Categories About Us

IT Management

Power BI for Professionals
IT-Business Alignment: Part II
Cyberattacks and Cybersecurity
Agile Concepts
IT Strategy & Technology Innovation
IT Management
Making the Most of Big Data
CCNA in 21 Hours
Cloud Computing
The adventures of an IT leader
IT Management, Part II
The complete web developer
GDPR Gap Analysis by Process
GDPR Gap Analysis by Article
Security and Data Privacy Audit Questionnaires
Data Protection and Privacy Management System
Linux for system administrators and DevOps
IT-Business Alignment: Part I
Effective Personal Data Practices
Agile for Managers
Data Protection Specialized Controls
Information security for non-technical managers
How to Improve Your Production: Part I
Managing Personal Data Breaches
Assessing Information Risks
GDPR Gap Assessment Tools
Agile Leadership
Adapting to Tech Changes
How to Improve Your Production: Part II
Managerial Technology Evaluation
Managing Data Subject Rights
How to improve your company’s performance
Building Real Time Web Applications in PHP and JS
The Talent Code
Good Digital Hygiene
DP and P Strategies, Policies and Plans
Scrum: The Basics
Data Protection Impact Assessment
Adjusting your Tech Mindset
Productivity: Email Hacks
Programmed Learning
Introduction to Malware
Enhance a Website Project
Common Types of Attack
Practical IT Asset Management
The modern information environment
An Insider’s Guide: Website Sourcing Made Easy!
Lead Technical Teams as a Non-technical Leader
IT Best Practices: Purchasing a New Computer
Salesforce Document Generation and Why You Need It
Introduction to Social Engineering
OOP in PHP and MVC
Technology’s Growth Highlights the Value of People
An Introduction to the Internet of Things
How to Talk Tech to a Non-Techie Audience
Windows 7 Install to Secure
Expert Talk: Technology and Change
Using and Managing Passwords
Hands-on with SAP S/4HANA and GBI
The Dynamic Duo of Agile
LGPD Compliance Support Tools
Development of Metaverse and Web 3.0
IT Management Controls
Hands-on with SAP ERP and IDES