Information Technology Training Topics
Cyberattacks: Trends, Threats and Prevention
The numbers have been tallied and just as expected, it was another record-breaking year for cyberattacks and breaches.
Configuring Your Device
This video lesson will help employees understand some of the safeguards that can and should be applied to personal and work mobile devices.
Project Management Essentials
Project management initiatives provide better control, higher ROI, shorter development times, lower costs, higher quality and reliability. Learn how to create a plan, implement it, monitor progress and deliver it on track, on budget and on time.
Your Email is Out to Get You - How Did This Happen?
Malicious email is one of the leading security risks for enterprises today. Email attacks can cause a loss of business, damage corporate reputations and reduce customer confidence.
Avoiding Human Mistakes
In this video lesson we will discuss how human nature can be manipulated by hackers, how to recognize suspicious emails and links, and how to safely use personal devices in public spaces.
What's New in Big Data: Trends, Tools and Techniques
Enterprises today are relying more and more on Big Data and advanced analytics to let them identify the dynamics of their market as well as the future trends that will offer them that “prized” competitive edge.
The Unraveling of Net Neutrality
Net Neutrality has been a guiding principle of the Internet. Net Neutrality rules required Internet Service Providers to allow access to all content and applications, no matter the source, without favoring or discriminating against a product or website.
Operational Intelligence: An Introduction
Operational Intelligence, or OI, has been proclaimed by many as the next generation of business intelligence. This rising technology star now offers organizations access to real-time business insights that have never been possible before.
Cyber Attacks & Security Breaches: Coping with External Threats
IT and security professionals must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats.
Introducing IoT: The Internet of Things
In this report we’ll take a close-up look at the “Internet of Things,” also known as IoT. We’ll talk about the associated technologies, legal, security and privacy issues. Professionals will gain valuable insight into the impact IoT will bring to individuals, global businesses and enterprise IT, now and in the future.