DS

David E. Smith Jr.

Technical & Cybersecurity Training

Technical & Cybersecurity Trainer

Applied Training | Curriculum Development | Real-World Decision Making

Services Summary

Contract Training & Curriculum Development

Organizations don’t fail because they lack information. They fail when people are asked to make decisions in complex, High-pressure environments without the structure or training needed to reason clearly.


Delivery formats

  • Instructor-led sessions (onsite or virtual)
  • Hybrid programs for teams
  • Self-paced courses integrated into your LMS

Contract-based training and curriculum development for organizations, teams, and institutions seeking structured, real-world instruction that improves judgment under pressure.

Technical & cybersecurity training

Role-relevant instruction built for real operational constraints.

Cybersecurity awareness + scam/fraud education

Reduce risk through practical recognition and verification habits.

Privacy, compliance, risk, and regulatory training

Aligned to policy requirements and how teams actually work.

OSHA and operational safety training

Decision clarity when conditions change and time is limited.

Custom curriculum + program development

Architecture, content, assessments, and rollout planning.

SCORM-compliant course design + LMS integration

Built for modern platforms and maintainable delivery.

Instruction style: Scenario-based, gamified, and decision-focused learning that improves consistency under pressure.

Note: I work as a contract technical and cybersecurity trainer, designing and delivering training programs that help professionals slow decisions down, recognize patterns, and apply consistent judgment in real-world scenarios.

Capabilities

I design and deliver custom training programs across technical, cybersecurity, and regulated domains. My work combines instructional design, applied analysis, and scenario-based delivery to produce training that changes behavior under real conditions.

Contract technical and cybersecurity training

Instructor-led delivery with measurable objectives and applied practice.

Curriculum and program development

From needs analysis → architecture → content → assessments → rollout.

Cybersecurity awareness and fraud education

Practical detection + verification habits that reduce incidents.

Privacy, compliance, and risk training

Role-based training aligned to policy and operational reality.

OSHA and operational safety training

Decision clarity when conditions change and time is limited.

End-to-end program design

Systems that support instructors, learners, and managers.

Where this helps most

Training that targets decision points is especially effective when performance depends on interpretation, verification, and consistent judgment under time constraints.

  • Teams exposed to phishing / social engineering
  • Regulated environments with compliance obligations
  • Operational roles where safety decisions matter
  • Organizations standardizing training across departments

Engagement-ready

Available for contract and project-based work: delivery, course builds, program redesign, and instructor enablement.

Contact

Teaching Approach

Training has to hold up in the real world: ambiguity, interruptions, time pressure, and competing priorities. My instruction is designed around decision points — what to notice, how to verify, and how to choose consistently.

Decision structure first

Clear steps learners can repeat when pressure increases.

Scenario-based execution

Practice is tied to realistic constraints, not ideal conditions.

Measured outcomes

Objective checks that validate behavior change, not just completion.

The goal: learners leave with a process they can use again tomorrow not a slide deck they forget next week.

Curriculum & Instructional Design

In addition to teaching, I design full training ecosystems — structuring content for delivery across organizations and ensuring compatibility with modern learning platforms.

  • LMS-based course delivery
  • SCORM-compliant course design
  • CMS-driven content management
  • Modular course architecture
  • Gamified and scenario-based learning
  • Instructor-led, hybrid, and self-paced formats

The goal is simple: training that is easy to deliver, easy to maintain, and reliable under operational pressure.

Cybersecurity Course

Evidence of teaching + course design

Scam Email Analysis Using OSINT

How to Read, Verify, and Reason About Suspicious Messages

This course demonstrates how analytical reasoning and open-source information can be used to understand scam emails, reduce uncertainty, and make better decisions under pressure. It serves as both a learner-facing course and a case study in applied instructional design.

Learning objectives

Observable behaviors learners can demonstrate after training.

Scenario design

Realistic prompts that force decisions under time constraints.

Assessment strategy

Verification steps + decision rationale, not trivia checks.

Delivery formats

Instructor-led, hybrid, and self-paced variants supported.

What learners practice

  • Identify manipulation and urgency cues
  • Verify sender, links, and claims using OSINT
  • Reduce uncertainty before taking action
  • Apply consistent decision steps under pressure

Built for transfer: repeatable reasoning that holds up when inbox volume and stress increase.

How This Work Is Used

My training and curriculum work supports multiple audiences from organizations needing delivery support to hiring teams evaluating instructional capability.

Organizations seeking contract training support

Short-term delivery, ongoing partnerships, or team-wide rollouts.

Teams needing custom cybersecurity or compliance education

Role-specific scenarios aligned to real risk and policy requirements.

Recruiters and hiring managers

Evidence of teaching approach, course structure, and program design ability.

Individuals building applied analytical skills

Skill development focused on reasoning, verification, and decision consistency.

Training engagements can be delivered as custom programs, standalone courses, or integrated into existing learning environments.

Engagement & Contact

I’m available for contract and project-based engagements, including curriculum development, custom training delivery, and program design.

Common engagement types

Training delivery · Course builds · Program redesign · Instructor enablement.

Delivery options

Instructor-led · Hybrid · Self-paced · LMS/CMS-ready.