National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar
|
|
|
- Barnaby Ball
- 10 years ago
- Views:
Transcription
1 National Initiative for Cybersecurity Careers and Studies (NICCS) Webinar April 25, 2013
2 Welcome to the NICCS Webinar! Thank you for joining us today. During this presentation, you will: Learn about the National Initiative for Cybersecurity Education (NICE), and one of its implementation tools, the National Initiative for Cybersecurity Careers and Studies (NICCS). Discover new educational resources and learn how you can plot your career path. Obtain NICCS Supervisory Office (SO) contact information for follow-up questions and inquiries We encourage you to visit the page during this presentation so you can navigate the site with us. 2
3 Cyber Threats Increase Every Day The Department of (DHS) is responsible for overseeing the protection of the.gov domain and for providing assistance and expertise to private sector owners and operators of cyber networks As a Nation, we must respond by improving our technical infrastructure and by developing and maintaining a highly skilled cyber workforce capable of protecting our networks against cyber attacks. In May 2009, the President ordered a Cyberspace Policy Review to develop a comprehensive approach to secure and defend America s infrastructure. The review built upon the Comprehensive National Cybersecurity Initiative (CNCI) launched by President George W. Bush in In this presentation, you will learn about an initiative that expanded from CNCI the National Initiative for Cybersecurity Education (NICE) and its goals to improve the Nation s cybersecurity workforce. 3
4 Formation of NICE In response to increased cyber threats across the Nation, the National Initiative for Cybersecurity Education (NICE) expanded from a previous effort, the Comprehensive National Cybersecurity Initiative (CNCI) #8. NICE focuses on cybersecurity awareness, education, training, and professional development. NICE was formed in March 2011 and is a nationally-coordinated effort comprised of more than 20 federal departments and agencies, and numerous partners in academia and industry. DHS has been working since October 2012 to fulfill recommendations that expand the national pipeline of men and women with advanced cybersecurity skills to enable DHS to become a preferred employer for the talent produced by that pipeline, and position the Department to help make the United States safer, more secure, and more resilient. 4
5 NICCS Goals The vision of NICCS is to serve as an online resource for the Nation to learn about cybersecurity awareness, education, careers, and workforce development opportunities. Goal 1: Build a National Cybersecurity Resource Elevate cybersecurity awareness and encourage the public to adopt a culture of cyberspace security. Goal 2: Promote Cybersecurity Education Nurture the future cybersecurity workforce by promoting kindergarten through post graduate level education. Build an online community for cybersecurity professionals and others to gain knowledge related to their field. Goal 3: Guide Cybersecurity Standards Guide the development of cybersecurity standards, training, and professional development to empower and advance cybersecurity personnel. 5
6 Welcome to NICCS! Lets look at how to navigate NICCS & some of the resources that are available to you! NICCS is a website that is applicable and useful to everyone, including students, teachers, HR managers, current IT professionals, and anyone else who wants to learn more about cybersecurity and how it impacts your life. 6
7 Navigating the Home Page The layout of the Home Page is designed to increase the visibility of NICE initiatives in an intuitive-format for the user. The banner at the top displays various links throughout the site. The main page includes information for various demographic groups, such as students, professionals and veterans. 7
8 Navigating the Awareness Tab Click on the Awareness tab for more information on how to safeguard yourself and your organization from cyber threats. The Cyber Glossary will assist users utilizing the site to become more familiar with cybersecurity lexicon. The Stop.Think.Connect. campaign supports NICCS and is one way DHS is raising awareness of the increasing cybersecurity threat. 8
9 Navigating the Education Tab To access the Education page, click on the Education tab. Visit the Degrees Page to learn more about the majors and programs being offered throughout the country that lead to a career in cybersecurity. The Hands on Experiences page provides resources where students can participate in various cyber clubs and competitions. 9
10 Navigating Education: Promoting Education Learn more about Educational opportunities at the Promoting Education page. This page gives users examples of how they can learn more about cybersecurity, as well as details how users in the public and private sector are working together to foster increased education. Learn more about Cyber Communities and how you can develop the technical skills necessary for a career in cybersecurity inside and outside the classroom. 10
11 Navigating the Training Tab To access the Training Catalog, click on the Training tab. On the training landing page, you can click either Training Catalog, or the Find Courses button to enter the catalog. Other links on this page will allow you to learn more about the National Cybersecurity Workforce Framework. 11
12 Navigating Training: Catalog Search To search the Training Catalog, click on the Catalog Search Tab. Cyber Professionals can use the Training Catalog to search available courses by Specialty Area, Keyword, Provider. Training can also be browsed using the interactive Framework Specialty Areas by clicking Browse Courses using the Workforce Framework. 12
