SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Kristin J. Ingersoll
Portfolio
Kristin J.
Ingersoll
Kristin J. Ingersoll
Kristin Ingersoll ~ Resume
I am an Instructional Designer and e-Developer with a unique professional background. I bring national television
production experience as well as a depth of instructional design experience. I’ve worked for large, Fortune 500
companies and small consulting companies and can work well in either environment. Most importantly, I truly love
what I do and have found it to be a great blend of my creative streak, my enjoyment of people and analysis, and my
flair for organizing information so others can understand, retain, and apply it.
Kristin J. Ingersoll
Kristin Ingersoll ~ Resume
Kristin J. Ingersoll
Kristin Ingersoll ~ Resume
Kristin J. Ingersoll
Kristin Ingersoll ~ Resume
Kristin J. Ingersoll
Briljent: HEWLETT PACKARD ENTERPRISE
Standard Pages – A Sampling
I used PowerPoint
for storyboarding
and Articulate Storyline 2 to develop
the courses. The subject matter
ranged, but most courses included
interactivities designed to keep
learners engaged.
Kristin J. Ingersoll
Briljent: HEWLETT PACKARD ENTERPRISE
This was a multi-step
activity to help students
learn how to fill out a
report.
For this exercise, I used
layers, with a trigger to
show “incomplete” if the
user clicked NEXT before
completion.
I also used button states
with variables, triggered to
display when the user
entered incorrect
information.
Interactive Activities
Kristin J. Ingersoll
Briljent: HEWLETT PACKARD ENTERPRISE
Learning Checks – A Sampling
External-facing courses for
Medicare/Medicaid
providers are available here:
http://provider.indianamedicaid.com/general-
provider-services/provider-education/provider-
healthcare-portal-training.aspx
Kristin J. Ingersoll
OneAmerica: One Day is Today!
Course Designed for OneAmerica Sales and Marketing:
• eLearning developed using ReadyGo! Software
• Introduced Sales and Marketing Representatives to resources
available to them for customer meetings
• Embedded videos, links to website, best practice testimonials
• Linked to resources on SalesForce
Kristin J. Ingersoll
OneAmerica: Distributions 101
Course Designed for OneAmerica Distributions Department – New
Employee Orientation:
• Two Day Instructor-Led Course
• New Employees sat at individual computers in lab
• Instructor presented software, procedures, job aids
• Each Pit Stop included quiz
• Comprehensive Exam
Kristin J. Ingersoll
Department of Defense: Security Awareness
Kristin J. Ingersoll
Briljent: 508 Transition Project - “Tips & Tricks”
Over 6,000 courses were
transitioned to Section 508
compliance in 12 months.
The client, The Centers for
Medicare & Medicaid Services
(CMS) needed to make all
eLearning courses Section 508
compliant. I led the effort to train
the TQC department on 508 rules
and regulations. I held ILTs, Lunch
& Learns, individual
sessions, and sent out
“Tips & Tricks” to
answer FAQs.
Kristin J. Ingersoll
Xerox: Instructor Guide for
Kraft ILT - “Show Me the Money!”
Kristin J. Ingersoll
Foreign Services Institute: Storyboard for
“Classified and Sensitive Information”
Kristin J. Ingersoll
National Institutes of Health: Section 508
Text For “Security Awareness” Course
Graphic: A plane flies across screen with banner that says,
ensuring IT security enables the N I H mission. A series of
graphics appears starting with a woman at a computer with a
thought bubble that says, I need access twenty four hours a
day, seven days a week. Next is a man in front of a monitor
with papers on table in front of him, with a thought bubble
that says, I need to trust the analysis of my data. Next is a
woman in a laboratory, holding a test tube, with a thought
bubble that says, I need to protect proprietary formulas.
Next is a man on a phone, looking at a folder of papers, with
a thought bubble that says, I need to secure patient records.
Graphic: A laptop computer appears with a blank screen.
Then, a warning text box appears with the words, Password
Rejected, with boxes that say okay and cancel. Another
warning appears that says, Starting Program Hijack, with
boxes that say okay and cancel. A warning text box appears
over the Hijack text with large text that says Alert. The
computer screen is cleared of all warnings and text appears:
What Happened?
There are four pop ups on this screen. The first is, Examples
of Computer Incidents. When you click that link, a box opens
with this text. Bullet 1: You think someone is using a
computer without authorization. Bullet 2: Your files look like
someone has been tampering with the data. Bullet 3: Sensitive information has been disclosed. Bullet 4: Your
computer is acting strange. Additional examples include: hacker attacks, suspected fraud, waste, or abuse of a system,
web page defacements, inappropriate use, improper disclosure of sensitive information, inability to access your files,
and theft of data (including disks). Report any case of theft to the NIH Help Desk. Users should also contact their local
property representative for hardware theft and their ISSO for hardware and data theft.
The second pop up is, What Information Should be Reported? When you click that link, a
box opens with this text: Keep notes on all aspects of the problem, for example: Bullet 1:
Any computer messages, for example: You have received a virus. Bullet 2: What you
were doing when the problem occurred. Bullet 3: Details on how the computer is acting.
Bullet 4: Are others affected by the problem? Bullet 5: Was sensitive information
involved? The third pop up is, N I H Help Desk. When you click that link, the contact
information for the N I H Help Desk appears. The local phone number is 3 0 1 4 9 6 4 3 5
7. The toll free phone number is 8 6 6 3 1 9 4 3 5 7. The T T D phone number is 3 0 1 4 9 6
8 2 9 4.The website is H T T P colon backslash backslash I T helpdesk dot N I H dot gov.
The last pop up is I S S O. When you click that link, the dictionary will open. The same
definition that is on the main screen appears. I S S O is the acronym for Information
System Security Officer. Each Institute and Center, or I C, has an I S S O to assist you with
security policies, issues, and problems.
Kristin J. Ingersoll
Eli Lilly & Co: Needs Assessment – Training in Insulin
Manufacturing (Building105)
This Evaluation was completed for the Eli Lilly eMarketing Group. There was some concern that the general
marketing population at Lilly has some misinformation regarding eMarketing and eTactics.
Tools employed to determine the needs and recommendations based on a Needs Assessment completed
earlier in 2001 included this SWOTI Analysis. It compared the opportunities, threats, strengths, and
weaknesses and their interactions.
Kristin J. Ingersoll
Westbrook Training
& Design
Engaging Minds; Animating the Ordinary; Creating User-Centered, Cutting-Edge Training Solutions
Analyze, design, and develop performance-based interventions.
These include:
• Blended Learning
• eLearning
• Instructor-Led (including Instructor and Participant
Guides)
• Self-study courses
• On-the-job training workshops
• Curriculum analysis and mapping
• Design logos
Clients have included:
Valerie DeLaCruz
Singer

