Information Technology

Preview a sample of our most popular videos or check out our Information Technology topics below.

Cyber Security Awareness: A Few Words About Passwords
Passwords are increasingly important these days, so make sure you are doing all you can to stay safe! Welcome to the "Cyber Security Awareness" series of video lessons meant to help the learner understand modern technological threats to themselves and their company. One should never underestimate the importance of strong passwords! This video lesson, "A Few Words About Passwords," is the third of six and covers what you need to know to stay safe.
Cyber Security Awareness: You Are the First Line of Defense
Welcome to the "Cyber Security Awareness" series of video lessons meant to help the learner understand modern technological threats to themselves and their company. This video lesson, "You are the First Line of Defense," is the first of six. From this lesson, the learner will understand the frequency and severity of cyber attacks, who is behind them, and what they can do as the first line of defense when using websites and personal and work devices. Keywords: data security, IT security, data protection, cybersecurity.
Cybersecurity Toolkit: Phishing
Welcome to the “Cybersecurity Toolkit,” a series of video lessons designed to cover everything you need to know about keeping your workplace safe from cyberattacks. This lesson, “Cybersecurity: Phishing,” is intended to define and describe different types of phishing attacks and provide action steps to avoid these attacks. This lesson begins by defining the term “phishing” before describing its many forms such as email spoofing, mass brand impersonation, URL phishing, website spoofing, subdomain attacks, in-session phishing, image phishing, vishing, search engine attacks, and more.
Security Awareness Now! Protecting Against Insider Threats
The world of cybersecurity threat has become an entire universe. This module alerts employees to the different types and sources of cybersecurity threats, intentional and unintentional, and how those threats can appear in the daily routine of any organization. Employees acquire best practices for safeguarding the organization’s critical assets.
User-Centered Design: Benefits, Challenges, and Best Practices
For well over a decade, UCD methodologies have helped shape the technology solutions and devices that touch our daily lives. In this report, Rob Stokes, Director of User Experience at Spanning Cloud Apps, introduces viewers to the world of user-centered design and discusses its benefits and challenges. In addition, we’ll offer practical advice and best practices that professionals can utilize to benefit their critical development projects.
What’s New in Big Data: Trends, Tools and Techniques
Enterprises today are relying more and more on Big Data and advanced analytics to let them identify the dynamics of their market as well as the future trends that will offer them that “prized” competitive edge. With our current global output of data now estimated at 2.5 quintillion bytes a day, companies must lay down a bona fide strategy to effectively manage and mine the massive data sets of structured and unstructured data that they acquire.

Sample of Our IT Topics

Agile
Ajax
CompTIA
Cybersecurity
Javascript
Microsoft

Looking for more information?

Learn how you can use off-the-shelf IT training to drive business results.

Not seeing a topic you're looking for?

This is only a sample of our library! Request a demo to get an in-depth look at the thousands of titles in our collection.