ITIL Foundation |
Q6UJ90AZOFOT |
Aug 2018 |
Artificial Intelligence and Business Strategy |
AcZdVzhxB3vEx7gme_Y-tjOB34Ma |
Sep 2022 |
Software Architecture: Breaking aMonolith into Microservices |
b5b9425d3de4110de891e00e7452a8824f58a79e75ea88cd3c1c8f874bf2eb22 |
Aug 2023 |
Microservices Foundations |
1068792e793c58f453b5e3cc3afa881f166f21da604c53f4ea56286c9793787d |
Aug 2023 |
Learning Kubernetes |
f30d79c6bd9e716b44d2cc156c74ece622be2eabe33fdcc951a2ae08a380117e |
Aug 2023 |
Advanced Google Ads |
AQWnLizjGF3gTTpS-mpDxKTCaY7_ |
Jun 2021 |
Shopify Essential Training |
AbVYErmQwv87GEOgBwOy1Hr1udeA |
Jan 2021 |
Artificial Intelligence Tools and Concepts |
ARiFjoNqdqg01bFid6gQ4fMPjCo8 |
Nov 2020 |
Advanced SEO: Search Factors |
AfRMnBm8wH0pyd18RnsdjuGBd_9j |
Aug 2020 |
Technical WordPress SEO |
AcggIPkVCfqte3CkPImZA9nmBQf1 |
Aug 2020 |
JMeter: Performance and Load Testing |
AaV1AtXIdWlMx7n2ox9l2xcrClPf |
Dec 2019 |
Learning VR Photography and Video |
AQh1nfclOiKcYORRdzZ0aZl0jKaU |
Feb 2020 |
Virtual Reality Foundations |
ATOYrkz0h22KTEV9e7lZWvoCJDN7 |
Feb 2020 |
Creating a Membership Based Business |
AbB_--V1BmDBCHB8uV6KV0Jexc6P |
Feb 2020 |
360 Video Production and Post |
AQ9eMl5JBD6csEVxH8sQ-eWukj6Q |
Mar 2020 |
3D Content Creation for Virtual Reality |
Aave4jOyqK-_XSEDomRPzQYaqTbj |
Mar 2020 |
Writing a Business Case |
AVJ_3697FBni5AaTM2DSncTF_MHb |
Mar 2020 |
Foundations of The Fourth Industrial Revolution (Industry 4.0) |
ARhFqYSdEazkZejSwctzkyMyOzAB |
Apr 2020 |
Strategic Planning Foundations |
ARa0EJIwPYrss61b98a6xVdCHV8m |
Apr 2020 |
Negotiation Foundations |
AYEE3xIIztPxWn0Zhrni1vcQ9JRK |
Jan 2020 |
Amazon Web Services Data Services |
AYVr8TceRW9pFNPVqz1_hF9H7Q_P |
Feb 2019 |
Amazon Web Services Essential Training |
AdOXu_ubEoex4bbwVkmqT2omaNiw |
Dec 2018 |
Cert Prep: AWS Certified SysOps Administrator |
AfD_oQYwhsY8jTODYlD92wGd-v1i |
Dec 2018 |
Amazon Web Services: Networking |
Af0OIWnmRed9Uus3OgH6A5QItlML |
Dec 2018 |
Amazon Web Services: Analysis |
AcJFatbKzRq9oEArgEKc3aysnv1E |
Nov 2018 |
Amazon Web Services: Deploying and Provisioning |
AU6_3efHzvM0xmr1pjPK40y5bwqQ |
Nov 2018 |
Amazon Web Services: Enterprise Security |
AfyioArwLUaHq4D25tUZUMrY-LQr |
Nov 2018 |
Amazon Web Services: High Availability |
AXknDi32ElAymn2qVoLxIK7sFz2i |
Nov 2018 |
Amazon Web Services: Monitoring and Metrics |
ASY-6L8xFH78eW1-N2o5HzW79sVY |
Nov 2018 |
Amazon Web Services: Storage and Data Management |
AV94xuEm1HmEkgX86NV7IPFYPGpD |
Nov 2018 |
Digital Transformation |
AfQdGFMqQX_FILqtJN8lxJw48pzS |
May 2018 |
Linux: System Maintenance |
AbsGVW00mpz3KTrirEpO2xhxpfZW |
Nov 2017 |
Strategic Negotiation |
AdPvAyprEXHQzerBt0dVhW8pCT22 |
Nov 2017 |
Top 10 Social Media Management Tools |
AwgeIVO_1_6neFiq_Yiu6sXB0Kmc |
