SlideShare a Scribd company logo
Applying Competency-based
Credentials
About Us
CaSS (www.cassproject.org)
The future of competencies
Competency
Repositories
Competency
Profiles
Eduworks
(www.eduworks.com)
Solutions that unlock human potential
Text and document analysis
Credential Engine
Applications
The Problem
Determine “what’s next” (or “who’s next”)
Degrees
Courses
Certificates
Experience ?
!Knowledge
Skills
Abilities
The Solution
Determine “what do I know” and “what can I do”
Details
Use Case:
Career Pathways
A.S. Computer
Science
100%
B.S Computer
Science
100%
M.S Computer
Science
72%
Graduate Cert
Cybersecurity
20%
M.S Health
Informatics
45%
More...
More...
My Profile
 Degrees
 Courses
 Certificates
 Experience
KeyCompetencies
A.S. Computer
Science
100%
B.S Computer
Science
100%
M.S Computer
Science
72%
Graduate Cert
Cybersecurity
20%
M.S Health
Informatics
45%
More...
More...
A.S Computer Science
 Assembling
Computers
 App Design
 Web Development
B.S Computer Science
 Data Structure
Programming
 Operating System
Development
 UI/UX Design
M.S Computer Science
 Managing Teams
× Usability Analysis
× Infrastructure
Programming
× Oral & Written
Communication
Search Credentials
My Profile
 Degrees
 Courses
 Certificates
 Experience
Use Case:
Career Pathways
Personalized Credential Search
cybersecuritySearch
Graduate Certificate in Cybersecurity
The Graduate Certificate in Cybersecurity - Critical Infrastructure blends both information
technology (IT) and operational technology (OT) and focuses specifically on securing critical
infrastructures in sectors such as energy, water, gas and transportation.
You have 2 of 5 competencies associated with this credential:
 100
Analyze new technology and identify/develop solution sets for cybersecurity
vulnerability concerns.
 100 Apply appropriate models for security risk mitigation.
85 Develop cybersecurity solution requirements for IT/OT vendors and suppliers.
47 Implement industry best practices for existing and future systems.
28
Integrate security into the entire system life cycle (planning, architecture, design,
development, implementation/operation, maintenance and disposal).
Evidence
Evidence
Details
Details
Details
Personalized Credential Search
cybersecuritySearch
Graduate Certificate in Cybersecurity
The Graduate Certificate in Cybersecurity - Critical Infrastructure blends both information
technology (IT) and operational technology (OT) and focuses specifically on securing critical
infrastructures in sectors such as energy, water, gas and transportation.
You have 2 of 5 competencies associated with this credential:
 100
Analyze new technology and identify/develop solution sets for cybersecurity
vulnerability concerns.
Validated by C Marty at SecForce-3 Cybersolutions based on work experience.
Expires in 3 years.
 100 Apply appropriate models for security risk mitigation.
85 Develop cybersecurity solution requirements for IT/OT vendors and suppliers.
47 Implement industry best practices for existing and future systems.
Evidence
Details
Details
Hide
January 18, 2016
Personalized Credential Search
cybersecuritySearch
Graduate Certificate in Cybersecurity
The Graduate Certificate in Cybersecurity - Critical Infrastructure blends both information
technology (IT) and operational technology (OT) and focuses specifically on securing critical
infrastructures in sectors such as energy, water, gas and transportation.
You have 2 of 5 competencies associated with this credential:
 100
Analyze new technology and identify/develop solution sets for cybersecurity
vulnerability concerns.
 100 Apply appropriate models for security risk mitigation.
Implement industry best practices for existing and future systems.
Related Knowledge, Skills, and Abilities:
• Knowledge of End to End encryption – Some evidence in your profile
• Create and update a threat analysis – Some evidence in your profile
• Monitor and respond to CVE reports – No evidence in your profile
Evidence
Evidence
Hide
47
• Degrees, courses, badges are associated with competencies (data in CE)
• Experience is associated with competencies (manual or automated)
• Competencies are cross-walked (manual or automated)
• Matches are analyzed
(algorithmically)
How this works
Degrees
Courses
Certificates
Experience
Knowledge
Skills
Abilities
Credential Engine
Competencies
Cross-
walk
Analysis
Bottom Line
Associating credentials with
competencies supports
• Career exploration
• Credential search
• Staffing and recruiting
Automated tools are available for
• Cross-walking competencies
• Cross-walking credentials

