Skip to Main content

IT & Computer Training

Certificate in Software Development

Software Development is the fastest-growing employment sector in the United States. Professionals equipped with coding skills are highly sought after and well paid.

Digital transformation has impacted every industry and businesses struggle to find candidates with the necessary technical skills. We are also seeing an increasing number of non-tech roles citing programming skills as "advantageous".

Learning software development opens doors to employment in a wide variety of roles and sectors.

 

INFORMATION, REGISTRATION & PAYMENT

 

Back To Top

Computer Applications

Certificate in Computer Skills for the Office

Bring to your Office skills to a whole new level by diving into a suite set of powerful instructional courses.

Excel with Excel, and move from the basics to an advanced level. Employ all of your newly-learned tips and tricks to unlock new dimensions from your data.

Plus, expand your presentation prowess, with courses that deliver on the functional basics of the PowerPoint application while boosting your visual design skillset.

Watch well-crafted video tutorials while reinforcing your learning with built-in knowledge checks, interactive exercises, and interactive games.

 

Information, Registration & Payment

Back To Top
Excel Advanced Skills

This course is designed for the learner who already has a solid understanding of Excel's basic tools and functions. The course teaches learners some of the more advanced skills and features available in Excel, which may be useful in data analysis. These skills include style templates, conditional formatting, data validation, data manipulation, and pivot tables.

INFORMATION, REGISTRATION & PAYMENT

Back To Top
Excel Basics

As big data continues to change the way businesses operate and drive strategy, the ability to efficiently and effectively organize and analyze data is crucial. Managers need to be able to utilize tools to identify trends and help make better business decisions. Microsoft's Excel is a powerful spreadsheet software to organize and manage data related to business operations. This course focuses on mastering the fundamental tasks performed in Excel, including data entry, basic formula calculations, and formatting and style operations. During the course, you will learn how to build a spreadsheet from scratch and gain a greater understanding of the most popular Excel commands and functions.

INFORMATION, REGISTRATION & PAYMENT 

Back To Top
Excel Tips & Tricks

This course features 25 of the most popular Excel tip and tricks for both novice and advanced Excel users. In this course, you will learn time-saving techniques to boost efficiency, increase productivity and workflow, and improve and advance your skills. Topics include data entry, data organization, data cleaning, elements of style, data sorting, data filtering, and spreadsheet display tips. This course also covers three of the most popular lookup and reference functions: VLOOKUP, HLOOKUP, and Find + Replace.

INFORMATION, REGISTRATION & PAYMENT

 

Back To Top
Microsoft Project Basics

This course introduces learners to Microsoft's project management software, MS Project. Learners, particularly aspiring project managers, are provided a step-by-step tutorial on mastering basic functions that are essential for any project. MS Project is a popular tool for project managers that allows them to develop schedules, allocate resources and duties to specific tasks, and track a project's progression. It also allows managers to oversee the budget and analyze workloads. This introductory course will focus on the Microsoft Office 2019 version of MS Project. Learners are required to have access to MS Project 2019 in order to complete this course.

 

Information, Registration & Payment

Back To Top
Microsoft Project Intermediate

This intermediate-level course provides learners with essential skills for mastering Microsoft's project management software, MS Project. Aspiring project managers are provided a step-by-step tutorial on various functions that are required for every type of project. This course assumes that learners also have a basic familiarity with MS Project.

MS Project is a popular tool that allows project managers to develop schedules, allocate resources, and track progress. It also allows managers to perform variance analysis and combine multiple projects. This intermediate course will focus on the Microsoft Office 2019 version of MS Project.

 

Information, Registration & Payment

Back To Top
Microsoft Word Basics

This is an introductory-level course designed to both build a foundation of essential skills in Microsoft Word and to gain a greater understanding of its interface and design elements. The course focuses on mastering the fundamental tasks performed in Word, including writing, proofing, finalizing, and printing a document.

 

Information, Registration & Payment

Back To Top
PowerPoint for Business

As technology continues to change the way that we engage in business communications, the art of presenting has also undergone a shift. No longer can presenters rely solely on their spoken words to deliver their messages. Now, audiences expect to see multimedia slideshows that both inform and entertain. This course will consider how to plan and design effective slideshow presentations using Microsoft's PowerPoint software. It includes practical tips and examples for mapping the presentation, incorporating research, using templates, selecting visual elements, and delivering the presentation.

