Introduction

The need for human capital development in ICT cannot be overemphasized, as Information and Communication Technology is obviously the driving force of every economy around the world.

As a result of this development, the Entrepreneurship and ICT Capacity Building Training under Brekete Academy was introduced, managed, and conducted by Adus Michael for Amadurs Technology Limited.

So the aims and objectives are poised to ensure that Nigerians are equipped with ICT skills that will make them safe online, to be productive, self-reliant, and to be able to meet up with the demands of this digitalization age.

This initiative also aims to provide an opportunity for participants to be introduced to online entrepreneurship and to create viable employment opportunities in the Information and Communication Technologies (ICTs) industry.

We have realized that the potential of a country is not just measured on its GDP or natural resources but on its workforce and its skills. Driven by this realization, we have carefully put together various professional ICT skills as modules that will empower Nigerians and to effectively tackle, unemployment, dispel insecurity, instill confidence amongst the populace and consequently ensure fruitful engagement of the country’s workforce.

Content

1. Web Publishing……………………………………………………………..

(A) Identify the main advantages of having a website: access to a global audience, ease of updating, audience interactivity, and cost savings…………..

(B) Recognize search engine optimization techniques e.g. including relevant metadata, including a sitemap and website links, registering with a search engine……………………….

(C) Recognize the factors that impact web page download speed: audio, video, graphical objects, animation content, and file compression…………………………….

2. Web Concepts…………………….

(A) Understand that the Internet supports a range of services such as the World Wide Web (WWW), File Transfer, email, instant messaging (IM)………..

(B) Understand the term client/server. Understand the functionality and relationship between the browser and the webserver……..

(C) Understand the terms domain, Uniform Resource Locator (URL), hyperlink, web hosting, search engine…..

3. Content Management System (CMS)……………………………………

(A) And Which CMS To Focus On…………………………………………………….

(B) About WordPress…………………………………

(c) Understand the role of WordPress as CMS and the recommendations on implementation……………

(D) Installation and Configurations of WordPress from Cpanel………………………………………

4. Website Development…………………………………………………

(A) WordPress Dashboard and Features…………………………

(B) Theme and Plugin Features…………………..

(c) Content Development……………………

(D) Social Media Integration for promoting the website…………………………….,

(A) Facebook Page, Twitter, LinkedIn, etc.

5. Search Engine Optimization (SEO)……………………

(A) Yoast SEO

6. Legal Issues……………………………

(A) Understand the term copyright and its implications for text, images, audio, and video available on websites……………………………………

7. Cyber Security…………………………………

8. Mobile App Development……………………………………

9. YouTube Channel Monetization……………………………………………

About This Training Manual

This manual starts by walking you through the basics of understanding and setting up WordPress so that you can:

  • Understand the fundamental difference between a blog and a website.
  • Define what a content management system (CMS) is.
  • Explore different ways that websites use WordPress.
  • Get to know WordPress’s basic requirements.
  • Explore web- hosting recommendations.
  • Install WordPress on your web server.
  • Discover ways to publish and manage your content.

In this manual, you also discover the right tools to use for publishing and designing with WordPress, including tools that help you:

  • Write great content.
  • Transfer files from your computer to your web server.
  • Plan your design strategy.

In This Part…

  • Get an overview of the concepts of WordPress web design, including the basic requirements needed to design with WordPress.
  • Discover how to install WordPress on your web server.
  • Explore the different types of content that can be published with WordPress.
  • Build a solid starting point for designing your website with WordPress.

Exploring Web publishing

Web publishing, or “online publishing,” is the process of publishing content on the Internet. It includes creating and uploading websites, updating webpages, and posting blogs online. The published content may include text, images, videos, and other types of media.

Before the Internet, companies had to rely on designing printed materials or pay for advertising space in a newspaper to spread a marketing message. In today’s modern world, where a majority of the population has access to the Internet, spreading a message has never been easier or more efficient.

With web publishing, you do not need to pay an expensive designer to come up with art or pay for thousands of advertising prints to mail to a targeted list. With web publishing, you can extend your reach and ultimately reduce your marketing budget in the process.

That was why the Ordinary President created this Entrepreneurship and ICT Capacity Building Training so your entire marketing initiative, online business needs, products, and services especially customers that will patronize you can be generated and manages by yourself when you attend our training. Because is a practical approach to hands on training that will empower you to become an expert in the ICT space.

(A) Identify The Main Advantages Of Having a website:

In today’s digital world, nearly everyone is connected in some way to the World Wide Web in order to satisfy their entertainment, education, research and consumer needs. The popularity of the Internet has prompted businesses of all sizes to have an online presence in the form of a Website.

If your business does not have a Website as of yet, your business probably isn’t performing to its fullest of capabilities. Having a Website can provide a number of benefits to your business that you may not have been aware of before.

Your website is a powerful marketing tool. A well-maintained website can help you gain a competitive advantage in your industry and improve your business image. Developing your web site offers many benefits including helping you get more leads and prospects, increase sales, enhance your professional brand, and improve your customer service.

But surprisingly, according to various recent studies, just about 35% – 40% of all small businesses don’t have websites. That is where our Entrepreneurship and ICT Capacity Building Training comes in, providing you with the skills to design and develop any type of website of your choice or that of your client.

Today, having a company website is as crucial as having a shop, office or telephone number. Research has found that 6/10 customers expect brands to have content online about their business. Why wait any longer your customers are looking for you! If you own or operate a business which hasn’t taken that step into the online world, I have compile more than enough reasons that will leave you wondering why you hadn’t done it sooner.

Click here to read the benefit of having a website

(B) Recognize Search Engine Optimization Techniques:

Search engine optimization (SEO) is often about making small modifications to parts of your website. When viewed individually, these changes might seem like incremental improvements, but when combined with other optimizations, they could have a noticeable impact on your site’s user experience and performance in organic search results.

You’re likely already familiar with many of the topics in this manual, because they’re essential ingredients for any web page. You should build a website to benefit your users, and any optimization should be geared toward making the user experience better.

One of those users is a search engine, which helps other users discover your content. Search Engine Optimization is about helping search engines understand and present content. Your site may be smaller or larger than our website and offer vastly different content.

(C) Recognize The Factors That Impact Web Page Download Speed

If it’s annoying for you to wait for a website to load, think about how your visitors feel. The speed of a page plays a vital role in a website’s conversions and user experience. Unfortunately, too many website owners place a priority on bells and whistles and sophisticated website design instead of focusing on performance.