More Related Content

PPTX
Fendley how secure is your e learning
PPTX
Pasta Threat Modeling
PPT
Open group spc rosenthal v3
DOCX
Course  operations security textbook  title security p
PDF
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
PPTX
main.pptx
PDF
Top Cyber Security Course : Mastering Digital Defense
PDF
Secure Your Future: Cybersecurity in India
Fendley how secure is your e learning
Pasta Threat Modeling
Open group spc rosenthal v3
Course  operations security textbook  title security p
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
main.pptx
Top Cyber Security Course : Mastering Digital Defense
Secure Your Future: Cybersecurity in India

Similar to CASS Application (20)

PDF
Strengthening Critical Infrastructure Security.pdf
PPTX
CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...
PDF
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PPTX
ppt_cyber.pptx
PDF
Cyber security of critical infrastructure
PDF
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
PDF
Advice for CISOs: How to Approach OT Cybersecurity
PPTX
cybersecurityandthe importance of the that
PDF
PDF
1640925838308_IT Courses Non-IT Courses.pdf
PPTX
Iot security amar prusty
PDF
Cyber security career development paths
PPTX
SOC Analyst Course
PDF
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
PDF
Career Opportunities in Cyber Security
PDF
Advanced Cyber Security Diploma - Edukite
PDF
What Financial Institution Cyber Regs Tell the Infrastructure Sector
PPTX
New Bandicam Crack Download Free Unlimited 2025 - setup
PPTX
Revo Uninstaller Pro Crack Download Free Setup
PDF
#Top Cyber Security Course In India 2024
Strengthening Critical Infrastructure Security.pdf
CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
ppt_cyber.pptx
Cyber security of critical infrastructure
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
Advice for CISOs: How to Approach OT Cybersecurity
cybersecurityandthe importance of the that
1640925838308_IT Courses Non-IT Courses.pdf
Iot security amar prusty
Cyber security career development paths
SOC Analyst Course
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Career Opportunities in Cyber Security
Advanced Cyber Security Diploma - Edukite
What Financial Institution Cyber Regs Tell the Infrastructure Sector
New Bandicam Crack Download Free Unlimited 2025 - setup
Revo Uninstaller Pro Crack Download Free Setup
#Top Cyber Security Course In India 2024
Ad

More from Credential Engine (20)

PPTX
Virgil Holdings Application
PPTX
Vantage Point Application
PPTX
Innovate+Educate Application
PPTX
CourseNetworking Application
PPTX
Verif-y Application
PPTX
LRNG Application
PPTX
NOCTI Application
PPTX
Bright Hive Application
PPTX
Credly Application
PPTX
U.S. Chamber of Commerce Foundation Application
PPTX
Parchment Application
PPTX
AcademyOne Application
PPTX
Smart Catalog Application
PPTX
Credential Transparency Initiative - Orientation for Registry Partners
PPTX
Expressing Concept Schemes & Competency Frameworks in CTDL
PPTX
Credential Finder Prototype App Demonstration
PPTX
Credential Transparency Initiative - On the Road to Improving the Credentiali...
PPTX
CTI Pilot-site Partner Orientation November 2015
PPTX
CTI Technical Advisory Committee (TAC) Meeting December 1, 2015
PPTX
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
Virgil Holdings Application
Vantage Point Application
Innovate+Educate Application
CourseNetworking Application
Verif-y Application
LRNG Application
NOCTI Application
Bright Hive Application
Credly Application
U.S. Chamber of Commerce Foundation Application
Parchment Application
AcademyOne Application
Smart Catalog Application
Credential Transparency Initiative - Orientation for Registry Partners
Expressing Concept Schemes & Competency Frameworks in CTDL
Credential Finder Prototype App Demonstration
Credential Transparency Initiative - On the Road to Improving the Credentiali...
CTI Pilot-site Partner Orientation November 2015
CTI Technical Advisory Committee (TAC) Meeting December 1, 2015
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
Ad

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation theory and applications.pdf
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Machine Learning_overview_presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
cuic standard and advanced reporting.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
The Rise and Fall of 3GPP – Time for a Sabbatical?
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation theory and applications.pdf
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Spectral efficient network and resource selection model in 5G networks
1. Introduction to Computer Programming.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Programs and apps: productivity, graphics, security and other tools
Machine Learning_overview_presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Big Data Technologies - Introduction.pptx
cuic standard and advanced reporting.pdf
A Presentation on Artificial Intelligence
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

