Categories About Us

IT Management

Power BI for Professionals
Cyberattacks and Cybersecurity
Responsible Use of AI
Agile Concepts
An Introduction to the Internet of Things
Linux for system administrators and DevOps
CCNA in 21 Hours
Cloud Computing
Agile Leadership
Data and Technology
Making the Most of Big Data
Technology’s Growth Highlights the Value of People
IT Strategy & Technology Innovation
Scrum: The Basics
Building Real Time Web Applications in PHP and JS
How to Improve Your Production: Part I
The complete web developer
Expert Talk: What is Blockchain
OOP in PHP and MVC
How to improve your company’s performance
IT Management
Expert Talk: Cyber Security
Lead Technical Teams as a Non-technical Leader
Adjusting your Tech Mindset
Enhance a Website Project
How to Talk Tech to a Non-Techie Audience
Good Digital Hygiene
Programmed Learning
How to Improve Your Production: Part II
Agile for Managers
Adapting to Tech Changes
Introduction to Malware
IT Management, Part II
Data Protection and Privacy Management System
Assessing Information Risks
The Talent Code
Using and Managing Passwords
Expert Talk: Data Security Protection & Management
IT-Business Alignment: Part I
Managerial Technology Evaluation
Managing Personal Data Breaches
Common Types of Attack
Data Protection Specialized Controls
Effective Personal Data Practices
Information security for non-technical managers
GDPR Gap Analysis by Article
Productivity: Email Hacks
The modern information environment
Expert Talk: AI in Business - the Real Scoop
IT Best Practices: Purchasing a New Computer
The adventures of an IT leader
Introduction to Social Engineering
Development of Metaverse and Web 3.0
GDPR Gap Assessment Tools
Expert Talk: Technology and Change
IT-Business Alignment: Part II
The Dynamic Duo of Agile
GDPR Gap Analysis by Process
An Insider’s Guide: Website Sourcing Made Easy!
Hands-on with SAP S/4HANA and GBI
DP and P Strategies, Policies and Plans
Windows 7 Install to Secure
Managing Data Subject Rights
Practical IT Asset Management
Salesforce Document Generation and Why You Need It
Security and Data Privacy Audit Questionnaires
Data Protection Impact Assessment
IT Management Controls
LGPD Compliance Support Tools
Hands-on with SAP ERP and IDES