Categories Pricing Corporate

IT Management

LGPD Compliance Support Tools
Adjusting your Tech Mindset
Assessing Information Risks
Programmed Learning
Lead Technical Teams as a Non-technical Leader
Building Real Time Web Applications in PHP and JS
Using and Managing Passwords
Expert Talk: Technology and Change
IT Strategy & Technology Innovation
Windows 7 Install to Secure
Information security for non-technical managers
Cloud Computing
Hands-on with SAP ERP and IDES
Enhance a Website Project
Data Protection Impact Assessment
GDPR Gap Analysis by Article
The Dynamic Duo of Agile
Common Types of Attack
GDPR Gap Assessment Tools
Data Protection Specialized Controls
IT Best Practices: Purchasing a New Computer
How to Improve Your Production: Part II
How to improve your company’s performance
IT-Business Alignment: Part I
Data Protection and Privacy Management System
The adventures of an IT leader
GDPR Gap Analysis by Process
Data and Technology
Practical IT Asset Management
Responsible Use of AI
DP and P Strategies, Policies and Plans
Agile Leadership
IT Management Controls
Hands-on with SAP S/4HANA and GBI
How to Talk Tech to a Non-Techie Audience
An Insider’s Guide: Website Sourcing Made Easy!
IT Management
Expert Talk: Cyber Security
IT Management, Part II
CCNA in 21 Hours
The complete web developer
Managerial Technology Evaluation
Salesforce Document Generation and Why You Need It
Expert Talk: What is Blockchain
Agile for Managers
Managing Personal Data Breaches
Productivity: Email Hacks
The modern information environment
Introduction to Social Engineering
Introduction to Malware
Expert Talk: Data Security Protection & Management
Managing Data Subject Rights
Power BI for Professionals
Good Digital Hygiene
Making the Most of Big Data
Linux for system administrators and DevOps
OOP in PHP and MVC
Agile Concepts
IT-Business Alignment: Part II
Expert Talk: AI in Business - the Real Scoop
Scrum: The Basics
Adapting to Tech Changes
An Introduction to the Internet of Things
Effective Personal Data Practices
Security and Data Privacy Audit Questionnaires
Cyberattacks and Cybersecurity
How to Improve Your Production: Part I