Computer Classes

Website Construction

Build a Website 1-2-3

In this 2-hour class, you will learn how to build a website by engaging three critical considerations:  choosing your domain name, choosing a web host, and choosing from among various methods for creating the content of your web page.  Seats will be filled on a first-come, space-available basis. Instructor: L. Atwater Computer Lab, Room 311
Social Media Protection

Social Network Safety/Security

In this 2 hour class, you will learn how information about you gets onto the Internet and the practical steps you can take for greater online privacy.  Seats will be filled on a first-come, space-available basis. Instructor: Curtis P. and Amanda S. Computer Lab, Room 311 Required Skills: The ability to read and comprehend English well, and the skills acquired in PC Basics, Word I Basics, Web I Basics, and Email Basics. You will learn: To locate and read a website's privacy policy
Mobile Devices

Mobile Device Security

In this 2 hour class, you will learn how to use your mobile devices more securely.  Seats will be filled on a first-come, space-available basis. Instructor: Curtis P. and Amanda S. Computer Lab, Room 311 Required Skills: The ability to read and comprehend English well, and the skills acquired in PC Basics, Word I Basics, Web I Basics, and Email Basics. You will learn: To engage your mobile device's internal security features The activities and sites to avoid security risks
Health Literacy for Healthy Living

Health Literacy for Healthy Living

In this 2.5 hour class, you will learn to find and assess quality online health information. Seats will be filled on a first-come, space-available basis. Instructors: A. Muhammad, PIA International, Inc. Computer Lab, Room 311 Required Skills: The ability to read and comprehend English well, and the skills acquired in PC Basics, Word I Basics and Web I Basics. You will learn to: Navigate medical websites. Evaluate medical websites for updates and active links. Research personal health issues.
Résumés and Cover Letters

Resume Writing and Cover Letter Workshop and Lab

This 2.5-hour workshop will feature how to maximize the use of Microsoft Word résumé templates to create a dynamic résumé that sets yours apart from the thousands received by an employer. Several websites will be explored to expand your knowledge and effective use of keywords and action verbs, with an emphasis on why both are important to your résumé construction.
Constant Contact LogoRomona Foster, Authorized Constant Contact Trainer

Look Great in the Inbox: 7 Don'ts of Email Design Plus Bonus (Registration Required)

Grow Your Business with Email and Social Media: Simple Marketing Strategies for Small Businesses and Nonprofits is sponsored by Constant Contact, Inc., and will show you that when it comes to your business or organization emails first impressions matter. This 2.5 hour seminar will help you avoid common mistakes and maximize your emails for a powerful impact!Register Now
Constant Contact LogoRomona Foster, Authorized Constant Contact Trainer

Standout Subject Lines: Get Opened, Get Read, Get Results (Registration Required)

Standout Subject Lines: Get Opened, Get Read, Get Results is sponsored by Constant Contact, Inc., and will show your email subject lines are working, or no working, to capture the attention and interest.  This 2.5 hour, fast-paced seminar will take a deeper dive into the mechanics of truly effective subject lines.Register Now
Knowledge Commons DC logo

The Basics of Online Security - Part 3

Sony, Target, and celebrity smartphone pictures have made “cybersecurity” headlines news. But technical security topics are often presented as black and white: either individuals are totally vulnerable and clueless or they are super-secure hackers. The reality is that online security is a range of gray. We can all take several small steps, each one improving our security bit by bit.
Knowledge Commons DC logo

The Basics of Online Security - Part 2

Sony, Target, and celebrity smartphone pictures have made “cybersecurity” headlines news. But technical security topics are often presented as black and white: either individuals are totally vulnerable and clueless or they are super-secure hackers. The reality is that online security is a range of gray. We can all take several small steps, each one improving our security bit by bit.
Knowledge Commons DC logo

The Basics of Online Security - Part 1

Sony, Target, and celebrity smartphone pictures have made “cybersecurity” headlines news. But technical security topics are often presented as black and white: either individuals are totally vulnerable and clueless or they are super-secure hackers. The reality is that online security is a range of gray. We can all take several small steps, each one improving our security bit by bit.

Pages