%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> /XObject << /I1 16 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text /ImageC ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20250717044903+00'00') /ModDate (D:20250717044903+00'00') /Title (Report 07-2025) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4137 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 195.458 521.469 551.276 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 195.833 520.719 550.526 re S 0.773 0.773 0.773 rg 61.016 211.208 m 550.984 211.208 l 550.984 211.958 l 61.016 211.958 l f 0.200 0.200 0.200 rg BT 61.016 693.716 Td /F1 14.4 Tf [(INFORMATION SECURITY AWARENESS TRAINING)] TJ ET 0.400 0.400 0.400 rg BT 61.016 664.909 Td /F2 9.0 Tf [(Posted on )] TJ ET BT 104.045 664.909 Td /F3 9.0 Tf [(May 10,2021)] TJ ET BT 156.578 664.909 Td /F2 9.0 Tf [( by )] TJ ET BT 171.086 664.909 Td /F3 9.0 Tf [(IT Communications)] TJ ET 0.153 0.153 0.153 rg BT 61.016 637.420 Td /F4 9.0 Tf [(Part of living in a connected world is understanding that our )] TJ ET BT 61.016 626.431 Td /F4 9.0 Tf [(private information is more vulnerable. ID theft and data breaches )] TJ ET BT 61.016 615.442 Td /F4 9.0 Tf [(are no longer isolated incidents, they happen every single day.)] TJ ET BT 61.016 595.453 Td /F1 9.0 Tf [(So why would a university be targeted?)] TJ ET BT 61.016 575.464 Td /F4 9.0 Tf [(Universities hold a great deal of information that could be )] TJ ET BT 61.016 564.475 Td /F4 9.0 Tf [(exploited if it gets into the wrong hands. This information includes )] TJ ET BT 61.016 553.486 Td /F4 9.0 Tf [(personal details and research data.)] TJ ET BT 61.016 533.497 Td /F1 9.0 Tf [(Consequences and why it matters:)] TJ ET BT 61.016 513.508 Td /F4 9.0 Tf [(Though not all data security incidents will lead to the loss or theft )] TJ ET BT 61.016 502.519 Td /F4 9.0 Tf [(of information, they will expose information to unwanted risk.)] TJ ET BT 61.016 480.730 Td /F4 9.0 Tf [(A full data security breach will involve a known disclosure or inappropriate access to information, which is a more serious )] TJ ET BT 61.016 469.741 Td /F4 9.0 Tf [(incident. Any data security incident could potentially be disastrous for both you and the institution.)] TJ ET BT 61.016 449.752 Td /F4 9.0 Tf [(In an effort to create awareness around some of the typical hacks that we all fall prey to, we have made an Information )] TJ ET BT 61.016 438.763 Td /F4 9.0 Tf [(Security Awareness training programme available. This is a self-study programme with fun quizzes in-between. This is by )] TJ ET BT 61.016 427.774 Td /F4 9.0 Tf [(no means a programme that you will need to have a pass record. This course is strictly informational so that you will have )] TJ ET BT 61.016 416.785 Td /F4 9.0 Tf [(the necessary tools when it comes to