Geri
Sanal Kampüsü
Talimat Kılavuzu
Eğitim Modülleri
VOOC
1 Management & Tracking of apprentices
1.1 Digital Apprenticeship Tracking Systems Design
1.2 Apprenticeship Management Software Utilization
1.3 Compliance with data security standards and intricacies of tracking workflow
2 Data Analysis & Usage
2.1 Data Analysis Techniques
2.2 Data Visualization
2.3 Data Interpretation and Decision-Making
3 Engagement with Stakeholders
3.1 Negotiation and Conflict Resolution
3.2 Stakeholder Engagement Strategies complying with GDPS issues
4 Curriculum Alignment
4.1 Alignment with Educational Standards and Labour Market Requirements
4.2 Instructional Material Selection
4.3 Creation of Alignment Documentation
5 Mentorship and Guidance
5.1 Understanding the Role of the Mentor
5.2 Problem-Solving and Guidance Skills
5.5 Tailoring Support to Specific Needs of Apprentices
Giriş Yap
Kayıt Ol
Sanal Kampüsü
Talimat Kılavuzu
Eğitim Modülleri
VOOC
1 Management & Tracking of apprentices
1.1 Digital Apprenticeship Tracking Systems Design
1.2 Apprenticeship Management Software Utilization
1.3 Compliance with data security standards and intricacies of tracking workflow
2 Data Analysis & Usage
2.1 Data Analysis Techniques
2.2 Data Visualization
2.3 Data Interpretation and Decision-Making
3 Engagement with Stakeholders
3.1 Negotiation and Conflict Resolution
3.2 Stakeholder Engagement Strategies complying with GDPS issues
4 Curriculum Alignment
4.1 Alignment with Educational Standards and Labour Market Requirements
4.2 Instructional Material Selection
4.3 Creation of Alignment Documentation
5 Mentorship and Guidance
5.1 Understanding the Role of the Mentor
5.2 Problem-Solving and Guidance Skills
5.5 Tailoring Support to Specific Needs of Apprentices
Giriş Yap
Kayıt Ol
Curriculum
1 Section
5 Lessons
10 Weeks
Expand all sections
Collapse all sections
Çıraklık veri yönetiminde Genel Veri Koruma Tüzüğü (GVKT) ile uyumluluk ve yasal standartlar aracılığıyla yön bulma
9
1.1
Veri koruma yasalarına genel bakış
1.2
Test 1
1.3
Çıraklık takibinde veri güvenliği ve gizliliğin temelleri
1.4
Test 2
1.5
Çıraklık veri yönetiminde uygulanacak siber güvenlik uygulamaları
1.6
Test 3
1.7
GVKT Uyumluluğunu Kontrol Edin!
1.8
Test 4
1.9
Ek Kaynaklar
This content is protected, please
login
and
enroll
in the course to view this content!
Modal title
Main Content