IT Basics and using the internet safely

Deze training is helaas verwijderd door Web Infra Academy (EN). Bekijk hieronder de ervaringen van deelnemers, de alternatieven, of klik via de navigatie terug naar het overzicht van het hele aanbod in dit onderwerp.

check_box_outline_blank

Introduction to Generative AI

Logo van Xebia Academy
|META_INFO|

What will you learn? After the training, you will be able to: Explain what Generative AI is and what makes it different from earlier forms …

check_box_outline_blank

Introduction to Generative AI

Logo van Xebia Academy
|META_INFO|

What will you learn? After the training, you will be able to: Explain what Generative AI is and what makes it different from earlier forms …

check_box_outline_blank

Data Compliance with Microsoft Purview

Logo van D-Data
Startgarantie
|META_INFO|

In this training, you will learn how to use Microsoft Purview to manage information, ensure compliance and reduce risk within your organiza…

check_box_outline_blank

Computer Privacy and Security Essential Training (2006)

Logo van IT-Learning
|META_INFO|

The Internet is an unmatched resource for home, education, and business. And no matter where and how you are using the Internet, it is crit…

check_box_outline_blank

Metaverse and NFTs for Marketing

Logo van IT-Learning
|META_INFO|

Have you tried to imagine where the internet is headed? While it may be dizzying to think about, the metaverse is poised to play a fundamen…

check_box_outline_blank

Cybersecurity at Work (2020)

Logo van IT-Learning
|META_INFO|

Cybersecurity isn't solely within your IT department's purview. If you own a smartphone, work on a computer, or use the internet, then you'…

check_box_outline_blank

Cybersecurity at Work

Logo van IT-Learning
|META_INFO|

Cybersecurity doesn’t fall solely within your IT department's purview. If you own a smartphone, work on a computer, or use the internet, …

check_box_outline_blank

Internet Safety for Students

Logo van IT-Learning
|META_INFO|

Along with being a core part of building digital citizenship, internet safely is an essential skill for students. This course explores how …

check_box_outline_blank

How to Conduct a Phishing Email Investigation

Logo van IT-Learning
|META_INFO|

According to the email security platform GreatHorn, phishing is the number one threat vector of all online breaches. But what exactly is a …

check_box_outline_blank

Web Security: OAuth and OpenID Connect (2018)

Logo van IT-Learning
|META_INFO|

While many technical professionals claim to know and understand OAuth, reality often suggests otherwise. Implementing the proper grant type…