INFORMATION, REGISTRATION & PAYMENT

 

Back To Top
Visual PowerPoint

In today's professional landscape, PowerPoint presentations can be effective platforms for sharing information and garnering audience interest and support. At the same time, a poorly designed PowerPoint slideshow can quickly turn an audience away. By focusing on how to apply basic design principles to slideshow creation, this course will help learners use Microsoft's PowerPoint 365 software to build visually engaging slideshow presentations. Learners will consider how to select images and photographs for use in slides, the importance of arrangement and placement of images, the use of tools like Shapes and SmartArt, methods for presenting data, and the selection of colors and fonts that increase the readability of content.

 

INFORMATION, REGISTRATION & PAYMENT

 

Back To Top

Cybersecurity

Certificate in Cybersecurity

Cybersecurity, also known as Information Security, is the protection of data and personally identifiable information from malicious attacks, theft, and destruction. Failures of cybersecurity policies, both in large corporations and governmental agencies, have earned significant visibility and negative publicity in recent months and years. As the amount of data being stored continues to increase, and as hackers become more sophisticated, the need for cybersecurity is greater than ever.

This Certificate in Cybersecurity offers lessons on the critical elements of information security, as well as foundational information about key certifications for professionals in the industry. Each of the eight courses in this suite will help learners master the vocabulary of the industry and offers examples, videos, interactive games, and review questions to ensure mastery of the material.

Courses can be taken in any order. Upon successful completion, you can download and print a Certificate of Completion.

INFORMATION, REGISTRATION & PAYMENT

Back To Top
Real-World Cybersecurity Scenarios

What would you do in the face of an actual information security problem? These courses each include a module devoted to fictional scenarios, based on real-world challenges that cybersecurity professionals face. Each course is self-paced and contain interactive games, real-world examples, expert videos, quizzes, assessments, and focused instruction.

Each of the courses in this bundle helps refine and enhance the skills that cybersecurity and IT professionals need. The concepts and principles covered focus attention on the needs of the expanding computer information security industry.

This bundle is designed for adult learners who are interested in gaining an introduction to information technology security. Some understanding of basic IT concepts is helpful.


Information, Registration & Payment

Back To Top
Real-World Cloud Cybersecurity Scenarios

This suite of five related courses covers various aspects of securing cloud services. Its structure is based on the Certified Cloud Security Professional (CCSP) certification administered jointly by the Cloud Security Alliance and (ISC)2. Each course is comprised of two modules. The first provides content related to the course subject matter. The second module engages the learner with real-world scenarios in which he or she must apply the content of the first module.

This bundle is designed for adult learners who are interested in gaining an introduction to information technology security. Some understanding of basic IT concepts is helpful.

Individual courses included in this bundle are listed below.

Information, Registration & Payment

Back To Top
CISSP® Exam Prep Course

The CISSP® Exam Prep Course prepares test-takers for the Certified Information Systems Security Professional exam, as administered by the International Information System Security Certification Consortium (ISC)2. The CISSP® certification is recognized worldwide and adheres to the strict standards of ISO/IEC 17024. As security breaches outpace the available pool of security experts, the need for information security professionals with proper certifications will continue to grow. Among other titles, obtaining the CISSP® certification prepares one for a position as a Security Analyst, Chief Information Security Officer, or as a Security Architect.

This course contains two 120-question practice exams, which cover The International Information System Security Certification Consortium's eight domains:

  1. Asset Security
  2. Communications and Network Security
  3. Identity and Access Management
  4. Security and Risk Management
  5. Security Assessment and Testing
  6. Security Engineering
  7. Security Operations
  8. Software Development Security

Information, Registration & Payment

Back To Top
CISSP® Practice Exams and Exam Strategies

This course is designed to give learners an assessment of their readiness to take ISC2's CISSP® Exam. It contains two 120-question practice exams, which cover The International Information System Security Certification Consortium's eight domains:

  1. Security and Risk Management
  2. Asset Security
  3. Security Engineering
  4. Communications and Network Security
  5. Identity and Access Management
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security

Information, Registration & Payment

Back To Top
CompTIA Security+® Exam Prep Course

The CompTIA Security+® Exam Prep Course prepares test-takers for the Security+ exam, as administered by CompTIA. The CompTIA certification is recognized worldwide and adheres to the strict standards of ISO/IEC 17024 and is approved by the US Department of Defense to meet directive 8140/8570.01-M requirements. The course contains a variety of content presentation methods to help teach the concepts and vocabulary, and ultimately, learners are given ample opportunity to assess their skills with a multiple choice practice exam.