Weitere ähnliche Inhalte

Ähnlich wie PORTFOLIO_2016_ONLINE

The data science revolution in insurance
The data science revolution in insuranceThe data science revolution in insurance
The data science revolution in insuranceStefano Perfetti
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 
Choose 3 to do, one page 1.5 space for each. Deadline is 18th 1 pm.docx
Choose 3 to do, one page 1.5 space for each. Deadline is 18th 1 pm.docxChoose 3 to do, one page 1.5 space for each. Deadline is 18th 1 pm.docx
Choose 3 to do, one page 1.5 space for each. Deadline is 18th 1 pm.docxjessiep6
 
Essay On Psalm 51. Online assignment writing service.
Essay On Psalm 51. Online assignment writing service.Essay On Psalm 51. Online assignment writing service.
Essay On Psalm 51. Online assignment writing service.Jessica Phillips
 
DUE DATE Sunday, 29 March 1159 pm (digital copy to Canvas)Essa.docx
DUE DATE Sunday, 29 March 1159 pm (digital copy to Canvas)Essa.docxDUE DATE Sunday, 29 March 1159 pm (digital copy to Canvas)Essa.docx
DUE DATE Sunday, 29 March 1159 pm (digital copy to Canvas)Essa.docxmadlynplamondon
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLexume1
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11captsbtyagi
 
How Competitive Intelligence Helps Professional Service Firms Succeed
How Competitive Intelligence Helps Professional Service Firms SucceedHow Competitive Intelligence Helps Professional Service Firms Succeed
How Competitive Intelligence Helps Professional Service Firms SucceedIntelCollab.com
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaLizbethQuinonez813
 
James Joyce Dubliners Essay Topics
James Joyce Dubliners Essay TopicsJames Joyce Dubliners Essay Topics
James Joyce Dubliners Essay TopicsAngel Morris
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesBlake Carver
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Free Printable Christmas Stationery Unlined - Printa
Free Printable Christmas Stationery Unlined - PrintaFree Printable Christmas Stationery Unlined - Printa
Free Printable Christmas Stationery Unlined - PrintaKatie Williams
 
Respond to two of your colleagues in one or more of the following .docx
Respond to two of your colleagues in one or more of the following .docxRespond to two of your colleagues in one or more of the following .docx
Respond to two of your colleagues in one or more of the following .docxaudeleypearl
 
Respond to two of your colleagues in one or more of the following .docx
Respond to two of your colleagues in one or more of the following .docxRespond to two of your colleagues in one or more of the following .docx
Respond to two of your colleagues in one or more of the following .docxwilfredoa1
 
