X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 cybersecurity training


Implementing Plex Online: Pilot Part Methodology and Just-in-Time Training
Are you looking to implement an enterprise resource planning (ERP) system, but are afraid of time and IT resources needed—not mention the loss of employees

cybersecurity training  Plex Online: Pilot Part Methodology and Just-in-Time Training Are you looking to implement an enterprise resource planning (ERP) system, but are afraid of time and IT resources needed—not mention the loss of employees during the training and implementation? Plex Online can help. Discover how Plex Online’s four-phase training process—piloting, testing, systems enhancements, and go-live—drives 98% customer satisfaction in Plex Online implementations—32% higher than the industry

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Learning Management Suite (LMS)

These are tools for managing, creating, scheduling training or learning in your organization. The terminology varies from vendor to vendor. Learning management systems (LMS) typically help to manage both classroom and on-line learning. They do not normally include content creation or management tools but may in some cases. Some LMSs may manage just classroom or just e-learning rather than both. Some LMSs may also include content authoring and managment and virtual classrooms. Learning content management systems (LCMS) emphasize the management of content for courses/training/learning. In most cases, they include content authoring tools. In some cases, they may also include some of the features of LMSs. Content authoring tools are often provided as part of an LCMS. They may also be stand-alone products. Virtual classrooms (web conferencing tools) normally are separate third party offerings but may be included as part of a suite of tools. Suites of tools include features of at least two or more of the above categories. While some companies offer just LMS or LCMS systems others offer suites of products, which provide all or most of the features of the other tools. Suites combine several capabilities of learning management--usually two or more of the following: learning management, classroom training management, e-learning management, custom content creation, learning content management, learning object repositories, or virtual classrooms.  

Evaluate Now

Documents related to » cybersecurity training

The Guide to Google Apps Training Part Five: Organizational Units and Permissions


It’s a given that the level of access to information is determined by the roles people have within your company or organization. Having the right tools to establish perimeters and authorizations is key for a good security base.

Once you’re using Google Apps, providing essential tools for the management of these varying levels of access and assigning “admin roles” is easily accomplished by following the steps outlined in this white paper. With the help of this Google Apps guide, your super administrator can develop and establish organizational units, assign and organize admin roles, as well as configure member access to settings and services. Learn how to best develop and configure service and setting details, and how to easily create administrative privileges with a series of pre-built roles. While the five pre-built roles supplied by Google Apps (help desk admin, groups admin, user management admin, services admin, and reseller admin) are generally adequate for use, more customization may be needed. Help for assignation and/or creation of these roles by the super administrator is also explained. This Google Apps guide also gives information on providing additional management services for Chrome devices, which can be adapted by the user to your departmental requirements, and discusses how Google Apps Directory Synch (GADS) helps to organize users.

cybersecurity training   Read More

Dispelling the Myths of End-user Training


User training is a key aspect of the software implementation process. But it’s also the most overlooked, as companies often think more about software functionality than about how well their employees are adapting to using it. Don’t assume that your employees are too busy, or that software training costs too much. Find out how user software training can save you money and increase your return on investment (ROI).

cybersecurity training   Read More

TechVentive


TechVentive advises technology and services firms and develops thought leadership, marketing materials, sales campaigns, channel programs, and sales training initiatives.

cybersecurity training   Read More

Training for the Many… Learning for the One: How Successful Organizations Recognize the Difference and Use Technology to Deliver Both


Winston Churchill once said, “Personally, I’m always ready to learn, although I do not always like being taught.” Formal training and informal learning can be combined to create powerful education opportunities for groups and for individuals. Include personalization in the mix and you have a recipe for almost certain success. It sounds straightforward, but is the implementation of such programs as simple as it seems?

cybersecurity training   Read More

Case Study: OnDemand Gives BECU Online Training Success


BECU, a credit union with more than 500,000 members, found its existing learning management system (LMS) was leading to employee frustration and not producing the needed training results. The company realized it needed a solution that would scale with the company’s rapid growth and provide functionality for employee performance management. Find out why the company chose Cornerstone’s OnDemand LMS to address its needs.

cybersecurity training   Read More

Trends in Training Your Extended Enterprise: Partners and Customers


SumTotal Systems recently surveyed 10,000 directors of training from primarily US-based companies to learn how they’re pushing outside their corporate walls to their partners and customers. Over 35 percent are currently training customers and partners with learning management systems (LMSs). Find out why they’re using LMS functionality to help drive their business globally while maintaining performance standards.

cybersecurity training   Read More

Improving Training Productivity and Implementing Online Learning to Manage Rapid Growth


Having experienced rapid growth, HDFC Standard Life (HDFCSL) needed to scale up learning and development to accommodate the rush of new hires and reach all employees. HDFCSL launched a companywide learning management program based on the SumTotal Learning Management solution that delivers, tracks, and analyzes the progress of blended online and instructor-based training, raising employee participation to 100% within 5 months.

cybersecurity training   Read More

E-learning Benefits and ROI Comparison of E-learning versus Traditional Training


You’re considering a move from traditional training to e-learning, but you’re not sure if the returns will be significant. In fact, employees are better able to retain and transfer what they’ve learned with Web-based training (WBT) and computer-based training (CBT). And typically, with these methods, the time a worker spends being trained is reduced by about 40 percent. Learn more about how e-learning can benefit you.

cybersecurity training   Read More

The Roaring Penguin Training Network


A recent paper presented evidence that Bayesian filtering could be effective using a shared Bayes database, even among hundreds or thousands of different users. This lead to the Roaring Penguin Training Network (RPTN), a mechanism for sharing Bayes votes among different CanIt customers. This white paper describes the Roaring Penguin Training Network (RPTN).

cybersecurity training   Read More

Oracle VM Templates for JD Edwards EnterpriseOne


Corning Data Services, Inc. (CDS) recently engaged in a customer opportunity that required a JD Edwards EnterpriseOne 9.0 demonstration and training environment. CDS employees would be providing netchange training to a large international JD Edwards customer upgrading from JD Edwards OneWorld Xe to EnterpriseOne 9.0. The customer wanted to provide employees an advance look at the new release as a way to build excitement and internal support for the upcoming upgrade. The customer’s project team was provided access to the new version and the web client interface in hopes of jump starting the project planning.

cybersecurity training   Read More