DICT Updated-NICS
DICT Updated-NICS
INTRODUCTION 3
NICS STRUCTURE 4
HOW TO READ 6
DEFINITION OF TERMS 7
GROUP 4: CYBERSECURITY 61 – 74
The ASEAN Digital Masterplan (ADM) for 2025 acknowledges this need, with one of the
desired outcomes and enabling actions enumerated is an increased capability for businesses
and people to participate in the digital economy. This vision includes improving curriculum
development, building capacity, and raising ICT professionals' qualification standards.
The primary objective of this project is to develop an updated National ICT Competency
Standards or NICS that is strategically designed to enable individuals and organizations to
achieve the nation’s ICT goals.
The enabling objectives that allow the achievement of the primary objective are as follows:
1. Collect and analyze data through literature review and focus group discussion
2. Restructure the NICS based on collected and analyzed data
3. Update the twenty (20) NICS
NICS STRUCTURE
The NICS is structured to provide organizations with a benchmark of key knowledge, skills,
and attitudes that will bring them to realize their objectives. The enhanced NICS now covers
the general functions of an organization with additional emphasis on Information
Technology, Cybersecurity, and Network management.
Table 1
Chief Information
Officer
IT professionals who specialize in managing computer
Enterprise systems and technology infrastructure. They
Information Architecture troubleshoot issues, implement solutions, ensure data
Technology Solutions security, and oversee hardware and software. These
Group Architecture, experts play a crucial role in optimizing technology to
Design & meet organizational needs across various specialized
Delivery areas within information technology.
IT Governance
IT Operations
Cybersecurity professionals are tasked with protecting
Chief Information
computer systems, network, and data by
Security Officer
implementing security measures, monitoring for
Cybersecurity threats, and responding to security incidents. Their
Cybersecurity Governance role involves establishing safeguards, assessing risks,
Group
Cybersecurity and maintaining security protocols to prevent and
Architecture, address potential cyber threats within an
Design, and organization's infrastructure.
Delivery
Competency Definition:
Describes the competency by defining the tasks, how it’s done, and the outcomes to be expected.
Behavioral Indicators:
Observable behaviors and criteria that must be consistently exhibited by the individual to be
categorized at a particular level.
Enabling Competencies:
Knowledge bases that a person must have to perform at a certain level.
Andragogical Mastery
It pertains to expertise in andragogy, which is the art of instructing adults, stands in contrast
to pedagogy, the conventional approach to teaching children.
Attention to Detail
Attention to detail is the ability to efficiently allocate cognitive resources to achieve
thoroughness and accuracy when accomplishing tasks, no matter how small or large.
Attentive Listening
Attentive listening is a communication ability that goes beyond mere hearing of the words
spoken by another person, instead, it involves a deliberate effort to comprehend the
underlying meaning and intent.
Coaching
Coaching is described as a collaborative engagement with clients in a stimulating and
inventive process, motivating them to optimize both their personal and professional
capabilities.
Collaboration
Collaboration is to work jointly with others or together especially in an intellectual
endeavor.
Communication
Communication is the exchange of information among individuals using a shared system of
symbols, signs, or behavior.
Competency
Competency refers to the knowledge, skills, and attitudes (KSAs) associated with
exceptional job performance. It plays a role in discerning between high, average, and low
performance, signifying desirable qualities or behaviors and functions as performance
indicators.
Content Creation
Content creation involves researching, developing strategic concepts, transforming these
concepts into valuable materials, and subsequently promoting them to a specific audience.
Enabling Competencies
Enabling competencies relates to the necessary foundational knowledge for achieving a
particular level of performance, setting them apart from the main competencies themselves.
Mentoring
Mentoring involves establishing an informal connection with the aim of fostering a mutually
advantageous, two-way relationship that supports long-term career advancement.
Password Hygiene
Pedagogy
Pedagogy involves the exploration of the methods and activities employed in the practice of
teaching, specifically for children.
Resource Management
Resource management involves a set of procedures and methods employed to guarantee the
availability of all essential resources required to complete a project or achieve business goals.
Stakeholder Engagement
Stakeholder engagement refers to the organization's method of involving pertinent
stakeholders with a specific aim to attain mutually agreed-upon results.
Strategic Thinking
Strategic thinking entails examining situations, recognizing patterns, and foreseeing
potential outcomes from a long-term perspective.
