Page 25 - IT SDP_SeKON
P. 25

Applications Development



                   Related Skills & Knowledge Development Opportunities

                        Microsoft Word                                   An Overview of Open Standards

                        Microsoft Excel                                   and its Impact


                        Microsoft PowerPoint                             Processes, Systems, Tools, and
                                                                           Techniques for Data Heuristic
                        Building Security
                                                                           Designs
                        Heuristic Designs (Based on Data

                                                                          Introduction to Cryptography
                        Feeds)
                                                                          Starter Guide to Cybersecurity
                        Internet of Everything

                                                                          An Agile Information Technology
                        Interoperability
                                                                           Service Management (ITSM)
                        Open Standards
                                                                          Building Your Own Agile Branding
                        Overview of Service-Oriented
                                                                          Managing Knowledge
                        Architecture (SOA)

                        Understanding the Tools and

                        Techniques of the Internet
























     25            Version 1.0 – January 2017


                  INTERNAL CMS USE ONLY! INFORMATION NOT RELEASABLE TO THE PUBLIC UNLESS AUTHORIZED BY LAW: This information has not been publicly
                  disclosed and may be privileged and confidential. This document must not be disseminated, distributed, or copied to persons not authorized to
                  receive the information. Unauthorized disclosure may result in prosecution to the full extent of the law.
   20   21   22   23   24   25   26   27   28   29   30