Font size
  • A-
  • A
  • A+
Site color
  • R
  • A
  • A
  • A
Connext
  • Dashboard
  • Course search
  • Onboarding
  • Management Academy
  • Business Academy
  • Professional Academy
  • Life Skills Academy
  • Connext Compliance Courses
  • Certificates
  • ILT Course Catalogue
  • English ‎(en)‎ English (United States) ‎(en_us)‎
  • Log in
Skip to main content

IT Courses

  1. Home
  2. Courses
  3. Categories
  4. Business Academy
  5. IT Courses
Uptime Monitoring Tool-Manual
IT Courses

Uptime Monitoring Tool-Manual

Manager’s Centralized Utilization Trackers
IT Courses

Manager’s Centralized Utilization Trackers

Q2 IT Security Awareness Training
IT Courses

Q2 IT Security Awareness Training

OneDrive User Guide
IT Courses

OneDrive User Guide

IT Security Awareness Training
IT Courses

IT Security Awareness Training

Acceptable Use Policy
IT Courses

Acceptable Use Policy

To outline the acceptable use of computer equipment at Connext Global Solutions. These rules are in place to protect the employee, and Connext Global Solutions. Inappropriate use exposes Connext Global Solutions to risks including virus attacks, compromise of network systems and services, and legal issues.

Connext Email Policy
IT Courses

Connext Email Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Email Retention Policy
IT Courses

Email Retention Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Identifying and Preventing Phishing Threats
IT Courses

Identifying and Preventing Phishing Threats

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

Equipment Disposal Policy
IT Courses

Equipment Disposal Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Removable Media Policy
IT Courses

Removable Media Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Remote Access and Virtual Network Policy
IT Courses

Remote Access and Virtual Network Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Physical IT Equipment Security Policy
IT Courses

Physical IT Equipment Security Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

User ID and Password Policy
IT Courses

User ID and Password Policy

To ensure the controlled use of removable media devices to store and transfer information by all Connext employees, clients and business partners who have access to information, information systems and IT equipment for the purposes of conducting official business. This policy aims to ensure that the use of removable media devices is controlled.

Skip Feedback
Feedback
  • FeedbackWe want to hear from you!

Stay in touch

Data retention summary
Get the mobile app

Proudly made with

Moodle logo

Made with by conecti.me