الفئات الأسعار الشركات

إدارة تكنولوجيا المعلومات

Assessing Information Risks
Building Real Time Web Applications in PHP and JS
Lead Technical Teams as a Non-technical Leader
Using and Managing Passwords
LGPD Compliance Support Tools
Programmed Learning
Adjusting your Tech Mindset
IT Strategy & Technology Innovation
Expert Talk: Technology and Change
Information security for non-technical managers
Hands-on with SAP ERP and IDES
Windows 7 Install to Secure
Cloud Computing
The Dynamic Duo of Agile
Data Protection Specialized Controls
GDPR Gap Assessment Tools
How to Improve Your Production: Part II
IT Best Practices: Purchasing a New Computer
How to improve your company’s performance
IT-Business Alignment: Part I
Enhance a Website Project
Data Protection Impact Assessment
Common Types of Attack
GDPR Gap Analysis by Article
Data Protection and Privacy Management System
The adventures of an IT leader
IT Management Controls
Hands-on with SAP S/4HANA and GBI
GDPR Gap Analysis by Process
Practical IT Asset Management
An Insider’s Guide: Website Sourcing Made Easy!
How to Talk Tech to a Non-Techie Audience
DP and P Strategies, Policies and Plans
Agile Leadership
CCNA in 21 Hours
IT Management, Part II
IT Management
Expert Talk: Data and Technology
Expert Talk: Cyber Security
Responsible Use of AI
The complete web developer
Managing Personal Data Breaches
Agile for Managers
Managerial Technology Evaluation
Introduction to Malware
Expert Talk: Data Security Protection & Management
Salesforce Document Generation and Why You Need It
The modern information environment
Expert Talk: What is Blockchain
Productivity: Email Hacks
Managing Data Subject Rights
Introduction to Social Engineering
Making the Most of Big Data
OOP in PHP and MVC
Linux for system administrators and DevOps
Good Digital Hygiene
An Introduction to the Internet of Things
Agile Concepts
IT-Business Alignment: Part II
Effective Personal Data Practices
Expert Talk: AI in Business - the Real Scoop
Scrum: The Basics
Adapting to Tech Changes
Security and Data Privacy Audit Questionnaires
How to Improve Your Production: Part I
Cyberattacks and Cybersecurity