Categories Pricing Corporate

IT Hallinto

Assessing Information Risks
LGPD Compliance Support Tools
Adjusting your Tech Mindset
Lead Technical Teams as a Non-technical Leader
Programmed Learning
IT Strategy & Technology Innovation
Windows 7 Install to Secure
Hands-on with SAP ERP and IDES
Expert Talk: Technology and Change
Building Real Time Web Applications in PHP and JS
Using and Managing Passwords
Cloud Computing
Information security for non-technical managers
Data Protection Specialized Controls
IT Best Practices: Purchasing a New Computer
Data Protection Impact Assessment
Enhance a Website Project
The Dynamic Duo of Agile
Common Types of Attack
GDPR Gap Assessment Tools
IT-Business Alignment: Part I
GDPR Gap Analysis by Article
Data Protection and Privacy Management System
How to improve your company’s performance
How to Improve Your Production: Part II
How to Talk Tech to a Non-Techie Audience
Hands-on with SAP S/4HANA and GBI
IT Management Controls
DP and P Strategies, Policies and Plans
Responsible Use of AI
GDPR Gap Analysis by Process
Practical IT Asset Management
The adventures of an IT leader
An Insider’s Guide: Website Sourcing Made Easy!
Data and Technology
Agile Leadership
IT Management
IT Management, Part II
CCNA in 21 Hours
Expert Talk: Cyber Security
The complete web developer
Expert Talk: What is Blockchain
Managing Data Subject Rights
The modern information environment
Agile for Managers
Managerial Technology Evaluation
Salesforce Document Generation and Why You Need It
Introduction to Malware
Productivity: Email Hacks
Managing Personal Data Breaches
Introduction to Social Engineering
Expert Talk: Data Security Protection & Management
Making the Most of Big Data
Good Digital Hygiene
OOP in PHP and MVC
Linux for system administrators and DevOps
Agile Concepts
Expert Talk: AI in Business - the Real Scoop
IT-Business Alignment: Part II
Adapting to Tech Changes
Security and Data Privacy Audit Questionnaires
Scrum: The Basics
An Introduction to the Internet of Things
Effective Personal Data Practices
How to Improve Your Production: Part I
Cyberattacks and Cybersecurity