pagetop
bug_report
Report a bug
cloud_upload Upload

Technology


65 results
StrictlyStuff 2 enrollments • 1 likes

This course introduces the learner to information technology concepts and major arguments and gambits in moral philosophy. Lessons: 1. Permission, Persuasion, and Contracts 2.…

Free course
Safted 2 enrollments • 0 likes

This course, focuses on introducing the student to the Android environment, the User Interface, and User Variables. This is the first of a series of three courses that combined…

Free course
Safted 2 enrollments • 0 likes

This module would typically be part of an introductory SQL course. It should be scheduled late in the term after students have a fair amount of SQL practice.

Free course
ITeam 2 enrollments • 1 likes

The Data Protection module covers topics on - your responsibilities toward data privacy - data destruction standards - and dangers of leaving private/confidential information out…

Free course
AlShamoon 2 enrollments • 0 likes

The Business Email Compromise (BEC) Scams module covers topics on: - identifying BEC scams, - differentiating between the three main types of BEC scams and - reporting a suspected…

Free course

Contracts Part 1 mode_edit Editable

Your Team 1 enrollments • 0 likes

A course covering the basic contract rules that are most commonly used, and featured on both Compucare 7 and Compucare 8.

Free course

From template Chemistry Lab mode_edit Editable

Your Team 1 enrollments • 0 likes

We practice chemistry everyday

Free course
Your Team 1 enrollments • 2 likes

Mindfulness into Action comienza con la reflexión de que muchos problemas personales y sociales se dan por suposiciones que tenemos a un nivel del subconsciente. Actuando en este…

Free course
TuitionDepartment 1 enrollments • 0 likes

Course Introduction This course introduces advanced concepts in information security management. Students will utilize critical thinking and problem solving skills to develop an…

Free course
Alownd 1 enrollments • 0 likes

The Spear Phishing module covers topics on: why spear phishing poses a threat to our organization, the three types of spear phishing emails, and the indicators of a spear phishing…

Free course
keyboard_arrow_up Top