Categories About Us

IT Management

Cyberattacks and Cybersecurity
Power BI for Professionals
Linux for system administrators and DevOps
Making the Most of Big Data
Cloud Computing
CCNA in 21 Hours
Agile Leadership
IT Management
Common Types of Attack
The adventures of an IT leader
Data and Technology
Agile Concepts
Responsible Use of AI
IT Strategy & Technology Innovation
The complete web developer
Scrum: The Basics
Building Real Time Web Applications in PHP and JS
How to Improve Your Production: Part I
An Introduction to the Internet of Things
How to Improve Your Production: Part II
Introduction to Social Engineering
Assessing Information Risks
Adjusting your Tech Mindset
Expert Talk: Cyber Security
The Dynamic Duo of Agile
Technology’s Growth Highlights the Value of People
Expert Talk: AI in Business - the Real Scoop
Salesforce Document Generation and Why You Need It
Information security for non-technical managers
Effective Personal Data Practices
How to improve your company’s performance
GDPR Gap Analysis by Article
Lead Technical Teams as a Non-technical Leader
Practical IT Asset Management
Data Protection and Privacy Management System
The Talent Code
How to Talk Tech to a Non-Techie Audience
Good Digital Hygiene
IT Management, Part II
Programmed Learning
Managing Personal Data Breaches
Managerial Technology Evaluation
Data Protection Specialized Controls
IT-Business Alignment: Part I
Expert Talk: What is Blockchain
Introduction to Malware
GDPR Gap Assessment Tools
Enhance a Website Project
Managing Data Subject Rights
OOP in PHP and MVC
Agile for Managers
DP and P Strategies, Policies and Plans
Data Protection Impact Assessment
Productivity: Email Hacks
GDPR Gap Analysis by Process
Using and Managing Passwords
An Insider’s Guide: Website Sourcing Made Easy!
Security and Data Privacy Audit Questionnaires
IT-Business Alignment: Part II
Adapting to Tech Changes
Expert Talk: Technology and Change
IT Best Practices: Purchasing a New Computer
The modern information environment
Windows 7 Install to Secure
Development of Metaverse and Web 3.0
Expert Talk: Data Security Protection & Management
LGPD Compliance Support Tools
Hands-on with SAP S/4HANA and GBI
Hands-on with SAP ERP and IDES
IT Management Controls