A) Bidders will build upon the Needs Assessment, found in Section 3.2 of the Washington State Digital Equity Plan, to conduct a needs assessment that identities specific cybersecurity concerns and cybersecurity literacy gaps for each Covered Populations selected. 1. The needs assessment for each Covered Populations selected will include: i. Quantitative Methods: Administer surveys, questionnaires, and other tools for collecting numerical data. P a g e | 2 ii. Qualitative Methods: Conduct interviews, focus groups, and observations for gathering descriptive data. iii. Secondary Research: Reviewing existing data and research from external sources to complement primary data collection. 2. Bidders will complete and submit the needs assessment(s) to Commerce by the third month of the project. B) Bidders will design and develop a minimum of nine training modules, with at least 45 minutes of content per module, that cover the topics and subtopics listed below. Bidders may add additional modules that address cybersecurity concerns and cybersecurity literacy gaps identified by selected Covered Populations. 1. Introduction to cybersecurity o Definition and importance of cybersecurity o Common cyber threats and attacks o Cultural perspectives on privacy and security. 2. Online Safety o Safe browsing and searching habits o Password Management and authentication o Social Media privacy and online presence 3. Device and Network Security o Securing devices and software updates o Home network security and Wi-Fi safety. o Public Wi-Fi and mobile hotspot security 4. Data Protection and Privacy o Personal information and data sharing o Online transactions and shopping safety o Identity theft and fraud protection 5. Cyber Etiquette and Digital Citizenship o Online communication and etiquette o Digital footprint and reputation management o Cyberbullying and online harassment prevention 6. Advanced Threats and Defenses o Phishing, ransomware and malware prevention o Two-factor authentication and biometrics o Incident response and reporting 7. Community Engagement and Leadership o Cybersecurity advocacy and awareness o Community resources and support networks o Leadership roles in promoting cyber safety 8. Next Generation of Cybersecurity o Using AI/Artificial Intelligence o How to identify “deep fakes” o Media literacy o How to protect your online identity 9. Preparing the Workforce for Generative AI in Workforce Transformation o Affected industries o Job skills training and upskilling o Fail fast and quickly apply lessons learned