System Knowledge
System knowledge pertains to comprehension of basic computer systems.
Visionary Mindset
A visionary mindset involves possessing or being characterized by foresight and
imagination.
INFORMATION SECURITY
Safeguards analog and digital information assets from unauthorized access, modification,
disclosure, destruction, and inspection, addressing risks or threats to ensure its integrity,
confidentiality, and availability.
Note: Applies to roles or functions engaged in project-based tasks. It's important to note
that certain project members participate only in specific phases of the project management
process.
NATIONALISM
Excels in work performance with a dedication to initiatives that positively impact national
growth, displaying an unwavering commitment to the betterment of our nation.
BAYANIHAN
Embodies the spirit of Bayanihan within the organization, fostering collaboration and
shared responsibility for the collective well-being and progress of all.
The Chief Information Officer (CIO) has a very important job in a company. They ensure
that the people, the way things are done, and the technology in the IT (Information
Technology) part of the company all work together. The CIO's main goal is to ensure that
everything in IT helps the company achieve its business goals. As the world becomes more
digital, the CIO takes a leading role in making important decisions about keeping
information safe, using data, and ensuring customers have a good experience. They are like
the captain, steering the ship through the digital world, keeping it safe, and helping it grow.
The CIO has many tasks, including planning and implementing an IT strategy. This strategy
needs to meet the needs of the business, make sure the company gets the most out of its
investments, and keep everything secure. The CIO also oversees projects and work in the IT
department, ensuring the team stays current and upgrades the technology when needed.
They evaluate how well the team is doing to help everyone work their best.
One big responsibility of the CIO is ensuring information is kept safe. This means creating
and keeping up with rules and procedures to protect information. The CIO also works with
others to ensure everyone knows how to keep things safe. Every year, the CIO reports to the
head of the company about how well the information security plan is working, including
any improvements made (Whitney, 2018).
For Government CIOs, it is essential that they also have civil service competencies.
STRATEGIC VISION
Formulates and communicates clear, forward-thinking strategies that align an
organization’s objectives with a well-defined path for the future.
INNOVATIVE LEADERSHIP
Skillfully guiding a team to embrace new ideas and creative strategies, fostering a culture
of continuous improvement, and turning visionary possibilities into real solutions.
ETHICAL LEADERSHIP
Makes transparent decisions, advocating for data privacy, and overseeing cybersecurity
practices to ensure responsible and ethical conduct within network and IT systems.
STAKEHOLDER ENGAGEMENT
Fosters transparent and collaborative relationships with key individuals and groups,
actively involving them in the decision-making processes and ensuring that IT strategies
align with their needs and expectations.
Enterprise Architecture
Ideally, professionals who assume enterprise architecture function possess strong leadership
qualities that are critical in shaping an organization's technological landscape. Through their
expertise, they guide the design of IT systems to align with overall organizational objectives
seamlessly. This leadership goes beyond technical considerations and involves strategic
vision and effective coordination.
BUSINESS ACUMEN
Demonstrates a comprehensive understanding of the organization’s internal and external
environment to strategize effective solutions to bring more value or success to the
organization, its people, and/or customers.
STRATEGIC PLANNING
Develops comprehensive and effective plans or strategies that are aligned with the
organization’s imperatives.
ENTERPRISE TRANSFORMATION
Strategically driving comprehensive organizational and functional changes to adapt,
innovate, and ensure long-term viability in response to the evolving IT and business
landscape.
Transitioning from high-level solutions outlined in the solutions architecture, the project
now undergoes the development of detailed plans to execute its objectives effectively. Here,
professionals involved in solutions design focus on translating high-level solutions by
stakeholders into practical design solutions with actionable plans. The goal is to create a
holistic solution design that addresses the solution from a functional, technical, and UI/UX
standpoint (Hartson & Pyla, 2019).
IT SOLUTIONS ARCHITECTURE
Assesses business requirements and formulates strategies in developing IT solutions for
projects, focusing on designing software applications and hardware to address needs and
align IT seamlessly with business operations.
IT SOLUTIONS DESIGN
Translates high-level solutions into practical design solutions with actionable
plans for implementing IT solutions.
IT SOLUTIONS DEVELOPMENT
Entails the development of systems that meet project objectives through
server-side and client-side development, UI/UX design, database management,
and infrastructure management.
