Custom Development
Your Custom Development Process
The development team will build each asset type from scratch, embedding the simulation context throughout. Unlike vendor development, this collaborative process creates everything new with workplace simulation methodology built in from the beginning. Each step produces a concrete deliverable ready for learners.
Step 1: Slides Build
Create slide decks that bring the learning objectives to life with workplace context and simulation framing.
What to Include:
- One objective per slide cluster
- Workplace scenarios and role context
- Interactive elements and reflection prompts
- Clear visual cues and professional design
Example: Network Security Training Slides Built from scratch with workplace simulation context embedded throughout
Day 1: Network Security Training
Critical security protocols and threat detection for your first assignment
SecureCorp Cybersecurity Department - New Hire Onboarding
You're starting your first day as a new cybersecurity analyst. Today's focus: network security and threat detection.
Step 2: Lab Build
Design hands-on activities that mirror real work tasks with realistic constraints and deliverables.
What to Include:
- Realistic work scenario and role context
- Clear step-by-step instructions
- Expected deliverables and scoring criteria
- Time constraints and realistic duration
Example: Security Incident Response Lab Created from scratch with workplace simulation methodology
SecureCorp Security Incident Response Lab
SecureCorp Security Incident Response Lab
🚨 Security Alert
Suspicious network activity detected at SecureCorp. Multiple employees report unusual behavior, firewall showing blocked connection attempts, and workstations experiencing slow performance. Unauthorized access attempts have been identified.
Your Learning Objectives
- Analyze network traffic for security threats
- Implement incident response procedures
- Document findings with professional accuracy
Lab Tasks
- Analyze Network Logs: Review firewall logs, intrusion detection system alerts, and network traffic patterns
- Identify Threat Indicators: Look for signs of malware, unauthorized access, or data exfiltration
- Assess Impact: Determine which systems are affected and the potential scope of the incident
- Develop Response Plan: Create a step-by-step incident response strategy
- Document Findings: Prepare a professional incident report for management
⏱️ Time Constraint
Complete this lab within 60 minutes. This mirrors real-world incident response timelines where quick action is critical.
Step 3: Assessment Build
Create assessments that directly measure each objective with clear scoring and workplace relevance.
What to Include:
- Coverage of all objectives
- Clear scoring rules and feedback
- Workplace-relevant scenarios
- Retake policies and remediation
Example: Network Security Assessment Designed from scratch with workplace scenarios and professional context
SecureCorp Network Security Assessment
SecureCorp Network Security Assessment
Assessment Instructions
This assessment evaluates your understanding of network security concepts, threat detection, and incident response procedures covered in the SecureCorp training program.
Question 1
A client reports suspicious network activity - multiple failed login attempts and unusual data transfers. As a SecureCorp cybersecurity analyst, which security tool should you deploy first?
Question 2
During a security incident at SecureCorp, you need to contain the threat without disrupting business operations. What is your first priority?
Step 4: Case Study Build
Develop case studies that apply learning in realistic workplace scenarios with decision-making and problem-solving.
What to Include:
- Complex workplace scenario
- Multiple stakeholders and constraints
- Decision points and consequences
- Reflection and learning outcomes
Example: SecureCorp Data Breach Response Case Developed from scratch with complex workplace scenarios and stakeholder management
SecureCorp Data Breach Response Case Study
SecureCorp Data Breach Response Case Study
🏢 Your Final Professional Challenge
Business Context: You've successfully completed your cybersecurity training and are ready for your final evaluation. SecureCorp has three real client scenarios that require professional security consultation and recommendations.
💼 Professional Impact
These case studies simulate real-world cybersecurity consulting scenarios. Your recommendations will be evaluated by senior security managers and could determine your placement on high-priority projects.
Case Study 1: Startup Development Team
📋 Client Scenario
Company: InnovateTech Solutions (12-person startup)
Industry: Software Development
Security Budget: $15,000 for complete security setup
Timeline: Security implementation needed within 2 weeks
Challenge: Recommend security solutions for software development team
Case Study 2: Corporate Office Security
📋 Client Scenario
Company: Global Finance Corp (200+ employees)
Industry: Financial Services
Security Budget: $50,000 for office security refresh
Timeline: Phased security rollout over 6 months
Challenge: Balance security needs with budget constraints
Quality Check
Before you publish, run these final checks:
- ✅ Objectives present and unchanged from handoff package
- ✅ Simulation frame visible in every artifact (SecureCorp context)
- ✅ Every objective has at least one assessment
- ✅ Every assessment has at least one supporting activity
- ✅ All internal links work and resolve correctly
You’re Ready to Launch
The custom curriculum is now ready for learners. The development team has built everything from scratch using our workplace simulation methodology, creating engaging learning experiences that help learners build the skills and mindset they need for success in their careers.
