PromptBase
Close icon
Explore
Marketing & BusinessDown chevron icon
General
Home
Marketplace
Apps
Create
Hire
Login
Sell
Outlined heart icon
🤖 GPT

Rise 360 Elearning Course Development

Rise 360 Elearning Course Development gpt prompt mini thumbnail
34Eye icon
Views
TestedTick icon
TipsTick icon
Dive into a streamlined ELearning course creation experience for RISE 360. This prompt will help you design a comprehensive course, using Instructional Design theory tailored to your needs, its variety of block types—including text, media, interactive, and engagement options—facilitates a rich learning environment.
...more
$3.99
Get prompt
Add to cart icon
After purchasing, you will gain access to the prompt file which you can use with GPT or the app builder. You'll receive 20 free generation credits with this purchase. By purchasing this prompt, you agree to our terms of service.
Updated: 4 months ago

Prompt Details

Model
Chat - GPT-4 (gpt-4)
Token size
716 ($0.02150 / call)
Example input
Provide the following variables: [Duration]: e.g., 4 weeks [Audience]: e.g., New Software Developers [Topic]: e.g., Introduction to Machine Learning [Learning Objectives]: e.g., Understanding fundamental concepts and practical applications of machine learning
Example output
Course Introduction Statement Block: "Embark on Your Cybersecurity Journey: Equip yourself with essential knowledge and skills to safeguard digital assets against ever-evolving cyber threats." Interactive Image: A graphical representation of the cybersecurity landscape. Clickable areas include key terms like "malware," "phishing," and "encryption," each providing a brief definition. Module 1: Understanding Cybersecurity Text Block: "What is Cybersecurity? Cybersecurity is the practice of defending computers, networks, and data from malicious attacks. It's about understanding the landscape of cyber threats and knowing how to protect yourself and your organization." Media Block: A 3-minute video highlighting the importance and impact of cybersecurity, with real-world examples of cyberattacks and their consequences. List Block: Bullet list of common cyber threats: Malware, Phishing, Man-in-the-Middle attacks, etc., with a brief description of each. Engagement Block (Process): An interactive step-by-step flowchart showing how a typical phishing attack happens, from the initial email contact to data breach. Knowledge Check: Multiple-choice questions about basic cyber threats. Example: "Which of these is a common method used by cybercriminals to trick people into giving out confidential information?" Module 2: Fundamentals of Protecting Information……
Browse Marketplace