● Creates basic code for ● Generates code for ● Generates code for
backend system that is backend system at a backend system with
clean, maintainable, and proficient level, high mastery, ensuring
efficient, adhering to ensuring it is clean, it is not only
industry standards and maintainable, and proficiently done but
best practices. efficient while adhering also adheres to the
● Develops to industry standards highest industry
uncomplicated systems and best practices. standards and best
that meet project ● Develops moderately practices.
objectives, fulfill user complex systems that ● Leads the development
requirements, and are meet project objectives, of complex systems
aligned with project fulfill user independently or with
specifications, guided requirements, and are teams, showcasing a
by a supervisor or a aligned with project comprehensive
more experienced specifications. understanding of
developer. project requisites.
● Provides technical
direction and guidance
to the project team.
● Creates basic code for ● Generates code for the ● Generates code for the
the system’s user system’s user interface system’s user-interface
interface that is clean, at a proficient level, with high mastery,
maintainable, and ensuring it is clean, ensuring it is not only
efficient, adhering to maintainable, and proficiently done but
industry standards and efficient while adhering also adheres to the
best practices. to industry standards highest industry
● Develops basic and best practices. standards and best
user-interface code that ● Develops moderately practices.
meets project objectives, complex user interfaces ● Leads the development
fulfills user that meet project of complex systems
requirements, and is objectives, fulfill user independently or with
aligned with project requirements, and are teams, showcasing a
specifications, guided aligned with project comprehensive
by a supervisor or a specifications. understanding of
more experienced ● Integrates user project requisites.
developer. experience principles ● Incorporates advanced
● Considers the into the development of user experience
user-experience of the user interfaces, methodologies into the
users in the ensuring a user-centric development of user
development of approach to design and interfaces,
frontend interfaces. functionality. demonstrating a
nuanced understanding
of user interactions,
accessibility, and
IT Operations
IT Operations, often called ITOps, plays a pivotal role in the digital landscape, overseeing IT
services' implementation, management, delivery, and support. In essence, it ensures that the
digital backbone of an organization operates seamlessly, catering to the dynamic needs of
internal and external users. Gartner defines IT operations as a holistic approach involving
not just technology but also people and management processes. This comprehensive
strategy aims to provide the right services at the right quality and competitive costs.
SYSTEMS MAINTENANCE
Monitoring and managing systems to ensure availability, confidentiality, and
integrity.
IT Governance
POLICY DEVELOPMENT
Develops and implements standards aligned with IT frameworks, regulations, and
organizational goals.
The Chief Information Security Officer (CISO) is critical in organizations, serving as the
guardian of digital security. This top-level executive is responsible for crafting and
implementing security policies to shield the company's crucial data from potential cyber
threats. Managing the overall security program, the CISO ensures that everything from
computer systems to applications is fortified against vulnerabilities. They are the frontline
defenders against evolving cyber risks, leveraging their expertise to stay ahead in the
perpetual cat-and-mouse game with cyber adversaries.
In a world where technology advances rapidly, the CISO's adaptability is paramount. They
play a pivotal role in securing the organization against potential risks and facilitating secure
digital transformations. The CISO's expertise extends beyond mere defense; it becomes a
driving force for innovation, enabling the organization to grow securely in an increasingly
interconnected and digitized landscape. Balancing the need for robust security measures
with the organization's expansion and technological innovation goals, the CISO has a critical
role in maintaining a secure and resilient business environment.
For Government CISOs, it is essential that they also have civil service competencies.
Competencies under CIO, specifically ethical leadership and stakeholder engagement, apply
to the CISO function.
STRATEGIC VISION
Demonstrates leadership by aligning cybersecurity efforts with business goals,
anticipating threats, and integrating security into long-term organizational
planning for proactive resilience.
Transitioning from high-level solutions outlined in the solutions architecture, the project
now undergoes the development of detailed plans to execute its objectives effectively. Here,
professionals involved in solutions design focus on translating high-level solutions by
stakeholders into practical design solutions with actionable plans. The goal is to create a
holistic solution design that addresses the solution from a functional, technical, and UI/UX
standpoint (Hartson & Pyla, 2019).
SECURITY ARCHITECTURE
Develops and refines security strategies by integrating risk management, strategic
problem-solving, standards adherence, and continuous improvement.
