2. Kristin J. Ingersoll
Kristin Ingersoll ~ Resume
I am an Instructional Designer and e-Developer with a unique professional background. I bring national television
production experience as well as a depth of instructional design experience. I’ve worked for large, Fortune 500
companies and small consulting companies and can work well in either environment. Most importantly, I truly love
what I do and have found it to be a great blend of my creative streak, my enjoyment of people and analysis, and my
flair for organizing information so others can understand, retain, and apply it.
6. Kristin J. Ingersoll
Briljent: HEWLETT PACKARD ENTERPRISE
Standard Pages – A Sampling
I used PowerPoint
for storyboarding
and Articulate Storyline 2 to develop
the courses. The subject matter
ranged, but most courses included
interactivities designed to keep
learners engaged.
7. Kristin J. Ingersoll
Briljent: HEWLETT PACKARD ENTERPRISE
This was a multi-step
activity to help students
learn how to fill out a
report.
For this exercise, I used
layers, with a trigger to
show “incomplete” if the
user clicked NEXT before
completion.
I also used button states
with variables, triggered to
display when the user
entered incorrect
information.
Interactive Activities
8. Kristin J. Ingersoll
Briljent: HEWLETT PACKARD ENTERPRISE
Learning Checks – A Sampling
External-facing courses for
Medicare/Medicaid
providers are available here:
http://provider.indianamedicaid.com/general-
provider-services/provider-education/provider-
healthcare-portal-training.aspx
9. Kristin J. Ingersoll
OneAmerica: One Day is Today!
Course Designed for OneAmerica Sales and Marketing:
• eLearning developed using ReadyGo! Software
• Introduced Sales and Marketing Representatives to resources
available to them for customer meetings
• Embedded videos, links to website, best practice testimonials
• Linked to resources on SalesForce
10. Kristin J. Ingersoll
OneAmerica: Distributions 101
Course Designed for OneAmerica Distributions Department – New
Employee Orientation:
• Two Day Instructor-Led Course
• New Employees sat at individual computers in lab
• Instructor presented software, procedures, job aids
• Each Pit Stop included quiz
• Comprehensive Exam
12. Kristin J. Ingersoll
Briljent: 508 Transition Project - “Tips & Tricks”
Over 6,000 courses were
transitioned to Section 508
compliance in 12 months.
The client, The Centers for
Medicare & Medicaid Services
(CMS) needed to make all
eLearning courses Section 508
compliant. I led the effort to train
the TQC department on 508 rules
and regulations. I held ILTs, Lunch
& Learns, individual
sessions, and sent out
“Tips & Tricks” to
answer FAQs.
15. Kristin J. Ingersoll
National Institutes of Health: Section 508
Text For “Security Awareness” Course
Graphic: A plane flies across screen with banner that says,
ensuring IT security enables the N I H mission. A series of
graphics appears starting with a woman at a computer with a
thought bubble that says, I need access twenty four hours a
day, seven days a week. Next is a man in front of a monitor
with papers on table in front of him, with a thought bubble
that says, I need to trust the analysis of my data. Next is a
woman in a laboratory, holding a test tube, with a thought
bubble that says, I need to protect proprietary formulas.
Next is a man on a phone, looking at a folder of papers, with
a thought bubble that says, I need to secure patient records.
Graphic: A laptop computer appears with a blank screen.
Then, a warning text box appears with the words, Password
Rejected, with boxes that say okay and cancel. Another
warning appears that says, Starting Program Hijack, with
boxes that say okay and cancel. A warning text box appears
over the Hijack text with large text that says Alert. The
computer screen is cleared of all warnings and text appears:
What Happened?
There are four pop ups on this screen. The first is, Examples
of Computer Incidents. When you click that link, a box opens
with this text. Bullet 1: You think someone is using a
computer without authorization. Bullet 2: Your files look like
someone has been tampering with the data. Bullet 3: Sensitive information has been disclosed. Bullet 4: Your
computer is acting strange. Additional examples include: hacker attacks, suspected fraud, waste, or abuse of a system,
web page defacements, inappropriate use, improper disclosure of sensitive information, inability to access your files,
and theft of data (including disks). Report any case of theft to the NIH Help Desk. Users should also contact their local
property representative for hardware theft and their ISSO for hardware and data theft.
The second pop up is, What Information Should be Reported? When you click that link, a
box opens with this text: Keep notes on all aspects of the problem, for example: Bullet 1:
Any computer messages, for example: You have received a virus. Bullet 2: What you
were doing when the problem occurred. Bullet 3: Details on how the computer is acting.
Bullet 4: Are others affected by the problem? Bullet 5: Was sensitive information
involved? The third pop up is, N I H Help Desk. When you click that link, the contact
information for the N I H Help Desk appears. The local phone number is 3 0 1 4 9 6 4 3 5
7. The toll free phone number is 8 6 6 3 1 9 4 3 5 7. The T T D phone number is 3 0 1 4 9 6
8 2 9 4.The website is H T T P colon backslash backslash I T helpdesk dot N I H dot gov.
The last pop up is I S S O. When you click that link, the dictionary will open. The same
definition that is on the main screen appears. I S S O is the acronym for Information
System Security Officer. Each Institute and Center, or I C, has an I S S O to assist you with
security policies, issues, and problems.
16. Kristin J. Ingersoll
Eli Lilly & Co: Needs Assessment – Training in Insulin
Manufacturing (Building105)
This Evaluation was completed for the Eli Lilly eMarketing Group. There was some concern that the general
marketing population at Lilly has some misinformation regarding eMarketing and eTactics.
Tools employed to determine the needs and recommendations based on a Needs Assessment completed
earlier in 2001 included this SWOTI Analysis. It compared the opportunities, threats, strengths, and
weaknesses and their interactions.
17. Kristin J. Ingersoll
Westbrook Training
& Design
Engaging Minds; Animating the Ordinary; Creating User-Centered, Cutting-Edge Training Solutions
Analyze, design, and develop performance-based interventions.
These include:
• Blended Learning
• eLearning
• Instructor-Led (including Instructor and Participant
Guides)
• Self-study courses
• On-the-job training workshops
• Curriculum analysis and mapping
• Design logos
Clients have included:
Valerie DeLaCruz
Singer