Nov 2017 |
Twelve-Factor Applications |
AcSyO2YGmdUncvrC4EQK0m6cXa-a |
Nov 2017 |
Business Development Foundations |
AbHOPCV-hpxEl815GsymbB34hImt |
Nov 2017 |
IT Security Careers and Certifications: First Steps |
AaE_MvljPcv7-TYX7YecDVNNJH50 |
Nov 2017 |
Cybersecurity Foundations |
Augqz9xn4ZkmFd-4qh5Li4e0a-4o |
Nov 2017 |
Learning Bitcoin |
AchaY7Ax3xsU__wIVbatY8graDUK |
Nov 2017 |
Blockchain Basics |
AZ1k8tHC8iA8NPU_UbsIYi9HwSfk |
Nov 2017 |
IT Security Foundations: Operating System Security |
Asv7yczpszwrGo6xW0NqW1fuQRqQ |
Nov 2017 |
IT Security Foundations: Network Security |
AUBdgw04Z13jmyp1XYbnmkW8aZN9 |
Nov 2017 |
Cybersecurity for IT Professionals |
Awf-jyZbfbR1sjYsBB5EQTheI0Gj |
Dec 2017 |
Learning IT Security |
AWJoDd3CnnEA8XzGsZuYe5yUdchQ |
Dec 2017 |
Cybersecurity with Cloud Computing |
AubO7Z5FGsgd-c6lm1hzEFdo0BdJ |
Dec 2017 |
Learning Computer Forensics |
Ab-GUHrn7K6SgGIjXwqdrImMg7m3 |
Dec 2017 |
Learning Cryptography and Network Security |
AVKjo5Jd8byE1iqXTiwkmZNX8rG2 |
Dec 2017 |
Blockchain: Beyond the Basics |
AZXxbaDipqKvv0aTQXjcuJbDUFmo |
Dec 2017 |
Learning Computer Security Investigation and Response |
AZBRWe2ruvSAlq0IVjiGiAIHYamP |
Dec 2017 |
Data Science Foundations: Fundamentals |
AyeYmScSOooabKTD0zozgtMF3W84 |
Dec 2017 |
Learning Data Analytics |
AQZaZx4KbI-C638nxg7N_cNBOdR7 |
Jan 2018 |
CompTIA Security+ (SY0-401) Cert Prep: Compliance and Operational Security |
AbXuK6LANF2V-Ri9hVJC21Q_wemZ |
Jan 2018 |
Learning Kali Linux |
AYXe30AZ3uBQ-4xhIbx4igL_M4AO |
Jan 2018 |
Body Language for Leaders |
ArhKjX3v-tJzZ-X_Kfi6XyNOX4SP |
Jan 2018 |
Making Investment Decisions |
AcXedjXlHl-lIMsgtPc8eGaYQBPe |
Jan 2018 |
Learning Secure Sockets Layer |
AU66lflMA_mZMZXdRLBWvlC6_ixN |
Dec 2017 |
Become an IT Security Specialist |
AW3lRI1yPbD-GjrjDkegcLy8yxa2 |
Dec 2017 |
IT Security Foundations: Core Concepts |
AX662l4Cxpie95S1odXA9W3v0M1X |
Nov 2017 |
CIPP/US Cert Prep: The Basics |
AXZa9q9VHpPS8XfPP5d_vqtpIQ_u |
Oct 2020 |
CIPP/US Cert Prep: 1 U.S. Privacy Environment |
AU_trXrca--16nur6yhMdWx3xe_b |
Oct 2020 |
CIPP/US Cert Prep: 2 Private Sector Privacy |
Ac5xNzDqv3raCtFUa16MoRaJ-d3M |
Oct 2020 |
CIPP/US Cert Prep: 3 Government and Court Access to Information |
AXuMfxEeWulzwksnInq4NLUn53w4 |
Oct 2020 |
CIPP/US Cert Prep: 4 Workplace Privacy |
AWyQRJYAsDJZjnbmASRBqDh3Wjkb |
Oct 2020 |
CIPP/US Cert Prep: 5 State Privacy Laws |
AXj80rA1Y5N4VMQTzjA0n9_XBpWB |
Oct 2020 |
Become a Certified Information Privacy Professional (CIPP/US) |
ATEJWrrJlOE8WH7Vz6Fv_mvave7A |
Oct 2020 |
The Elements of Effective Photographs |
ASzKawSIT9nb1p1vqCAwYIk6BV2O |
Jan 2022 |
Photography: First Steps |
ATSi6zHuF0A0HCD5wNLJi3S4vW8o |
Nov 2021 |
Introduction to Photography |
AT8jumGzTgfigPeK0jgYYpLRKxrF |
Nov 2021 |