Information Security.)] TJ ET BT 61.016 396.796 Td /F4 9.0 Tf [(To access the course, go to)] TJ ET 0.373 0.169 0.255 rg BT 174.074 396.796 Td /F4 9.0 Tf [(https://learn.sun.ac.za)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 174.074 395.645 m 262.121 395.645 l S 0.153 0.153 0.153 rg BT 262.121 396.796 Td /F4 9.0 Tf [(. When the SUNLearn main page opens, click on the "Information )] TJ ET BT 61.016 385.807 Td /F4 9.0 Tf [(Security Awareness Training" link and log in with your network username and password. If you're successfully logged in, )] TJ ET BT 61.016 374.818 Td /F4 9.0 Tf [(scroll down and click on the "Enrol me" button to enrol yourself for the course and to access the training material.)] TJ ET BT 61.016 354.829 Td /F4 9.0 Tf [(If you are unable to log on to SUNLearn and you are certain that the network credentials you have entered are correct and )] TJ ET BT 61.016 343.840 Td /F4 9.0 Tf [(active, please log a request via)] TJ ET 0.373 0.169 0.255 rg BT 187.079 343.840 Td /F4 9.0 Tf [(https://learnhelp.sun.ac.za)] TJ ET 0.18 w 0 J [ ] 0 d 187.079 342.689 m 292.136 342.689 l S 0.153 0.153 0.153 rg BT 292.136 343.840 Td /F4 9.0 Tf [(for SUNLearn support.)] TJ ET BT 61.016 323.851 Td /F4 9.0 Tf [()] TJ ET BT 61.016 303.862 Td /F4 9.0 Tf [()] TJ ET BT 61.016 283.873 Td /F4 9.0 Tf [()] TJ ET BT 61.016 263.884 Td /F4 9.0 Tf [()] TJ ET BT 61.016 243.895 Td /F4 9.0 Tf [()] TJ ET 0.400 0.400 0.400 rg BT 61.016 225.406 Td /F2 9.0 Tf [(Posted in:News,Notices,Security,Training | | With 0 comments)] TJ ET q 225.000 0 0 150.000 325.984 496.211 cm /I1 Do Q endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 174.0737 395.9632 262.1207 405.1207 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://learn.sun.ac.za/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 187.0787 343.0072 292.1357 352.1647 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://learnhelp.sun.ac.za/) >> endobj 16 0 obj << /Type /XObject /Subtype /Image /Width 300 /Height 200 /ColorSpace /DeviceRGB /Filter /DCTDecode /BitsPerComponent 8 /Length 17392>> stream JFIF``BExifMM*J PiZ >SONYSLT-A99V '  (00004 0 2015:04:09 14:56:522015:04:09 14:56:52250mm F1.4 }http://ns.adobe.com/xap/1.0/ 2015-04-09T14:56:522015-04-10T13:14:47 C    !'"#%%%),($+!$%$C   $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$,"N !1AQa"2q#BCR$Sbr%34DETsU&6c,!1AQ#"aq2 ?ʣ#橴) E 8H~Cph3sFUk&Ap efui'IO <غ9(5xK,X홢H8wfz6(J%oG7g%OJ#s{W [pK쾔 _".i>u뵱EID@@0ް.=_8HP*?SR-T^eTnpN9+m CC͑И K`xVlkc͏ k^ީ5_LRmL:wf+cG''^SūsOʓ'Z+N<&| 槩) #U Yu#-f҆O7*-q2$.1b U+ep\y!u7Hahqj+GfJ{BѵHt˷-[w$m#SNڊ3ЌɰU׮wk>`~<>״)H~\D|^E4eѧ5(=vm=ZO$ULn)❧) iKA[女ݢ%B^4dQnoU0_ (U쥠hՔtCƘAJ!ùFXridv)E/Ih= N 훸?SN\Ɔ BzIW|l\ unTݟ!