SECURITY DESIGN
Translates high-level solutions into practical security design solutions with
actionable plans for implementing security solutions.
Security Operations
In today's digital landscape, Security Operations play a crucial role in keeping IT resources
available and data safe. These teams work hard to stop cyber threats, using advanced tools
to identify and stop potential problems in real-time. They also take proactive steps, like
managing vulnerabilities, to ensure important IT resources stay strong and working.
At the same time, Security Operations keep data confidential and intact. They use encryption
and controls to protect sensitive information and quickly respond to security issues. By
SECURITY OPERATIONS
Monitoring and managing systems’ security to ensure availability, confidentiality,
and integrity.
Security Governance
Establishing robust standards, including Key Performance Indicators (KPIs), and vigilant
compliance monitoring are pivotal aspects of effective IT Security Governance. These
standards provide a structured framework, enabling organizations to gauge the success of
their security initiatives, pinpoint areas for improvement, and align security efforts with
broader business objectives.
POLICY DEVELOPMENT
Develops and implements standards aligned with IT frameworks, regulations, and
organizational goals.
Integral to this framework are the software rules and protocols that govern data
transmission, processing, and management across the network. These elements significantly
contribute to the overall efficiency and performance of the network.
NETWORK ARCHITECTURE
Designs and implements robust, secure, and scalable network infrastructures that
facilitate seamless and reliable communication while aligning with business
requirements.
SECURITY DESIGN
Translates high-level solutions into practical network design solutions with
actionable plans for implementing solutions.
Network Operations
Network operations involve the critical tasks of monitoring and managing systems' security
to uphold the pillars of availability, confidentiality, and integrity. This entails a vigilant
oversight of the network infrastructure, ensuring that it remains secure, accessible, and free
from unauthorized access. By focusing on these key elements, network operations play a
pivotal role in sustaining a reliable and protected environment for seamless connectivity and
data integrity.
NETWORK OPERATIONS
Monitoring and managing systems’ security to ensure availability, confidentiality,
and integrity.
POLICY DEVELOPMENT
Develops and implements standards aligned with IT frameworks, regulations, and
organizational goals.
The business operations competencies function as vital guidelines for individuals navigating
diverse facets of organizational functions. This comprehensive framework outlines key
competencies essential for efficient business operations, encompassing various areas such as
logistics, administration, accounting, management, and customer support. It is crucial to
acknowledge that while this framework establishes a solid foundation, the dynamic nature
of organizational operations may necessitate additional role-specific nuances. Hence, it is
encouraged to tailor these guidelines to their unique professional contexts, ensuring
enhanced applicability and optimal benefit from these competencies.
LEADERSHIP
Leads, motivates, guides, and empowers teams and individuals to achieve their
utmost potential while strategically steering the organization toward success. This
involves promoting innovation, upholding a commitment to integrity, formulating
effective strategies, and/or offering a clear vision to guide the organization
towards its goals.
ACCOUNTING
Systematically records and analyzes financial transactions, supporting in
managing and summarizing an organization's financials to understand its
financial status and objectives.
MARKETING
SALES
Engagement in client-facing activities with the objectives of building rapport with
customers and boosting the organization’s revenue through the sale of its products
or services.
LEARNER SUPPORT
CURRICULUM DEVELOPMENT
Thoughtfully and strategically develops educational curricula to ensure learners
acquire essential knowledge, skills, and attitudes, preparing them to meet the
demands of both society and industry effectively.
INSTRUCTIONAL DESIGN
Systematic integration of adult learning principles, instructional models, and
teaching strategies in the creation of effective training programs and materials that
aim to equip learners with the right set of knowledge and skills to effectively
perform their responsibilities.
COURSE FACILITATION
Efficiently delivers comprehensive training programs using suitable teaching
strategies in online or face-to-face settings, with a focus on addressing knowledge,
skill, or performance gaps and optimizing organizational operations.
https://www.deped.gov.ph/about-deped/central-office/administration-functions/
All you need to learn about the objectives of accounting! (2022, May 12). Unacademy.
https://unacademy.com/content/cbse-class-11/study-material/accountancy/accounting-objectives/
American Marketing Association. (2023, March 21). What is Marketing? — The Definition of Marketing —
AMA. https://www.ama.org/the-definition-of-marketing-what-is-marketing/
Arya, K. (2023b, April 12). Benefits of using productivity tools at workplace - Productivity Tips & Tool.
