Categories About Us

IT Management

Power BI for Professionals
Cyberattacks and Cybersecurity
IT Management
IT Strategy & Technology Innovation
CCNA in 21 Hours
Making the Most of Big Data
Linux for system administrators and DevOps
The adventures of an IT leader
The complete web developer
Scrum: The Basics
Adapting to Tech Changes
Assessing Information Risks
Data Protection and Privacy Management System
How to Improve Your Production: Part I
Cloud Computing
Agile Concepts
The Talent Code
Windows 7 Install to Secure
Agile Leadership
Managing Personal Data Breaches
Building Real Time Web Applications in PHP and JS
Effective Personal Data Practices
IT Management, Part II
Technology’s Growth Highlights the Value of People
Programmed Learning
The modern information environment
How to improve your company’s performance
IT Best Practices: Purchasing a New Computer
How to Improve Your Production: Part II
GDPR Gap Analysis by Article
Hands-on with SAP S/4HANA and GBI
Managerial Technology Evaluation
Good Digital Hygiene
GDPR Gap Analysis by Process
Information security for non-technical managers
Enhance a Website Project
Agile for Managers
OOP in PHP and MVC
Security and Data Privacy Audit Questionnaires
Productivity: Email Hacks
GDPR Gap Assessment Tools
An Introduction to the Internet of Things
IT-Business Alignment: Part I
IT-Business Alignment: Part II
Common Types of Attack
DP and P Strategies, Policies and Plans
An Insider’s Guide: Website Sourcing Made Easy!
Practical IT Asset Management
Managing Data Subject Rights
Data Protection Specialized Controls
Data Protection Impact Assessment
Introduction to Social Engineering
Salesforce Document Generation and Why You Need It
LGPD Compliance Support Tools
Adjusting your Tech Mindset
How to Talk Tech to a Non-Techie Audience
Using and Managing Passwords
Lead Technical Teams as a Non-technical Leader
Expert Talk: Technology and Change
The Dynamic Duo of Agile
Introduction to Malware
Development of Metaverse and Web 3.0
IT Management Controls
Hands-on with SAP ERP and IDES