CASS Application

  • 2. About Us CaSS (www.cassproject.org) The future of competencies Competency Repositories Competency Profiles Eduworks (www.eduworks.com) Solutions that unlock human potential Text and document analysis Credential Engine Applications
  • 3. The Problem Determine “what’s next” (or “who’s next”) Degrees Courses Certificates Experience ?
  • 4. !Knowledge Skills Abilities The Solution Determine “what do I know” and “what can I do”
  • 5. Details Use Case: Career Pathways A.S. Computer Science 100% B.S Computer Science 100% M.S Computer Science 72% Graduate Cert Cybersecurity 20% M.S Health Informatics 45% More... More... My Profile  Degrees  Courses  Certificates  Experience
  • 6. KeyCompetencies A.S. Computer Science 100% B.S Computer Science 100% M.S Computer Science 72% Graduate Cert Cybersecurity 20% M.S Health Informatics 45% More... More... A.S Computer Science  Assembling Computers  App Design  Web Development B.S Computer Science  Data Structure Programming  Operating System Development  UI/UX Design M.S Computer Science  Managing Teams × Usability Analysis × Infrastructure Programming × Oral & Written Communication Search Credentials My Profile  Degrees  Courses  Certificates  Experience Use Case: Career Pathways
  • 7. Personalized Credential Search cybersecuritySearch Graduate Certificate in Cybersecurity The Graduate Certificate in Cybersecurity - Critical Infrastructure blends both information technology (IT) and operational technology (OT) and focuses specifically on securing critical infrastructures in sectors such as energy, water, gas and transportation. You have 2 of 5 competencies associated with this credential:  100 Analyze new technology and identify/develop solution sets for cybersecurity vulnerability concerns.  100 Apply appropriate models for security risk mitigation. 85 Develop cybersecurity solution requirements for IT/OT vendors and suppliers. 47 Implement industry best practices for existing and future systems. 28 Integrate security into the entire system life cycle (planning, architecture, design, development, implementation/operation, maintenance and disposal). Evidence Evidence Details Details Details
  • 8. Personalized Credential Search cybersecuritySearch Graduate Certificate in Cybersecurity The Graduate Certificate in Cybersecurity - Critical Infrastructure blends both information technology (IT) and operational technology (OT) and focuses specifically on securing critical infrastructures in sectors such as energy, water, gas and transportation. You have 2 of 5 competencies associated with this credential:  100 Analyze new technology and identify/develop solution sets for cybersecurity vulnerability concerns. Validated by C Marty at SecForce-3 Cybersolutions based on work experience. Expires in 3 years.  100 Apply appropriate models for security risk mitigation. 85 Develop cybersecurity solution requirements for IT/OT vendors and suppliers. 47 Implement industry best practices for existing and future systems. Evidence Details Details Hide January 18, 2016
  • 9. Personalized Credential Search cybersecuritySearch Graduate Certificate in Cybersecurity The Graduate Certificate in Cybersecurity - Critical Infrastructure blends both information technology (IT) and operational technology (OT) and focuses specifically on securing critical infrastructures in sectors such as energy, water, gas and transportation. You have 2 of 5 competencies associated with this credential:  100 Analyze new technology and identify/develop solution sets for cybersecurity vulnerability concerns.  100 Apply appropriate models for security risk mitigation. Implement industry best practices for existing and future systems. Related Knowledge, Skills, and Abilities: • Knowledge of End to End encryption – Some evidence in your profile • Create and update a threat analysis – Some evidence in your profile • Monitor and respond to CVE reports – No evidence in your profile Evidence Evidence Hide 47
  • 10. • Degrees, courses, badges are associated with competencies (data in CE) • Experience is associated with competencies (manual or automated) • Competencies are cross-walked (manual or automated) • Matches are analyzed (algorithmically) How this works Degrees Courses Certificates Experience Knowledge Skills Abilities Credential Engine Competencies Cross- walk Analysis
  • 11. Bottom Line Associating credentials with competencies supports • Career exploration • Credential search • Staffing and recruiting Automated tools are available for • Cross-walking competencies • Cross-walking credentials

Editor's Notes

  • #8: So we take all of that data and jam it into some software that walks the crosswalks from where the learner is at to the requirements of each credential in the Credential Engine. What we get back is this. 50% qualified, 38% qualified, here’s how to qualify, here’s the job title if you do qualify. Salaries would be nice. Maybe a demand meter? I get ahead of myself. So then I can click on the details here…
  • #9: So we take all of that data and jam it into some software that walks the crosswalks from where the learner is at to the requirements of each credential in the Credential Engine. What we get back is this. 50% qualified, 38% qualified, here’s how to qualify, here’s the job title if you do qualify. Salaries would be nice. Maybe a demand meter? I get ahead of myself. So then I can click on the details here…
  • #10: So we take all of that data and jam it into some software that walks the crosswalks from where the learner is at to the requirements of each credential in the Credential Engine. What we get back is this. 50% qualified, 38% qualified, here’s how to qualify, here’s the job title if you do qualify. Salaries would be nice. Maybe a demand meter? I get ahead of myself. So then I can click on the details here…