(זZ{y릤]҇FCT+_Ltڅ=,ɇMHRƜ׈ZKjZOna{0*[Q3ALL BM tn(t)yD&DkJM!yv)GN"jn@xǿ"eoW>e1~*N/lY?ho?m H0۩7;D]wS'&)0oHAo1R˿eh'j-f*ʻxK=lշ6ɡ:M@ta^ZG勯D5QͶRtaV)ȭ3ҟt$ zCL*];gNЈ)$okB :Zú6T˰3y~Vgn[jX̵XuX|Ni#ZeE]qں|w&{5on w+\1v*|Zeb] plnГQ/+EDZ2{P3|)zOc W;F%A^2i-tEEqfjY[i&Nл[8@L;fJTxoSWrQ|R˃q[XՕJy6dAɞc_7s> yh--hkĢA&վ e7- R4 C6vED=|c*Bnwh6-Z6#xyÊ繥Ҕ=M.ii'tR ZqM0sTrƑ[mnBu93(I(oCɤV]mMI@XMnK!ぜ>wN(UaP vfَ骨:aΓP8aXXrXCm:y2&baxtawG[YM⚇F)N]K*;'ٲG? +)ۭ)ƞfVMܺesᒷz, (SgbN*X~Z2ء>{aqY7<i3FnI2xR &0d$II0:-%Yxͷ5@=(>*4jGYݫ`10r WݗP#OT42/bC#wyZo,:0W_e[eCh.Ϋ&%cl >^Omi+ߩ~H᙮*KG2 qW( SF^6x^\hJ+ ۬[κ(ۜ3Q8(2D^d*JlX ‰5#,+E(t7;ڎJ0U$=,rVhwX\B=> E: I`G"жŃPA[ nR|cTo0uc)y]LZdm1UI~M')a}`ܦPlOL;zG3J'oR}qMlG6a;+*\|V1TRB@ w{ts╹{Bi"1UcR kpo{Lgnٿ_sOe4ysnrIZ +e*Ta0:,Jhw=:iz.+ϗtKQWJ vF*JFntiPmH惣&mum%c ߍNʥmR\gPCY#FIeu?[_.vc@St{8#/ߑNa,9>6@SWJ0 ~5VAI!/hij.r [V䳶CRΪ4t*Tu1DkZr7-)ʔKA-ƻpc ȫMm9cO>N[hat3 JutѶ?!{"Kρ6nkCw@al &WGlW<Uko//һkyIq]ظe\wnv~lIz~ ?}꥟LZd H8\^>,O DaTćeE1ݔ] Nn#L)6[P?eo17i5eRA ;8 S_5Uhm24ӄζX%dLM.왢TRi٧'3Pu ssz=9mwQ<{!Se|8Fkv[kxYjX%EG%D g2g o% r촻S -`n^X)ќHܽZ[CK+᜜JhT׎)䠈Qm5pH!MMƀxȘH0 jeuϡv㾻hj V*0 wwv`9/c2;u_' &тxZ)}K[ⷀ/Di|C,kTXk`; mUt8ppM\jM\7B\%d\R(Ğ 𶊺u 끌+}Xoٽ\SIh*$N0պFђye Y. Z$kOjdӵ0 ܨvV7kbWGa$2t!/x@0y"C/qCWM2XrJ80O0/[qIa+n}kZ֗h*j?D aP[csF:nM?RZqhhHM1=(fVD'kgn!}4! l( ,ci*?Q/U_k*(5PN?A섯Ɔ3hF򅦆J7׼e7ߑ9qՕh"d/]KLx<?HUk <Σ2Ѻh\0< Wr$ te ƈ;fؚ;0AܻOX`2a81ハI6k-j߄dL598c^WK;ѣMtp h+ga[ pGհ4k{J}MN%vg'՛;?F(ѿ~)hv sO0#uIэ%n0,Xny.zog(-r֣*Sp&CSvcՌ.wkz\I9% 1JCK |g[3[ޕuG) nWDR^g 1y֨Vkwzj _Z5'ԷjX#:xm kG Y.>[А7^խ+<,2Ǵ3Nc=[waNCZio~J_7> QG4 $(+9 3EPAdm+L9[Si%̐cyom#qOKp4ÙSnkˈEC.׊8 \ZMB3y㙿7O`.hʝ$ -7S_ kqڜnGwO n,kq#3nۿoa$3K98,DutuS޳V#ވG%K ϳ[ o8(L޾dBc7vt}oNԘP1ҟ~+˅.tW ?ZS4w۹fU 2>KMH}gJ>tT*i(m-.S6tpAL~K-pu搯k~ Ck>v76^e5E8ɛ!%r48]O*߂6.뭒%p3FLo兘e2Qx,U#~Gw24 sa ${u3L܁)X? oQ,[;fPٶ,S<#tݽHMlE]!Ckj7{ža*WQJb؝lҥ$`c `ќ~e}3ƑU>+:XnQ*.j e}‡B0*OJ6SŕCPBԏ5;zJn\ghC'c9j:L٩trO61\S<"Qjn .=GdKd?EG5S";]s J6]rNأ nNHkQJp3&/KT 3V؍YMIۛ:odRy7tL8P{AFZI|X;~?4QxM+h6žrҾ 9QڳmU[2GZ2Zqy)n~tK LdfQ4Q! [ĬkժS`4;6m:آL K׊Gى$wzӢ[E=;[+w nU59Mlékwqκ"hYQU-^qt u4(sxy3nJmDovrO*M-#fcnԦ-ߖC(mr&8M.4ժg;0w)`_w[P>U{3FԳӢ^qZgz]]qS7 Mun[~!ve8 `[[e2I##w=TI㭤x#GgTsc29)#2 +.n5UV=3tb<04o rלIe+δ}WYE1(xXʑSmрVJۭuq~ॶS5c+c '*Ƒ,w:XA{4 +BXD1c)%`[k$ ΰjӪ 6ݨ$2[jᇘWS* Nvs*XVzJ'ccuK; F۔ts '5~8}6]vZȃV+J2S~JZ8 mcf8O[%>Z噠V޺i|(\_A]O*ӎOZM-|6|dUz8Kޤ4Z cӄr?FI6- =xKiSƪ5Lug/is909'z / (iTʧPSu;͓pd_s':*H2hzr$.F@l}nQ|Fw|pn°?i)dmUc'cUGV̝5F1r}a8kG`Ʒ5uR}X䀼;Ėcx瑪`2ь:hNI&!\]$8`oJjL?C0Se{{dPnQ.\DGY{W9`˓<\'kZ #˒|J(NٛyϐY\E /Qk6:H˓Y8!y=zt3kK DA}r.Vu1%h ɤ\xerc'ꊑiV f?\@TZFx%\Ѯ{``˓tx EPQp h=%`fMi%qQW;B=r8Qbޯc 5X\$0,*ձr3G˓@p ig)K80rhF5M88.\q4B/ endstream endobj xref 0 17 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000332 00000 n 0000000369 00000 n 0000000507 00000 n 0000000596 00000 n 0000004785 00000 n 0000004897 00000 n 0000005012 00000 n 0000005132 00000 n 0000005240 00000 n 0000005368 00000 n 0000005444 00000 n 0000005572 00000 n 0000005652 00000 n trailer << /Size 17 /Root 1 0 R /Info 5 0 R >> startxref 23213 %%EOF Training « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Training

