Demand for UX designers is on the rise with a 10-year job growth (2014-24) forecast of 19% according to CNNMoney/Payscale's top 100 careers. The field of User Experience and User Interface web design is one of the most popular areas of expertise in web development / app development today.
Introduction to the WordPress Content Management Systems (CMS).
Have you ever wondered how WordPress plugins work? Now is your chance to learn.
Join us for a two-part workshop about WordPress Plugins.
Part 1: What is a plugin? What does it do? How does it do it? How can I use them?
What is IT support? Companies rely on technology everyday, but sometimes that technology fails us. Computers break, systems fail, phones die; and when that happens, we need experts to fix them. IT support is all about troubleshooting and problem solving when the tech fails, and providing great customer service along the way.
This course is the second of a series that aims to prepare you for a role as an entry-level IT Support Specialist
This course is designed to provide a full overview of computer networking. We’ll cover everything from the fundamentals of modern networking technologies and protocols to an overview of the cloud to practical applications and network troubleshooting.
By the end of this course, you’ll be able to:
it's time to navigate the Windows and Linux Operating Systems or OSs. Learning Linux doesn't have to be scary. It's not impossible to use Windows commands and it's certainly not difficult to get started.
While this course will have some conceptual learning, we will focus more on the practical aspects of the operating system. Not only when you learn how to use the Windows and Linux OSs, we'll also teach you how to interact with these operating systems through the command line.
IT infrastructure encompasses the software, the hardware, network, and services required for an organization to operate in an enterprise IT environment.
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options.
Developing a data-driven culture in the small business is a daunting task, especially during this time of economic recovery. In this hands-on workshop, attendees are introduced to a framework for data-driven decision-making. Using a step-by-step approach, the information used in the planning process is used to transformed into an action plan for implementation.
Small or medium business (SMB) generates data, lots of data. Are we using it?
This data is a rich resource but many SMBs are held back from benefiting from that data because of the following factors: