You searched for: ""

  • 1 Day ILT, VILT

    Elevate Your Expertise with Advanced Excel Training

    Looking to supercharge your Microsoft Excel skills? Our ‘Microsoft Excel 2021 Advanced’ course is your ticket to unlocking the full potential of this powerful tool. Whether you’re a clerk, executive, manager, or just someone passionate about mastering Excel, this course is tailor-made for you. We’ve designed it to take your existing Excel knowledge to the next level, helping you excel in your professional endeavors.

  • 0.5 Days VILT

    How teams of all sizes connect, create and collaborate.

    Imagine a workplace where collaboration is effortless and seamless. In this training, you will learn the modern solution that transforms the way teams work together. With sharing tools, working on presentations becomes a truly engaging experience. Picture a group of people effortlessly working on a single document, simultaneously, in perfect harmony.

    This dynamic 3-hour course is designed to empower individuals and teams with the skills to foster true collaboration within the workplace using the powerful suite of tools provided by Google Workspace.  

  • 0.5 Days VILT

    Flexible collaboration tools designed for all the ways that work is changing.

    This 3-hour course is designed for end-users transitioning from Office 365 to Google Workspace, focusing on managing files and file permissions. Learn how to easily move your data, share files securely, and collaborate effectively with others using the powerful tools of Google Drive. 

  • 0.5 Days VILT

    Unleash Productivity with Gmail – The Heart of Google Workspace’s Communication Tools.

    Ever feel overwhelmed by your inbox? Discover the hidden power of Gmail and become a productivity pro with this 3-hour course. Learn essential features that pro users swear by, from mastering inbox organization and advanced collaboration tools to maximizing security and privacy. 

  • 0.5 Days VILT

    Google Workspace: Transforming the Digital Landscape with Integrated and Intuitive Tools for Every Business.

    Embark on a transformative learning journey with our immersive 3-hour course, tailored to empower participants, this course is strategically designed to equip individuals with the expertise to effortlessly manage large-scale events. Participants will gain practical insights into creating seamless event management processes, enhancing collaboration, and streamlining communication through the integration of Google Forms. 

  • 1 Day

    This course teaches developers, database administrators, and system programmers various features of SQL, including column functions, grouping, unions, subqueries, and maintaining data.

    Note: Guided eLearning is a self-paced offering which includes web-based content for self-study and videos (including audio) that demonstrate activities.

    If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.

  • 1 Day SPVC

    This course is intended for Developers, Database Administrators, and System Programmers who require further insight into the SQL language.

    Note: Guided eLearning is a self-paced offering which includes web-based content for self-study and videos (including audio) that demonstrate activities.

    If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.

  • 0.5 Days ILT, VILT

    Defending Digital Frontiers: An Intensive Security Awareness workshop.

    This SAW1: Security Awareness Workshop Level 1 course aims to stimulate the intensity and need of Security among the user. This workshop is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats & Attacks and Cyberattack.

    Every single user is accountable for ensuring that their respective systems are protected against unauthorized access. The ability of a business to protect its information systems from being corrupted or even stolen is directly correlated to the level of that business’s overall success. The implementation of effective security measures will not only result in increased efficiency and productivity, but it will also provide protection from liability. This is due to the fact that the measures will prevent potential risks.

    This is done with the intention of fostering an environment within an organization that is security-conscious, as well as providing direction on how to effectively respond to security incidents and reduce the risk that is posed by cyberattacks.

    Training for security awareness should be a priority at every organization, but it should be especially important at organizations that are embracing digitalization. Employees who are working on computers, laptops, or other devices present an easy target for cybercriminals who are looking to take advantage of their victims’ lack of awareness.

    An effective security awareness training practice in an organization can motivate employees to take part in security awareness programs and attend security-related events, which in turn equips them to defend the organization against cybersecurity risks.

    Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.

  • 1 Day WBT

    This course is designed to introduce students to IBM Data Science Experience. The course covers how to create and set up a project and to be familiar with how to create, code, collaborate, and share notebooks while working with a variety of data sources to analyze data.

    If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course.

  • 1 Day WBT

    This offering teaches cloud database support staff how to manage access of users and privileges to a dashDB for Analytics or dashDB for Transactions database.

    Note: Guided eLearning is a self-paced offering which includes web-based content for self study and videos (including audio) that demonstrate the hands-on activity.

    If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms

  • 1 Day ILT, VILT

    IBM FlashSystem 9100 system is an all-flash, powerful end-to-end Non-Volatile Memory Express (NVMe) enterprise storage solution that combines the performance of IBM FlashCore technology.
    FlashSystem 9100 is built on the efficiency of IBM Spectrum Virtualize, and delivered on a proven IBM software solution with extremely low latencies for your multi cloud deployments.

    This course introduces the FlashSystem 9100 NVMe Control Enclosure models: IBM 9846/9848 FlashSystem 9110, Model AF7 and IBM 9846/9848 FlashSystem 9150, Model AF8.
    It also focuses on the integration of FlashSystem 9100 SAS-Attached expansion enclosures; scalability performance with NVMe; and the intuitive sight of IBM Storage Insights which helps optimize the storage infrastructure using predictive analytics.

    If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms

  • 1 Day ILT, VILT

    While everyone’s talking about ChatGPT and Gemini, DeepSeek has been quietly pushing boundaries and catching the attention of AI enthusiasts. In this course, we’ll peel back the curtains on what makes DeepSeek special, and show you how it fits into the bigger AI picture – no buzzwords or marketing fluff, just real talk about what these tools can (and can’t) do.

    We’ll dive into the practical stuff: understanding AI fundamentals, mastering prompt engineering across different models, and discovering where DeepSeek truly shines compared to its more famous cousins. Whether you’re an AI skeptic or enthusiast, you’ll walk away with the skills to cut through the tech jargon and make these tools work for you in meaningful ways. Think of it as your BS-free guide to navigating the AI landscape, with a special spotlight on one of its most intriguing new players.

    Ever wondered how to make AI tools work their magic? You’re in the right place. In this course, we’ll crack the code on getting the most out of AI powerhouses like ChatGPT, Gemini, Claude, and more. Think of it as learning how to speak “AI” fluently – because let’s face it, these tools are everywhere now, and knowing how to use them well is like having a superpower in your back pocket.

    We’ll start by demystifying AI (no computer science degree required!), explore how these large language models actually think (spoiler: it’s fascinating), and then dive into the art of prompt engineering. By the end, you’ll be crafting prompts that make AI tools dance to your tune, whether you’re a creative professional, tech enthusiast, or just curious about making these tools work better for you.

  • 1 Day ILT, VILT

    Strengthening Cyber Defenses: How Your Business Can Stay Ahead of Potential Attacks.

    This CWB: CyberSecurity Workshop For Business course aims to stimulate the intensity and need of cybersecurity awareness among the business users, and is designed to give an exposure on IT Systems Security & Infrastructure, Monitoring Potential Threats and Attacks.

    Each and every organization is accountable for ensuring that their systems are secure. A company’s success is directly proportional to its ability to prevent the corruption or even theft of its information systems. Not only will increasing efficiency and productivity result from the implementation of effective security measures, but it will also provide protection from liability.

    You need to have a solid understanding of the fundamental ideas behind cyberspace before you can design and put into practice any preventative measures against cyberattacks. The approach (or approaches) to cyber security that an organization chooses to implement should be adapted to meet the specific requirements of the organization.

    As was mentioned earlier, the implementation of methods to prevent attacks on a company’s information systems is the essence of what constitutes cyber security. Controlling physical access to the system’s hardware is one aspect of cyber security. Another aspect of cyber security is protecting against potential threats that could arise from network access or the injection of code.

    Participants in our workshop will gain an understanding of both the fundamentals of protecting their computer systems as well as the methods that should be put into practise in order to achieve this goal.

  • 1 Day ILT, VILT

    This Empower your workforce with Copilot for Microsoft 365 Use Cases course is composed of two parts – Getting started with Copilot for Microsoft 365 and Empower your workforce with Copilot for Microsoft 365 Use Cases. The first part of the course introduces you to Copilot for Microsoft 365, examines how you can use Copilot throughout the various Microsoft 365 apps, explores best practices for using Copilot and building effective prompts, and examines how you can extend Copilot with plugins and Graph connectors.

    The second part of this training content is really the heart of this course. Students perform a series of hands-on exercises involving seven Use Cases – Executives, Sales, Marketing, Finance, IT, HR, and Operations. These exercises focus on using Copilot in various Microsoft 365 apps (such as Word, PowerPoint, Outlook, and so on) to complete a series of common business-related tasks pertaining to each Use Case.

    To complete the Use Case exercises in this course, each student must have access to a Microsoft 365 subscription (BYOS) in which they’re licensed to use Copilot for Microsoft 365. Each student must also have a Microsoft OneDrive account, since Copilot requires OneDrive to complete the file sharing tasks used throughout the Use Case exercises.

    Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world. 

     Check it out – Microsoft Lead The Era of AI 

  • 1 Day ILT, VILT

    Craft effective prompts for Microsoft Copilot for Microsoft 365

    Discover ways to craft effective and contextual prompts for Microsoft Copilot for Microsoft 365 that create, simplify, transform, and compile content across Microsoft 365 applications. Learn the importance of providing a clear goal, context, source, and expectation in your prompt for the best results. This course covers real world scenarios and examples using Copilot in Microsoft 365 apps like Word, Excel, PowerPoint, Teams, Outlook, OneNote, and Chat.

    Empower Your Career with Microsoft AI Skills! Join our hands-on courses to build the expertise today’s industries demand. Master AI applications and position yourself as a leader in the digital world. 

