Categories About Us

IT Management

Power BI for Professionals
IT Strategy & Technology Innovation
IT Management
Cyberattacks and Cybersecurity
GDPR Gap Assessment Tools
Making the Most of Big Data
Agile Concepts
CCNA in 21 Hours
How to Improve Your Production: Part I
Expert Talk: Technology and Change
Linux for system administrators and DevOps
Assessing Information Risks
Common Types of Attack
GDPR Gap Analysis by Article
How to improve your company’s performance
How to Improve Your Production: Part II
IT Management, Part II
The adventures of an IT leader
GDPR Gap Analysis by Process
Agile Leadership
The complete web developer
Managing Data Subject Rights
Agile for Managers
Information security for non-technical managers
Cloud Computing
Enhance a Website Project
Data Protection Impact Assessment
Data Protection and Privacy Management System
Managing Personal Data Breaches
Managerial Technology Evaluation
Adapting to Tech Changes
IT-Business Alignment: Part II
Scrum: The Basics
Programmed Learning
Building Real Time Web Applications in PHP and JS
IT-Business Alignment: Part I
The Talent Code
Salesforce Document Generation and Why You Need It
Good Digital Hygiene
An Introduction to the Internet of Things
Effective Personal Data Practices
LGPD Compliance Support Tools
Technology’s Growth Highlights the Value of People
Using and Managing Passwords
Lead Technical Teams as a Non-technical Leader
Adjusting your Tech Mindset
Windows 7 Install to Secure
Hands-on with SAP ERP and IDES
Data Protection Specialized Controls
IT Best Practices: Purchasing a New Computer
The Dynamic Duo of Agile
DP and P Strategies, Policies and Plans
Practical IT Asset Management
Hands-on with SAP S/4HANA and GBI
How to Talk Tech to a Non-Techie Audience
IT Management Controls
An Insider’s Guide: Website Sourcing Made Easy!
Productivity: Email Hacks
Introduction to Malware
Introduction to Social Engineering
The modern information environment
Development of Metaverse and Web 3.0
OOP in PHP and MVC
Security and Data Privacy Audit Questionnaires