13 Navigating Training: Explore the Framework The Training tab will also allow users to explore the National Cybersecurity Workforce Framework. To explore the Framework, click the tab to the right of the Catalog Search tab, Explore the Framework. You can explore the Framework by clicking on Overview, Categories, Specialty Areas, KSAs, Competencies, and Tasks. 13
14 Navigating the Careers Tab To access Careers Page, click on the Careers tab. The left side navigation menu provides information on various career-oriented topics, such as professionalization and workforce planning. Access various NICE White Papers to learn more about professionalization and workforce planning. 14
15 Navigating Careers: Workforce Planning Learn more about how to build your organization at the Workforce Planning page. This page defines cybersecurity workforce planning and details what organizations can do to build a dynamic workforce. This page provides resources to HR Managers who need to organize their workforce, including a 4-phased Workforce Planning Process. 15
16 Navigating the News & Events Tab To access the News & Events page, click on the News & Events tab. Learn more about various upcoming events in the display menu, or click the calendar tab for a full view of upcoming events. Access various industry articles to stay informed on cybersecurity news and developments. 16
17 Navigating the Research Tab To access the Research page, click on the Research tab. Learn more about the ever-growing field of cybersecurity by accessing various white papers and scholarly articles. The Document Library will take users to external sites where they can access research articles, journals and white papers. 17
18 Questions? Questions? For any questions or concerns following this webinar, please use the NICCS Supervisory Office mailbox: Visit NICCS here: 18
National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide
National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide Overview During this presentation, you will: Learn about
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce
Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce Benjamin Scribner Department of (DHS) National Cybersecurity Education & Awareness Branch (CE&A) October 2014 Mid-South
National Initiative for Cybersecurity Education
ISACA National Capital Area Chapter March 25, 2014 National Initiative for Cybersecurity Education Montana Williams, Branch Chief Benjamin Scribner, Program Director Department of Homeland Security (DHS)
Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority
Cybersecurity: A Shared Responsibility and Department of Homeland Security Priority A Presentation to the National Cyberwatch Center November 20, 2015 Webinar Protocol :: Mute your phone/mic when not talking
The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Preventing and Defending Against Cyber Attacks June 2011
Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified
Department of Homeland Security
Department of Homeland Security Cybersecurity Awareness for Colleges and Universities EDUCAUSE Live! July 24, 2014 Overview Dramatic increase in cyber intrusions, data breaches, and attacks at institutions
Strategic Plan September 2012
Strategic Plan September 2012 NIST NICE Component Leads Overall Lead Ernest L. McDuffie, Ph.D. Lead for the National Initiative for Cybersecurity Education (NICE) United States Department of Commerce (DoC)
Shaping the Future of Cybersecurity Education
Shaping the Future of Cybersecurity Education Is N.I.C.E. NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION (NICE) February 2011 THEPRESENT Comprehensive National Cybersecurity Initiative Training the existing
Success Factor LMS - Learner Mode
Success Factor LMS - Learner Mode Objectives This training is designed to introduce you to Health Net s new and improved Learning Management System (LMS). The course covers: Overview of the new LMS Launching
National Initiative for Cybersecurity Education
THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
Perform this procedure when you need to add a recurring payment option, or when you need to change or withdraw it.
Purpose Use this procedure to add, change, or remove recurring payments. Trigger Perform this procedure when you need to add a recurring payment option, or when you need to change or withdraw it. Prerequisites
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Coming Soon! echalk Enhancements & New Features
Coming Soon! echalk Enhancements & New Features Look for these new enhancements and features that are coming soon: Google Docs Integration Submit Google Docs via the Homework Drop Box Subscribe to a Class/Group
Securing Our Future: Closing the Cybersecurity Talent Gap
Securing Our Future: Closing the Cybersecurity Talent Gap October 2015 results from the Raytheon-NCSA survey of young adults in 12 countries about cybersecurity career interest and preparedness Overview
Cybersecurity Education
Cybersecurity Education Issues & Approaches Derek A. Smith Director of Cybersecurity Initiatives at Excelsior College AFCEA November 18, 2014 Where we are now! Symantec: In a world of increased cybersecurity
Learning Management System (LMS) User Guide. 4 March 2015
Learning Management System (LMS) User Guide 4 March 2015 Contents Accessing ATPCO s Learning Management System (LMS)... 3 Overview of ATPCO s LMS... 5 Accessing Training Course Schedules... 7 Quick Search
Guidelines for Using the Web Help Desk
Guidelines for Using the Web Help Desk Technology Department 7/15/2013 The purpose of this document is to provide guidance on how to navigate the School Association for Special Education in DuPage County
Lesson 3.3 Creating a Marketing Campaign Element. Objective At the end of this lesson, you should be able to: Create a Campaign Element
Lesson 3.3 Creating a Marketing Campaign Element Objective At the end of this lesson, you should be able to: Create a Campaign Element Summary Campaign Elements are a group of print ads, product promotions,
Blackboard Help. Getting Started My Institution Tab Courses Tab Working With Modules Customizing Tab Modules Course Catalog.