 

Information, Registration & Payment

Back To Top
Access Control and Identity Management Scenarios

Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This course introduces the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. It provides an overview of Identity Management and the resources used on modern-day information systems, including Web and cloud-based ones. This course also features a number of fictional scenarios based on access control and identity management that professionals face in the real-world.

Information, Registration & Payment

Back To Top
Application, Data, and Host Security Scenarios

When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security. This course covers the security of applications, data, and hosts in information systems. It provides a comprehensive examination of software development and change management. This course also features a number of fictional scenarios based on real-world application, data, and host security. Although not required, having some experience or working knowledge in IT concepts is helpful in taking this course.

Information, Registration & Payment

Back To Top
Asset Security

Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must also be guarded. Asset security involves the full support of everyone in an organization, from corporate-level personnel down to front line employees. Various security controls will be described that help protect privacy, along with data leakage prevention (DLP). Although it is not necessary, having some foundation in IT concepts is helpful in taking this course.

The content in this course aligns with Domain Two in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

Information, Registration & Payment

Back To Top
Cloud Application Security

Cloud computing and cloud-based applications are more prevalent today than ever before. Software developers must continuously challenge themselves to stay up to date securing cloud-based applications. This course begins by presenting several challenges and solutions for securing cloud-based applications. Learners are then presented with several real-world scenarios to apply the material they've learned.

This course follows the structure of the (ISC)2 Certified Cloud Computing Professional certification. While it is intended as a part of a five-course suite, it can be taken as a stand-alone course. This course assumes a basic understanding of internet technology.

Information, Registration & Payment

Back To Top
Cloud Data Security

This course is comprised of two modules. The first addresses many of the important concepts of cloud-based data and the security responsibilities of both cloud consumers and cloud service providers. The second module offers a series of scenarios that relate to cloud data security to ensure you have mastered the material.

This course follows the structure of the (ISC)2 Certified Cloud Computing Professional certification. While it is intended as a part of a five-course suite, it can be taken as a stand-alone course.

Information, Registration & Payment

Back To Top
Cloud Infrastructure and Platform Security

This course is comprised of two modules. The first addresses many of the challenges for both cloud consumers and cloud service providers in securing the infrastructure and platforms used in cloud computing. The second module offers a series of real-world scenarios designed to give learners a sense for how the concepts might be applied in their everyday work. This course is designed for IT professionals and other adult learners who have some knowledge of internet-related technology.

This course follows the structure of the (ISC)2 Certified Cloud Computing Professional certification. While it is intended as a part of a five-course suite, it can be taken as a stand-alone course.

Information, Registration & Payment

Back To Top
Cloud Operations Security

This course begins by covering security issues with regard to operating cloud services. While it covers many aspects relevant to a cloud service provider, it should be particularly valuable to helping cloud consumers understand how security responsibilities may be divided between consumer and provider. The second module engages the learner with real-world scenarios that represent the challenges to securing cloud operations. This course is designed for IT professionals and other adult learners who have some knowledge of internet-related technology.

This course follows the structure of the (ISC)2 Certified Cloud Computing Professional certification. While it is intended as a part of a five-course suite, it can be taken as a stand-alone course.

Information, Registration & Payment

Back To Top
Communication and Network Security

This course covers topics related to communications and network security. It begins with a lesson in the different types of networks and different transmission technologies. It also covers the two main models that govern how networks work: the OSI model and the TCP/IP model, as well as their related layers. The course includes a detailed discussion of the many protocols that allow networks and network devices to communicate with one another and includes a discussion of firewalls and wireless networks. This course is designed for IT professionals and other adult learners who are interested in gaining an introduction to information technology security.

The content in this course aligns with Domain Four in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

Information, Registration & Payment

Back To Top
Compliance and Operational Security Scenarios

This course contains a discussion of the role of security governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. This course also features a number of fictional scenarios based on compliance and operational security to allow you to practice the concepts learned in the material. This course requires some basic understanding of IT concepts.

Information, Registration & Payment

Back To Top
Cryptography Scenarios

This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world. This course requires some basic understanding of IT concepts.

This course is part of the Cybersecurity suite of courses. However, the course can be taken as a stand-alone course.

