INFORMATION TECHNOLOGY

Information Technology Training

Protecting Your PC | Video Lesson Preview

Protecting Your PC

Cybersecurity is a big deal nowadays. This video is designed to help IT and business professionals keep organizational data secure. Viewers will learn the different types of computer infections that are out there and know how those affect computers in terms of what they’re doing with private data. We’ll also cover the proper steps to keep computers secure at your organization.

Project Management Essentials: Introduction | Video Lesson Preview

Project Management Essentials

Organizations that implement project management get better control, better customer relations, higher return on investment, shorter development times, lower costs, higher quality and reliability and higher profit margins. This program will teach project managers how to create a plan, implement it, monitor progress
and deliver it on track, on budget and on time!

Semantic Technologies: Enabling Next-Generation Web Advertising

Semantic Technologies: Enabling Next-Generation Web Advertising

In this case study report, Amiad Solomon, founder and CEO of Peer 39, explains how he and his firm use Semantic Technology solutions to enable the delivery of more effective and well-targeted ads to online consumers.

Authentication, Authorization and Accounting: Best Practices

Authentication, Authorization and Accounting: Best Practices

One key item that should always be on the “IT security radar” is the critical area of Authentication, Authorization, and Accounting, also referred to as AAA. This program presents IT and business professionals with practical advice on this important topic.

Computer Workstation Safety

Computer Workstation Safety

Today much of the work we do involves computers, whether it’s in the warehouse or in the accounting department. This Computer Workstation Safety program reviews the safe use of computers, and offers practical solutions to many potential problems.

The Five Big Bang Theory of the Internet

The Five Big Bang Theory of the Internet

This program explores the evolution of the Internet and provides interesting insights about its history and where it might be headed in the future.

Cyber Attacks & Security Breaches: Coping with External Threats

Cyber Attacks & Security Breaches: Coping with External Threats

IT and security professionals must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats.

Introducing IoT: The Internet of Things

Introducing IoT: The Internet of Things

In this report we’ll take a close-up look at the “Internet of Things,” also known as IoT. We’ll talk about the associated technologies, legal, security and privacy issues. Professionals will gain valuable insight into the impact IoT will bring to individuals, global businesses and enterprise IT, now and in the future.

Ready to give it a try? Try our solution with unlimited access for 30 days, absolutely free. Get started today!