Developer Tips
Module Context
Suggest real-world workplace scenarios where understanding [Your Module Topic, e.g., 'Windows Boot Process'] is critical for an entry-level IT Support role.
Generate 3 diverse, realistic scenarios for an IT Help Desk technician related to troubleshooting the Windows boot sequence. Include potential user descriptions and urgency levels.
Analyze the following course outline and suggest where a module on [Your Module Topic] would fit best, explaining the connections to preceding and subsequent topics: [Paste Course Outline Here]
Review this course outline: [Outline]. Where would a module on 'Windows Boot Troubleshooting' fit logically? What prerequisite knowledge should be covered before, and what advanced topics could follow?
Learning Outcomes
Review the following learning outcomes for clarity, measurability, and relevance to an IT Support role. Suggest improvements using strong action verbs: [Paste Outcomes Here]
Critique these learning outcomes for a module on Active Directory basics: [Outcome 1, Outcome 2]. Are they SMART? Suggest revisions using verbs from Bloom's Taxonomy.
Generate examples of observable behaviors in a simulated help desk environment that would demonstrate mastery of the following outcome: [Paste Outcome Here]
For the outcome 'Accurately document troubleshooting steps in a ticketing system', provide 3 examples of how a learner could demonstrate this during a simulated support call.
Assessment Design
Generate 5 multiple-choice questions testing knowledge of [Specific Concept, e.g., 'common Windows boot errors'], including plausible distractors and explanations for the correct answer.
Create 5 multiple-choice questions about the difference between `ipconfig` and `ping` for network troubleshooting. Include explanations for why the correct answer is right and the others are wrong.
Draft a rubric to assess the skill of [Specific Skill, e.g., 'remotely assisting a user with a software installation']. Include criteria for technical accuracy, communication clarity, and professionalism, with 3 performance levels (e.g., Novice, Competent, Proficient).
Draft a 3-level rubric (Needs Improvement, Meets Expectations, Exceeds Expectations) for assessing a learner's ability to clearly explain a technical solution to a non-technical user during a simulated support interaction.
Simulation Development
Generate 3 detailed user personas needing IT support. Include their job role, technical comfort level, personality type (e.g., impatient, friendly, confused), and a specific technical issue related to [Module Topic].
Create a persona for a busy Marketing Manager who needs help connecting to the office VPN but is not tech-savvy and is currently stressed about a deadline.
Outline a branching decision path for a simulation where a learner must diagnose [Specific Problem, e.g., 'a printer connectivity issue']. Include potential diagnostic steps, common mistakes, and consequences for incorrect choices.
Outline a decision tree for a simulation task where a Tier 1 tech must decide whether to resolve a user's software issue directly or escalate it to Tier 2. Include factors like issue complexity, user permissions, and estimated resolution time.
- Adapt & Specify: Modify these example prompts with the specific module topic, concepts, and learner context.
- Provide Context: Give the AI background information (e.g., target audience, learning objectives) for more relevant responses.
- Iterate: If the first response isn't perfect, refine the prompt and ask again. Try asking for alternatives or different formats.
- Validate: Always review AI output for accuracy, relevance, and alignment with instructional goals. Don't trust it blindly.
- Combine: Use AI as a brainstorming partner or draft assistant, then apply team expertise to finalize the content.
The PS ID Companion builds on these AI best practices and is the development team’s go-to tool for planning, brainstorming, and generating high-quality instructional prompts tailored to Per Scholas modules. Use it to:
- Scaffold learning objectives and daily plans
- Get prompt suggestions for labs, scenarios, and assessments
- Overcome creative blocks or writer’s block
- Ensure prompts are job-aligned and simulation-ready
Quality Review Checklist
Quality Review Checklist
- Alignment: Objectives, content, activities, and assessments are aligned.
- Accessibility: Meets WCAG standards; all media accessible.
- Accuracy: Technical content is correct and up-to-date.
- Clarity: Instructions and explanations are clear and unambiguous.
- Completeness: All necessary info, resources, and steps included.
- Engagement: Activities are motivating and relevant.
- Functionality: Links, interactive elements, and labs work as expected.
- Consistency: Follows style guide and module template.