It doesn’t matter how nice your website looks; it’s speed matters more than ever. Research shows that nearly half of all internet users expect a site to load within 2 seconds or less, and many will leave a site if it takes more than 3 seconds to load.

This may be a bigger deal than you think because it’s costing you money. Research also concludes that as much as a one-second delay in page load speed can translate into a 7% reduction in conversion rates. Google has also announced that page speed is one of the signals that it’s using to rank pages. So, longer load times are also going to impact your standing in the search engines and your exposure to people who are looking for your business’s products and services.

Web Concepts:

General web concepts are concept and tutorial articles covering general subjects related to the web and web design and development, such as how the web works, information architecture, typography and web design.

These do not directly tie in with specific technologies and techniques covered in the other major site topics, but they will inevitably reference such technologies, for example, responsive web design involves a content management system, (WordPress).

What Is the World Wide Web (WWW)?

The World Wide Web, commonly known as the Web, is an information system where documents and other web resources are identified by Uniform Resource Locators, which may be interlinked by hypertext, and are accessible over the Internet.

World Wide Web, which is also known as a Web, is a collection of websites or web pages stored in web servers and connected to local computers through the internet. These websites contain text pages, digital images, audios, videos, etc.

Users can access the content of these sites from any part of the world over the internet using their devices such as computers, laptops, cell phones, etc. The WWW, along with the internet, enables the retrieval and display of text and media to your device.

Understand The Term Client/Server:

The client-server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters called clients… A server host runs one or more server programs, which share their resources with clients.

The client-server model describes how a server provides resources and services to one or more clients. Examples of servers include web servers, mail servers, and file servers. Each of these servers provides resources to client devices, such as desktop computers, laptops, tablets, and smartphones.

Your Domain URL (Uniform Resource Locator)

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address. URLs consist of multiple parts — including a protocol and domain name — that tell a web browser how and where to retrieve a resource.

End users use URLs by typing them directly into the address bar of a browser or by clicking a hyperlink found on a webpage, bookmark list, in an email or from another application.

How is a URL structured?

The URL contains the name of the protocol needed to access a resource, as well as a resource name. The first part of a URL identifies what protocol to use as the primary access medium. The second part identifies the IP address or domain name — and possibly subdomain — where the resource is located.

URL protocols include HTTP (Hypertext Transfer Protocol) and HTTPS (HTTP Secure) for web resources, mail to for email addresses, FTP for files on a File Transfer Protocol (FTP) server, and telnet for a session to access remote computers. Most URL protocols are followed by a colon and two forward slashes; “mail to” is followed only by a colon.

Optionally, after the domain, a URL can also specify:

  • A path to a specific page or file within a domain;
  • A network port to use to make the connection;
  • A specific reference point within a file, such as a named anchor in an HTML file; and
  • A query or search parameters used — commonly found in URLs for search results.

What Is Content Management System?

A content management system (CMS) is an application that is used to manage web content, allowing multiple contributors to create, edit and publish. Content in a CMS is typically stored in a database and displayed in a presentation layer based on a set of templates.

The following are the basic features of a CMS:

  • Content creation (allows users to easily create and format content)
  • Content storage (stores content in one place, in a consistent fashion)
  • Workflow management (assigns privileges and responsibilities based on roles such as authors, editors and admins)
  • Publishing (organizes and pushes content live)

Benefits Of A Content Management System

One major advantage of a CMS is its collaborative nature. Multiple users can log on and contribute, schedule or edit content to be published. Because the interface is usually browser-based, a CMS can be accessed from anywhere by any number of users.

The second major advantage of a CMS is that it allows non-technical people who don’t know programming languages to easily create and manage their own web content. The WYSIWYG editors of a typical content management platform allow users to enter text and upload images without needing to know any HTML or CSS.

When a company uses a CMS to publish its pages, it reduces its reliance on front-end engineers to make changes to the website, making it quicker and easier to publish new content.

Which CMS To Focus On?

While there are hundreds of CMS platforms, some of the more popular ones are listed below:

Drupal

Joomla

Magento

ModX

Squarespace

Wix

Weebly

WordPress

What To Look For In A CMS?

Before choosing a content management system, it is beneficial to evaluate your company’s information management practices and overall business goals with respect to the publishing of content.

You will need to begin by making a list of the business problems you are trying to solve as well as any specific requirements you may have. This will help you choose the right content management system – the one that supports your business requirements – rather than the most popular or well-liked.

CMSs come in all shapes and sizes, each with its own set of features and benefits. Some are ideally suited for blogging; others may be tailored to eCommerce sites with features for pricing and accounting functionality. Specifics will vary based on your company’s needs and resources.

About WordPress

In simple terms, WordPress is a popular piece of software you can use to create your own website or blog. In fact, if you want to know just how popular WordPress is, here is a fun fact about WordPress.

WordPress Powers Over 40% Of The Websites On The Entire Internet!

To put this into perspective, you might’ve heard of other popular website platforms like Squarespace and Shopify etc…Well, they host a mere 1.6% and 1.7% respectively. It also means that one in four websites on the entire internet are powered by WordPress!

Let Me Get Technical For A Moment…

Yes, I know it kind of defeats the purpose of this training manual…But don’t worry, if I can get it, so can you. WordPress is also what’s known as an “open-source content management system (CMS).”

Allow me to break this definition down a little further:

“Open-source” essentially means that anyone can use or modify WordPress’ software for free. And a “CMS” is a tool that makes managing the content of your website easy for people who know nothing about programming or coding (score!).

How Did WordPress Come To Be?

WordPress was created back in 2003 by Matt Mullenweg and Mike Little, and was originally meant to be nothing more than a platform for bloggers.

Of course, since that time WordPress has evolved into a full-blown CMS with thousands of plugins, widgets, and themes for users to access (which we’ll get to later).

As we’ve already touched on, WordPress is also open-source, so rather than two people, as it was at the beginning – nowadays WordPress is updated and improved by a massive community of developers and contributors.

It’s also for this reason that WordPress continues to get better and remains the most popular website platform available for users in 2019.

Why Does Everyone Love On WordPress So Much?

So why are 40% of all websites online powered by WordPress? And what makes WordPress superior to the other website or CMS platforms out there?

Here are a few reasons that might help explain why:

It’s open-source – As mentioned earlier, WordPress is open source and worked on and improved by a community of thousands of developers and experts from around the globe.

It’s free! (well kind of) – You can install WordPress right now and it won’t set you back a cent… of course, you will need hosting and a domain, but that ain’t WP’s problem!