Put some power in your Powerpoint and Outlook

Friday, October 18th, 2013

Next week’s Powerpoint and Outlook training is especially for all the Tygerberg users.

If you want to put some power in your presentations or learn how to optimise your Outlook usage for more than just sending e-mails, join us at Gerga on the 22nd and 23rd.

Intermediate Outlook 2010:  22 October  

Customizing Message Options, Organizing and Locating Messages, Setting Calendar Options, Tracking Activities Using the Journal, Managing Tasks, Sharing Folder Information, Customizing the Outlook Environment

Intermediate Powerpoint 2010: 23 October

Getting Started with PowerPoint, Creating a Basic Presentation, Formatting Text on Slides, Adding Graphical Objects to a Presentation, Modifying Graphical Objects in Presentations, Working with Tables, Working with Charts, Preparing to Deliver a Presentation.

To enroll, just follow these easy steps. No registrations can unfortunately be done by the IT Service Desk on behalf of staff.

 

Learn more about SharePoint

Friday, October 4th, 2013

Only two months remain of this year, but if you’re still up for learning SharePoint, here’s your opportunity. 

On 31 October and 1 November a SharePoint level 1 two-day course will be presented for all SharePoint owners, as well as those who might be using this platform in the near future. 

During the two day course you will use, create, and edit content in a team website. You will also create and perform basic management of a team site using SharePoint Foundation 2010. This course is designed for individuals who will need to access information on a Microsoft SharePoint team site or for individuals who may need to create and manage a team website.

