Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Connext
  • Dashboard
  • Course search
  • Onboarding
  • Management Academy
  • Business Academy
  • Professional Academy
  • Life Skills Academy
  • Connext Compliance Courses
  • Certificates
  • English ‎(en)‎ English (United States) ‎(en_us)‎
  • Log in
Skip to main content

IT Courses

  1. Home
  2. Courses
  3. Categories
  4. Business Academy
  5. IT Courses
Uptime Monitoring Tool-Manual
John Michael Lagman
IT Courses

Uptime Monitoring Tool-Manual

Manager’s Centralized Utilization Trackers
Jonibelle PineroJohn Michael Lagman
IT Courses

Manager’s Centralized Utilization Trackers

Q2 IT Security Awareness Training
Sean NicdaoJonibelle PineroAlvin Jay GalbanJohn Michael LagmanMark Anthony Tuazon
IT Courses

Q2 IT Security Awareness Training

OneDrive User Guide
Sean NicdaoShierly Fe AbaaJenny Rose AbalosMikhail Dominico AcostaDWEIN CARLO ADRIANOVictoria AngelesKatrina Claire AquinoAnn Nicole ArellanoMARIE STELLA AURELIOJonard AustriaVanjo BalingitJONATHAN BANANTRICIA ANN BAUTISTAALEXANDER BAYDOLeni BocatoLady Kate BuhayArve Jay CaballeroThea CachuelaJohn Evander CainapDenielle Cedrick CamoAngelica Mhay CanlasLady Ann CanlasLerma CarbonKIRBY CARLOSNicole Antonette CarlosAgnes Mary Grace CarpizoAnnabeth CasteloJerie CataquianLeopoldo Pereabras CerenadoArnie ConcepcionKrystal Kay CortezChrezyl Mae CruzGianne CruzMARK JASPER DABUElaine DalagHYNESS DAYRITKATRINA MICHELLE DE GUZMANSheela Dela CruzWelzie Dela CruzALLAINE FAITH DELLERAAnnia Marie DeoNERICSON DIMARUCUTClariza DionisioJimwel Marius DizonRhozel DizonFloy Verenice DonayreDiana Rose EnriquezMarvin EspinosaChelsea Amaina EvangelistaMaria Franchesca Francisco-MagoAlvin Jay GalbanAnthony GicumMIRIAM GLODOTrisha Mae GoHazel GozarinRechelle GualbertoMarlon II JablaKristel JoseSumaya Niña KatoLady Nica LacuartaPaula Marie LampaDAISYRIE LAMPARAMichelle LansanganManny Lynn LargoEscel Mae LaxamanaJohn Michael LimpinErika LozanoManimar LucenioJe-Merlyn MabutasCharl Philip MacapagalJoannie MacaspacArianne Joy MaglalangJoel MagoRazel ManaliliMARY JOY MANALOLester ManasanNeal John ManguerraVanessa MangulabnanRodelio MendozaCHARINA MIRASOLMary Rose NacpilDondon NatataPaul Adrian NavarroShara Jane NazarioColeen Nicole NicdaoANALEE NOGOYHoney Grace PangramuyenCANDICE PANLAQUIJeneffer ParaderoJoann ParasAlvin PatawaranANN CLAINE PAULEDarlyn Mae PayomoElsa PerezAshley Anne PinedaJonibelle PineroALVIN QUIAZONAilyn QuizonMa. Cleofe ReagaRosalinda RebongCarlo Jovir ReyesNiklaus ReyesPatrick ReyesERNESTO ROSALES JRJuthird RoseteYnamae Lynet SalacCHRISTINE SALONGAAlvin John San JuanMary Grace SanchezMiguel Franco SerranoHannah Marie SimbajonEan Viccent SiongcoJoshua Kyle SorianoLovie Jean SuarezMelita TiuMaxwell TorrefielMark Anthony TuazonDiana TulabutJennalyn TungolAgata Monique VelasquezRomeo VergaraSANDER VILLAREALJasmin VivasPaula Jacqueline VizcaynoAlyssa Williane YatcoJulie Ann YuJanine Ruth May YusiIrvine Polo ZurbanoJohn Michael Lagman
IT Courses

OneDrive User Guide

IT Security Awareness Training
Sean NicdaoJonibelle PineroAlvin Jay GalbanJohn Michael LagmanMark Anthony Tuazon
IT Courses

IT Security Awareness Training

Acceptable Use Policy
Lumi AdminMark John Dela CruzLucky FunelasJoannie MacaspacArianne Joy MaglalangKate Peñafiel
IT Courses

Acceptable Use Policy

To outline the acceptable use of computer equipment at Connext Global Solutions. These rules are in place to protect the employee, and Connext Global Solutions. Inappropriate use exposes Connext Global Solutions to risks including virus attacks, compromise of network systems and services, and legal issues.