It’s easy to use – WP is highly accessible and prides itself on being user-friendly. As mentioned earlier, the great thing about this platform is that you don’t have to know how to write code to be able to create your own website. It can also be used by those with impaired vision.

It gives you access to all the latest and greatest developments – Because WordPress is a staple in the website and development world, you can be sure that any of the latest software or plugin initiatives are being crafted with WordPress in mind.

It’s highly flexible – No matter what type of website you’re trying to set up… whether it’s a personal blog or a high end e-commerce store – you can most likely create it in WordPress.

It’s customizable – It’s easy to add new features and functionality to your website with WP themes and plugins. Think of these as handy apps or add-ons for your website.

It can be accessed on all devices – You’re free to use WordPress on devices of all shapes and sizes, and you can access your website whether you’re on your desktop, laptop, or phone.

Understanding WordPress as CMS

Before we press on, I should also mention that when I talk about “WordPress” in this training manual I am referring to “WordPress.org.” Take it from me, it can be easy to get WordPress.org and WordPress.com mixed up, or to not even realize there are two different WordPress platforms.

So What Is The Difference Between The Two?

“WordPress.org” which is known as the “self-hosted” WordPress – is free open-source software you can install on your own hosting and create a website that you 100% own.

“WordPress.com” on the other hand, is a for-profit piece of software that is powered by WordPress.org.

It’s simple to use, it’s free, and however, the website is hosted by WordPress, as opposed to being your own site. This means you can’t have your own domain name, and your URL will be something along the lines of: “http://breketefamily.wordpress.com.”

You also have limited access to themes and plugins, so the changes you can make to your website are limited. In general, if you’re chatting with someone about WordPress, they’ll more than likely be talking about WordPress.org.

Alright, now that we know some more about what WordPress (.org!) is… let’s get into some basics of setting up and actually using the software.

Setting Up Your WordPress Website

Before we can get started with WordPress itself, you’ll need to sort out a few minor details first. Starting with securing your domain and hosting:

Purchasing A Domain

Before you set up your website or blog you’re going to need a domain name – the address of your website essentially.

You can purchase domains from a range of different Domain Registrars, and your domain can be separate from your hosting provider (which we’ll get into in a moment).

Your Domain Registrar may also be local, if you’d prefer your site address to be national (.co.nz) instead of international (.com). Domain costs can vary, but in general a domain should set you back no more than $10 – $15.

Setting Up Hosting

Like domains, there are a number of different hosting provider options out there. But before you select a provider, you’ll also want to choose the TYPE of hosting that best suits your website.

Here’s a quick rundown of some different hosting types:

Shared Hosting – With shared hosting the service provider can serve multiple websites from a single web server. This is usually the least expensive option and can be a good choice for smaller websites and blogs.

Virtual Private Server (VPS) – A VPS means you have your own resources set aside for you on a shared server. This basically means that your website will not be affected by any other sites on your server when it comes to security and performance. This is a great option if your websites are starting to gain more traffic.

Managed WordPress Hosting – If you need the power of a VPS, but you could use more assistance from your provider – managed WordPress hosting could be the way to go. This type of hosting gives you all that a VPS does, along with the added advantage of ongoing support and guidance.

A Dedicated Server – These types of servers are ideal for larger companies that have massive amounts of traffic to pouring into their site. With a dedicated server you have access to the full resources of an entire server. If you only care about performance this option might be the way to go. Just be aware this power comes at a hefty cost.

Cloud Hosting – Cloud hosting works by spreading your website content throughout multiple servers, which helps to improve your site’s “uptime”. However, the increased uptime and security can be costly, but this is a great option for those who want to make sure their site is live for users 99.999% of the time.

Okay, once you’ve chosen the type of hosting; now you’re free to select a provider. There’s no right or wrong answer when it comes to selecting a provider, as mentioned earlier, it could largely depend on your budget and the type of hosting you require.

Once you’ve decided on a host, you’ll just need to decide on the hosting package for you. Most hosting providers will also include a free domain in their plan, otherwise, you’ll be given the option to integrate from your Domain Registrar.

Installing WordPress

Once you’re in a with a hosting provider and you have a domain, you’ll usually be able to install WordPress in “one click” via your host homepage as below:

Most hosting providers allow you to install WordPress in one click. You’ll then be given some prompts which vary from company to company, but the set up should be fairly simple and straightforward.

Or Try The Famous WordPress 5 Minute Install…

Another option is also installing WordPress manually through the process famously known as the: “5 minute WordPress Install.” We create a video tutorial on how to get your domain name, hosting, and SSL certificate set up through Cpanel. Click to watch.

Once you’re all ready to go and you have WordPress installed, you can now start to familiarise yourself with the platform.

Navigating And Using The WordPress Dashboard

Once you’ve logged in you’ll be greeted with the main administration screen, which is commonly known as the dashboard.

It’s here you can organize and put together your site. It’s where all of the magic happens basically. At the top of your screen you’ll also see the toolbar.

Here you can click on your site name and you’ll be taken directly to your website or blog.

Back to the dashboard… you’ll notice straight away it shows you the recent activity of your website. It keeps you in the loop with insights, information, and news, courtesy of a number of different WordPress sources.

When you’re first starting out, you’ll also notice WordPress gives you prompts to help you get started creating your site:

You can choose to ignore these, or often they can be quite handy if you’re stuck on where to start. To the left side of your dashboard you’ll see the main navigation menu which gives you access to a number of different administration functions.

Under each menu item, sub-menus will also appear for each. Let’s briefly go over each menu item and how it functions…

First up we have posts:

Posts

Most website owners (especially blogs) know how important posting regular content can be. Both from an SEO (search engine optimization) and an audience standpoint (providing relevant and interesting content).

Through the posts menu item, you can start writing and adding new posts, as well as editing posts that have already been published, or drafts that still require some work.

Writing and editing a post is done through the newly introduced Gutenberg WordPress editor. This editor works as a simple drag and drop, making it nice and easy for non-techies and developers.

Once you’re done writing and editing your post, be sure to preview it first… once you’re happy, click publish and the post will go live!

Media

The media menu item allows you to upload new files, as well as view all of the media files you’ve uploaded to your WordPress site.

This includes images, audio files, video files and more. You can also upload, manage, and edit all of your individual images and videos via this built-in media uploader.

Pages

Much like the posts, pages allows you to draft and publish static pages for your website. You can edit and delete already published pages, you can also apply custom page templates to your pages.