WHAT YOU WILL LEARN

Introducing Microsoft SharePoint Foundation 2010
Working with Lists
Working with Libraries
Communicating with Team Members
Working Remotely with SharePoint Content
Customizing Your SharePoint Environment
Creating a Team Site
Performing Basic Site Administration
Branding a Site Collection
Managing Lists
Managing Libraries
Managing Form Libraries
Managing Content Structures
Managing Workflows
Working with Indexing and Searching
Working Offline Using SharePoint Workspace 2010
Managing the SharePoint Applications Using Central Administration
Managing User Access
Managing Site Security
Managing Site Usage
Managing Site Maintenance

If you’re still typing with two fingers, you can improve your typing speed and skill by attending the Typing course on 8 November in Stellenbosch at the CTU offices.

To enroll, just follow these easy steps. No registrations can unfortunately be done by the IT Service Desk on behalf of staff.

 

Meet TED

Friday, September 20th, 2013

TED has been inspiring millions around the world and most of the time he only has 18 minutes to do it! Quite the motivational speaker, isn’t he?

Good thing TED isn’t just one person otherwise he would’ve been exhausted after almost 30 years of talking.

TED talks began as a simple attempt to share what happens at various TED conferences around the world. It started off way back in 1984 when people from three different worlds – Technology, Entertainment and Design – came together at a conference to share ideas. They realized that some of these ideas might actually be cool and worth sharing with other people. And so TED talks was born.

In spite of it’s popularity TED remains a nonprofit organization and has grown exponentially over the years.  Along with two annual conferences, the TED Conference and TEDGlobal, TED includes the award-winning TED Talks video site, the Open Translation Project and TED Conversations, the inspiring TED Fellows and TEDx programs, and the annual TED Prize.

But the most popular of all these seem to be TED talks. As talks were given at conferences around the world, they were released online and quickly attracted a global audience who liked what they heard. Since June 2006, they have been offered for free viewing online, under Attribution-NonCommercial-NoDerivs Creative Commons license, through TED.com.

In January 2009 the then amount of videos had been viewed 50 million times. In June 2011 the amount of views totaled 500 million, and on 13 November 2012, TED reached its billionth video view.

Initially speakers came from the three fields of Technology, Entertainment and Design, but over the years they have included scientists, philosophers, musicians, religious leaders, philanthropists and many others. Previous presenters include Bill Clinton, Jane Goodall, Malcolm Gladwell, Al Gore, Gordon Brown, Richard Dawkins, Bill Gates, Google founders Larry Page and Sergey Brin, and many Nobel Prize winners. Since speakers are given only 18 minutes, their ideas have to be conveyed in the most innovative and interesting way to capture their audience and often also though storytelling.

As of May 2013, over 1,500 talks are available free online. Every week 5-7 new talks are being published. Topics range from a talk on why bees are disappearing to how to make stress your friend and everything in between. Whether you’re looking for something informative, inspiring, ingenious or just plain jaw-dropping, you’ll find it here.

So what are you waiting for? Get some inspiration at http://www.ted.com/talks

 [SOURCE: www.wikipedia.org & http://www.ted.com/]

Are you digitally literate?

Friday, September 20th, 2013

Do you sometimes feel as if you and your pc aren’t speaking the same language? There’s an easy solution and it will only take up four days of your life.

Make sure you know everything there is to know about computers by joining us from the 14th to the 17th of October on Stellenbosch campus and beat your computer at it’s own game.

To prepare you psychologically, we’ll give you the course content (see below) and to enroll, just follow these easy step by step instructions.

 


A. COMPUTER BASICS COURSE

 Introduction to Computers

  1. The Role of Computers
  2.  Parts of a Computer
  3.  Using a Computer
  4.  Overview of a Keyboard
  5.  Using a Mouse
  6.  Input, Output, and Storage Devices

Common Computer Terminology

 Introduction to Hardware

  1.           What Is an Operating System?
  2.           Overview of Programs and Data

 Introduction to Networks

  1.           Using the Internet

Computer Performance and Features

  1. Types of Computers
  2. The Role of Memory
  3. Computer Performance
  4.  Productivity Programs
  5.  Communication Programs
  6.  Educational and Entertainment Programs

