The Institute relies on the following steps to ensure the prevention of fraud and impersonation:
• When the trainee registers, his mobile number and e-mail are included, where the user is verified through a documentary message to verify the trainee's identity.
• The trainee's data can only be modified by communicating with the Institute's Training Department, where this change is approved by the administration.
• During the lectures, the trainee's presence is verified by the trainer or through the training department.
• The trainee's account is suspended in the event of repeated attempts to enter the wrong account, and the account is not reused until after communication between the trainee and the institute.
• During the lectures, the trainee is not allowed to use a pseudonym.
• The instructor verifies the student's identity and then is allowed to enter the lecture.
• Allocating a special account for each trainee (other than the registration account) that is used to make the applications and tasks required of the trainee.
The mechanism of examining the work of the trainees:
• Interactive application tasks: where the trainees are assigned tasks during the lectures, and the trainer discusses the trainees in these tasks and makes notes on them.
Weekly duties: The trainer assigns the trainees to do home tasks on a weekly basis, and what the trainee has done on the servers of the system or the programs used after completing the tasks is discussed, and the trainer makes notes on them during the lectures.
• Final project: The trainee (or a group of trainees) is assigned to complete a project assigned to him (them), and the trainer evaluates the project at the end of the training course.
To communicate with the training management team when changing the mobile number or e-mail of the trainee, training@solutionmakers.com.sa