Editing and publishing pages is also done using the Gutenberg editor, however, if needed you can also choose to use the classic editor by going to formatting and then selecting classic editor.

You can also download the classic editor plugin if all else fails (not sure what plugins are yet? We do discuss about various types of plugins on our Entrepreneurship and ICT Capacity Building Training, few will also be discuss here on our training manual below!).

Comments

The comments menu item lets you view, edit, and delete all of the comments posted to your website. As well as this, you can also view and manage comments that may require some moderation.

For example, based on your settings this could be comments that contain certain words that you deem inappropriate. You can also choose to blacklist certain URLs or users that may have spammed you with comments in the past.

Appearance

The Appearance menu lets you manage your WordPress themes, allowing you to view, activate, and edit them using the Theme Editor.

In a nutshell, themes are what give your website it’s overall look as well as providing it with specific functionalities. Not happy with the way your website looks? Pick a new theme!

You can download and choose from a vast collection of free themes you’ll find on WordPress. Or, if you can’t find what you’re looking for, you can always go off-site to find more premium themes from sites like ThemeForest.

As well as themes, the appearance menu allows you to directly customize what your site looks like, along with managing the menus of your site and how they work together.

You can also manage your widgets, which are little features that add more functionality to your pages or posts.

These could be things like a search field, a “recent posts” section, or editing what displays on the sidebar of your blog post page.

Plugins

Ah good old plugins… now these are a set of tools you’ll be using A LOT. Plugins are pretty much extra features you can add to your website that your current theme or widgets do not have.

This could be anything from a contact form plugin, to a plugin that helps with SEO for your site.

Through WordPress you instantly have access to thousands of different plugins made by a community of other users and developers, available at WordPress.org and via the ‘Plugins’ menu.

Through this menu item you have the option of adding new plugins, as well as managing your existing plugins. As often you’ll find that new updates will be available for your plugins regularly.

Users

The users menu allows you to manage your users and subscribers, as well as edit your own profile. If you’re the only one posting or editing your website then you’ll only need to worry about your own profile.

However, if you have a team, or maybe you have people contributing to your blog, it’s here that you can provide them with their own profile.

You can also provide users with different levels of accessibility. For example, for someone contributing to the blog, you’ll only want to give them access to the post editor, rather than access to the design or coding of the rest of your site.

Tools

Using the tools menu item you can import data from another content management platform, or you might choose to export your current site data into a backup file if you choose.

You can also check on the health of your website, which is handy for making sure any plugins you have installed are free from viruses or hacking. And you can also import or export personal data if you choose.

Settings

Finally we have the settings, where (as you guessed) you can manage the general options and preferences of your website.

Here’s a quick breakdown of what you can adjust and change:

General settings – Here you can adjust things like the title of your site, the address and the timezone.

Reading settings – Adjust the readability of your website, for example, what your homepage displays, how many blog pages to show, and whether or not you want search engines to see your posts.

Writing settings – Change the default post category, the post format, and your email if you want to post to WordPress via email.

Discussion settings – As touched on above, using these settings can help you manage and filter any comments you might receive or your website or posts.

Media settings – Set some defaults for the sizes of your images as well as how you’d like to organize the media files in your library.

Permalinks – This is slightly techie… but basically adjusting the permalink settings will adjust how the URLs of your posts and pages are displayed in the address bar.

Privacy – Finally, you can edit or preview your privacy policy page. As a website owner there are some national and international privacy laws you’ll have to ensure you adhere to. WordPress automatically sets you up with a page you can edit, but you also have the option of creating your own privacy policy.

And There You Have It!

A basic breakdown of what WordPress is and the basics you need to know about using the popular software. But even after this training manual explanation, if there is any need for clarifications, please bring that to my notice so I can add more details.

We do provide up-to-date video tutorials on our YouTube channel to support all we teach in the class, plus we have a telegram group where we give support for any questions, we also follow up our student and proffer them with a lifetime mentorship.

Social Media Integration:

Social media integration is a marketing tool that allows you to use social channels as an extension of your existing branding and marketing strategies.

Social media integration helps promote brand awareness and increases the visibility of your marketing campaigns by creating opportunities on various social platforms for your customers to link or share information between your website and social media.

Businesses that don’t utilize specific social platforms—or that don’t integrate their social media accounts into their websites—risk missing out on new prospects and leveraging their online presence.

Take steps to integrate your social media efforts not only to save time but to reach more customers and promote a consistent, trustworthy brand.

Facebook Page Promotion:

Facebook Pages are for businesses, brands, organizations, and public figures to share their stories and connect with people.

Like profiles, Pages can be customized with stories, events, and more. People who like or follow a Page can get updates in the News Feed. To create a Page: Go to facebook.com/pages/create.

Twitter For Business Promotion:

From hashtags and pinned tweets to Twitter lists and social media influencers, there’s a lot to Twitter. With the right marketing plan, businesses can use the platform to create successful social media campaigns to increase sales, boost brand recognition and increase customer service. 

Twitter is a social media and online news platform where people communicate in short messages – up to 240 characters long – called tweets. Founded in 2006, Twitter is now one of the most popular social media platforms in the world. It’s currently ranked No. 8 in the United States and No. 13 internationally, according to internet analytics company Alexa.

LinkedIn For Business Promotion:

LinkedIn is a social network specifically designed for career and business professionals to connect. Over 65 million professionals use LinkedIn to cultivate their careers and businesses.

Unlike other social networks in which you might become “friends” with anyone and everyone, LinkedIn is about building strategic relationships. Thus, the number of connections is less important than the type of connections. In fact, LinkedIn stops showing your actual number of connections once you have 500 because it’s about quality, not quantity. 

The site boasts members from just about every country and every industry imaginable. In fact, many Fortune 500 executives are on LinkedIn. The site has some advertising, but it’s not as invasive as other networking sites.

Working much like the “Six Degrees of Separation” concept, you start by connecting with those you know and who know you, and through them build a larger network for the purpose of gaining resources, finding freelance work or clients, and building alliances and partnerships. LinkedIn is ideal for building connections for freelance work, a customer base, potential partners, or simply to keep your job prospects open.

Search Engine Optimization (SEO):

Search engine optimization is the process of growing the quality and quantity of website traffic by increasing the visibility of a website or a web page to users of a web search engine. SEO refers to the improvement of unpaid results and excludes direct traffic and the purchase of paid placement.