 

Information, Registration & Payment

Back To Top
Cybersecurity for Healthcare Professionals

In this course, manager's are introduced to essential information security principles and concepts. These concepts are critically important in the healthcare sector as a data breach can have far-reaching consequences for individuals and organizations. Beyond financial losses and the embarrassment of having personal information exposed online, a security breach in healthcare can result in a patient becoming seriously injured or killed.

This course is designed to help manager's navigate crucial cybersecurity concepts as applied to HITECH and HIPAA-covered entities. Learners will explore the reasons why breaches occur, the motivation of attackers, and how to protect Personal Health Information (PHI) while it is in use, in storage, and in transit across a network.

 

 

Information, Registration & Payment

Back To Top
Identity and Access Management

This course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. The course presents different kinds of authentication techniques, how they work, and how they are distinguished from each other. This course requires some basic understanding of IT concepts.

The content in this course aligns with Domain Five in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

Information, Registration & Payment

Back To Top
Introduction to Cloud Computing and Cybersecurity

This course is comprised of two modules. The first provides an introduction to cloud-based services and the accompanying need for cybersecurity. The second module provides a series of real-world scenarios in which the learner must apply several of the concepts covered in the first module. Although this is an introductory course, learners should have some basic understanding of IT concepts.

This course follows the structure of the (ISC)2 Certified Cloud Computing Professional certification. While it is intended as the first of a five-course suite, it can be taken as a stand-alone course.

Information, Registration & Payment

Back To Top
Introduction to Cybersecurity

Globally, incidents of data breaches, identity thefts, and cybercrimes are on the rise, along with the explosive growth of online personal data and the expansion of computer networks. This course teaches the fundamental concepts of information security one will encounter in the cybersecurity field. This course will set the groundwork with basic vocabulary and then introduces concepts such as access controls, risk management, cyber attacks, and digital forensics. This course requires a basic understanding of IT concepts.

 

Information, Registration & Payment

Back To Top
Introduction to Malware

Malicious software, better known as malware, has become a central element in not just cybersecurity but daily life. It has played a role in everything from our politics to our economy, to our personal lives. However, it remains a poorly understood and reported subject. This course provides a clear and comprehensive introduction to malware and how to defend against it. Instruction is divided into two modules. The first provides an overview of the history and mechanisms of malware. The second module offers a series of real-world scenarios in which the learner must apply several of the concepts covered in the first module.

Information, Registration & Payment

Back To Top
Network Security Scenarios

This course examines communications and network security. It covers the different types of networks and different transmission technologies and the two main models that govern how networks work, the OSI model and the TCP/IP model, and their related layers. This course also features a number of fictional scenarios that will help you apply what you've learned to situations you may encounter in the real world. This course requires a basic understanding of IT concepts.

 

Information, Registration & Payment

Back To Top
Security and Risk Management

This course covers the role of governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. The course also includes a look at how modern organizations manage information security risks and how to conduct a risk analysis. It concludes by examining the process for providing information security training and education. This course requires some basic understanding of IT concepts.

The content in this course aligns with Domain One in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

Information, Registration & Payment

Back To Top
Security Assessment and Testing

This course covers security assessment and testing, focusing on potential disruptions that can affect organizations and how they can be addressed with assessments and plans. Students will have the opportunity to practice how to assess the impact of disasters that may arise as well as to develop their own versions of these plans. This course requires a basic understanding of IT concepts.

Information, Registration & Payment

Back To Top
Security Engineering

This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes, and how they work. Public key infrastructure and management is also covered. This course requires a basic understanding of IT concepts.

The content in this course aligns with Domain Three in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

Information, Registration & Payment

Back To Top
Security Operations

This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. This course requires a basic understanding of IT concepts.

The content in this course aligns with Domain Seven in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

INFORMATION, REGISTRATION & PAYMENT

Back To Top
Software Development Security

This course covers software development security while focusing on the systems development life cycle, operating systems, and their environments. Additional topics include the role of various databases in security and how to recognize and guard against attacks on software. Students will have the opportunity to apply application security controls. This course requires a basic understanding of IT concepts.

The content in this course aligns with Domain Eight in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

 

Information, Registration & Payment

Back To Top
Threats and Vulnerabilities Scenarios

This course examines the process of identifying and mitigating threats and vulnerabilities in information systems. It covers common categories of threats and vulnerabilities and the resources used to detect them. This course also features a number of fictional scenarios based on threats and vulnerabilities. This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real world scenarios.