     Check it out – Microsoft Lead The Era of AI 

  • 1 Day ILT, VILT

    This course examines how administrators can manage and extend Microsoft 365 Copilot to meet their business needs. The course introduces you to Copilot, examines how to implement and administer it, and then explores the fundamentals of Copilot extensibility.

  • 1 Day ILT, VILT

    Cloud Security: Essential Knowledge for the Modern Tech Professionals.

    The CSF1: Cloud Security Fundamental Level 1 course provides a brief introduction to information security risks associated with cloud computing. Students can use this course to review what they already know about cloud security and to pinpoint any gaps in their understanding. Students who are interested in working with cloud technology or who will be part of an organisation transitioning to the cloud will benefit from this course.

    Our trainers have all passed a rigorous certification process and are proven security professionals with years of industry experience and multiple professional qualifications.

    Cloud security is a set of rules, methods, and technologies that are meant to keep the cloud environment safe and under control. Cloud security can reduce the risks of moving to a cloud environment by using strict access controls, system audits, adherence to global security frameworks, and other measures.

    For those of you who want to use Google Cloud, Microsoft Azure, or Amazon Web Services, cloud security is less about setting up a secure cloud and more about using it securely. After all, these companies have already spent a lot of money to make sure their systems are safe. Still, anyone who wants to set up their own cloud needs to think about more things. These include security architecture, protecting physical infrastructure, disaster recovery, maintenance, and a stable connection.

    Cloud security also helps businesses stay in line with international rules like the General Data Protection Regulation (GDPR). It can also prepare businesses for future rules, which are always being thought about. For example, to follow the GDPR, companies must make sure that their cloud was built with the right architecture and that security and privacy were taken into account throughout the design process. If they don’t, regulators may fine them a lot if a security breach happens.

  • 1 Day ILT, VILT

    Setting the Gold Standard in Cloud Security Training: Dive Deep into Governance. Risk and Compliance (GRC).

    This CSF2: Cloud Security Fundamental Level 2 training offers a concise introduction to the information security risks associated with cloud computing from the perspectives of governance, risk, and compliance. Students have the opportunity to assess their current level of knowledge regarding cloud GRC and to identify any gaps in that knowledge through the use of this course. This class is beneficial for students who either have an interest in working with cloud technology or who are planning to be a part of an organisation that will be transitioning to the cloud.

    Our trainers have all passed a rigorous certification process and are proven security professionals with years of industry experience and multiple professional qualifications.

    Cloud security is a set of rules, methods, and technologies that are meant to keep the cloud environment safe and under control. Cloud security can reduce the risks of moving to a cloud environment by using strict access controls, system audits, adherence to global security frameworks, and other measures.

    Interaction with a variety of stakeholders, including auditors, customers, providers, and internal staff, is essential to the execution of a GRC programme successfully. We will discuss methods that will make it possible for an organization to manage the complicated information flow in a way that is both effective and efficient

  • 1 Day ILT, VILT

    Elevate Your Cyber Defense: Essential Security Awareness Workshop for the Digital Age.

    In a world dominated by digital advancements, cybersecurity isn’t just a term—it’s a necessity. The SAW2: Security Awareness Workshop Level 2 workshop offers a deep dive into the critical realms of IT Systems Security, Infrastructure, and Cyberattack response strategies. We spotlight real-world threats, offering a hands-on experience to gauge, monitor, and thwart potential cyberattacks.

    Every individual holds the key to their digital sanctuary. The success and safety of an organization’s data infrastructure directly hinge upon how well each member shields it from breaches. A proactive approach to security isn’t just about keeping data safe—it boosts operational efficiency, safeguards a brand’s reputation, and fortifies against potential liabilities.

    Our mission transcends basic training. We envision fostering a robust security-first culture across organizations. As the digital frontier expands, so does the playground for cybercriminals. Employees interfacing with digital devices become inadvertent gateways for these breaches. Our workshop serves as a wake-up call, emphasizing the gravity of security in the digital era.

    Prioritizing security awareness isn’t an option—it’s a business imperative, especially for digitally-driven enterprises. By partaking in our program, employees won’t just learn; they’ll evolve into cyber guardians, ready to champion security initiatives, and protect the organization’s digital assets against looming cyber threats. Secure your future by investing in knowledge today.

  • 1 Day

    Welcome to “Supercharging Productivity with Gemini in Google Workspace.” In the modern workplace, efficiency is not just about working harder, but smarter. Your Google Workspace (Docs, Sheets, Slides, Gmail, etc.) is the hub of your daily activity.

    This course is designed to transform your relationship with these familiar tools by integrating the power of Gemini directly into your workflow. We will move beyond theory to provide hands-on, practical strategies for using Gemini as an intelligent collaborator within your documents, spreadsheets, presentations, and communications, turning everyday tasks into opportunities for accelerated productivity and innovation.

Go to Top