Yoast SEO For Website Optimization

For many, getting a rich result for a specific piece of content can be an important goal. The results stand out and tend to generate quite a few clicks. Also, getting your content shown as a rich result is something like a stamp of approval by Google. In a sea of content, your content was selected for a rich result.

Getting a rich result depends on a lot of things. For one, you need to know where they appear in your niche. Find out who has them now for your specific key phrases and see if you can beat them if that makes sense.

To do that, you need to target your content at the correct audience using their language. Your content has to be well-written and of high quality. Also, in many cases, search engines like Google need additional insights to be sure they can award you a rich result.

Legal Issues You Need to Know About in the Web Development and Internet Marketing Industry

If your business is acquiring the services of a web development and internet marketing firm or if you are  a web development and internet marketing firm, you need to know this.

For the rest of us, you should understand this is a commonly missed issue. The general rule is that the creator owns the creation. It is also generally understood that if an employer hires a creator to create, the creation is owned by the employer. This is only true in an employer-employee relationship, but not when the creator is an independent contractor.

If the creator is an independent contractor, then the work must be specified in writing as a “work for hire” and be part of a work described in the Copyright Code–which of course has not been updated in the last few decades to include software and web coding. Therefore, copyrights must be otherwise assigned and specified in an agreement–often left out, even unintentionally by the parties.

On the other hand, issue of ownership may be a point of negotiation. Where the developer is providing a customized shopping cart or CMS system, it may be in developer’s best interest to ensure it retains these rights so that they may license the software to another client.

Understand The Term Copyright And Its Implications

Who Owns the Content?

Again, the similar analysis above also applies to those writing your blog posts, ghost writers, etc; however, this assumes the work is eligible for copyright protection. For example, tweets are too short to be copyrightable and likely so are meta tags and descriptions in use by SEO services.

Stock Images

Without discussing the additional considerations surrounding SOPA, rights to the images that developers use for your website need to be properly assigned whether it is from the developer or purchased through a stock image broker.

Other Intellectual Property

Trademarks, patents, and trade secrets definitely come into play here, but they are not unique to web development or internet marketing. Trademarks issues are often resolved by use of the employer of the mark in the market place and patents are usually clearly defined.

Trade secrets are something both the developer and the employer should be concerned. In such an arrangement, there may be a large amount of confidential information that either party would want to remain secret but is shared out of necessity or convenience to the other party, including, employer’s customer data, business process, or methods; or developer and internet marketers strategies and methods.

Outsourcing

Much of development and internet marketing is outsourced and jurisdictional issues come into play all across the board. For example, if there is a lawsuit, in which location will it be held? Are you going to be willing to fly to India to resolve a dispute? Are the laws that you would normally rely upon be even enforceable against the other party? If you do not know the answers to these questions, you are opening yourself up to a lot of risk.

Performance

Just like any service agreement, specifying real milestones, deliverables, a timeline, and a scope of work will be a great tool to make expectations uniform and prevent disputes.  Developers have a tendencies to not put these items in detail to avoid be held accountable to setback and unforeseen obstacles.

Link Ownership

Where SEO providers include link building as part of their service, documentation as to how back-links will be handled when the service agreement terminates–specifically links that are put in websites that the SEO providers actually control.

3D illustration of a folder, focus on a tab with the word infringement. Conceptual image of copyright law ; Shutterstock ID 761198749; Purchase Order: T drive

Security

Where web developers will be working or creating a site that collects or holds sensitive data, determining who would be responsible for a security breach that could have been easily prevented should also be contemplated.

In general, the employer may still be liable for a security breach even if it was a grave mistake, such as not encrypting passwords or credit card info, by the web developer. An indemnification clause should be considered as a negotiation point or insurance depending on the level of sensitivity of the data.

Liability Because of Acts of the Other Party In addition to the issues described above, parties may be held liable from third parties for actions they may not have caused. For example, if web developer uses copyrighted images for the site without permission, the site owner may be held liable for infringement.

In another example, a business owner may be liable for the statements made by an internet marketing firm for its representations or more specifically its misrepresentations.  Though in a number of these cases, the business may have a valid defense, without an indemnification clause, all the legal costs, at least initially, will be coming out of that year’s budget for the business.

Cyber Security

Overview

Cyber-security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.

So, in our online security module, the student will be introduced to cybersecurity, the different sections that affect, categories of hackers, and some windows commands they can use to detect if an attack had taken place or is currently going on in a system or network.

This training also teaches the students how to secure websites and other online accounts like Facebook, Instagram, WhatsApp.

The training will end with an in-dept interactive session with the students, giving them the opportunity to voice out their experience as touching cyber security, cyber criminals and their activities, real live scenarios of those fallen victim to cyber criminals, and I will bring solutions to any issues raised.

Introduction:

Understanding Cybersecurity as a Science:

Cybersecurity is an applied science. That is, people in the field often apply known facts and scientific discoveries to create useful applications, often in the form of technology. … Cybersecurity overlaps and is influenced by connections with social sciences such as economics, sociology, and criminology.

Delving Deeper

  • Areas where cyber criminals (malicious hackers) target the most.
  • Dissecting the word “HACKER” and who they really are.
  • Categories of hackers

Hands-on

  • Important windows commands to check for cyber attacks

Website Security

  • Statistics of hacked websites
  • Introduction to online platform to view the current and ongoing hacks
  • Introduction and detailed explanation of username and password security
  • Website security patch using updates
  • WordPress login page obscuring explanation
  • Detailed website’s 2FA authentication tutoring
  • Anti brute-force attack explanation by limiting logging attempts

Facebook Security Against Hackers:

If you are like millions out there, Facebook has become your no. 1 website on the Web. As you login to it every single day from many devices, be it from your mobile phone, computer, laptop and office workstation, there is a chance that you may leave your Facebook account on without logging out.

If your account gets accessed by strangers, it’s going to open up a large can of worms, so you should seriously try to prevent unwanted access to your account.

There are many ways to prevent access to your account by the next person to use the device, the easiest of which is to log out. However, if your smartphone or device gets stolen, it’s a whole different matter. In this training manual, we will go through some important options you can take to prevent others from accessing your personal Facebook account.

Create Strong Password:

Chances are, you already have your password created for Facebook however it is advisable for you to make sure your Facebook password is one of a kind and different from your other online accounts e.g. email, blog, hosting etc.

To change your password, go to Account Settings > General > Password.

The best passwords would have the combination of small and capital letters, numbers, and symbols.

Confirm Your Mobile Number

Confirming your mobile number is one of many ways to enhance your account security on Facebook. This way, even when you lose or forget your password, Facebook will be able to send you a new one via SMS.

