Categories Pricing Corporate

Управление IT-проектами

Assessing Information Risks
Expert Talk: Technology and Change
Lead Technical Teams as a Non-technical Leader
Programmed Learning
Using and Managing Passwords
LGPD Compliance Support Tools
Building Real Time Web Applications in PHP and JS
Adjusting your Tech Mindset
IT Strategy & Technology Innovation
Windows 7 Install to Secure
Cloud Computing
Information security for non-technical managers
Hands-on with SAP ERP and IDES
GDPR Gap Analysis by Article
Enhance a Website Project
Data Protection Impact Assessment
Data Protection Specialized Controls
The Dynamic Duo of Agile
Common Types of Attack
GDPR Gap Assessment Tools
IT Best Practices: Purchasing a New Computer
IT-Business Alignment: Part I
How to improve your company’s performance
How to Improve Your Production: Part II
Data Protection and Privacy Management System
The adventures of an IT leader
IT Management Controls
Hands-on with SAP S/4HANA and GBI
Agile Leadership
Responsible Use of AI
How to Talk Tech to a Non-Techie Audience
Data and Technology
DP and P Strategies, Policies and Plans
GDPR Gap Analysis by Process
Practical IT Asset Management
An Insider’s Guide: Website Sourcing Made Easy!
IT Management
Expert Talk: Cyber Security
IT Management, Part II
The complete web developer
CCNA in 21 Hours
Expert Talk: What is Blockchain
The modern information environment
Introduction to Malware
Introduction to Social Engineering
Expert Talk: Data Security Protection & Management
Productivity: Email Hacks
Managerial Technology Evaluation
Managing Data Subject Rights
Agile for Managers
Managing Personal Data Breaches
Salesforce Document Generation and Why You Need It
Power BI for Professionals
Linux for system administrators and DevOps
OOP in PHP and MVC
Good Digital Hygiene
Making the Most of Big Data
IT-Business Alignment: Part II
Adapting to Tech Changes
An Introduction to the Internet of Things
Agile Concepts
Expert Talk: AI in Business - the Real Scoop
Scrum: The Basics
Security and Data Privacy Audit Questionnaires
Effective Personal Data Practices
Cyberattacks and Cybersecurity
How to Improve Your Production: Part I