Kategorier Virksomhedsløsninger

IT ledelse

Adjusting your Tech Mindset
Programmed Learning
Assessing Information Risks
Building Real Time Web Applications in PHP and JS
Lead Technical Teams as a Non-technical Leader
Expert Talk: Technology and Change
Using and Managing Passwords
LGPD Compliance Support Tools
Information security for non-technical managers
IT Strategy & Technology Innovation
Cloud Computing
Hands-on with SAP ERP and IDES
Windows 7 Install to Secure
Data Protection Specialized Controls
GDPR Gap Assessment Tools
Data Protection Impact Assessment
GDPR Gap Analysis by Article
Common Types of Attack
The Dynamic Duo of Agile
Enhance a Website Project
IT Best Practices: Purchasing a New Computer
IT-Business Alignment: Part I
How to improve your company’s performance
How to Improve Your Production: Part II
Data Protection and Privacy Management System
Data and Technology
The adventures of an IT leader
Responsible Use of AI
Agile Leadership
How to Talk Tech to a Non-Techie Audience
DP and P Strategies, Policies and Plans
Practical IT Asset Management
Hands-on with SAP S/4HANA and GBI
IT Management Controls
GDPR Gap Analysis by Process
IT Management
An Insider’s Guide: Website Sourcing Made Easy!
Expert Talk: Cyber Security
IT Management, Part II
CCNA in 21 Hours
The complete web developer
Managing Data Subject Rights
The modern information environment
Expert Talk: What is Blockchain
Salesforce Document Generation and Why You Need It
Development of Metaverse and Web 3.0
Managerial Technology Evaluation
Introduction to Malware
Managing Personal Data Breaches
Expert Talk: Data Security Protection & Management
Power BI for Professionals
Productivity: Email Hacks
Introduction to Social Engineering
Good Digital Hygiene
Making the Most of Big Data
Agile for Managers
Linux for system administrators and DevOps
OOP in PHP and MVC
Expert Talk: AI in Business - the Real Scoop
Effective Personal Data Practices
Adapting to Tech Changes
Agile Concepts
An Introduction to the Internet of Things
Scrum: The Basics
Security and Data Privacy Audit Questionnaires
Cyberattacks and Cybersecurity
IT-Business Alignment: Part II
How to Improve Your Production: Part I