Blackboard Help Getting Started My Institution Tab Courses Tab Working With Modules Customizing Tab Modules Course Catalog 1 Getting Started The following are some things to keep in mind when using Blackboard
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
Guidelines for Using the Web Help Desk
BURBANK SCHOOL DISTRICT 111 Guidelines for Using the Web Help Desk Technology Department 1/7/2013 The purpose of this document is to provide guidance on how to navigate the Burbank School District 111
Algoma District School Board. Microsoft Office 365 Guide
Algoma District School Board Microsoft Office 365 Guide Table of Contents Accessing Your Office 365 Account... 3 Outlook - Your Office 365 Email Account... 4 Calendar - Your Office 365 Events Calendar...
DHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
How To Defend Yourself Against Cyber Attacks
Overview of Cyber Security: Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace. We rely on this vast array of networks to communicate and travel,
2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report
2012 Information Technology Workforce Assessment for Cybersecurity (ITWAC) Summary Report March 14, 2013 TABLE OF CONTENTS List of Tables... iii List of Figures... iv Executive Summary... v 1. INTRODUCTION...
Navigate to the Legacy website at: http://www.legacy-christian.com
Legacy Christian Academy Online Student Information System QUICK START TUTORIAL Sycamore Education is an interactive web-based application that allows parents to view a range of information about their
SuccessFactors Onboarding Phase 1 Hiring Coordinator Reference Guide Last revised 10.15.15
Page 1 WebEx Getting Started Guide Last revision: March 27, 2015 SuccessFactors Onboarding Phase 1 Hiring Coordinator Reference Guide Last revised 10.15.15 Table of Contents To skip directly to a section
Becoming a Cyber Professional: A Discussion with Recent Graduates
Becoming a Cyber Professional: A Discussion with Recent Graduates Moderator: George L. Heron, LifeJourney USA Panelists: Danielle Santos, Assistant Program Manager, Cyber Formal Education, DHS Scott Wallace.
SHAREPOINT COLLABORATIVE WORKSPACE
Council of Europe SHAREPOINT COLLABORATIVE WORKSPACE USER GUIDE Contents 1. Presentation of SharePoint... 3 1.1. Logging on... 4 2. Lists... 6 2.1. Displaying a list... 7 2.2. Navigating in a list... 9
Securing Networks, Securing Futures
CP_08_20150414 CyberPatriot is the premier national youth cyber education The National Youth Cyber Education Program program created to inspire high school and middle school students toward careers in
PART 1 of 2 Local SEO Questionnaire
PART 1 of 2 Local SEO Questionnaire Fill everything out below ONLY after you have become our client and made your initial payment. We will then get started immediately. We are so excited about helping
QAD Learning Center Demonstration Guide. July 2, 2015
QAD Learning Center Demonstration Guide July 2, 2015 Overview This demonstration focuses on one aspect of QAD Online Tools the QAD Learning Center and shows how this functionality supports the vision of
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN UNDERGRADUATE STUDENT PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the
D2L STUDENT MANUAL. Prepared by KAMEL SMIDA. Head of E-Learning Unit at the. Applied Medical Sciences College. Majmaah University 5/10/2014
2014 D2L STUDENT MANUAL Prepared by KAMEL SMIDA Head of E-Learning Unit at the Applied Medical Sciences College Majmaah University 5/10/2014 M U u n i v e r s i t y D e a n s h i p O f E - L e a r n i
Using JCPS Online for Websites
Getting Started Before you begin, an Online Group must be created for you. Send an email requesting the group along with the username of anyone you want added as an editor to [email protected].
MyAACC Anne Arundel Comm om uni ty C y ollege
What is MyAACC? MyAACC It is your online connection to AACC. It gives you access to many on-campus services online instead of requiring visits to the campus. What are you able to do with MyAACC? Search,
Event Management System (EMS) Virtual EMS
Event Management System (EMS) Virtual EMS EMS Implementation Project Maintain a centralized and transparent calendar for all campus spaces and users Web based, self service, space, and support service
About SharePoint Server 2007 My Sites
SharePoint How To s / My Sites of 6 About SharePoint Server 007 My Sites Use your My Site to store files and collaborate with your co-workers online. My Sites have public and private pages. Use your public
Security & privacy in the cloud; an easy road?
Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands [email protected] THE SHIFT O L D W O R L D
ISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
September 24, 2015. Mr. Hogan and Ms. Newton:
Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Sample Website Proposal
Sample Website Proposal Client January 01, 2014 Prepared by: Kip Shaw Prepared for: Contact at Client sunnywebshops.com Introduction Thank you for the opportunity to submit a proposal for the redesign
MANAGING PERFORMANCE @ OLD MUTUAL
MANAGING PERFORMANCE @ OLD MUTUAL A guide to the ACT NOW! Multi-Rater process Updated September 2014 MANAGING PERFORMANCE 02 Contents Introduction 03 Overview of process 04 The Welcome page 05 Changing
Welcome to echalk A Guide For Students. Introduction. Contents:
Welcome to echalk A Guide For Students Introduction echalk is an online learning environment that connects students, teachers, parents and administrators within your school and district. echalk provides
Go. Stockton Portal Tips
Go. Stockton Portal Tips Purpose of the Portal... 3 Starting Off... 3 Pop up Blocker... 3 Plug-ins... 3 Students Log In... 3 Staff/Faculty Log In... 3 Security Questions... 4 Choosing a Password... 4 Email...
Customer to Partner Relationship
Customer to Partner Relationship Contents Introduction... 2 Creating a new Partner relationship... 2 Updating or activating an existing relationship... 3 Field descriptions... 3 Logging a ticket on behalf
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
Installing Microsoft Exchange Integration for LifeSize Control
Installing Microsoft Exchange Integration for LifeSize Control September 2005 Part Number 132-00002-001, Version 1.1 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize
Communications Best Practices Guide
Communications Best Practices Guide 2014 Supporting Your Needs We are passionate about our students futures and are responsible for providing the direction to help them succeed. A massive undertaking like
ilinc Implementation Guide: Preparation, Setup, Rollout, & Follow-up
ilinc Implementation Guide: Preparation, Setup, Rollout, & Follow-up ILINC COMMUNICATIONS, INC PHOENIX, ARIZONA Implementation Guide: Contents ilinc Implementation Guide...2 Section 1: Preparation...2
Yammer Training Guide Facilitator s Notes
Yammer Training Guide Facilitator s Notes Purpose This presentation provides an overview of Yammer to help new users get started. This is meant to be a slide library, so please pick and pull what is appropriate
Department of Homeland Security Federal Government Offerings, Products, and Services
Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity
How to create an email template
How to create an email template Templates are created the same way as you would for any other content page for an html or text email. By checking the box next to the Name this Content field on the Create
Create a Simple Website. Intel Easy Steps 1 2012 Intel Corporation All rights reserved.
Create a Simple Website Intel Easy Steps 1 2012 Intel Corporation Website Creating a Simple Website As more and more people are using the Internet to get information, it has become very important for businesses
How to Attach Files in Blackboard Learn Email, Messages, Discussions, and Assignments
E-Mail 1. Launch the Email by clicking the icon from the Menu frame found on the left side of the screen. 2. From within the Send Email page, click the "Select Users" link. If you click any links above
Table of Contents User Guide... 1 Welcome... 4 Front End Life Blue... 5 General Navigation... 5 Menu Bar... 5 Continuous Scroll... 5 Hyperlinks...
User Guide Table of Contents User Guide... 1 Welcome... 4 Front End Life Blue... 5 General Navigation... 5 Menu Bar... 5 Continuous Scroll... 5 Hyperlinks... 6 Sections/Pages/Information... 6 Announcements...
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Getting started with
Getting started with The modern recruiting hub that will clear the clutter and connect you with qualified candidates for your business. Welcome to Louisiana Job Connection. This Getting Started Guide will
Evening and Online Degree Orientation. Division of Extended Learning
Evening and Online Degree Orientation Division of Extended Learning Table of Contents Introduction Page 2 Student Support Offices Division of Extended Learning Page 3 Admissions Page 4 Financial Services
Help with Primo. How do I..