Connext Email Policy
Mikhail Dominico AcostaLeonavi AndoZerxes Daniel BinuyaLady Kate BuhayThea CachuelaLeopoldo Pereabras CerenadoKrystal Kay CortezElaine DalagMark John Dela CruzTrisha Mae GoHazel GozarinJohn Michael LimpinManimar LucenioJe-Merlyn MabutasCharl Philip MacapagalJoannie MacaspacArianne Joy MaglalangColeen Nicole NicdaoElsa PerezALVIN QUIAZONYnamae Lynet SalacLovie Jean SuarezSydney TatoyJasmin VivasJanine Ruth May Yusi
IT Courses

Connext Email Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Email Retention Policy
John Michael Limpin
IT Courses

Email Retention Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Identifying and Preventing Phishing Threats
Iyra AcigaMikhail Dominico AcostaLumi AdminJanicar Joyce Al-OtaibiLeonavi AndoArianne Kate BorromeoLady Kate BuhayThea CachuelaLeopoldo Pereabras CerenadoKrystal Kay CortezElaine DalagMark John Dela CruzTrisha Mae GoHazel GozarinJohn Michael LimpinManimar LucenioJe-Merlyn MabutasCharl Philip MacapagalJoannie MacaspacArianne Joy MaglalangColeen Nicole NicdaoElsa PerezALVIN QUIAZONYnamae Lynet SalacLovie Jean SuarezJasmin VivasJanine Ruth May Yusi
IT Courses

Identifying and Preventing Phishing Threats

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

Equipment Disposal Policy
John Michael LimpinJoannie MacaspacArianne Joy Maglalang
IT Courses

Equipment Disposal Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Removable Media Policy
Mikhail Dominico AcostaLumi AdminLeonavi AndoLady Kate BuhayThea CachuelaLeopoldo Pereabras CerenadoKrystal Kay CortezElaine DalagMark John Dela CruzTrisha Mae GoHazel GozarinJohn Michael LimpinManimar LucenioJe-Merlyn MabutasCharl Philip MacapagalJoannie MacaspacColeen Nicole NicdaoElsa PerezALVIN QUIAZONYnamae Lynet SalacLovie Jean SuarezJasmin VivasJanine Ruth May Yusi
IT Courses

Removable Media Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Remote Access and Virtual Network Policy
Iyra AcigaMikhail Dominico AcostaLumi AdminLeonavi AndoLady Kate BuhayThea CachuelaLeopoldo Pereabras CerenadoKrystal Kay CortezElaine DalagMark John Dela CruzTrisha Mae GoHazel GozarinJohn Michael LimpinManimar LucenioJe-Merlyn MabutasCharl Philip MacapagalJoannie MacaspacColeen Nicole NicdaoElsa PerezALVIN QUIAZONYnamae Lynet SalacLovie Jean SuarezJasmin VivasShy WambangcoJanine Ruth May Yusi
IT Courses

Remote Access and Virtual Network Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Physical IT Equipment Security Policy
Iyra AcigaMikhail Dominico AcostaLumi AdminJanicar Joyce Al-OtaibiLeonavi AndoLeni BocatoLady Kate BuhayThea CachuelaLeopoldo Pereabras CerenadoKrystal Kay CortezElaine DalagMark John Dela CruzTrisha Mae GoHazel GozarinJohn Michael LimpinManimar LucenioJe-Merlyn MabutasCharl Philip MacapagalJoannie MacaspacColeen Nicole NicdaoElsa PerezALVIN QUIAZONYnamae Lynet SalacLovie Jean SuarezJasmin VivasShy WambangcoJanine Ruth May Yusi
IT Courses

Physical IT Equipment Security Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

User ID and Password Policy
Iyra AcigaMikhail Dominico AcostaJanicar Joyce Al-OtaibiLeonavi AndoLady Kate BuhayThea CachuelaLeopoldo Pereabras CerenadoKrystal Kay CortezElaine DalagMark John Dela CruzTrisha Mae GoHazel GozarinJohn Michael LimpinManimar LucenioJe-Merlyn MabutasCharl Philip MacapagalJoannie MacaspacColeen Nicole NicdaoElsa PerezALVIN QUIAZONYnamae Lynet SalacLovie Jean SuarezJasmin VivasJanine Ruth May Yusi
IT Courses

User ID and Password Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Skip Feedback
Feedback
  • FeedbackWe want to hear from you!

Stay in touch

Data retention summary
Get the mobile app

Proudly made with

Moodle logo

Made with by conecti.me