Information, Registration & Payment

Back To Top

Data Analytics

Certificate in Data Analytics

This certificate in data analytics provides an overview of topics in statistics and their applications in a variety of fields. This certificate will present the basics of quantitative analysis and its increasing use in today's professional landscape. Learners are exposed to quantitative decision-making tools and techniques, which tie into real-world case studies. Each course in this certificate utilizes games, videos, interactive exercises, quizzes, real world case studies, and other engaging content to ensure rapid mastery of the content and direct application. Course videos and lessons focus on use of both Microsoft Excel and OpenOffice.

INFORMATION, REGISTRATION & PAYMENT

 

Back To Top
Data Analysis for Improving Organizational Performance

When using data analysis to improve organizational performance, it's vital to employ the tools that bring the data to life and keep people engaged in the process. Organizations in both the public and private sectors often use tools and frameworks to deliver the data, and the information the data might suggest, to its staff. This intermediate-level course will explain some of these measures and tools, describe some specific measurements, and explain the relationship between assessment and strategy. Summarizing the data with the correct tool can be the gating factor to reaching staff and effecting changes that spur performance improvement.

INFORMATION, REGISTRATION & PAYMENT

 

 

Back To Top
Data Analysis in the Real World

How are data-driven decisions put into practice in the real world? How do these decisions differ when applied to different sectors, such as health care, education and government? This intermediate-level course will provide answers to these questions as well as recommendations for decision-making based on data analytics for each sector. The course will begin with an introduction of Big Data, then continue into a deeper dive on its implications within each sector. Industry case studies make the concepts applicable in the real-world.

INFORMATION, REGISTRATION & PAYMENT

 

Back To Top
Introduction to Data Analysis

Whatever your profession. Whatever your field. As a professional, and certainly as a leader, you will be asked to make a decision based on data. This course will introduce the different types of decisions made in an organizational setting, why quantitative analytics is important, and how data quality can affect decision making. Since quantitative analytics is used in various settings, this intermediate-level course also offers insight into how research is used in different sectors. From a management perspective, the course highlights appropriate quantitative methods and ways to ensure quality and accuracy through research design.

INFORMATION, REGISTRATION & PAYMENT

 

Back To Top
Statistical Process Control

Statistical Process Control is all about boosting quality. Quality management can not only deliver value to customers and stakeholders, it can also enable data-driven decision making that helps organizations gain a competitive advantage in the marketplace. This intermediate-level course will introduce the basics of quality management, explaining the difference between quality control and quality assurance, providing methods for application of analysis, showing different applications of the Seven Basic Quality Tools. It all culminates in a brief case study, which illustrates the concepts covered.

INFORMATION, REGISTRATION & PAYMENT

 

Back To Top
Statistics as a Managerial Tool

Managing today can require good instincts. However, instinct is not enough to manage the huge amounts of available data and the complex variables of the business world. Statistics can help managers and leaders make sense of these complexities, back-up their assertions, and feel confident about when to take the risks and when to pump the breaks. This intermediate-level course examines statistics as a managerial tool. It also looks at common graphical representations of data and how these can be effective tools to explain situations and support persuasive arguments for a course of action.

INFORMATION, REGISTRATION & PAYMENT

 

Back To Top
Tools of Data Analysis

There are a number of statistical tools and techniques that are commonly used by organizations to inform decision-making. These tools span numerous business functions and support many different objectives. This intermediate-level course describes, evaluates, and analyzes different statistical techniques and their real-world limitations and benefits. The course features crossover analysis, break-even analysis, cluster analysis, decision tree analysis as well as an introduction to regression.

INFORMATION, REGISTRATION & PAYMENT

 

Back To Top

Emerging Technologies

A Manager's Guide to Artificial Intelligence

This course introduces learners to basic artificial intelligence concepts and trends. Artificial Intelligence plays an increasingly important role in many industries. The emergence of this new technology promises to bring unprecedented efficiencies for organizations and enhance business performance. In today's global economy, managers will need to know how AI can be leveraged to keep their organizations competitive, as well as understand the potential ethical issues associated with employing AI technologies such as deep learning, machine learning, and the various AI-enabled recognition technologies.

