Industry competency models promote an understanding of the skill sets and competencies that are essential to educate and train a globally competitive workforce.
The Competency Model Clearinghouse is sponsored by the U.S. Department of Labor and provides validated industry competency models and tools to build a custom model and career ladder/lattice for your industry. Information about it can be found at: http://www.careeronestop.org/competencymodel/
Sadly, this is not well marketed, and few workforce professionals seem to know that it even exists!
This session on the Competency Model Clearinghouse will provide an overview of the Clearinghouse and the use of its 22 industry models for Career Pathways and Sector Strategies initiatives. It will show how to use the models to define regional skill requirements, provide career guidance and exploration, support area businessesโ human resource functions, frame certification requirements, and to develop industry-driven curricula.
You do not want to miss this important webinar!
About the presenter:
Alyce Louise Bertsche is the Principal Investigator and Project Manager for the USDOL/ETA Competency Model Initiative. Alyce Louise has over 25 years of experience in the fields of education and employment and training, and is currently a consultant with JBS International in North Bethesda, MD. She has been instrumental in many initiatives to define essential skills for the workplace, including SCANS, Equipped for the Future, the National Retail Federationโs Skill Standards; and the National Skill Standards Board.
1. W E B I N A R P R E S E N T A T I O N
F O R T H E
N O R T H E A S T R E G I O N A L
E M P L O Y M E N T A N D T R A I N I N G
A S S O C I A T I O N
( N E R E T A )
M A Y 1 , 2 0 1 4
P R E S E N T E R :
A L Y C E L O U I S E B E R T S C H E
J B S I N T E R N A T I O N A L
The DOL Competency Model
Clearinghouse
2. Workshop Overview
๏ Industry Competency Model Initiative
๏ ETA Competency Model Framework
๏ Competency Model Uses
๏ New Model Development and Updates
๏ Questions and Answers
2
3. Industry Competency Model Initiative
๏ Industry partners collaborate with ETA to develop
and maintain dynamic models of the foundation and
technical competencies that are necessary in
economically vital sectors of the American economy
๏ These models and tools for using them are posted on
the Competency Model Clearinghouse
www.careeronestop.org/competencymodel/
3
4. Competency Models
Q. What is a competency?
A. The capability to apply a set of related knowledge,
skills, and abilities to successfully perform functions or
tasks
Q. What is a competency model?
A. A collection of competencies that together define
successful performance in a particular work setting.
4
5. Why Competency Models?
Competency Models are a resource. They can be used to:
๏ Identify specific employer skill needs
๏ Develop competency-based curricula and training models
๏ Develop industry-defined performance indicators
๏ Create certifications
๏ Develop resources for career exploration and guidance
Who uses them?
๏ Industry leaders
๏ Human resources professionals
๏ Public workforce development professionals
๏ Labor organizations
๏ Educators
๏ Economic developers
5
6. Competency Models
Competency: โโฆa specific,
identifiable, definable, and
measurable skill or characteristic that
is essential for the performance of an
activity within a specific business or
industry context.โ
A competency model is a clear
description of what a worker needs to
know and be able to do โ the
knowledge, skills, and abilities โ to
perform well in a specific job,
occupation, or industry.
6
11. Features of the Competency Model
Clearinghouse
11
๏ User Guides (5) -- career exploration, curriculum
development, hr activities, communicating workforce
needs and assessment or credentialing
๏ Find Resources -- searchable database
๏ Models in Actionโ real-life examples
๏ Industry Competency Models -- 22 to date
๏ Tools -- online interactive โcreate your ownโ
๏ก Build a Competency Model
๏ก Build a Career Ladder/Lattice
12. 22 Available Industry Models
โข Advanced Manufacturing
โข Aerospace
โข Automation
โข Bioscience
โข Construction - Commercial
โข Construction - Heavy
โข Construction - Residential
โข Cybersecurity
โข Energy
โข Entrepreneurship
โข Financial Services
๏ Geospatial Technology
๏ Health: Allied Health
๏ Health: Electronic Health Records
๏ Hospitality/Hotel and Lodging
๏ Information Technology
๏ Long-term Care, Supports, and
Services
๏ Mechatronics
๏ Retail
๏ Renewable Energy
๏ Transportation , Distribution and
Logistics
๏ Water Sector
12
14. Uses for Competency Models
โข Communicate Industry Needs
โข Career Exploration and Guidance
โข Career Paths, Ladders, and Lattices
โข Workforce Program Planning & Labor Pool Analysis
โข Curriculum Evaluation, Planning, and Development
โข Human Resource Services
โข Certification, Licensure, and Assessment Development
โข Sector Initiatives
14
15. The Competency Models Help Educators by:
โข Providing a framework for education and training
curricula
โข Reducing the course and program curriculum
development time
โข Eliminating unneeded redundancy across courses
โข Improving instructional materials
โข Identifying gaps in current training offerings
16. The Competency Model Helps Business by:
โข Providing a common language for the Industry
โข Giving a standardized terminology for describing what
Middle-skilled workers do
โข Offering a framework for standardizing job titles and
positions
โข Providing a tool to use for staff recruiting and development
๏ก Recruiting โ describing what workers do
๏ก Performance management โ communicating roles and
responsibilities
๏ก Staff Development โ serving as a plan or checklist for professional
development training
22. 22
Tiers 4: Industry Wide Competencies
1. Cybersecurity Technology: The knowledge, skills, and abilities needed to
understand the purpose and function of cybersecurity technology, including
tools and systems.
