Categories Pricing Corporate

IT Management

Assessing Information Risks
LGPD Compliance Support Tools
Building Real Time Web Applications in PHP and JS
Using and Managing Passwords
Programmed Learning
Adjusting your Tech Mindset
Expert Talk: Technology and Change
Lead Technical Teams as a Non-technical Leader
IT Strategy & Technology Innovation
Windows 7 Install to Secure
Information security for non-technical managers
Hands-on with SAP ERP and IDES
Cloud Computing
IT Best Practices: Purchasing a New Computer
Enhance a Website Project
The Dynamic Duo of Agile
Data Protection Specialized Controls
GDPR Gap Assessment Tools
Common Types of Attack
Data Protection Impact Assessment
GDPR Gap Analysis by Article
How to Improve Your Production: Part II
How to improve your company’s performance
IT-Business Alignment: Part I
Data Protection and Privacy Management System
Practical IT Asset Management
IT Management Controls
DP and P Strategies, Policies and Plans
Responsible Use of AI
GDPR Gap Analysis by Process
An Insider’s Guide: Website Sourcing Made Easy!
The adventures of an IT leader
Agile Leadership
Hands-on with SAP S/4HANA and GBI
Data and Technology
IT Management, Part II
Expert Talk: Cyber Security
IT Management
How to Talk Tech to a Non-Techie Audience
CCNA in 21 Hours
The complete web developer
Agile for Managers
The modern information environment
Introduction to Malware
Expert Talk: Data Security Protection & Management
Expert Talk: What is Blockchain
Productivity: Email Hacks
Managing Personal Data Breaches
Salesforce Document Generation and Why You Need It
Managing Data Subject Rights
Managerial Technology Evaluation
Introduction to Social Engineering
OOP in PHP and MVC
Making the Most of Big Data
Good Digital Hygiene
Linux for system administrators and DevOps
Security and Data Privacy Audit Questionnaires
IT-Business Alignment: Part II
Scrum: The Basics
An Introduction to the Internet of Things
Agile Concepts
Expert Talk: AI in Business - the Real Scoop
How to Improve Your Production: Part I
Adapting to Tech Changes
Cyberattacks and Cybersecurity
Effective Personal Data Practices