Our Bearcats Consulting Group is traveling the country leadi…

Our Bearcats Consulting Group is traveling the country leading Data Security Training presentations at hospitals. In this type of technical training, we teach them how to prevent and detect issues with quality of software programs or how to detect individuals who want to hack into the system through emails and phone calls . What type of technical training is this?

Our Bearcats Consulting Group is traveling the country leadi…

Our Bearcats Consulting Group is traveling the country leading Data Security Training presentations at hospitals. April offers a $25 gift card to the local pub for anyone who refers 3 coworkers to the program. What is the name of this training incentive program?

Our Bearcats Consulting Group is traveling the country leadi…

Our Bearcats Consulting Group is traveling the country leading Data Security Training presentations at hospitals. In this type of  training, we have someone interested in data analytics observe a person in that department to see if they want to learn this skill. What type of training is this?

Our Bearcats Consulting Group is traveling the country leadi…

Our Bearcats Consulting Group is traveling the country leading Data Security Training presentations at hospitals. As consultants, we are designing rubrics to assess how well our training program is performing. The rubric we have chosen has weighted dimensions where the maximum score is the same across dimensions. What type of rubric is this? 

Our Bearcats Consulting Group is traveling the country leadi…

Our Bearcats Consulting Group is traveling the country leading Data Security Training presentations at hospitals. Baylee works with IT professionals who are required to undergo so many trainings a year to ensure they receive continuing education units that will go towards their IT certifications. What type of training is this?

Our Bearcats Consulting Group is traveling the country leadi…

Our Bearcats Consulting Group is traveling the country leading Data Security Training presentations at hospitals. Danielle teaches on what type of software, but only the bigger hospitals have the software package. The other hospitals use a different software that isn’t compatible to her training so many don’t hire her to do the training. What access to resource need does this best describe?