Categories About Us

IT Management

Power BI for Professionals
Agile Concepts
Scrum: The Basics
Linux for system administrators and DevOps
Expert Talk: What is Blockchain
An Introduction to the Internet of Things
Technology’s Growth Highlights the Value of People
CCNA in 21 Hours
The complete web developer
Responsible Use of AI
Expert Talk: Cyber Security
Making the Most of Big Data
Cloud Computing
IT Strategy & Technology Innovation
Agile Leadership
IT Management
Using and Managing Passwords
Agile for Managers
Lead Technical Teams as a Non-technical Leader
Cyberattacks and Cybersecurity
IT Best Practices: Purchasing a New Computer
How to Improve Your Production: Part I
Assessing Information Risks
How to improve your company’s performance
The modern information environment
Data and Technology
Adjusting your Tech Mindset
How to Improve Your Production: Part II
Common Types of Attack
Data Protection and Privacy Management System
How to Talk Tech to a Non-Techie Audience
The Talent Code
Productivity: Email Hacks
IT Management, Part II
Effective Personal Data Practices
Good Digital Hygiene
Building Real Time Web Applications in PHP and JS
Introduction to Malware
Managerial Technology Evaluation
DP and P Strategies, Policies and Plans
GDPR Gap Analysis by Article
Expert Talk: AI in Business - the Real Scoop
Introduction to Social Engineering
OOP in PHP and MVC
Information security for non-technical managers
Windows 7 Install to Secure
Adapting to Tech Changes
The adventures of an IT leader
Expert Talk: Data Security Protection & Management
GDPR Gap Assessment Tools
Enhance a Website Project
Managing Personal Data Breaches
Programmed Learning
Expert Talk: Technology and Change
GDPR Gap Analysis by Process
The Dynamic Duo of Agile
An Insider’s Guide: Website Sourcing Made Easy!
Managing Data Subject Rights
Data Protection Specialized Controls
IT-Business Alignment: Part I
Practical IT Asset Management
Development of Metaverse and Web 3.0
IT-Business Alignment: Part II
Security and Data Privacy Audit Questionnaires
Salesforce Document Generation and Why You Need It
Data Protection Impact Assessment
LGPD Compliance Support Tools
Hands-on with SAP S/4HANA and GBI
Hands-on with SAP ERP and IDES
IT Management Controls