Skip to Content

Custom Development

Custom development means building lessons, slides, labs, and assessments from scratch using our workplace simulation methodology.

Your Custom Development Process

The development team will build each asset type from scratch, embedding the simulation context throughout. Unlike vendor development, this collaborative process creates everything new with workplace simulation methodology built in from the beginning. Each step produces a concrete deliverable ready for learners.

Step 1: Slides Build

Create slide decks that bring the learning objectives to life with workplace context and simulation framing.

What to Include:

  • One objective per slide cluster
  • Workplace scenarios and role context
  • Interactive elements and reflection prompts
  • Clear visual cues and professional design

Example: Network Security Training Slides Built from scratch with workplace simulation context embedded throughout

PS
Module 134.1 - Components & Safety
TechCorp IT Department
Slide 1 of 12

Day 1: Network Security Training

Critical security protocols and threat detection for your first assignment

SecureCorp Cybersecurity Department - New Hire Onboarding

You're starting your first day as a new cybersecurity analyst. Today's focus: network security and threat detection.

© 2025 Per Scholas - Workplace Simulation Training

Step 2: Lab Build

Design hands-on activities that mirror real work tasks with realistic constraints and deliverables.

What to Include:

  • Realistic work scenario and role context
  • Clear step-by-step instructions
  • Expected deliverables and scoring criteria
  • Time constraints and realistic duration

Example: Security Incident Response Lab Created from scratch with workplace simulation methodology

G
Google Docs
Last edited 2 minutes ago

SecureCorp Security Incident Response Lab

SecureCorp Security Incident Response Lab

Role: Cybersecurity Analyst
Supervisor: Maria Rodriguez
Duration: 60 minutes
Priority: High

🚨 Security Alert

Suspicious network activity detected at SecureCorp. Multiple employees report unusual behavior, firewall showing blocked connection attempts, and workstations experiencing slow performance. Unauthorized access attempts have been identified.

Your Learning Objectives

  • Analyze network traffic for security threats
  • Implement incident response procedures
  • Document findings with professional accuracy

Lab Tasks

  1. Analyze Network Logs: Review firewall logs, intrusion detection system alerts, and network traffic patterns
  2. Identify Threat Indicators: Look for signs of malware, unauthorized access, or data exfiltration
  3. Assess Impact: Determine which systems are affected and the potential scope of the incident
  4. Develop Response Plan: Create a step-by-step incident response strategy
  5. Document Findings: Prepare a professional incident report for management

⏱️ Time Constraint

Complete this lab within 60 minutes. This mirrors real-world incident response timelines where quick action is critical.

Assessment: Technical accuracy (70%) + professional communication (30%)
Due: End of class

Step 3: Assessment Build

Create assessments that directly measure each objective with clear scoring and workplace relevance.

What to Include:

  • Coverage of all objectives
  • Clear scoring rules and feedback
  • Workplace-relevant scenarios
  • Retake policies and remediation

Example: Network Security Assessment Designed from scratch with workplace scenarios and professional context

G
Google Docs
Last edited 2 minutes ago

SecureCorp Network Security Assessment

SecureCorp Network Security Assessment

Module: Network Security Fundamentals
Duration: 45 minutes
Role: Cybersecurity Analyst
Supervisor: Maria Rodriguez

Assessment Instructions

This assessment evaluates your understanding of network security concepts, threat detection, and incident response procedures covered in the SecureCorp training program.

Question 1

A client reports suspicious network activity - multiple failed login attempts and unusual data transfers. As a SecureCorp cybersecurity analyst, which security tool should you deploy first?

A) Update antivirus software
B) Deploy network monitoring tools
C) Install firewall rules
D) Run system diagnostics

Question 2

During a security incident at SecureCorp, you need to contain the threat without disrupting business operations. What is your first priority?

A) Immediately disconnect all affected systems
B) Assess the scope and isolate only compromised systems
C) Notify all employees to stop working
D) Wait for management approval before taking action
Scoring: Technical accuracy (70%) + professional communication (30%)
Due: End of class

Step 4: Case Study Build

Develop case studies that apply learning in realistic workplace scenarios with decision-making and problem-solving.

What to Include:

  • Complex workplace scenario
  • Multiple stakeholders and constraints
  • Decision points and consequences
  • Reflection and learning outcomes

Example: SecureCorp Data Breach Response Case Developed from scratch with complex workplace scenarios and stakeholder management

G
Google Docs
Last edited 2 minutes ago

SecureCorp Data Breach Response Case Study

SecureCorp Data Breach Response Case Study

Module: Advanced Security Incident Response
Duration: 90 minutes
Role: Senior Cybersecurity Analyst
Supervisor: Maria Rodriguez

🏢 Your Final Professional Challenge

Business Context: You've successfully completed your cybersecurity training and are ready for your final evaluation. SecureCorp has three real client scenarios that require professional security consultation and recommendations.

💼 Professional Impact

These case studies simulate real-world cybersecurity consulting scenarios. Your recommendations will be evaluated by senior security managers and could determine your placement on high-priority projects.

