Categories Pricing Corporate

IT Management

Lead Technical Teams as a Non-technical Leader
LGPD Compliance Support Tools
Assessing Information Risks
Expert Talk: Technology and Change
Using and Managing Passwords
Building Real Time Web Applications in PHP and JS
Micro Talk: HR - Privacy and Protection, Part 1
Programmed Learning
Expert Talk: Adjusting your Tech Mindset
Hands-on with SAP ERP and IDES
Information security for non-technical managers
Windows 7 Install to Secure
IT Strategy & Technology Innovation
Cloud Computing
Enhance a Website Project
IT Best Practices: Purchasing a New Computer
The Dynamic Duo of Agile
Data Protection Specialized Controls
Data Protection Impact Assessment
Common Types of Attack
GDPR Gap Assessment Tools
GDPR Gap Analysis by Article
How to Improve Your Production: Part II
How to improve your company’s performance
IT-Business Alignment: Part I
Data Protection and Privacy Management System
Hands-on with SAP S/4HANA and GBI
An Insider’s Guide: Website Sourcing Made Easy!
DP&P Strategies, Policies and Plans
Expert Talk: Cyber Security
Expert Talk: Data and Technology
IT Management Controls
Expert Talk: Responsible Use of AI
GDPR Gap Analysis by Process
Practical IT Asset Management
Agile Leadership
How to Talk Tech to a Non-Techie Audience
IT Management, Part II
The adventures of an IT leader
IT Management
CCNA in 21 Hours
The complete web developer
Expert Talk: Data Security Protection & Management
Managing Personal Data Breaches
The modern information environment
Agile for Managers
Introduction to Social Engineering
Introduction to Malware
Making the Most of Big Data
Salesforce Document Generation and Why You Need It
Productivity: Email Hacks
Managing Data Subject Rights
Managerial Technology Evaluation
Expert Talk: What is Blockchain
Good Digital Hygiene
Linux for system administrators and DevOps
OOP in PHP and MVC
Effective Personal Data Practices
Expert Talk: Adapting to Tech Changes
Expert Talk: AI in Business - the Real Scoop
Agile Concepts
Scrum: The Basics
IT-Business Alignment: Part II
Security and Data Privacy Audit Questionnaires
An Introduction to the Internet of Things
Cyberattacks and Cybersecurity
How to Improve Your Production: Part I