To add your mobile number, go to Account Settings > Mobile and click on Add a Phone.

Select your country and set the mobile carrier before clicking Next.

Now you will be given an instruction to send an SMS to the given number. Follow the instructions to get a code via SMS, and then enter the code into the column. You also have the option to Share your number with friends on Facebook and Allow friends to text me from Facebook. Select your preferences and click Next.

Now your mobile phone is registered with Facebook, and when the need arises, this connection will be useful to reactivate your Facebook account.

Activate Secure Browsing:

Now Among other things, to make sure your browsing activity within Facebook is safe, you can turn on the Secure browsing option. By doing this, you automatically limit all external applications that are integrated with Facebook from doing any harm or taking your personal information without your knowledge or approval.

To start securing your account, click on the drop down menu from the top right corner of your Facebook account and go to Account Settings. Select Security from the left menu.

At the Secure Browsing section, click on the Edit link at the right. The option panel will appear, ‘check’ the box Browse Facebook on a secure connection then click on the Save Changes button.

Activate ‘Login Approvals’

Login approvals are an extended security feature offered by Facebook, and it will require you to enter a security code each time you try to access your Facebook account from unrecognized devices.

To activate Login Approvals, go to Account Settings > Security, look for Login Approvals and click on the Edit button.

An option to activate Login Approvals will appear, tick the check box to activate.

A popup window will appear with descriptions of login approvals, click on the Set Up Now button to continue.

If you already register your mobile number, Facebook will automatically send you a code via SMS. Enter this code in the given box and click Submit Code.

Now you have completed with Login Approvals request, click Next to continue.

Next, Facebook will offer you to setup a Code Generator from your mobile phone; this is useful in case you are unable to receive SMS. Click Continue.

Code Generator for Android phones:

Since I am using an Android phone, I’ll use the Android activation as an example. Download the Facebook Mobile App from Google Play if you don’t already have it. After downloading it to your mobile, click Next.

Once downloaded, Facebook will provide instructions to install the Code Generator. To install, launch your Facebook App, tap on menu > Account > Code Generator > Add App. Then click on Finish Setup below.

Now that your Code Generator is active, Facebook will guide you with the correct steps to use the code generator. Next time when you want to generate a new code, simply launch your app, tap on Account > Code Generator and the code will appear. For now, click Close as you have completed the steps to activate your Login Approvals.

Don’t ‘Keep Me Logged In’

The moment you want to login to your Facebook account, at the login page, there’s a small checkbox that says Keep me logged in. Make sure this box is unchecked. Then, log in as usual. With this on, you will be asked for your email and password every time you launch Facebook.

Instagram Security Against Hackers:

If you think your account has been hacked and you’re still able to log in, here are some things you can do to help keep your account secure: Change your password or send yourself a password reset email. Revoke access to any suspicious third-party apps. Turn on two-factor authentication for additional security.

In the wake of an apparent “hacking spree” on Instagram, a lot of people are wondering how to protect their Instagram accounts from being hacked.

Getting hacked is certainly a scary situation to be in — especially if you’re a business that relies on Instagram to make sales or generate leads!

So what can you do to protect your Instagram account?

First Things First: What to Do if Your Instagram Account Was Hacked

Before we go over some security tips and ways that you can protect your Instagram account from being hacked, let’s take a look at what to do if you think your account has been hacked or taken over:

Use Instagram’s New Account Recovery Process:

First reported by Motherboard, on June 17th, an Instagram spokesperson announced that the platform was testing new security features that “will make it easier for you to sign in and reclaim your account if it has been hacked.”  

But that’s not all! According to the spokesperson, Instagram is also reportedly testing features that could make it harder for hackers to steal Instagram accounts in the first place.

Here’s how it works:

If you can’t access your Instagram account because the password was changed by a hacker, you can tap the “My login info isn’t working” button, which will prompt you to enter the email address or phone number linked to your account or the ones used when you signed up to Instagram.

Instagram will then send a six-digit code to allow you to regain access to the account.

When you regain access to your account, Instagram will then take additional measures to “ensure a hacker cannot use codes sent to your email address [or] phone number to access your account from a different device,” the spokesperson added.

According to Motherboard, the new security process started rolling out on Monday — however, it’s still unclear how long it will be until most users get access.

We’ll be sure to keep you updated as more info comes out!

Use Instagram’s Old Account Recovery System 

If you don’t have access to the new feature yet, you can still use Instagram’s old process for recovering hacked accounts:

Check Your Email Account for a Message From Instagram

If you received an email from Instagram letting you know that your email address was changed, you may be able to undo this by using the revert this change option in that message.

If additional information was also changed (like your password), and you’re unable to change back your email address, you should report the account to Instagram. Here’s how to do it:

On the login screen, tap Forgot password?

Tap Need more help? below Send Login Link, then follow the on-screen instructions.

Enter a secure email address that only you can access. Once you’ve submitted your request, be on the lookout for an email from Instagram with next steps.

Turn on Two-Factor Authentication:

Nearly all major applications now provide some form of two-factor authentication (or 2FA), and this includes Instagram.

With two-factor authentication turned on, whenever you log into Instagram from an unrecognized device, you’ll be prompted to enter an SMS security code, along with your username and password. This can help thwart any attempts by hackers to log into your account and change your contact information.

To turn two-factor authentication on, head to your Instagram profile and tap the settings button. Then scroll down and tap Two-Factor Authentication.

Tap the slider to the “on” position.

If your account doesn’t have a confirmed phone number, you’ll be asked to enter one. Once you’ve entered your phone number, tap the next button.

Now when you log into your Instagram account from an unknown device, you’ll be prompted to enter a security code that you receive by SMS.

UPDATE: In light of the hacks, Instagram recently announced a more robust two-factor authentication system that now lets you use third-party authenticator apps to log into your Instagram account. 

To use a third-party app to log into your Instagram account, go to your profile, tap the menu icon, select “Settings” at the bottom and then choose “Two-Factor Authentication.”

Next, select “Authentication App” as your preferred form of authentication.

If you already have an authentication app installed, Instagram will automatically find the app and send a login code to it. You’ll need to retrieve the code and enter it on Instagram, and two-factor authentication will turn on automatically.

If you don’t have an authentication app, head to the App Store or Google Play Store to download one first and then proceed with setting up two-factor authentication. 

Make Sure Your Email Account is Secure:

Your email is a bit like a gateway to your online accounts — if someone has access to it, they also have access to nearly everything else you’ve used your email for… So make sure it’s secure!

