by other organizations and common way to launch learning content, to ELELTECH INDIA 2005 139
  • 3. Experiences of SCORM Implementation Process in Cyber Security Course Content communicate with an LMS and a predefined activities of this course development include language or vocabulary forming the basis of formulation of course syllabus based on the communication. These three aspects of SCORM standards, Identification of SCOs, the RTE are Launch, Application Program Identification of metadata specific to the Interface (API) and Data Model. The Launch course, defining a learning path for content mechanism defines a common way for delivery and evaluation methodology. LMSs to start learning content. The communication protocols are standardized 4.2 Design of Course Syllabus through the use of a common API. The API is the communication mechanism for The syllabus of the course was designed in informing the LMS of the state of the consultation with domain experts. The learning content such as initialized, finished structure of the course is also important as it or in an error condition. Also the getting and defines the learning paths for different target setting data (e.g., score, time limits, etc.) audience. Design of course syllabus is the between the LMS and the SCO is achieved basis for identifying the SCOs. through the APIs. A Data Model defines elements that both the LMS and SCO are 4.3 Identifying the SCO expected to “know” about such as the status of the learning content. A SCO can contain a single learning object or a collection of learning objects, tests, Understanding the importance of standards scenarios etc. Additional aspect of SCO conformance in a e-learning course, we that one has to keep in mind while designing decided to implement SCORM in the Cyber it is, a SCO must be standalone. This Security course. restricts a SCO from having any dependencies with other SCOs. The contents of Cyber Security is structured 4. Design and development of an in a hierarchical fashion. Unit is at the e-Learning course with SCORM highest level of this hierarchy and lesson at specifications the lowest level. In this hierarchy a lesson by itself can provide learning experience to the To develop a course that follows the user. So we have identified lesson as a specifications of SCORM, we need to SCO as it forms the most granular object implement the process to perform all the that can be tracked and delivered by an steps involved. The process is discussed LMS. The structure of a unit is shown here. here. 4.4 Course: Cyber Security 4.1 Development of Cyber Security Course confirming to SCORM Unit – 2: Network Security Module-1: Access Control Systems and We have developed course content for Methodologies Cyber Security, which is intended for Lesson-1:Identification and System administrators and Information Authentication Techniques security officers. This course has a Lesson-2:Various Identification and requirement of being offered through e- Authentication Techniques learning mode. In view of delivery of the Lesson-3: Access Control Issues course in e-learning mode, we took an approach to implement the SCORM Module-2: Virtual Private Network standards to make it interoperable with Lesson-1: Introduction to VPN LMSs. This activity required a study to Lesson-2: Cryptography for VPNs understand SCORM in depth, chalking out a Lesson-3: Layer-3 IP VPNs process to implement it specific to the Lesson-4: Securing Application course and meeting the course objectives at Streams the same time. After thorough study of Lesson-5: IPSec VPN Design & SCORM, we have come out with a process Deployment and VPN Case Study for implementing it in the course. The major ELELTECH INDIA 2005 140
  • 4. Experiences of SCORM Implementation Process in Cyber Security Course Content 10. lifecycle entity Module-3: Intrusion Detection Systems 11. lifecycle date and Vulnerability Assessment systems Lesson-1: Overview of IDS 12. metametadata identifier entry Lesson-2:IDS Types (Host Based 13. metametadata identifier catalog IDS & Network Based IDS) 14. technical format Lesson-3: Monitoring, Logging, 15. technical size responding to an Attack & 16. technical location Vulnerability Assessment 17. technical requirement orcomposite type Lesson-4: Intrusion Prevention OS Systems 18. technicalrequirement orcompositetypebrowser 19. technical otherplatformrequirements Module-4: Firewalls Lesson-1: Overview of Firewall 20. technical duration Lesson-2: Types of firewalls 21. educational interactivitytype (Packet Filtering, Application 22. educational learingresourcetype Gateways & Stateful Inspection) 23. educational intendedenduserrole Lesson-3: De Militarised Zones & 24. educational difficulty Firewall Features 25. educational typicallearningtime duration 26. rights cost Module-5: Server Management Lesson-1: User Management & 27. rights copyright and otherrestrictions Setting up User Privileges 28. rights description Lesson-2: DNS Security & Load Balancing 4.6 Naming and storing the Files: Module-6: Telecommunications & Internet Security When content development is being done, Lesson-1: Fax Security many people would handle the content. So it Lesson-2: Security Risk Analysis is always better to have a Content for voice-over-Internet Repository. Along with it some naming Lesson-3: Next Generation conventions have to be followed. Networks For example, presentation material in Lesson-4:Voice-over-packet service Lesson1 of Topic1 of Module1 and Unit1 architectures, standards & could be given the name