IT-Learning: 21424 products
Developing a Mentoring Program
Formal mentoring programs help organizations retain employees, increase job satisfaction and commitment, and cultivate organizational citiz…
Silhouette Photography: Shooting and Post Processing
Sometimes shapes tell better stories than shadows. A silhouette of a person or object can be a powerfully expressive, graphical representat…
Communicating Values
Common values are the foundation of successful relationships and successful businesses. A company’s values should be the driver of every …
Managing Your Calendar for Peak Productivity
You can manage your time more effectively by learning how to leverage the features of your calendar. In this course, best-selling author an…
Managing New Managers
Managing new leaders comes with a unique set of challenges. Even the most outstanding individual contributor can struggle as they unpack th…
Understanding Capital Markets (2019)
Capital markets are a crucial area of finance—and investors aren’t the only ones impacted. Retirement, buying a house, and long-term sa…
Capture One Pro 12 Essential Training
Capture One Pro is a complete digital management and editing application for professional photographers and serious enthusiasts. Its key fe…
Indra Nooyi on Three Things to Get You to Your Aspirational Job
From the Course: Career Advice from Some of the Biggest Names in Business Indra Nooyi on Three Things to Get You to Your Aspirational Job D…
CINEMA 4D R18 Essential Training: VFX
Cinema 4D R18 Essentials: VFX introduces artists to the Cinema 4D workflow for creating VFX and integrating them into a live action shot. L…
Salesforce Workflows: Leads
Explore how to effectively use Salesforce Leads to qualify and track potential customers. Because lead forms can be difficult records to ma…
Ethical Hacking: Denial of Service
Ethical hacking involves testing to see if an organization's network is vulnerable to outside threats. Denial-of-service (DoS) attacks are …
Autodesk Inventor 2018 New Features
The release of Autodesk Inventor 2018 introduces a series of new features and improvements to the mechanical design and 3D CAD software. Wh…
Ethical Hacking: Vulnerability Analysis
In order to assess—and ultimately, decrease—an organization's risk, IT security professionals must first evaluate and reduce existing v…
Learning CodeIgniter 3
Speed up your development with CodeIgniter, a fast and powerful PHP web application framework. Starting with the what and the why, instruct…
Linux CentOS 7: User and Group Management
Linux servers often contain thousands of users and user files. It's easier to maintain users if they are contained in groups, but only if t…