Most email providers have systems in place to block unwanted login attempts and offer security measures like email encryption and two-factor authentication. If you truly want to keep your Instagram account safe, you need to make sure your email account is equally as safe.

Extra Security Tips:

While the above tips should be enough to keep your account secure, here are a few more ways you can stay safe:

The first is to remember to log out of Instagram whenever you use a shared computer or phone. And if you log into Instagram from a public computer, make sure to not check the “Remember Me” box, as this will keep you logged in even after you close the browser.

The second is to never give your password to someone you don’t know or trust. This one’s fairly obvious, but one of the most common ways that hackers gain access to people’s accounts is through “phishing.”

How phishing attacks work is hackers will send you an email that contains a link to a fake Instagram login page. When you log in with your email and password, they get your credentials.

To prevent this from happening to you, make sure you have two-factor authentication turned on and always vet the legitimacy of the emails you receive. The third tip is to be more wary of the accounts you follow on Instagram. And thanks to a new About This Account tool, you can do just that.

With About This Account, you can now see more information about accounts on Instagram that reach large audiences. That way, you can evaluate the authenticity of the account before following it. To learn more about an account, go to their profile, tap the “…” button, and then select “About This Account.”

There, you will see the date the account joined Instagram, the country where the account is located, accounts with shared followers, any username changes in the last year and any ads the account is currently running. 

With the number of Instagram accounts that were recently hacked reaching into the thousands, it’s super important that you take the right steps to secure your account and protect yourself against hackers.

WhatsApp Security Against Hackers:

Imagine relaxing in your room or hanging out with some friends, and then your phone starts buzzing. Several people calling to ask if you were responsible for sending messages about investing in a scheme on a WhatsApp group.

This has been the experience of some Nigerian WhatsApp users in the past few weeks. So, having your WhatsApp account taken over should be a fairly easy situation to resolve: just enter your phone number into the app and have it send you another six-digit code.

The problem is that hackers can spam your number with a bunch of incorrect six-digit codes so that you get locked out of your account for up to 12 hours. Then, if you hadn’t set up a PIN of your own, this leaves an attacker free to set up one of their own on your account, locking you out for seven days in total.

That’s why it’s so important to remember these two rules:

  1. Never share your six-digit WhatsApp code with anyone — not your parents, not your best friend, and definitely not your sibling. No one will ever have a legitimate reason to ask for the code that WhatsApp sends you over SMS, so don’t even think about sharing it.
  2. Should the worst happen, then setting up a PIN will act as another barrier to stop someone from being able to sign in to your account, and it will stop this nightmare from happening to you.

End-to-end Encryption

All WhatsApp users should ensure that their chats are end-to-end encrypted. To verify that a chat is end-to-end encrypted, open the chat, tap on the name of the contact to open the contact info screen, and then tap Encryption to view the QR code and 60-digit number. WhatsApp end-to-end encryption ensures that only you and your contact can read the messages that are being exchanged and nobody in between, not even WhatsApp.

Don’t Click on Any Suspicious Link:

Do you keep getting random links as messages from your contact on WhatsApp? Well, then you should never click on links that you find fishy. In fact, it’s a good idea to first known what the sent link is all about from your contact and then click on it. Some reports suggest that WhatsApp is working on a “suspicious link” feature, which will make it easy for users to find out a certain link is authentic or not.

Tweak Those Privacy Settings:

WhatsApp provides various privacy options to the users. The messaging platform provides users with options to choose who they want to share their profile photo, status, and other details with. It’s a good idea to change the Setting to “Contacts only”. This means only phone number that are saved on your smartphone will be able to see your profile photo, status, phone number, and auto-delete status as well.

Deactivate WhatsApp When Phone Is Stolen or Lost:

Losing phone is a very common phenomenon. In this case, you should ensure to deactivate WhatsApp account before someone else hacks it and gets access to all  your personal data. To deactivate WhatsApp account, go to Settings, Delete my account option, enter phone number, and then click on “Delete my account”.

Remember to Logout of WhatsApp Web:

We often have the tendency to login to WhatsApp Web at office and then leave the account open on the desktop. This habit can actually create problems for you. Someone else sitting on the same PC can access all your chats without you even realizing it. It’s a good practice to Logout from WhatsApp Web before leaving office. It’s just takes seconds to login again. Just scan the code and you’re done.

Lock WhatsApp Screen:

Try out WhatsApp lock screen option available on Android. This will ensure no one else can but you can open your WhatsApp account. Just head to Settings menu, Privacy, and then select Screen Lock option. You will then need to register your fingerprint. After the process is completed, you will have to scan your fingerprint every time you open the WhatsApp app. This adds an extra layer of security.

Two-Step Verification:

WhatsApp introduced the “Two-step verification” feature around two years ago. This feature adds more security to your WhatsApp account. To enable two-step verification, open WhatsApp, go to Settings, click on Account, Two-step verification, and enable it. WhatsApp also asks you to enter your correct email address.

WhatsApp mentioned in an official blog that, “this email address will allow WhatsApp to send you a link via email to disable two-step verification in case you ever forget your six-digit PIN, and also to help safeguard your account. We do not verify this email address to confirm its accuracy.

We highly recommend you provide an accurate email address so that you’re not locked out of your account if you forget your PIN.” The messaging platform also said, “If you receive an email to disable two-step verification, but didn’t request this, don’t click on the link. Someone could be attempting to verify your phone number on WhatsApp.”

Conclusion:

This is just but a few among the list of options we will elaborate on our Entrepreneurship & ICT Capacity Building Training on Cyber Security plus one crucial reminder to log out, you can surf your Facebook worry-free.

Most of us wouldn’t have thought that our online accounts would get hijacked, but if the recent LinkedIn security breach proves anything, it is that there are people out there on the Web who are actively trying to gain access to our sensitive information. Let’s not make it any easier for them.

Mobile App Development

We usually use more than one software, but just because of the Entrepreneurship and ICT Capacity Building Training that is just a 3 days training for the weekdays while 2 days for the weekend, we usually use MIT App Inventor.

GENERAL OVERVIEW:

A mobile application is any piece of software that runs on a mobile operating system either IOS or ANDRIOD. Generally, to develop an application that runs on a mobile platform one has to use a programming language that can compile the native code of the platform of the operating system either android or IOS.

But a set of researcher’s and students at MIT (Massachusetts Institute of Technology) came up with a software called MIT APP INVENTOR which is an application that makes the development of mobile application possible without the to write any single line of code.

