Categories Pricing Corporate

IT Management

Assessing Information Risks
Building Real Time Web Applications in PHP and JS
Lead Technical Teams as a Non-technical Leader
Adjusting your Tech Mindset
LGPD Compliance Support Tools
Using and Managing Passwords
IT Strategy & Technology Innovation
Windows 7 Install to Secure
Programmed Learning
Expert Talk: Technology and Change
Information security for non-technical managers
Hands-on with SAP ERP and IDES
Cloud Computing
Enhance a Website Project
Data Protection Specialized Controls
The Dynamic Duo of Agile
IT-Business Alignment: Part I
GDPR Gap Analysis by Article
IT Best Practices: Purchasing a New Computer
GDPR Gap Assessment Tools
Common Types of Attack
Data Protection Impact Assessment
How to Improve Your Production: Part II
Data Protection and Privacy Management System
How to improve your company’s performance
The adventures of an IT leader
Hands-on with SAP S/4HANA and GBI
Expert Talk: Data and Technology
Responsible Use of AI
DP and P Strategies, Policies and Plans
Practical IT Asset Management
An Insider’s Guide: Website Sourcing Made Easy!
GDPR Gap Analysis by Process
IT Management Controls
Agile Leadership
How to Talk Tech to a Non-Techie Audience
Expert Talk: Cyber Security
IT Management
IT Management, Part II
CCNA in 21 Hours
The complete web developer
The modern information environment
Introduction to Social Engineering
Introduction to Malware
Productivity: Email Hacks
Expert Talk: What is Blockchain
Expert Talk: Data Security Protection & Management
Salesforce Document Generation and Why You Need It
Managerial Technology Evaluation
Managing Data Subject Rights
Managing Personal Data Breaches
Agile for Managers
Making the Most of Big Data
Linux for system administrators and DevOps
OOP in PHP and MVC
Good Digital Hygiene
Effective Personal Data Practices
Scrum: The Basics
Agile Concepts
IT-Business Alignment: Part II
Expert Talk: AI in Business - the Real Scoop
Adapting to Tech Changes
Security and Data Privacy Audit Questionnaires
An Introduction to the Internet of Things
Cyberattacks and Cybersecurity
How to Improve Your Production: Part I