Essay Verbs Discuss. Online assignment writing service.
Essay Verbs Discuss. Online assignment writing service.Essay Verbs Discuss. Online assignment writing service.
Essay Verbs Discuss. Online assignment writing service.Heather Hughes
 

Ähnlich wie PORTFOLIO_2016_ONLINE (20)

GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
The data science revolution in insurance
The data science revolution in insuranceThe data science revolution in insurance
The data science revolution in insurance
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
Choose 3 to do, one page 1.5 space for each. Deadline is 18th 1 pm.docx
Choose 3 to do, one page 1.5 space for each. Deadline is 18th 1 pm.docxChoose 3 to do, one page 1.5 space for each. Deadline is 18th 1 pm.docx
Choose 3 to do, one page 1.5 space for each. Deadline is 18th 1 pm.docx
 
Essay On Psalm 51. Online assignment writing service.
Essay On Psalm 51. Online assignment writing service.Essay On Psalm 51. Online assignment writing service.
Essay On Psalm 51. Online assignment writing service.
 
DUE DATE Sunday, 29 March 1159 pm (digital copy to Canvas)Essa.docx
DUE DATE Sunday, 29 March 1159 pm (digital copy to Canvas)Essa.docxDUE DATE Sunday, 29 March 1159 pm (digital copy to Canvas)Essa.docx
DUE DATE Sunday, 29 March 1159 pm (digital copy to Canvas)Essa.docx
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11
 
How Competitive Intelligence Helps Professional Service Firms Succeed
How Competitive Intelligence Helps Professional Service Firms SucceedHow Competitive Intelligence Helps Professional Service Firms Succeed
How Competitive Intelligence Helps Professional Service Firms Succeed
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
 
James Joyce Dubliners Essay Topics
James Joyce Dubliners Essay TopicsJames Joyce Dubliners Essay Topics
James Joyce Dubliners Essay Topics
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
GITA April 2015 Newsletter
GITA April 2015 NewsletterGITA April 2015 Newsletter
GITA April 2015 Newsletter
 
Free Printable Christmas Stationery Unlined - Printa
Free Printable Christmas Stationery Unlined - PrintaFree Printable Christmas Stationery Unlined - Printa
Free Printable Christmas Stationery Unlined - Printa
 
Respond to two of your colleagues in one or more of the following .docx
Respond to two of your colleagues in one or more of the following .docxRespond to two of your colleagues in one or more of the following .docx
Respond to two of your colleagues in one or more of the following .docx
 
Respond to two of your colleagues in one or more of the following .docx
Respond to two of your colleagues in one or more of the following .docxRespond to two of your colleagues in one or more of the following .docx
Respond to two of your colleagues in one or more of the following .docx
 
Essay Verbs Discuss. Online assignment writing service.
Essay Verbs Discuss. Online assignment writing service.Essay Verbs Discuss. Online assignment writing service.
Essay Verbs Discuss. Online assignment writing service.
 