as emerging products, which address Unit1_Module1_Topic1_Lesson1.ppt. It is key security issues important to keep in mind that underscores should be used as separator as some 4.5 Identifying the metadata attributes operating systems may not be able to The metadata forms the basis of SCORM. identify a filename with blank spaces or any The mandatory metadata attributes specified other delimiters as separators. Also the by SCORM and a subset of optional content should be stored in a central metadata attributes specific to the course repository with the directory structure were considered. The list of the metadata following the same naming convention. attributes for a SCO i.e Basics of Communication Systems & Issues in 4.7 Metadata Repository Computer Networking are 1. general identifier The SCORM implementation guide specifies 2. general identifier entry creation of a central repository for the 3. general identifier catalog content metadata. We have developed a 4. general title central repository for the metadata using MS 5. general description Access. The metadata of all the SCOs are 6. general keyword entered into this repository. The metadata 7. lifecycle version repository schema is shown in fig.2 8. lifecycle status 9. lifecycle role ELELTECH INDIA 2005 141
  • 5. Experiences of SCORM Implementation Process in Cyber Security Course Content Figure 2 Metadata repository schema entry of all the metadata values and 4.8 Generating the Metadata generates an XML file for the inputs given. For the purpose of generating the metadata, Below is the snapshot of the interface a web-based application has been developed for generating metadata in XML developed. It provides the GUI to facilitate format. Figure 3 Metadata Generator for SCO metadata ELELTECH INDIA 2005 142
  • 6. Experiences of SCORM Implementation Process in Cyber Security Course Content functions loadPage(), unloadPage() 4.9 Packaging the Content: provided in SCOFunctions.js file. Once metadata has been generated, the The next step in this process is sequencing SCO has to interact with the LMS so that it and packaging the content. Default can be launched by the LMS. For this, each sequencing as per the course structure was SCO must be embedded with JavaScript defined before packaging the course functions that would communicate with the content. Using the Reload Editor the LMS. Each Lesson of Cyber Security contents were arranged into organizations Content, has been embedded with the and these organizations have been JavaScript functions that are provided by packaged as a zip file. A package descriptor ADL. There are two JavaScript files (imsmanifest.xml) has been created by the available for this purpose- SCOFunctions.js Reload Editor for this zipped content. The and APIWrapper.js. We have made the content organization created using Reload content launchable by embedding the editor for unit 2 is shown in Fig.4. Figure 4 content organizations of Cyber Security Course Contents ELELTECH INDIA 2005 143
  • 7. Experiences of SCORM Implementation Process in Cyber Security Course Content Metadata Generator for all the SCOs and 4.9 Validating the SCO metadata and the the package descriptor generated by Reload Package Descriptor using ADL Test Suite Editor after packaging the content have ADL has provided a test suite using which passed the ADL SCORM conformance the SCO metadata and Package descriptor tests. can be validated. In this cyber security course, the SCO metadata generated by the Figure 5 Conformance Test Suite ELELTECH INDIA 2005 144
  • 8. Experiences of SCORM Implementation Process in Cyber Security Course Content To carry out conformance test, ADL also http://www.edtech.vt.edu/edtech/id/index.ht provides a sample RTE that can deliver a ml content package if the package is SCORM http://www.lsal.cmu.edu/lsal/expertise/paper conforming. The Cyber Security content s/presentations/techlearnisd2002/techlearnis package was imported successfully and d2002.pdf delivered in the Sample RTE. We have also ported this course content onto Atutor which is a open source e- learning tool. The RTE implementation of Atutor has delivered the course package according to the default sequence provided in the imsmanifest file. Conclusion Developing online courses using SCOs has a lot of future potential. This provides the ability to access a repository for anytime, anywhere and reusable learning content. At the same time we should be conscious about the issues related with the implementation. They are, identifying SCO, which can be standalone and reused and repurposed in different contexts. Next is the selection of metadata specific to the course. Development or using the existing tools for metadata repository and learning content repository decide the ease of maintaining the course. Based on our design team experiences, we believe these efforts are possible for implementing SCORM standards in e-learning course content development. References http://www.rhassociates.com/scorm.htm http://www.lsal.cmu.edu/lsal/expertise/projec ts/developersguide/ http://www.edutools.info/course/productinfo/i ndex.jsp http://www.centra.com/products/index.asp http://www.adl.org/adl.asp http://www.lsal.cmu.edu/lsal/expertise/techn ologies/index.html http://www.techniques.org/product.php http://www.e-learningzone.co.uk/links.html http://www.cetis.ac.uk/ http://www.jointadlcolab.org/v2/lit.htm http://www.learninglab.org.uk/ADL/homepag e.asp http://www.ieee.org/organizations/eab/tutoria ls/refguide/mms01.htm ELELTECH INDIA 2005 145