Categories Corporate

IT Management

Assessing Information Risks
Programmed Learning
Adjusting your Tech Mindset
Lead Technical Teams as a Non-technical Leader
Using and Managing Passwords
Building Real Time Web Applications in PHP and JS
IT Strategy & Technology Innovation
LGPD Compliance Support Tools
Windows 7 Install to Secure
Expert Talk: Technology and Change
Cloud Computing
Information security for non-technical managers
Hands-on with SAP ERP and IDES
GDPR Gap Analysis by Article
Common Types of Attack
GDPR Gap Assessment Tools
Enhance a Website Project
How to Improve Your Production: Part II
How to improve your company’s performance
The Dynamic Duo of Agile
IT Best Practices: Purchasing a New Computer
Data Protection Impact Assessment
IT-Business Alignment: Part I
Data Protection Specialized Controls
Data Protection and Privacy Management System
Hands-on with SAP S/4HANA and GBI
Expert Talk: Cyber Security
GDPR Gap Analysis by Process
DP and P Strategies, Policies and Plans
Practical IT Asset Management
Agile Leadership
Data and Technology
Responsible Use of AI
IT Management, Part II
The adventures of an IT leader
IT Management Controls
IT Management
An Insider’s Guide: Website Sourcing Made Easy!
How to Talk Tech to a Non-Techie Audience
CCNA in 21 Hours
The complete web developer
Agile for Managers
The modern information environment
Salesforce Document Generation and Why You Need It
Introduction to Social Engineering
Managing Data Subject Rights
Managerial Technology Evaluation
Expert Talk: What is Blockchain
Managing Personal Data Breaches
Development of Metaverse and Web 3.0
Productivity: Email Hacks
Power BI for Professionals
Expert Talk: Data Security Protection & Management
OOP in PHP and MVC
Linux for system administrators and DevOps
Good Digital Hygiene
Introduction to Malware
Making the Most of Big Data
Expert Talk: AI in Business - the Real Scoop
Agile Concepts
Scrum: The Basics
An Introduction to the Internet of Things
Adapting to Tech Changes
Security and Data Privacy Audit Questionnaires
Effective Personal Data Practices
How to Improve Your Production: Part I
Cyberattacks and Cybersecurity
IT-Business Alignment: Part II