Kategorien Über uns

IT-Management

Excel VBA – Einführung
Excel VBA – Arbeiten mit Excel Elementen
Excel VBA – Arbeiten mit Excel Funktionen & Daten
LLMs: Verstehen, nutzen und effektiv anwenden
KI in Unternehmen: Effizienter arbeiten
Führungskräfte sind Markenbotschafter*innen
Einführung in agile Methoden
KI erfolgreich ins Unternehmen integrieren
Excel VBA – Arbeiten mit Steuerelementen
IT-Kosten- und Finanzmanagement
Kommunikation durch Live-Visualisierung
Hacker vs. Mensch
Digitaler Wandel prozessorientiert gestalten
Entscheidungen in agilen IT-Projekten
Cyber Security
IT Management
Ganzheitliche Businessmodell
Power Business Intelligence Desktop
Talking Data | Souveränes Datenmanagement
Digitalisierung: Den Betriebsrat gestalten
Windows Powershell 3.0
Mobile- und Cloud-Computing
IT – Verträge – kurz und praktisch
Die Rolle des Betriebsrats in der Digitalisierung
Managing Diversity im digitalen Zeitalter
SAP®-Programmierung: ABAP® Grundlagen
Cyberattacks and Cybersecurity
Power BI for Professionals
Lead Technical Teams as a Non-technical Leader
Building Real Time Web Applications in PHP and JS
Common Types of Attack
Technology’s Growth Highlights the Value of People
Adjusting your Tech Mindset
How to Talk Tech to a Non-Techie Audience
Enhance a Website Project
Programmed Learning
The adventures of an IT leader
IT Strategy & Technology Innovation
Agile Concepts
How to improve your company’s performance
Making the Most of Big Data
How to Improve Your Production: Part II
Managing Data Subject Rights
Cloud Computing
Managerial Technology Evaluation
Information security for non-technical managers
How to Improve Your Production: Part I
Linux for system administrators and DevOps
IT Management
Responsible Use of AI
Using and Managing Passwords
CCNA in 21 Hours
Assessing Information Risks
Good Digital Hygiene
Expert Talk: Technology and Change
The Dynamic Duo of Agile
Windows 7 Install to Secure
Agile Leadership
IT Management, Part II
Scrum: The Basics
Expert Talk: Cyber Security
The complete web developer
Managing Personal Data Breaches
IT Best Practices: Purchasing a New Computer
GDPR Gap Analysis by Article
Data and Technology
GDPR Gap Analysis by Process
Effective Personal Data Practices
GDPR Gap Assessment Tools
Expert Talk: What is Blockchain
Data Protection Impact Assessment
Agile for Managers
IT-Business Alignment: Part I
Practical IT Asset Management
The Talent Code
Productivity: Email Hacks
IT-Business Alignment: Part II
Introduction to Social Engineering
Introduction to Malware
Data Protection and Privacy Management System
Data Protection Specialized Controls
Security and Data Privacy Audit Questionnaires
LGPD Compliance Support Tools
Salesforce Document Generation and Why You Need It
Expert Talk: Data Security Protection & Management
An Insider’s Guide: Website Sourcing Made Easy!
OOP in PHP and MVC
The modern information environment
Expert Talk: AI in Business - the Real Scoop
Adapting to Tech Changes
DP and P Strategies, Policies and Plans
Hands-on with SAP ERP and IDES
Development of Metaverse and Web 3.0
An Introduction to the Internet of Things
Hands-on with SAP S/4HANA and GBI
IT Management Controls