Computer Operating Systems

  1.  Functions of an Operating System
  2.  Introduction to the Windows Vista GUI
  3. Start Menu Options
  4.  Working with Windows-Based Programs
  5.  Managing Files and Folders
  6. Performing Basic File Operations

Career Opportunities

  1. Understanding the Widespread Reach of Computers
  2. Overview of Career Opportunities

 

B. PRODUCTIVITY PROGRAMMES 

Introduction to Productivity Programs 

  1. Overview of Productivity Programs
  2. Features of Productivity Programs
  3. Using Office 2010 Templates and Office Online
  4. Overview of Office Web Applications

Common Features and Commands 

  1. Introduction to the User Interface
  2. Using the Pointer
  3. Working with the Ribbon
  4. Using the Toolbars
  5. Keyboard Techniques for Entering Text
  6. Advanced Keyboard Techniques for Entering Text

Introduction to Word Processors 

  1. Getting Started with Word 2010
  2. Creating a Document by Using a Template
  3. Editing and Formatting Text
  4. Working with Tables and Pictures
  5. Proofreading a Document
  6. Creating a New Online Document
  7. What Is Desktop Publishing?

 

 

C. COMPUTER SECURITY & PRIVACY 

Introduction to Computer Security and Privacy 

  • What Is Computer Security and Privacy?
  • Natural Threats
  • Measures for Protection from Natural Threats
  • Threats from Human Actions
  • Measures for Protection Against Threats from Human Actions
  • Computer Threats and Measures for Protection

Protecting Your Computer

  • Guidelines for Protecting Your Computer
  • Best Practices for Securing Online and Network Transactions
  • Measures for Securing E-Mail and Instant Messaging
  • Measures for Protecting Your Computer

Protecting Your Family from Security Threats 

  • Measures to Protect Your Privacy
  • Online Predators
  • Guidelines for Protection from Online Predators

Keeping Your Computer Secure and Updated 

  • Securing a Computer
  • Configuring the Computer Security Settings
  • Keeping the Computer Up-to-Date

Computer Ethics

  • What Is Intellectual Property?
  • Copyright Violation and Prevention
  • Legal Concerns with Information Exchange

 

D. DIGITAL LIFESTYLES  

The Digital Experience 

  • Benefits of Digital Technology
  • Digital Technology and Media Devices

Introduction to Digital Audio

  • Characteristics of Digital Audio
  • How to Copy and Convert Digital Audio
  • Speech Recognition and Synthesis
  • Digital Audio

Introduction to Digital Video 

  • Characteristics of Digital Video
  • Digital Video Editing and Output Formats
  • Web Video Technologies
  • Digital Video and Web Technologies

Introduction to Digital Photography 

  • Overview of Digital Cameras
  • Digital Image Management and Editing
  • Printing Digital Images

Enjoying Digital Media on Your Computer 

  • Organizing Digital Media on the Computer
  • How to Enjoy Digital Media on the Computer
  • Using the Computer As a TV

Digital Technology and Career Opportunities 

  • Digital Technology and Your Work Place
  • Career Opportunities As Information Workers
  • Career Opportunities As IT Professionals
  • Career Opportunities As Developers

Adobe Acrobat one-day course

Friday, August 30th, 2013

Adobe Acrobat is a family of application software and web services developed by Adobe Systems to view, create, manipulate, print and manage files in Portable Document Format (PDF).

If you work with pdfs on a daily basis and would like to learn more about the optimal use of Adobe Acrobat, then this is the course for you. Read more on Adobe Acrobat here.

DATE

9 September 2013 (Full day)

VENUE

Stellenbosch University:  E-Classroom at SUN Library

————————————————————————————————————

COST: FREE

————————————————————————————————————

WHO SHOULD ATTEND:

Anyone wishing to extend their Adobe Acrobat Professional skills.

WHO SHOULD YOU CONTACT TO REGISTER:

Please send an e-mail to mvanrooyen@asaudit.ac.za with the number and names of the delegates.

 

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.