Help with Primo What is Primo? Primo is a search tool that allows you to find and access a wide range of print and electronic resources provided by the CCC libraries. No more searching separate places
Engagement Guide 2015 Virtual OSEP Project Directors Conference
Engagement Guide 2015 Virtual OSEP Project Directors Conference Purpose of This Guide This guide provides helpful information so you are prepared to engage with presenters, online materials, and other
This document is provided "as-is". Information and views expressed in this document, including URLs and other Internet Web site references, may
This document is provided "as-is". Information and views expressed in this document, including URLs and other Internet Web site references, may change without notice. Some examples depicted herein are
2013 EDITION. V-Camp Student. Guide. INTERACTIVE GUIDE Use the buttons shown below to navigate throughout this interactive PDF BACK
V-Camp Student Guide INTERACTIVE GUIDE Use the buttons shown below to navigate throughout this interactive PDF BACK 03 EDITION V-Camp Student Guide Table of Contents Unit : Table of Contents...iii How
National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work
National Cyber Security Awareness Month Week Two: Creating a Culture of Cybersecurity at Work Webinar Recording and Evaluation Survey This webinar is being recorded and will be made available online to
Veeam MarketReach User Guide. Automate Your Marketing. Grow Your Business.
Veeam MarketReach User Guide Automate Your Marketing. Grow Your Business. March, 2013 Contents PART 1. INTRODUCTION 3 What is Veeam MarketReach? 3 PART 2. ENTERING VEEAM MARKETREACH 3 Who can access Veeam
Cybersecurity Protecting Yourself, Your Business, Your Clients
Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric
Microsoft Outlook 2003 Basic Guide
Microsoft Outlook 2003 Basic Guide Table of Contents Introduction... 2 Getting Help... 2 Exploring Outlook... 3 Drop-Down Menus... 3 Navigation Pane... 4 Folder Pane... 7 Reading Pane... 7 Toolbars...
Google Apps for Education: The Basics
Google Apps for Education: The Basics You will learn how to get started with Google Drive by uploading and converting documents. You will also learn how to share your documents with others. Plus learn
Angel Learning Management System
Angel Learning Management System Introductory Tutorial for Students 2008-2009 Academic Year Center for Distance and Professional Education, (800) 222-4978 [email protected] Introduction Welcome to Angel!
ACE ONLINE HELPDESK. Guidance Notes V1. Contents. Guidance on new forms of acceptable evidence
Guidance on new forms of acceptable evidence ACE ONLINE HELPDESK Guidance Notes V1 Contents Introduction... 2 Accessing the Helpdesk for the first time... 3 Raising your first ticket... 4 Managing my tickets...
UMUC FED Program. Online Open House July 22, 2015
UMUC FED Program Online Open House July 22, 2015 Corporate Learning Solutions Shelby Byrd Senior Account Manager Danielle Haynes Account Manager 1-855-CLS-5300 or [email protected] www.umuc.edu/fedgov 2 UMUC
Outlook 2013 ~ e Mail Quick Tips
The Ribbon: Home tab New Email to send a new mail New Items to send a new mail, a new appointment, a new meeting, a new contact, a new task, a new Lync Meeting Ignore to ignore a request Clean Up to clean
Sharing a VoiceThread
Sharing a VoiceThread Every VoiceThread is completely private by default, so you ll need to share it before anyone else can view it or comment on it. You can share your VoiceThread with one person, with
Welcome to Active Giving Fundraising!
Welcome to Active Giving Fundraising! Managing Your Personal Fundraising Page You will be notified by email when your personal fundraising page has been set up. Please follow the easy steps below to manage
Internal Communications
Internal Communications Jacqueline Destremps ABOUT ME MY JOURNEY 1 1998-2008 2008-2014 2014-2015 2015- I started my first business while I was in college, Bride To Be in AZ. I created a website for local
Online Learning Management System Student Guide
Welcome to the Vanguard Continuing Education Program. This tutorial will help you better understand the functionality of the system. If you have a question that is not answered here, please contact us
INTRODUCTION TO THE UC LEARNING CENTER. 2 SYSTEM REQUIREMENTS. 3 LOGGING ON TO THE UC LEARNING CENTER. 4 THE UC LEARNING CENTER HOME PAGE. 24 NOTES:.
UC Learning Center INTRODUCTION TO THE UC LEARNING CENTER... 2 SYSTEM REQUIREMENTS... 3 LOGGING ON TO THE UC LEARNING CENTER... 4 THE UC LEARNING CENTER HOME PAGE... 6 UPDATING YOUR PERSONAL INFORMATION...
Talent Development: Learning Management System. Employee (Faculty & Staff) User Guide
Talent Development: Learning Management System Employee (Faculty & Staff) User Guide Human Resource Management 1246 West Campus Road Lawrence, KS 66045 785-864-4946 Fax 785-864-5790 http://humanresources.ku.edu
