Megan James of UDT earned Microsoft Customer Immersion Experience Certification

Through this certification, Megan can assist UDT customers with their Professional Development goals.
Share on facebook
Share on google
Share on twitter
Share on linkedin

Megan James, an Instructional Technology Consultant at UDT, has recently earned her Customer Immersion Experience (CIE) certification from Microsoft. Through this certification, Megan can assist UDT customers with their Professional Development goals. Courses for the CIE program include hands-on training with Microsoft Office 365 and Windows 10.

Customer Immersion Experience sessions use a trained facilitator to lead attendees through a unique, hands-on experience. The Customer Immersion Experience can be optimized for customer-specific delivery. Facilitators can set up a CIE in minutes and connect to a remote desktop loaded with Microsoft’s latest and greatest technology.

Facilitators can run a CIE session from any set of devices, whether using Microsoft equipment, having customers connect from their own device, or even remotely, with attendees connecting from their own workspace. Mini-CIE sessions can be delivered as an add-on to client meetings. Qualified facilitators have access to CIE equipment kits and can also host sessions at Microsoft Technology Centers and offices.

Before joining the UDT team, Megan spent 12 years in education as a classroom teacher and media specialist. She is originally from Missouri but currently resides in Tampa, Florida supporting all Florida clients. She began at UDT supporting MDCPS teachers and technology, but her role has recently changed to delivering Productivity and Security CIE trainings to customers.

Interested in learning more? View more about our professional development by clicking the button below!

Focus time, money, and effort on what really matters

Let’s build success together. 

More to explore

Multi-Factor Authentication

Seven Benefits of Multi-Factor Authentication

Hackers are using increasingly sophisticated tactics to gain data access. Email phishing, keylogging, brute force attacks and social engineering are among the variety of ways to gain access credentials.

Just one more step

Please fill out the following form,