Categorieën Prijsstelling Zakelijk

IT Management

Building Real Time Web Applications in PHP and JS
Expert Talk: Technology and Change
Programmed Learning
LGPD Compliance Support Tools
Assessing Information Risks
Lead Technical Teams as a Non-technical Leader
Using and Managing Passwords
Adjusting your Tech Mindset
Cloud Computing
IT Strategy & Technology Innovation
Windows 7 Install to Secure
Information security for non-technical managers
Hands-on with SAP ERP and IDES
The Dynamic Duo of Agile
Common Types of Attack
GDPR Gap Assessment Tools
Enhance a Website Project
GDPR Gap Analysis by Article
Data Protection Impact Assessment
IT Best Practices: Purchasing a New Computer
Data Protection Specialized Controls
How to improve your company’s performance
How to Improve Your Production: Part II
IT-Business Alignment: Part I
Data Protection and Privacy Management System
DP and P Strategies, Policies and Plans
GDPR Gap Analysis by Process
Practical IT Asset Management
IT Management Controls
Data and Technology
An Insider’s Guide: Website Sourcing Made Easy!
How to Talk Tech to a Non-Techie Audience
Agile Leadership
Responsible Use of AI
Hands-on with SAP S/4HANA and GBI
IT Management
Expert Talk: Cyber Security
The adventures of an IT leader
IT Management, Part II
CCNA in 21 Hours
The complete web developer
Managerial Technology Evaluation
Expert Talk: Data Security Protection & Management
Introduction to Malware
Agile for Managers
The modern information environment
Good Digital Hygiene
Making the Most of Big Data
Salesforce Document Generation and Why You Need It
Managing Data Subject Rights
Expert Talk: What is Blockchain
Introduction to Social Engineering
Managing Personal Data Breaches
Productivity: Email Hacks
Linux for system administrators and DevOps
OOP in PHP and MVC
Nieuwe Computer aanschaffen
Effective Personal Data Practices
Scrum: The Basics
Expert Talk: AI in Business - the Real Scoop
Agile Concepts
Adapting to Tech Changes
An Introduction to the Internet of Things
IT-Business Alignment: Part II
Security and Data Privacy Audit Questionnaires
Cyberattacks and Cybersecurity
How to Improve Your Production: Part I