Assyne, N., Ghanbari, H., & Pulkkinen, M. (2022). The essential competencies of software professionals: A
https://doi.org/10.1016/j.infsof.2022.107020
Bendler, D., & Felderer, M. (2023). Competency models for information security and cybersecurity
professionals: Analysis of existing work and a new model. ACM Transactions on Computing
Bossu, C., Brown, N., & Warren, V. (2018). Professional and Support Staff in Higher Education: An
https://doi.org/10.1007/978-981-10-1607-3_29-2
https://digitalmindsbpo.com/glossary/technical-support-tech-support/
Brown, A. S. (2005). The charter: selling your project. Paper presented at PMI Global Congress 2005—North
America, Toronto, Ontario, Canada. Newtown Square, PA: Project Management Institute.
Calzon, B. (2023b, August 10). What is data analysis? Methods, techniques, types & how-to. BI Blog | Data
https://www.datapine.com/blog/data-analysis-methods-and-techniques/
CIO. (2023). What is a solutions architect? A vital role for IT-business alignment.
https://www.cio.com/article/191394/what-is-a-solutions-architect-a-vital-role-for-it-business-alignme
nt.html
https://www.cisco.com/c/en/us/products/security/what-is-ciso.html#:~:text=A%20CISO%2C%20or%
20chief%20information,policies%20to%20protect%20critical%20data.
https://books.google.com.ph/books?hl=en&lr=&id=ScKTo1mZidwC&oi=fnd&pg=PR1&dq=classroom+
management&ots=9maMFqBnpu&sig=r1LDz4NZGtdoDnvzycjyoHMfrWc&redir_esc=y#v=onepage
&q=classroom%20management&f=false
clickworker. (2022, September 20). Content Generation ⇒ Content Marketing Glossary | clickworker.
clickworker.com. https://www.clickworker.com/content-marketing-glossary/content-generation/
https://www.merriam-webster.com/dictionary/collaborate
https://www.merriam-webster.com/dictionary/communication
https://builtin.com/operations/technical-support
Costa, A., Pinto, A., & Cota, M. (2013). PMO competencies: how to define, assess, and plan. Paper presented
at PMI® Global Congress 2013—North America, New Orleans, LA. Newtown Square, PA: Project
https://csrc.nist.gov/glossary/term/INFOSEC
https://www.celt.iastate.edu/instructional-strategies/teaching-format/
Cronje, J. C. (2005, August 23). An investigation into the roles and competencies of an online facilitator.
https://repository.up.ac.za/handle/2263/27469
Cuncic, A., MA. (2022, November 9). What is active listening? Verywell Mind.
https://www.verywellmind.com/what-is-active-listening-3024343
Deep Fried Brain Project. (n.d.). PROCESS GROUP AND KNOWLEDGE AREA MAPPING. PMBOK
-knowledge-area.pdf
Effective student assessment and evaluation in the classroom. (2016). Alberta Education.
https://files.eric.ed.gov/fulltext/ED498247.pdf
Eschenbrenner, B. (n.d.). Information Systems User Competency: a Conceptual foundation. AIS Electronic
Fawcett, T., & Provost, F. (2013). Data science for business. ResearchGate.
https://www.researchgate.net/publication/256438799_Data_Science_for_Business
Force, J. T. (2018). Risk management framework for information systems and organizations:
https://doi.org/10.6028/nist.sp.800-37r2
Galante, M. (2022b, March 27). What is project Management? Definitions, examples & more. Forbes
Advisor. https://www.forbes.com/advisor/business/what-is-project-management/
https://www.gartner.com/en/information-technology/glossary/cio-chief-information-officer
https://www.gartner.com/en/information-technology/glossary/it-governance
https://www.gartner.com/en/information-technology/glossary/it-operations
https://www.gartner.com/en/information-technology/glossary/solution-architecture
Gavriliev, E. I., & Avdeenko, T. (2022). Model and procedure for assessing the qualification of a
software developer. 2022 IEEE 23rd International Conference of Young Professionals in Electron
Ghasemaghaei, M., Ebrahimi, S., & Hassanein, K. (2018). Data analytics competency for improving
https://doi.org/10.1016/j.jsis.2017.10.001
Good, L. (2023b, November 15). What is Project Management? Definition, Types & Examples.
