Categories Pricing Corporate

IT-ledelse

Building Real Time Web Applications in PHP and JS
Expert Talk: Technology and Change
Using and Managing Passwords
Adjusting your Tech Mindset
LGPD Compliance Support Tools
Lead Technical Teams as a Non-technical Leader
Windows 7 Install to Secure
Information security for non-technical managers
Assessing Information Risks
Cloud Computing
Hands-on with SAP ERP and IDES
Programmed Learning
IT Strategy & Technology Innovation
Data Protection Impact Assessment
Common Types of Attack
The Dynamic Duo of Agile
IT Best Practices: Purchasing a New Computer
Data Protection and Privacy Management System
Enhance a Website Project
GDPR Gap Assessment Tools
Data Protection Specialized Controls
GDPR Gap Analysis by Article
How to improve your company’s performance
IT-Business Alignment: Part I
How to Improve Your Production: Part II
IT Management Controls
Data and Technology
Practical IT Asset Management
Responsible Use of AI
Hands-on with SAP S/4HANA and GBI
An Insider’s Guide: Website Sourcing Made Easy!
The adventures of an IT leader
GDPR Gap Analysis by Process
How to Talk Tech to a Non-Techie Audience
DP and P Strategies, Policies and Plans
Agile Leadership
Expert Talk: Cyber Security
IT Management
CCNA in 21 Hours
IT Management, Part II
The complete web developer
The modern information environment
Agile for Managers
Managerial Technology Evaluation
Expert Talk: Data Security Protection & Management
Expert Talk: What is Blockchain
Managing Data Subject Rights
Managing Personal Data Breaches
Introduction to Malware
Introduction to Social Engineering
Salesforce Document Generation and Why You Need It
Productivity: Email Hacks
Making the Most of Big Data
Good Digital Hygiene
Linux for system administrators and DevOps
OOP in PHP and MVC
Security and Data Privacy Audit Questionnaires
Agile Concepts
An Introduction to the Internet of Things
Scrum: The Basics
Expert Talk: AI in Business - the Real Scoop
Effective Personal Data Practices
Adapting to Tech Changes
IT-Business Alignment: Part II
How to Improve Your Production: Part I
Cyberattacks and Cybersecurity