INFORMATION, REGISTRATION & PAYMENT

Back To Top
A Manager's Guide to Blockchain

Blockchain is on the forefront of emerging technologies and is the foundation of modern cryptocurrencies. If you're a manager with little exposure to blockchain as a concept, this course will help you build an understanding of the concepts and how the technology might apply to your business. This course is an introduction to blockchain as an underlying technology for cryptocurrencies and other applications. The assignments delve into critical parts of blockchain, such as consensus mechanisms and cryptography. They also look at blockchain's impact on verticals such as healthcare, Fintech, and government, along with democracy, governance, and social impact.

INFORMATION, REGISTRATION & PAYMENT

 

Back To Top
A Manager's Guide to Robotics

This course will introduce many of the concepts and metrics for management to consider when evaluating whether an investment in robotics is the right decision for the operation. The course begins by defining automation types and processes before exploring the business functions involved in making the decision to execute an automation enhancement. In addition to delving into pragmatic issues, this course also explores the strategic and ethical issues of replacing human workers with robots.

Information, Registration & Payment

Back To Top
Certificate in Emerging Technology for Managers

This Certificate in Emerging Technology for Managers addresses blockchain, artificial intelligence, and robotics. Learners who have completed this suite of courses are knowledgeable in how each technology affects business processes and how each contributes to a discussion about the future of labor. In the current business environment, managers and leaders should have a baseline understanding of these emerging technologies. Certificate holders are informed about cryptocurrencies and how blockchain is restoring trust and security in Internet transactions. Learners have examined how artificial intelligence is leading to gains in efficiency and performance, along with concepts and metrics for management to consider when evaluating an investment in robotics.

Each of these self-paced courses offer an assortment of interactive exercises, selected readings, and self-assessments that will engage you and help you practice effective business communication.

Upon successful completion of all courses in this certificate program, you can download and print a Certificate of Completion.

INFORMATION, REGISTRATION & PAYMENT

 

Back To Top

Web Design

Introduction to Web Design

Introduction to Web Design is an introductory-level course providing the groundwork for building effective websites optimized in design, structure, usability, and accessibility. You will learn the fundamental principles of visual design and user experience to build webpages that are aesthetically pleasing and intuitive to navigate.

The course will guide you through the website design process, from identifying your content strategy and information architecture, to choosing a layout and other design elements such as visual hierarchy, whitespace/negative space, color, and typography.

 

Introduction, Registration & Payment

Back To Top
CSS for Web Design

This course will introduce basic features of Cascading Style Sheets, or CSS. CSS is a versatile programming language that is used to style web pages by specifying how HTML and XML documents should appear. CSS makes it possible to control the presentation of elements on a page, including their color, dimensions, position, and behavior. A series of lab exercises provide students with opportunities to practice the tools and concepts they learn throughout the course.

 

Information, Registration & Payment

Back To Top
HTML for Web Design

This is an introductory-level course designed to provide a fundamental understanding HyperText Markup Language, commonly abbreviated as HTML. HTML is the standard markup language used to create webpages. Along with CSS, and JavaScript, HTML is a cornerstone technology used to create webpages as well as to create user interfaces for mobile and web applications.

The course will cover HTML tags for images, links, lists, and tables, as well as how to organize page structures. Learners will gain experience using various HTML elements by developing a variety of different HTML documents through several lab assignments.

 

Information, Registration & Payment

Back To Top
JavaScript for Web Design

This course introduces learners to the fundamentals of scripting and basic programming concepts while exploring the ways JavaScript can add functionality to web pages. Through several lab exercises, learners will progress from developing simple JavaScripts to more complex functions. From this base knowledge, they will then be introduced to popular JavaScript libraries and other similar tools and frameworks in use today.

 

Introduction, Registration & Payment

Back To Top
Responsive Web Design

This course will introduce you to responsive web design (RWD) by reviewing basic principles and foundational techniques for designing websites that are viewable on all devices. While this is an introductory course, the material does require that the learner has at least a basic understanding of HTML and CSS. After completing the course, students will be able to create custom CSS layouts and use media queries to optimize websites for different screen sizes.

 

Information, Registration & Payment

Back To Top

Questions?

If you would like to discuss your options with someone from Adult and Continuing Education, please call (904) 826-8643 or email:

continuingeducation@flagler.edu

Disclaimer

Flagler College is accredited by the Southern Association of Colleges and Schools Commission on Colleges to award Bachelor of Arts, Bachelor of Fine Arts, and Master of Arts degrees.  Non-degree, non-credit training and development programs are not accredited by SACS Commission on Colleges, and the accreditation of Flagler College does not extend to or include these programs or its students.  Flagler College does not accept course work from these programs for credit toward any award.