project-management.com. https://project-management.com/what-is-project-management/
Grades, What are They Good For? (2021b, October 8). Harvard Graduate School of Education.
https://www.gse.harvard.edu/ideas/usable-knowledge/21/10/grades-what-are-they-good
Greefhorst, D., & Proper, E. (2011). The role of enterprise architecture. In Springer eBooks (pp. 7–29).
https://doi.org/10.1007/978-3-642-20279-7_2
https://www.deped.gov.ph/wp-content/uploads/2020/06/Values-Education-Program-FAQ.p
df
Herrity, J. (2023a). 7 conflict resolution skills (and how to use them at work). Indeed.
https://www.indeed.com/career-advice/resumes-cover-letters/conflict-resolution-skills
https://www.indeed.com/career-advice/career-development/attention-to-detail
Herrity, J. (2023c). Guide to people management: Definition, tips and 8 skills. Indeed.
https://www.indeed.com/career-advice/career-development/guide-to-people-management
https://sg.indeed.com/career-advice/finding-a-job/administrative-officer-roles-and-responsib
ilities
https://www.indeed.com/career-advice/career-development/collaboration-skills
https://www.indeed.com/career-advice/career-development/competency-framework
Indeed. (2023d). Mastering essential communication skills: Definitions and 2023 examples.
https://in.indeed.com/career-advice/resumes-cover-letters/communication-skills
https://uk.indeed.com/career-advice/career-development/computer-literacy
https://www.iso27001security.com/html/27032.html
https://www.itgovernance.co.uk/it_governance
Jewell, P., Reading, J., Clarke, M., & Kippist, L. (2019). Information skills for business acumen and
Kelley, K. (2023b, August 4). What is Data Analysis?: Process, Types, Methods, and Techniques.
Simplilearn.com. https://www.simplilearn.com/data-analysis-methods-process-types-article
Kenton, W. (2023b, May 18). Financial Accounting Meaning, principles, and why it matters.
Investopedia.
https://www.investopedia.com/terms/f/financialaccounting.asp#toc-importance-of-financial-
accounting
Klee, S., Janson, A., & Leimeister, J. M. (2021). How data analytics Competencies Can Foster
Business Value– A Systematic review and Way forward. Information Systems Management,
https://onlinedegrees.sandiego.edu/what-is-educational-technology-definition-examples-im
pact/
Lesson Plan Guidelines for Student Teachers - School of Education. (n.d.-b). School of Education.
https://drexel.edu/soe/resources/student-teaching/advice/how-to-write-a-lesson-plan/
Llego, M. A. (2021b, November 13). DePED K to 12 Grading System steps for computing grades.
TeacherPH. https://www.teacherph.com/deped-grading-system/
https://corporatefinanceinstitute.com/resources/accounting/financial-accounting/
Malec, M. (2022, December 20). What is people management, and why is it so important? Learnerbly.
https://www.learnerbly.com/articles/what-is-people-management
Martín, A., & Grudziecki, J. (2006). DIGEULIT: Concepts and Tools for Digital Literacy
Development. Innovation in Teaching and Learning in Information and Computer Sciences, 5(4),
249–267. https://doi.org/10.11120/ital.2006.05040249
Martin, F. (n.d.). Facilitation matters: instructor perception of helpfulness of facilitation strategies in online
courses. https://eric.ed.gov/?id=EJ1249262
https://www.td.org/insights/mentoring-versus-coaching-whats-the-difference
https://www.stakeholdermap.com/stakeholder-engagement.html
https://www.weareteachers.com/what-is-classroom-management/
Nathani, P. (2022). Guide to curriculum development: Types, principles & process of curriculum
National Privacy Commission. (2022, February 12). Republic Act 10173 - Data Privacy Act of 2012 -
Plurilock Security, Inc. (2023, September 13). What is Password Hygiene? Plurilock.
https://plurilock.com/answers/password-hygiene-what-does-password-hygiene-mean/
Postlethwaite, T. N. (n.d.). The fundamentals of education planning: Lecture - discussion series. Unesco:
https://unesdoc.unesco.org/ark:/48223/pf0000070052/PDF/70052eng.pdf.multi
Powell, M. et al. (2022). Protecting information and system integrity in industrial control system
environments: Cybersecurity for the manufacturing sector. NIST Special Publication 1800-10.
