Information Technology Training Topics
Protecting Your PC
This video course is designed to help Information Technology and business professionals keep organizational data secure and avoid potential cyber attacks.
Configuring Your Device
This video lesson will help employees understand some of the safeguards that can and should be applied to personal and work mobile devices.
Project Management Essentials
Project management initiatives provide better control, higher ROI, shorter development times, lower costs, higher quality and reliability. Learn how to create a plan, implement it, monitor progress and deliver it on track, on budget and on time.
Computer Workstation Safety
Today much of the work we do involves computers, whether it’s in the warehouse or in the accounting department. This Computer Workstation Safety program reviews the safe use of computers, and offers practical solutions to many potential problems.
Avoiding Human Mistakes
In this video lesson we will discuss how human nature can be manipulated by hackers, how to recognize suspicious emails and links, and how to safely use personal devices in public spaces.
Authentication, Authorization and Accounting: Best Practices
One key item that should always be on the “IT security radar” is the critical area of Authentication, Authorization, and Accounting, also referred to as AAA. This program presents IT and business professionals with practical advice on this important topic.
Semantic Technologies: Enabling Next-Generation Web Advertising
In this case study report, Amiad Solomon, founder and CEO of Peer 39, explains how he and his firm use Semantic Technology solutions to enable the delivery of more effective and well-targeted ads to online consumers.
The Five Big Bang Theory of the Internet
This program explores the evolution of the Internet and provides interesting insights about its history and where it might be headed in the future.
Cyber Attacks & Security Breaches: Coping with External Threats
IT and security professionals must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats.
Introducing IoT: The Internet of Things
In this report we’ll take a close-up look at the “Internet of Things,” also known as IoT. We’ll talk about the associated technologies, legal, security and privacy issues. Professionals will gain valuable insight into the impact IoT will bring to individuals, global businesses and enterprise IT, now and in the future.