Kategorien Über uns

IT-Management

KI in Unternehmen: Effizienter arbeiten
Excel VBA – Arbeiten mit Excel Elementen
LLMs: Verstehen, nutzen und effektiv anwenden
Excel VBA – Einführung
Excel VBA – Arbeiten mit Excel Funktionen & Daten
KI erfolgreich ins Unternehmen integrieren
Excel VBA – Arbeiten mit Steuerelementen
Digitaler Wandel prozessorientiert gestalten
Cyber Security
Talking Data | Souveränes Datenmanagement
Einführung in agile Methoden
Kommunikation durch Live-Visualisierung
Ganzheitliche Businessmodell
Hacker vs. Mensch
Entscheidungen in agilen IT-Projekten
Führungskräfte sind Markenbotschafter*innen
IT-Kosten- und Finanzmanagement
Windows Powershell 3.0
IT Management
Mobile- und Cloud-Computing
IT – Verträge – kurz und praktisch
Digitalisierung: Den Betriebsrat gestalten
Die Rolle des Betriebsrats in der Digitalisierung
Power Business Intelligence Desktop
Managing Diversity im digitalen Zeitalter
SAP®-Programmierung: ABAP® Grundlagen
Cyberattacks and Cybersecurity
Programmed Learning
Linux for system administrators and DevOps
Power BI for Professionals
Information security for non-technical managers
Responsible Use of AI
Common Types of Attack
Windows 7 Install to Secure
Agile Concepts
Adjusting your Tech Mindset
Cloud Computing
Building Real Time Web Applications in PHP and JS
Using and Managing Passwords
Assessing Information Risks
Scrum: The Basics
Lead Technical Teams as a Non-technical Leader
Effective Personal Data Practices
Agile Leadership
IT Strategy & Technology Innovation
Enhance a Website Project
IT Management
CCNA in 21 Hours
Managing Personal Data Breaches
Introduction to Social Engineering
IT Management, Part II
Expert Talk: Technology and Change
Good Digital Hygiene
How to Talk Tech to a Non-Techie Audience
How to improve your company’s performance
Making the Most of Big Data
The complete web developer
Expert Talk: Cyber Security
The Dynamic Duo of Agile
How to Improve Your Production: Part II
Managing Data Subject Rights
Agile for Managers
The adventures of an IT leader
Expert Talk: What is Blockchain
Managerial Technology Evaluation
IT Best Practices: Purchasing a New Computer
How to Improve Your Production: Part I
Data and Technology
IT-Business Alignment: Part I
Data Protection Impact Assessment
Introduction to Malware
Productivity: Email Hacks
GDPR Gap Analysis by Article
Practical IT Asset Management
GDPR Gap Analysis by Process
IT-Business Alignment: Part II
Data Protection and Privacy Management System
Data Protection Specialized Controls
LGPD Compliance Support Tools
GDPR Gap Assessment Tools
Salesforce Document Generation and Why You Need It
Technology’s Growth Highlights the Value of People
Security and Data Privacy Audit Questionnaires
Expert Talk: Data Security Protection & Management
The Talent Code
The modern information environment
An Insider’s Guide: Website Sourcing Made Easy!
OOP in PHP and MVC
Expert Talk: AI in Business - the Real Scoop
Adapting to Tech Changes
DP and P Strategies, Policies and Plans
Hands-on with SAP ERP and IDES
Development of Metaverse and Web 3.0
An Introduction to the Internet of Things
Hands-on with SAP S/4HANA and GBI
IT Management Controls