https://doi.org/10.6028/NIST.SP.1800-10
https://professionalleadershipinstitute.com/resources/business-acumen/
Sabbott. (2015b, November 10). Assessment definition. The Glossary of Education Reform.
https://www.edglossary.org/assessment/
https://www.computerscience.org/careers/software-developer/
https://gwacalculator.com/college-grading-system-philippines/
Schooley, S. (2023b, November 6). What does it take to be a good people manager? business.com.
https://www.business.com/articles/people-management/
Shaping a curriculum framework: the fundamental principles. (2022b, March 18). THE Campus
https://www.timeshighereducation.com/campus/shaping-curriculum-framework-fundamen
tal-principles
https://www.shrm.org/resourcesandtools/tools-and-samples/job-descriptions/pages/chief-inf
ormation-officer.aspx
https://www.shrm.org/resourcesandtools/hr-topics/behavioral-competencies/leadership-and
-navigation/pages/leadershipcompetencies.aspx
https://snov.io/glossary/needs-assessment/
Staff, C. (2023, November 29). What is resource management? definition, jobs, and more. Coursera.
https://www.coursera.org/articles/resource-management
Staff, C. (2023b, November 29). What is the software development life cycle? SDLC explained. Coursera.
https://www.coursera.org/articles/software-development-life-cycle
Staff, W. A. T. (2023b, October 31). 23 Brilliant classroom management Strategies and techniques. We Are
Teachers. https://www.weareteachers.com/classroom-management-techniques/
Storm, A. (2023, August 23). Principles of Andragogy: Theory, Examples, and Implementation. Thinkific.
Studocu. (n.d.). Module 2 Values Formation - VALUES FORMATION I. Learning Resources: Television,
Powerpoint - Studocu.
https://www.studocu.com/ph/document/mindanao-state-university-iligan-institute-of-techn
ology/national-service-training/module-2-values-formation/24136211
Strutner, S. (2023b, September 5). Financial Management explained: scope, Objectives & importance.
Oracle NetSuite.
ment.shtml
https://doi.org/10.1016/j.telpol.2021.102282
Tait, A. (2000). Planning student support for open and distance learning. Open Learning: The Journal
Terada, Y. (2019b, February 27). The key to effective classroom management. Edutopia.
https://www.edutopia.org/article/key-effective-classroom-management
https://www.tes.com/magazine/teaching-learning/general/what-is-pedagogy
https://www.theknowledgeacademy.com/blog/communication-skills
https://www.theknowledgeacademy.com/blog/strategic-thinking/
https://www.education.vic.gov.au/Documents/school/teachers/teachingresources/practice/pedagogical
model.pdf
https://books.google.com.ph/books?hl=en&lr=&id=IWBppwNMC-QC&oi=fnd&pg=PR7&dq=needs+a
ssessment+analysis&ots=PayVDA4lIZ&sig=ffPXsoiRUTJLF2VA6FYcg6hQuL4&redir_esc=y#v=one
page&q=needs%20assessment%20analysis&f=false
https://unevoc.unesco.org/home/TVETipedia+Glossary/show=term/term=Digital+literacy
https://www.ucop.edu/human-resources/_files/uc%20people%20management%20competen
cies.pdf
Udo, N. & Koppensteiner, S. (2004). What are the core competencies of a successful project
manager? Paper presented at PMI® Global Congress 2004—EMEA, Prague, Czech Republic.
https://www.valamis.com/hub/adult-learning-principles
Verlinden, N. (2023, September 12). 18 Key leadership Competencies for 2023 Success. AIHR.
https://www.aihr.com/blog/leadership-competencies/
Watkins, R., Meiers, M., & Visser, Y. L. (2012). A guide to assessing needs. The world bank. The World Bank.
https://documents1.worldbank.org/curated/en/644051468148177268/pdf/663920PUB0EPI00essing09
780821388686.pdf
https://uk.indeed.com/career-advice/career-development/computer-literacy
https://www.creatrixcampus.com/blog/what-curriculum-development-understanding-funda
mentals
https://doi.org/10.1016/b978-0-12-387793-2.00001-2
Wu, W. (2009). Exploring core competencies for R&D technical professionals. Expert Systems With