Categories About Us

IT Management

Cyberattacks and Cybersecurity
Power BI for Professionals
Agile Concepts
CCNA in 21 Hours
Scrum: The Basics
Making the Most of Big Data
Adapting to Tech Changes
Linux for system administrators and DevOps
IT Strategy & Technology Innovation
Responsible Use of AI
The complete web developer
Technology’s Growth Highlights the Value of People
Building Real Time Web Applications in PHP and JS
Cloud Computing
An Introduction to the Internet of Things
Expert Talk: Cyber Security
IT Management
Good Digital Hygiene
Expert Talk: What is Blockchain
How to improve your company’s performance
Agile for Managers
Data and Technology
Agile Leadership
Common Types of Attack
IT Management, Part II
Data Protection and Privacy Management System
Lead Technical Teams as a Non-technical Leader
GDPR Gap Analysis by Article
How to Improve Your Production: Part I
OOP in PHP and MVC
Information security for non-technical managers
Using and Managing Passwords
The adventures of an IT leader
Enhance a Website Project
Assessing Information Risks
IT-Business Alignment: Part I
IT-Business Alignment: Part II
How to Improve Your Production: Part II
IT Best Practices: Purchasing a New Computer
Adjusting your Tech Mindset
How to Talk Tech to a Non-Techie Audience
Effective Personal Data Practices
Productivity: Email Hacks
The Talent Code
Managerial Technology Evaluation
The modern information environment
Introduction to Malware
Expert Talk: AI in Business - the Real Scoop
DP and P Strategies, Policies and Plans
Introduction to Social Engineering
Expert Talk: Data Security Protection & Management
GDPR Gap Assessment Tools
Managing Personal Data Breaches
Programmed Learning
Expert Talk: Technology and Change
Windows 7 Install to Secure
GDPR Gap Analysis by Process
The Dynamic Duo of Agile
An Insider’s Guide: Website Sourcing Made Easy!
Managing Data Subject Rights
Data Protection Specialized Controls
Practical IT Asset Management
Development of Metaverse and Web 3.0
Security and Data Privacy Audit Questionnaires
Salesforce Document Generation and Why You Need It
Data Protection Impact Assessment
LGPD Compliance Support Tools
Hands-on with SAP S/4HANA and GBI
Hands-on with SAP ERP and IDES
IT Management Controls