Categories About Us

IT Management

Power BI for Professionals
Agile Concepts
IT Strategy & Technology Innovation
Cyberattacks and Cybersecurity
Making the Most of Big Data
IT Management
IT-Business Alignment: Part II
Cloud Computing
CCNA in 21 Hours
The complete web developer
IT Management, Part II
Information security for non-technical managers
The adventures of an IT leader
How to Improve Your Production: Part I
Assessing Information Risks
IT-Business Alignment: Part I
Agile for Managers
GDPR Gap Analysis by Article
GDPR Gap Assessment Tools
GDPR Gap Analysis by Process
Linux for system administrators and DevOps
How to improve your company’s performance
Security and Data Privacy Audit Questionnaires
Good Digital Hygiene
Data Protection Specialized Controls
Data Protection and Privacy Management System
How to Improve Your Production: Part II
The Talent Code
Adjusting your Tech Mindset
Adapting to Tech Changes
Effective Personal Data Practices
Agile Leadership
Programmed Learning
Introduction to Malware
LGPD Compliance Support Tools
The modern information environment
Introduction to Social Engineering
Scrum: The Basics
Managing Personal Data Breaches
Managerial Technology Evaluation
Building Real Time Web Applications in PHP and JS
Managing Data Subject Rights
Productivity: Email Hacks
Data Protection Impact Assessment
Common Types of Attack
Enhance a Website Project
DP and P Strategies, Policies and Plans
Development of Metaverse and Web 3.0
Practical IT Asset Management
OOP in PHP and MVC
Technology’s Growth Highlights the Value of People
An Insider’s Guide: Website Sourcing Made Easy!
IT Best Practices: Purchasing a New Computer
Salesforce Document Generation and Why You Need It
An Introduction to the Internet of Things
Lead Technical Teams as a Non-technical Leader
How to Talk Tech to a Non-Techie Audience
Windows 7 Install to Secure
Expert Talk: Technology and Change
Using and Managing Passwords
Hands-on with SAP S/4HANA and GBI
The Dynamic Duo of Agile
IT Management Controls
Hands-on with SAP ERP and IDES