<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Cyber Workforce Development</title><link>http://www.sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Cyber Workforce Development</description><atom:link href="http://www.sei.cmu.edu/blog/feeds/tag/cyber-workforce-development/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 09 Sep 2024 00:00:00 -0400</lastBuildDate><item><title>Generative AI and Software Engineering Education</title><link>https://www.sei.cmu.edu/blog/generative-ai-and-software-engineering-education/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Educators have had to adapt to rapid developments in generative AI to provide a realistic perspective to their students. In this post, experts discuss generative AI and software engineering education.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ipek Ozkaya, Douglas Schmidt</dc:creator><pubDate>Mon, 09 Sep 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/generative-ai-and-software-engineering-education/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Artificial Intelligence</category><category>Cyber Workforce Development</category><category>AI-Augmented Software Engineering</category></item><item><title>Designing Great Challenges for Cybersecurity Competitions</title><link>https://www.sei.cmu.edu/blog/designing-great-challenges-for-cybersecurity-competitions/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This blog post highlights the SEI’s experience developing cybersecurity challenges for the President’s Cup Cybersecurity Competition and general-purpose guidelines and best practices for developing effective challenges.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Jarrett Booz, Josh Hammerstein, Matt Kaar</dc:creator><pubDate>Mon, 17 Apr 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/designing-great-challenges-for-cybersecurity-competitions/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Cyber Workforce Development</category></item><item><title>The Benefits of Cyber Assessment Training</title><link>https://www.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post discusses how cybersecurity assessments can help critical infrastructure organizations improve their cybersecurity with help from free assessment tools developed by the SEI and offered by the U.S. government.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rhonda Brown, Alexander Petrilli</dc:creator><pubDate>Mon, 13 Mar 2023 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-benefits-of-cyber-assessment-training/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity Engineering</category><category>Cyber Risk and Resilience Management</category><category>Cybersecurity</category><category>Cyber Workforce Development</category></item><item><title>Using Machine Learning to Increase the Fidelity of Non-Player Characters in Training Simulations</title><link>https://www.sei.cmu.edu/blog/using-machine-learning-to-increase-the-fidelity-of-non-player-characters-in-training-simulations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Use of machine-learning (ML) modeling and a suite of software tools to create decision-making preferences that make non-player characters (NPCs) more realistic in simulations.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dustin Updyke, Thomas Podnar, Geoffrey Dobson, John Yarger</dc:creator><pubDate>Mon, 11 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/using-machine-learning-to-increase-the-fidelity-of-non-player-characters-in-training-simulations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Cyber Workforce Development</category></item><item><title>Generating Realistic Non-Player Characters for Training Cyberteams</title><link>https://www.sei.cmu.edu/blog/generating-realistic-non-player-characters-for-training-cyberteams/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post describes efforts underway to improve the realism of non-player characters (NPCs) in training exercises with new software called ANIMATOR.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Dustin Updyke, Tyler Brooks</dc:creator><pubDate>Mon, 12 Apr 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/generating-realistic-non-player-characters-for-training-cyberteams/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Cybersecurity</category><category>Cyber Workforce Development</category></item></channel></rss>