PORTFOLIO_2016_ONLINE

  • 2. Kristin J. Ingersoll Kristin Ingersoll ~ Resume I am an Instructional Designer and e-Developer with a unique professional background. I bring national television production experience as well as a depth of instructional design experience. I’ve worked for large, Fortune 500 companies and small consulting companies and can work well in either environment. Most importantly, I truly love what I do and have found it to be a great blend of my creative streak, my enjoyment of people and analysis, and my flair for organizing information so others can understand, retain, and apply it.
  • 3. Kristin J. Ingersoll Kristin Ingersoll ~ Resume
  • 4. Kristin J. Ingersoll Kristin Ingersoll ~ Resume
  • 5. Kristin J. Ingersoll Kristin Ingersoll ~ Resume
  • 6. Kristin J. Ingersoll Briljent: HEWLETT PACKARD ENTERPRISE Standard Pages – A Sampling I used PowerPoint for storyboarding and Articulate Storyline 2 to develop the courses. The subject matter ranged, but most courses included interactivities designed to keep learners engaged.
  • 7. Kristin J. Ingersoll Briljent: HEWLETT PACKARD ENTERPRISE This was a multi-step activity to help students learn how to fill out a report. For this exercise, I used layers, with a trigger to show “incomplete” if the user clicked NEXT before completion. I also used button states with variables, triggered to display when the user entered incorrect information. Interactive Activities
  • 8. Kristin J. Ingersoll Briljent: HEWLETT PACKARD ENTERPRISE Learning Checks – A Sampling External-facing courses for Medicare/Medicaid providers are available here: http://provider.indianamedicaid.com/general- provider-services/provider-education/provider- healthcare-portal-training.aspx
  • 9. Kristin J. Ingersoll OneAmerica: One Day is Today! Course Designed for OneAmerica Sales and Marketing: • eLearning developed using ReadyGo! Software • Introduced Sales and Marketing Representatives to resources available to them for customer meetings • Embedded videos, links to website, best practice testimonials • Linked to resources on SalesForce
  • 10. Kristin J. Ingersoll OneAmerica: Distributions 101 Course Designed for OneAmerica Distributions Department – New Employee Orientation: • Two Day Instructor-Led Course • New Employees sat at individual computers in lab • Instructor presented software, procedures, job aids • Each Pit Stop included quiz • Comprehensive Exam
  • 11. Kristin J. Ingersoll Department of Defense: Security Awareness
  • 12. Kristin J. Ingersoll Briljent: 508 Transition Project - “Tips & Tricks” Over 6,000 courses were transitioned to Section 508 compliance in 12 months. The client, The Centers for Medicare & Medicaid Services (CMS) needed to make all eLearning courses Section 508 compliant. I led the effort to train the TQC department on 508 rules and regulations. I held ILTs, Lunch & Learns, individual sessions, and sent out “Tips & Tricks” to answer FAQs.
  • 13. Kristin J. Ingersoll Xerox: Instructor Guide for Kraft ILT - “Show Me the Money!”
  • 14. Kristin J. Ingersoll Foreign Services Institute: Storyboard for “Classified and Sensitive Information”
  • 15. Kristin J. Ingersoll National Institutes of Health: Section 508 Text For “Security Awareness” Course Graphic: A plane flies across screen with banner that says, ensuring IT security enables the N I H mission. A series of graphics appears starting with a woman at a computer with a thought bubble that says, I need access twenty four hours a day, seven days a week. Next is a man in front of a monitor with papers on table in front of him, with a thought bubble that says, I need to trust the analysis of my data. Next is a woman in a laboratory, holding a test tube, with a thought bubble that says, I need to protect proprietary formulas. Next is a man on a phone, looking at a folder of papers, with a thought bubble that says, I need to secure patient records. Graphic: A laptop computer appears with a blank screen. Then, a warning text box appears with the words, Password Rejected, with boxes that say okay and cancel. Another warning appears that says, Starting Program Hijack, with boxes that say okay and cancel. A warning text box appears over the Hijack text with large text that says Alert. The computer screen is cleared of all warnings and text appears: What Happened? There are four pop ups on this screen. The first is, Examples of Computer Incidents. When you click that link, a box opens with this text. Bullet 1: You think someone is using a computer without authorization. Bullet 2: Your files look like someone has been tampering with the data. Bullet 3: Sensitive information has been disclosed. Bullet 4: Your computer is acting strange. Additional examples include: hacker attacks, suspected fraud, waste, or abuse of a system, web page defacements, inappropriate use, improper disclosure of sensitive information, inability to access your files, and theft of data (including disks). Report any case of theft to the NIH Help Desk. Users should also contact their local property representative for hardware theft and their ISSO for hardware and data theft. The second pop up is, What Information Should be Reported? When you click that link, a box opens with this text: Keep notes on all aspects of the problem, for example: Bullet 1: Any computer messages, for example: You have received a virus. Bullet 2: What you were doing when the problem occurred. Bullet 3: Details on how the computer is acting. Bullet 4: Are others affected by the problem? Bullet 5: Was sensitive information involved? The third pop up is, N I H Help Desk. When you click that link, the contact information for the N I H Help Desk appears. The local phone number is 3 0 1 4 9 6 4 3 5 7. The toll free phone number is 8 6 6 3 1 9 4 3 5 7. The T T D phone number is 3 0 1 4 9 6 8 2 9 4.The website is H T T P colon backslash backslash I T helpdesk dot N I H dot gov. The last pop up is I S S O. When you click that link, the dictionary will open. The same definition that is on the main screen appears. I S S O is the acronym for Information System Security Officer. Each Institute and Center, or I C, has an I S S O to assist you with security policies, issues, and problems.
  • 16. Kristin J. Ingersoll Eli Lilly & Co: Needs Assessment – Training in Insulin Manufacturing (Building105) This Evaluation was completed for the Eli Lilly eMarketing Group. There was some concern that the general marketing population at Lilly has some misinformation regarding eMarketing and eTactics. Tools employed to determine the needs and recommendations based on a Needs Assessment completed earlier in 2001 included this SWOTI Analysis. It compared the opportunities, threats, strengths, and weaknesses and their interactions.
  • 17. Kristin J. Ingersoll Westbrook Training & Design Engaging Minds; Animating the Ordinary; Creating User-Centered, Cutting-Edge Training Solutions Analyze, design, and develop performance-based interventions. These include: • Blended Learning • eLearning • Instructor-Led (including Instructor and Participant Guides) • Self-study courses • On-the-job training workshops • Curriculum analysis and mapping • Design logos Clients have included: Valerie DeLaCruz Singer