2. Information Assurance: The standards, procedures, and applications used to
protect the confidentiality, integrity and availability of information and
information systems.
3. Risk Management: The systems, tools, and concepts used to minimize the risk
to an organizationโs cyberspace and prevent a cybersecurity incident.
4. Incident Detection: The knowledge, skills, and abilities needed to identify
threats or incidents.
5. Incident Response and Remediation: The knowledge, skills, and abilities
needed to respond to and remediate an incident, as well as restore functionality
to the system or infrastructure.
23. 23
Tiers 5: Industry Sector Functional Areas
1. Securely Provision Systems: Specialty Areas responsible for conceptualizing, designing, and
building secure information technology (IT) systems, with responsibility for some aspect of the systems'
development.
2. Operate and Maintain IT Security: Specialty Areas responsible for providing the support,
administration, and maintenance necessary to ensure effective and efficient information technology (IT)
system performance and security.
3. Protect and Defend from Threats: Specialty Areas responsible for identifying, analyzing, and
mitigating threats to internal information technology (IT) systems or networks.
4. Investigate Threats: Specialty Areas responsible for investigating cyber events or crimes of
information technology (IT) systems, networks, and digital evidence.
5. Collect Information and Operate Cybersecurity Processes: Specialty Areas responsible for
specialized denial and deception operations and collection of cybersecurity information that may be
used to develop intelligence.
6. Analyze Information: Specialty Areas responsible for highly specialized review and evaluation of
incoming cybersecurity information to determine its usefulness for intelligence.
7. Oversee and Govern Cybersecurity Work: Specialty Areas responsible for providing leadership,
management, direction, or development and advocacy so that the organization may effectively conduct
cybersecurity work.
24. Crosscutting, Industry-wide means:
๏ Models are resources to build on, not end products.
๏ Models include major industry principles and unique
aspects.
๏ What makes this industry different from other
industries?
๏ What commonalities should everyone in the field
know?
๏ What key industry technologies are there?
๏ What are the key components of the culture of the
industry?
24
25. Crosscutting, Industry-wide means:
๏ Models represent broad industry level, not particular
occupations.
๏ The models donโt describe a standard of behavior.
๏ Every worker doesnโt have every skill, or every skill at
the same level.
๏ Shows what worker requirements for the industry are
shared among occupations within the sector.
๏ Models arenโt intended to replace existing
occupational information.
๏ Models support workforce development training, and
are typically focused on the post-secondary level.
25
26. Tiers 1-3: Foundational Skills
The Foundational Skills are newly updated.
They include:
๏ Personal Effectiveness Competencies
๏ Academic Competencies
๏ Workplace Competencies
26
29. Tier 4 Block Structure
๏ Each Tier 4 block has:
๏กDefinition
๏กCritical Work Functions
๏กTechnical Content Areas
29
30. The knowledge, skills, and abilities needed to
understand the purpose and function of
cybersecurity technology, including tools and
systems.
Critical Work Functions:
Cryptography
๏ Explain the core concepts of cryptography
and cryptographic key management
concepts
๏ Explain the concept of public key
infrastructure (PKI)
๏ Explain symmetric key rotation
techniques and concepts
๏ Describe encryption methodologies
IT Architecture
๏ Explain IT architectural concepts and
frameworks
๏ Explain security system design tools,
methods, and techniques
๏ Demonstrate knowledge of information
theory
๏ Demonstrate knowledge of communication
methods, principles, and concepts
๏ Explain parallel and distributed computing
concepts
๏ Explain remote access technology concepts
๏ Describe how different file types can be used
for anomalous behavior
๏ Distinguish between data in use, data in
motion (transit), and data at rest
๏ Describe the capabilities of different
electronic communication systems and
methods
๏ Understand system life cycle management
principles, including software security and
usability
30
Cybersecurity
Technology
Information
Assurance
Risk
Management
Incident
Detection
Incident Response
and Remediation
31. 31
Technical Content Areas
Cryptography
๏ Core concepts and methodologies
๏ก Encryption concepts (e.g., symmetric vs.
asymmetric, transport encryption, digital
signatures)
๏ก Cryptographic tools and products (e.g., WEP,
MD5, SHA)
๏ก Public Key Infrastructure (PKI)
๏ก Certificate authorities and digital certificates
๏ก Recovery agent
๏ก Registration
๏ก Key Escrow
๏ก Trust models
IT Architecture
๏ Electronic communication systems and
methods
๏ก E-mail
๏ก Voice over Internet Protocol (VoIP)
๏ก Instant Messenger (IM)
๏ก Web forums
๏ก Direct video broadcasts
๏ Information Theory
๏ก Source coding
๏ก Channel coding
๏ก Algorithm complexity theory
๏ก Data compression
๏ Communication methods, principles,
and concepts
๏ก Encoding
๏ก Signaling
๏ก Multiplexing
Cybersecurity
Technology
Information
Assurance
Risk
Management
Incident
Detection
Incident Response
and Remediation
32. Upcoming Models and Model Updates
๏ Automation Update
๏ Geospatial Technology Update
๏ Engineering โ New Model
๏ Hospitality and Tourism โ Model Update and Expansion
A series of Web meetings will be held to refine and validate
each model with Subject Matter Experts.
Youโre invited to participate:
๏ก Participate in the Web consultations
๏ก Recommend colleagues and organizations to join in
32