y outsourcing business processes we mean the entry of new data into the E-University and establishing interconnections between them. For instance, you need to provide a new student with access to his personal cabinet.
In this instance, you need to follow these steps:
Create student's personal record by means of E-University. By creating we mean copying student's information from the file provided by the customer. If the customer provides this information printed, he needs to pay for converting it into electronic form. Assign a curriculum to a student, i.e. determine the training schedule; set forth e-learning courses, tests, and online class times. Of course, the electronic educational content provided to us by the customer in electronic form is also entered into the system by us, as it would otherwise be impossible to assign a curriculum to a student. Fill in the “Finance” tab, i.e. determine the dates and amounts of payments and penalties for delay. Fill in all the rest of necessary directories and libraries. If a student needs a new training course (which is not located in the system, but created in electronic form of Word or other application), you need to create this course in the system and assign it to the student. If the course is not created, it makes sense to order E-University staff to develop it. Generate student’s password and user in the system and hand it out to the student.
The cost of outsourcing is defined individually and depends on the specific types of work.
Attention:by creation of e-learning content we mean the creation of content by means of E-University from the customer’s training materials, but we do not develop educational content ourselves. In this case, the customer must provide content in electronic form; otherwise payments for converting content into electronic form will occur.
Use E-University and don't worry about the safety of your system or your privacy.
E-University features industrial strength high-security. All communication is secured by digital certificated issued by a trust center authority. The data is encrypted using modern state-of-the-art AES-256 encryption and 2048-bit secured key exchange.
Encryption: 256-bit AES encryption (actual encryption algorithm may vary depending on browser capabilities). Digital Certificate, Public Key Infrastructure: 2048-Bit Certificate.