Categories Pricing Corporate

IT Management

Building Real Time Web Applications in PHP and JS
Programmed Learning
Using and Managing Passwords
Lead Technical Teams as a Non-technical Leader
LGPD Compliance Support Tools
Adjusting your Tech Mindset
Assessing Information Risks
Expert Talk: Technology and Change
Hands-on with SAP ERP and IDES
Windows 7 Install to Secure
IT Strategy & Technology Innovation
Information security for non-technical managers
Cloud Computing
GDPR Gap Assessment Tools
Data Protection Specialized Controls
Enhance a Website Project
GDPR Gap Analysis by Article
The Dynamic Duo of Agile
Data Protection Impact Assessment
IT Best Practices: Purchasing a New Computer
Common Types of Attack
Data Protection and Privacy Management System
IT-Business Alignment: Part I
How to Improve Your Production: Part II
How to improve your company’s performance
Hands-on with SAP S/4HANA and GBI
IT Management Controls
How to Talk Tech to a Non-Techie Audience
GDPR Gap Analysis by Process
The adventures of an IT leader
An Insider’s Guide: Website Sourcing Made Easy!
IT Management, Part II
DP and P Strategies, Policies and Plans
Practical IT Asset Management
Expert Talk: Data and Technology
IT Management
Responsible Use of AI
CCNA in 21 Hours
Expert Talk: Cyber Security
Agile Leadership
The complete web developer
Introduction to Malware
Managing Personal Data Breaches
Managerial Technology Evaluation
Agile for Managers
Managing Data Subject Rights
Expert Talk: What is Blockchain
Productivity: Email Hacks
Salesforce Document Generation and Why You Need It
Expert Talk: Data Security Protection & Management
The modern information environment
Good Digital Hygiene
Making the Most of Big Data
Introduction to Social Engineering
Linux for system administrators and DevOps
OOP in PHP and MVC
Scrum: The Basics
IT-Business Alignment: Part II
Adapting to Tech Changes
Agile Concepts
An Introduction to the Internet of Things
How to Improve Your Production: Part I
Effective Personal Data Practices
Expert Talk: AI in Business - the Real Scoop
Security and Data Privacy Audit Questionnaires
Cyberattacks and Cybersecurity