on "Within HEAD"
Skip to main content
Door2Learn
  • Home
  • Course Categories
    Customer Service Sales & Marketing Health & Wellness Information Technology Next Big Idea Book Club Personal Development Professional Skills Leadership Human Resources منصة بلانك في الفيزياء
  • More
English ‎(en)‎
English ‎(en)‎ العربية ‎(ar)‎
Log in
Home Course Categories Collapse Expand
Customer Service Sales & Marketing Health & Wellness Information Technology Next Big Idea Book Club Personal Development Professional Skills Leadership Human Resources منصة بلانك في الفيزياء
  1. Courses
  2. Free Courses
  3. Information Technology

Information Technology

Optimizing Your Images for SEO

Optimizing Your Images for SEO

Companies place a lot of emphasis on editorial content, especially when it comes to search engine optimization (SEO). But words are only half the equation.

To capture attention and garner a reader’s trust, you also need images. And, if you’re not optimizing those images for the web, you’re missing out on a prime competitive advantage. In this course, you’ll learn what image optimization is and why it’s worth the effort. Then, you’ll get six must-know tips for taking your image optimization to the next level.
Go to the course

Search Engine Optimization

Search Engine Optimization

For the uninitiated, searching for things online might seem like magic. You type a few words in the search bar, click a button, and voila!—the answers to your questions are right at your fingertips. But why do certain webpages appear at the top of a results page? The answer is search engine optimization.

To start, search engine optimization (SEO) isn’t magic. It takes careful strategy. In this course, you’ll learn everything you need to know to get your business and content in front of as many eyes as possible by improving your search rankings and visibility. You’ll start with the basics, like keyword research and selection. Then, you’ll move on to more in-depth topics, such as technical optimization practices and how to optimize your content.
Go to the course

How to Protect Yourself Against Phishing Attacks

How to Protect Yourself Against Phishing Attacks

Reports of online scams and cyberattacks are on the rise, but most people don’t heed them until it’s too late. So, what steps can you take right away to avoid becoming another cautionary tale? One critical security measure is protecting yourself against phishing—when an attacker pretends to be a trusted contact or organization to gain access to personal information.

In this course, you’ll learn exactly what you’re dealing with in a phishing attack, as well as how to spot one. Most importantly, you’ll pick up immediately applicable tips to prevent theft and stop attackers in their tracks.
Go to the course

What Is Social Engineering?

What Is Social Engineering?

Social engineering is the art of manipulation to steal information. Unlike cybercrimes that involve cracking complex algorithms, it relies on predictable human behavior to get victims to reveal information voluntarily.

This course provides an overview of how social engineers exploit human psychology to access sensitive information, as well as tips for spotting attacks. By becoming aware of these dangers, you’re less likely to fall victim to various forms of manipulation.
Go to the course

Online Security Fundamentals

Online Security Fundamentals

How do you keep your home safe? At the minimum, most people lock the doors when they leave. Others install motion-sensitive lights or security cameras. Some invest in alarm systems to protect against threats.

But safeguards aren't just for physical spaces. We store highly sensitive data online. Exposure of that data has a far-reaching impact, with consequences more devastating than losing valuables to a thief.

In this short course, you’ll learn strategies to protect yourself online and get tips to block incoming threats. Finally, you’ll review how to act fast to minimize damage if a security breach occurs.
Go to the course

How to Protect Your Data

How to Protect Your Data

Modern-day theft scarcely resembles heists and burglaries of the past—it has evolved into the digital sphere, requiring us to learn new security practices alongside the old ones.

In this course, learn what constitutes confidential data, why it’s important to keep it safe, and essential security best practices that include both cyberspace and physical facilities.
Go to the course

Windows 10 Essential

What's New in Powerpoint 2019

Door2Learn

UNLOCKING MINDS, EMPOWERING FUTURES

Contact Us

  • Email: info@door2learn.com
  • Website: www.door2learn.com
You are not logged in. (Log in)
Data retention summary
Get the mobile app
Powered by Moodle