Kategorier Virksomhedsløsninger

IT ledelse

Adjusting your Tech Mindset
Assessing Information Risks
Programmed Learning
Building Real Time Web Applications in PHP and JS
Using and Managing Passwords
Lead Technical Teams as a Non-technical Leader
Expert Talk: Technology and Change
Hands-on with SAP ERP and IDES
IT Strategy & Technology Innovation
LGPD Compliance Support Tools
Windows 7 Install to Secure
Information security for non-technical managers
Cloud Computing
Common Types of Attack
Enhance a Website Project
GDPR Gap Assessment Tools
GDPR Gap Analysis by Article
Data Protection Impact Assessment
Data Protection Specialized Controls
The Dynamic Duo of Agile
IT Best Practices: Purchasing a New Computer
IT-Business Alignment: Part I
How to Improve Your Production: Part II
How to improve your company’s performance
Data Protection and Privacy Management System
Hands-on with SAP S/4HANA and GBI
Practical IT Asset Management
DP and P Strategies, Policies and Plans
Agile Leadership
GDPR Gap Analysis by Process
The adventures of an IT leader
Data and Technology
Responsible Use of AI
How to Talk Tech to a Non-Techie Audience
IT Management Controls
IT Management, Part II
An Insider’s Guide: Website Sourcing Made Easy!
IT Management
CCNA in 21 Hours
Expert Talk: Cyber Security
The complete web developer
Agile for Managers
Salesforce Document Generation and Why You Need It
Introduction to Social Engineering
Managing Data Subject Rights
The modern information environment
Power BI for Professionals
Making the Most of Big Data
Development of Metaverse and Web 3.0
Managing Personal Data Breaches
Managerial Technology Evaluation
Expert Talk: What is Blockchain
Introduction to Malware
Productivity: Email Hacks
Expert Talk: Data Security Protection & Management
Good Digital Hygiene
Linux for system administrators and DevOps
OOP in PHP and MVC
Scrum: The Basics
Expert Talk: AI in Business - the Real Scoop
An Introduction to the Internet of Things
Agile Concepts
Effective Personal Data Practices
Security and Data Privacy Audit Questionnaires
IT-Business Alignment: Part II
Cyberattacks and Cybersecurity
Adapting to Tech Changes
How to Improve Your Production: Part I