Case Study 1: Startup Development Team

📋 Client Scenario

Company: InnovateTech Solutions (12-person startup)
Industry: Software Development
Security Budget: $15,000 for complete security setup
Timeline: Security implementation needed within 2 weeks
Challenge: Recommend security solutions for software development team

Case Study 2: Corporate Office Security

📋 Client Scenario

Company: Global Finance Corp (200+ employees)
Industry: Financial Services
Security Budget: $50,000 for office security refresh
Timeline: Phased security rollout over 6 months
Challenge: Balance security needs with budget constraints

Assessment: Professional presentation + technical accuracy
Due: End of class

Quality Check

Before you publish, run these final checks:

  • ✅ Objectives present and unchanged from handoff package
  • ✅ Simulation frame visible in every artifact (SecureCorp context)
  • ✅ Every objective has at least one assessment
  • ✅ Every assessment has at least one supporting activity
  • ✅ All internal links work and resolve correctly

You’re Ready to Launch

The custom curriculum is now ready for learners. The development team has built everything from scratch using our workplace simulation methodology, creating engaging learning experiences that help learners build the skills and mindset they need for success in their careers.


Developer Tips

Module Context

Here are some prompts for generating module context:

Suggest real-world workplace scenarios where understanding [Your Module Topic, e.g., 'Windows Boot Process'] is critical for an entry-level IT Support role.

Generate 3 diverse, realistic scenarios for an IT Help Desk technician related to troubleshooting the Windows boot sequence. Include potential user descriptions and urgency levels.

Analyze the following course outline and suggest where a module on [Your Module Topic] would fit best, explaining the connections to preceding and subsequent topics: [Paste Course Outline Here]

Review this course outline: [Outline]. Where would a module on 'Windows Boot Troubleshooting' fit logically? What prerequisite knowledge should be covered before, and what advanced topics could follow?

Learning Outcomes

Here are some prompts for generating learning outcomes:

Review the following learning outcomes for clarity, measurability, and relevance to an IT Support role. Suggest improvements using strong action verbs: [Paste Outcomes Here]

Critique these learning outcomes for a module on Active Directory basics: [Outcome 1, Outcome 2]. Are they SMART? Suggest revisions using verbs from Bloom's Taxonomy.

Generate examples of observable behaviors in a simulated help desk environment that would demonstrate mastery of the following outcome: [Paste Outcome Here]

For the outcome 'Accurately document troubleshooting steps in a ticketing system', provide 3 examples of how a learner could demonstrate this during a simulated support call.

Assessment Design

Here are some prompts for generating assessment design:

Generate 5 multiple-choice questions testing knowledge of [Specific Concept, e.g., 'common Windows boot errors'], including plausible distractors and explanations for the correct answer.

Create 5 multiple-choice questions about the difference between `ipconfig` and `ping` for network troubleshooting. Include explanations for why the correct answer is right and the others are wrong.

Draft a rubric to assess the skill of [Specific Skill, e.g., 'remotely assisting a user with a software installation']. Include criteria for technical accuracy, communication clarity, and professionalism, with 3 performance levels (e.g., Novice, Competent, Proficient).

Draft a 3-level rubric (Needs Improvement, Meets Expectations, Exceeds Expectations) for assessing a learner's ability to clearly explain a technical solution to a non-technical user during a simulated support interaction.

Simulation Development

Here are some prompts for generating simulation development:

Generate 3 detailed user personas needing IT support. Include their job role, technical comfort level, personality type (e.g., impatient, friendly, confused), and a specific technical issue related to [Module Topic].

Create a persona for a busy Marketing Manager who needs help connecting to the office VPN but is not tech-savvy and is currently stressed about a deadline.

Outline a branching decision path for a simulation where a learner must diagnose [Specific Problem, e.g., 'a printer connectivity issue']. Include potential diagnostic steps, common mistakes, and consequences for incorrect choices.

Outline a decision tree for a simulation task where a Tier 1 tech must decide whether to resolve a user's software issue directly or escalate it to Tier 2. Include factors like issue complexity, user permissions, and estimated resolution time.

Pro Tips for Using AI Prompts
  • Adapt & Specify: Modify these example prompts with the specific module topic, concepts, and learner context.
  • Provide Context: Give the AI background information (e.g., target audience, learning objectives) for more relevant responses.
  • Iterate: If the first response isn't perfect, refine the prompt and ask again. Try asking for alternatives or different formats.
  • Validate: Always review AI output for accuracy, relevance, and alignment with instructional goals. Don't trust it blindly.
  • Combine: Use AI as a brainstorming partner or draft assistant, then apply team expertise to finalize the content.

The PS ID Companion builds on these AI best practices and is the development team’s go-to tool for planning, brainstorming, and generating high-quality instructional prompts tailored to Per Scholas modules. Use it to:

  • Scaffold learning objectives and daily plans
  • Get prompt suggestions for labs, scenarios, and assessments
  • Overcome creative blocks or writer’s block
  • Ensure prompts are job-aligned and simulation-ready

Try the PS ID Companion

Quality Review Checklist

Quality Review Checklist

  • Alignment: Objectives, content, activities, and assessments are aligned.
  • Accessibility: Meets WCAG standards; all media accessible.
  • Accuracy: Technical content is correct and up-to-date.
  • Clarity: Instructions and explanations are clear and unambiguous.
  • Completeness: All necessary info, resources, and steps included.
  • Engagement: Activities are motivating and relevant.
  • Functionality: Links, interactive elements, and labs work as expected.
  • Consistency: Follows style guide and module template.
Last updated on