The student that usually attends our training ended up discovering how easy it is to develop a mobile application using an MIT APP INVENTOR. To take this training manual further we are going to break the module into two sections:

  1. User interface Design
  2. Logic Design.

User Interface Design:

This section has to do with the design and development of the user interface of our application. The user interface of any application is the part of the application that is visible and available for users to interact with.

The user interface section contains a lot of components that can be used to design different types of application. This includes components like:

  1. Button
  2. Check Box
  3. Date Picker
  4. Image
  5. List Picker
  6. Sliders
  7. Spinners
  8. Label
  9. Textbox
  10. Switch                             etc.

On our live training, we would show you how to use components and modify each of the properties of the components such as color, background, height, width, etc. To fit our design specification.

Also, in the User interface section, we would learn about layout components, which are components that enable us to arrange our component, either horizontally or vertically. This component helps give shape to our application.

Application Logic Design:

 In this section the logic aspect of the application would be implemented, this logic aspect is that part of our application responsible for response to users input, making processes and giving output as result.

In this section we would dissect to understand how a computers operation is related to the human brain’s operation, where we would perform an exercise to see how we process data and also see how a computer process data, during this exercise we would draw out similarities and differences between the two.

After this exercise, we would learn how to generate an ALGORITHM which is the step by step process we expect a computer to perform a certain task.

We would also learn about computer memory operation, that is basically how a computer memory works, which would lead us to understand what variables are in computer programming.

Project Implementation:

After learning about the different sections of a mobile application which comprises of the User interface and Logic, we would move on the apply the knowledge learned to Develop a Currency Converter Application which is an application that would enable us to convert from one currency to another.

EXPECTATIONS AT THE END OF THE COURSE

 At the end of the training, students are expected to have a basic understanding of how the machine works, how to develop any mobile application by following what was learned in the two sections using MIT APP INVENTOR.

At the end of this training, students are expected to further dive into more advanced features of MIT APP Inventor using YouTube tutorials as a guide so as to ensure that what was learned is practiced and improved on, plus our mentorship platform on telegram.

YouTube Channel Monetization

YouTube platform was launched in May 2005, YouTube allows billions of people to discover, watch, and share originally-created videos. YouTube provides a forum for people to connect, inform, and inspire others across the globe and acts as a distribution platform for original content creators and advertisers, both large and small.

This training manual is designed to make the readers understand how YouTube can be used as a marketing tool. It explains how you can create a video to promote your business and create greater awareness about the products and services you offer.

This training manual is primarily going to help all those readers who are into marketing and advertising through videos, specifically those who aspire to make a career in YouTube Marketing.

We do advise first, that before proceeding with this training, you should have a good understanding of the fundamental concepts of marketing and advertising that is if you want to do that entire using the YouTube platform.

Determine And Get To Know Your Audience:

Before you even think about hitting the record button, get to know your audience and understand why they need help.

If you have a product or service, talk to your customers about how they use your product and where they struggle. If you’re teaching a class, find out what learning outcomes your students hope to gain. Are you training a new hire? Ask yourself what questions they need to be answered to be most successful.

Then use that information to choose tutorial topics that will help the most people.

WARNING: As tempting as it may be, DO NOT skip this first step. Even if you know your audience like the back of your hand, it’s still vital to get that information out of your head and into an outline.

Before you move on to step two, make sure to answer these questions about your audience and video:

1. What is your topic? Pick ONE topic per video. By narrowing your scope, your video will be more focused, and easier to create. You’ll also ensure your video is the appropriate length to keep your viewers’ attention.

2. Who is the audience? Start with basic demographic information like education, age, professional organizations, association with other groups and then advance to their interests, concerns, and goals.

Why do they care about this topic? Make sure you know why your audience will care. This will ensure you address their concerns and reasons for watching the video.

What is the learning objective? Having a clear learning objective helps you provide clearer instruction with a more achievable outcome.

How does it benefit them? If someone is going to invest time watching your video, what value are they going to take away?

Here are a few script-writing tips to get you started.

  • Write your script like you explaining the process to a friend. Use simple language and avoid jargon.
  • Show and tell. Instead of simply giving a play-by-play of your on-screen actions, “first I click this, then I click that,” let the actions speak for themselves. Take time to both say what you’re doing and why you’re doing it.
  • Practice, practice … and then practice some more. Be sure to read your script aloud before you record it. Many times you’ll find that something that sounded great in your head can be hard to say out loud. If you find yourself getting tripped up, go back and make sure you’re using natural language.
  • Get feedback. Find someone who’s not afraid to tell you what they really think and send them your script. This might seem scary at first, but once you get used to receiving feedback, it becomes an essential part of the scripting process.

Create a New Channel:

With a Google Account, you can watch and like videos and subscribe to channels. However, without a YouTube channel, you have no public presence on YouTube.

Even if you have a Google Account, you need to create a YouTube channel to upload videos, comment, or make playlists. You can use a computer or the YouTube mobile site to create a new channel.

Create a Personal Channel:

Follow these instructions to create a channel that only you can manage using your Google Account. 

  1. Sign in to YouTube on a computer or using the mobile site.
  2. Try any action that requires a channel, such as uploading a video, posting a comment, or creating a playlist.
  3. If you don’t yet have a channel, you’ll see a prompt to create a channel.
  4. Check the details (with your Google Account name and photo) and confirm to create your new channel.

Create a Channel With a Business or Other Name:

Follow these instructions to create a channel that can have multiple managers or owners. 

You can use a Brand Account to create a channel that has a different name but that’s still managed from your Google Account. Learn more about Brand Accounts. 

  1. Sign in to YouTube on a computer or using the mobile site.
  2. Go to your channel list.
  3. Choose to create a new channel or use an existing Brand Account:
    • Create a new channel by clicking Create a new channel.
    • Create a YouTube channel for a Brand Account that you already manage by choosing the Brand Account from the list. If this Brand Account already has a channel, you can’t create a new one—you’ll just be switched over to that channel if you select the Brand Account from the list. 
  4. Fill out the details to name your new channel and verify your account. Then, click Done. This creates a new Brand Account. 
  5. To add a channel manager, follow the instructions to change channel owners and managers.

Our training covered extensive practical oriented approach to all our listed modules above. Everything here is like 60% from the 99.9% been taught in the training class.

The training manual is design and put together by Adus Michael for Amadurs Technology Limited. For further clarification please call 08039202123 or 09050383911, adusmichael@gmail.com.