IT-Learning: 21992 producten
Presenting Technical Information with Stories
Technical information can be dry and hard to understand. But that doesn’t mean your presentation has to be. Storytelling can transform te…
Android Studio Essential Training 2020
Software developers who want to build Android apps need Android Studio—the official Google IDE. Android Studio is based on IntelliJ IDEA …
SAS® 9.4 Cert Prep: Part 02 Accessing Data
Want to get ahead in a crowded job market? Get certified with SAS. This course is part of a series by the SAS Institute, designed to prepar…
Digital Strategy
Digital disruption is changing every business. Only a decade ago, the auto industry was well-defined by players such as GM, Ford, and Toyot…
Big Picture Thinking for Financial Risk Analysis
Analyzing a company’s financial information can be almost meaningless without first ensuring you have a proper sense of context. This cou…
Microsoft Mesh and New Meeting Features in Microsoft Teams
Jump into the new version of Teams, also known as Teams 2.0, to use new and improved features for group video meetings. Instructor Nick Bra…
How to Articulate Your Value to Your Boss
Effectively articulating your value at work is essential for career advancement. In this course, seasoned career coach Cristina Costa provi…
Pricing Strategy: Value-Based Pricing
Are you charging the price you deserve? You might be able to increase revenue through value-based pricing, a strategy in which you set pric…
One Minute Motivational Tips for Songwriters
Songwriters sometimes encounter creative roadblocks. Even the most passionate musicians can get discouraged. In this course, Cliff Goldmach…
Learning Zsh
The Z-Shell, or Zsh, is a powerful shell that helps you get your command-line tasks done quickly and effectively. It’s widely available a…
Practice Exam 3 for ISC2 Certified in Cybersecurity (CC)
This practice exam is intended to help you prepare for the ISC2 Certified in Cybersecurity (CC) certification exam. After you launch the pr…
Cert Prep: Word Expert - Microsoft Office Specialist for Office 2019
Demonstrate your mastery of Word by becoming a Microsoft Office Specialist (MOS) Expert. Get training to prepare for the MOS Word Expert ce…
Threat Modeling: Tampering in Depth
Threat modeling allows security pros and software developers to proactively address the inevitable—hackers trying to compromise a systemâ…
Safeguarding Customer Credit Card Data: PCI Compliance (2019)
How are credit card payments processed behind the scenes? And when a credit card is stolen, what usually happens to the compromised data? I…
Practical Success Metrics in Your Training Program
Training is hard Practical Success Metrics in Your Training Program Doelgroep Iedereen die zich verder wil verdiepen in dit onderwerp en zi…