Skip to content

Hi, my name is

Joseph Black.

I build digital learning experiences and dig into cybersecurity.

I'm an instructional systems designer with a background in military service and adult education. I recently completed a M.S. in Cybersecurity Technology and am working toward a D.Sc. in Cybersecurity at Marymount University.

Let's connect.

About

Hello! My name is Joseph. I specialize in instructional design and cybersecurity, two disciplines that have always been complementary for me.

My background includes military service as a Combat Medic, followed by over a decade in adult education. Today I work as an instructional systems specialist, building e-learning content and training programs.

I recently completed a M.S. in Cybersecurity Technology (4.0 GPA) and am pursuing a D.Sc. in Cybersecurity at Marymount University, with a focus on applied research, enterprise risk management, and governance.

Outside of work I'm interested in leadership, philosophy, and research, areas that continue to shape how I approach both training design and technical problem-solving.

Here are a few tools and technologies I've been working with recently:

  • Python
  • Java
  • JavaScript / Node.js
  • SAP SuccessFactors
  • Lectora (SCORM 1.2)
  • Nmap
  • Wireshark
  • Metasploit
  • Nessus
  • Kali Linux
  • Autopsy
  • FTK Imager
  • Volatility
  • Burp Suite
  • CyberChef
  • Ghidra
Joseph Black

Experience

Instructional Systems Specialist @ Federal Bureau of Prisons

Aug 2023 – Present

  • Design and deliver e-learning content and instructor-led training for national correctional programs under the Federal Bureau of Prisons.
  • Integrate SCORM-compliant content into the agency's LMS (SAP SuccessFactors), ensuring ADA accessibility and cybersecurity standards are met.
  • Develop multimedia and animation for training delivery using tools like Adobe Creative Cloud, Lectora, and JavaScript-based frameworks.
  • Collaborate with subject matter experts and national policy stakeholders to modernize federal training initiatives and reduce reliance on print media.

Education

D.Sc. Cybersecurity (Planned) @ Marymount University

May 2026 - May 2029

  • Pending admission to the Doctor of Science (D.Sc.) in Cybersecurity, a doctorate program emphasizing applied research, enterprise risk management, and governance, with additional focus on emerging technologies, infrastructure security, and national/global policy.
Click to view completed and upcoming coursework
IT 850 Dissertation and Oral Defense Designs

This course is the culminating experience of the doctoral research experience. The purpose of the course is to successfully prepare the written dissertation based on previous original applied research and to present its oral defense.

IT 840 Applied Research: Dissertation Data Collection and Analysis

During this course the doctoral student will collect and analyze data to further the dissertation research developed in previous courses. The purpose of this course is to complete an original piece of applied research which will contribute to the development of the cybersecurity field. At the end of the course, the doctoral student must have completed the analysis phase of the dissertation and be ready to complete the writing process.

IT 830 Applied Research: the Dissertation Proposal

In this course, doctoral students will develop the documentation for approval of their research topic and overall research plan, obtain approval from their advisor, and submit their dissertation proposal for approval by the Faculty Dissertation Committee. Students will evaluate which type of IRB submission is appropriate and prepare the material for its timely submission. The student will also be guided in a professional literature review on their chosen topic and develop a clear understanding of past work in their field.

IT 820 Applied Research: Qualitative and Quantitative Research

In this course, doctoral students will be exposed to the overall research design process through the analysis of knowledge claims, strategies of inquiry, and the development phases of the research project. The course examines how to consider external factors and how they are applied to the quantitative, qualitative, and mixed methods research methodologies. In addition, this course will provide the student with an introduction to questionnaire design.

IT 810 Applied Research Topics and Methods in Cybersecurity

In this course, doctoral students will begin to develop the applied research concept in the cybersecurity field. Students examine the state of cybersecurity research and the roadmaps established at the national and international levels. It is designed to provide an increased understanding of the philosophy of science and the nature of scientific thinking. The doctoral students identify researchable topics, the use of existing knowledge to act as a basis for the research project, and the use of information systems to support the identification of known information and data. The course prepares students to be cybersecurity leaders who are able to use applied research to refine and improve cybersecurity practices through evidence-based techniques.

IT 800 Beginning Applied Research in Cybersecurity

This course prepares doctoral students for the applied research process in the cybersecurity field. Students review APA guidelines and look at the special requirements for academic writing. They start thinking of issues in the field that could benefit from additional research, and they begin to examine the literature research and writing process to develop these ideas into potential dissertation topics. Students also analyze past work and consider ethical issues that might occur during the conduct of cybersecurity research.

IT 757 Cyber Threat Intelligence

This doctoral-level course covers the cyber threat intelligence landscape, including tactical, operational, and strategic dimensions. It includes open source intelligence techniques and social media intelligence techniques as well as mobile app intelligence-gathering techniques. Investigational strategies, such as counter intelligence methods and attribution, are also discussed.

IT 755 Global and National Cybersecurity Policy

This doctoral course explores global and national cybersecurity policy, examining the laws, regulations, and policies that have the potential to enhance national security and foster innovation in cybersecurity and technology. Featured guest lecturers will discuss current topics, with attention to national and international efforts. Students will have the opportunity to submit (and potentially publish) in the Journal of National Science Policy and Governance.

IT 747 Cybersecurity in the Systems Life Cycle

This doctoral-level course integrates cybersecurity concepts, principles, tools, and techniques into the system life cycle, including acquisition and purchasing of technology, security requirements definition during requirements analysis, secure software coding practices, auditing processes for production systems, cyber insurance considerations, and communication security issues with upper management and the board.

IT 745 Machine Learning in Cybersecurity

This doctoral course explores machine learning models and algorithms for today's business world and in cybersecurity in particular. The course focuses on both understanding the theory of machine learning approaches, and their reliance on trustworthy and unbiased data. Doctoral students will be expected to research the emerging role of machine learning and artificial intelligence in cybersecurity, predict its impact in cybersecurity globally, and develop an application. Topics include supervised, unsupervised, and deep learning, fundamental algorithms such as linear regression, decision tree learning, classification and support vector machines, and researching applications for these techniques. Students research and discuss how machine learning and natural language processing (NLP) are used in cybersecurity, both for attack by adversaries and defense by government and industry.

IT 737 Securing the Evolving Technology Infrastructure

This doctoral-level course examines the cybersecurity challenges of the constantly changing computing infrastructure with its increasing reliance on the Internet and the rise of additional threats posed by cloud computing, mobile computing, integration of the Internet of Things, automated industrial control systems, use of hardware built in other countries, and the risk of other critical infrastructures. This course examines the cybersecurity challenges of interrelated systems across the global landscape and the different techniques used to protect computers and data, with particular emphasis on sectors such as transportation, utilities, health care, financial services, and manufacturing.

IT 727 Managing Cybersecurity Risk

This doctoral-level course covers all aspects of the management of the risk of cyber attack and covers the foundations for the thoughtful and purposeful development of cyber defense strategies in any organization. In general, there are too many threats and potential vulnerabilities but not enough money and resources to protect all the digital assets in organizations, particularly those connected to the Internet. This courses covers the strategic decision-making process, including formal methodologies, as to which assets to defend and why.

Other Projects

Get In Touch

I'm open to conversations about cybersecurity, instructional design, or research. If you'd like to connect, feel free to reach out.

Send a message