Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Technical Training

RSS Feed    Add to Google    Add to My Yahoo!
Technical TrainingReports
 
Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Fighting Economic Crime in the Financial Services sector
sponsored by ComputerWeekly.com
IT BRIEFING: PwC examines the impact of Cybercrime on the financial services industry.
Posted: 27 Mar 2012 | Published: 26 Mar 2012

ComputerWeekly.com

UK Computer Science Education in the 21st Century
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Management consultant Yva Thakurdas assesses the scale of the UK IT skills gap, analyses its causes and potential solutions in this presentation.
Posted: 03 Apr 2013 | Published: 03 Apr 2013

ComputerWeekly.com

How to improve your communication with your boss
sponsored by ComputerWeekly.com
TRAINING GUIDE: Learn how to communicate more effectively with your boss in this guide from Dr Brian Sutton and Dr Robina Chatham.
Posted: 08 May 2012 | Published: 08 May 2012

ComputerWeekly.com

Integrated Talent Management
sponsored by ComputerWeekly.com
ANALYST REPORT: This Independent analyst perspective into the integrated talent management systems market from Elearnity assesses the leading talent management suppliers.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Social channels changing contact center certification
sponsored by Salesforce.com
EGUIDE: In this expert tip, find out which certification programs are getting overhauled, including those focused on individual call center managers and agents, such as the program from ICMI, and the costs associated with these certifications.
Posted: 20 Mar 2012 | Published: 20 Mar 2012

Salesforce.com

The dying art of storytelling; how to rejuvenate your training programme
sponsored by Skillsoft
WHITE PAPER: This white paper examines the art of storytelling as a tool in the training process and how you can get employees to retain information from training to apply it on the job.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Step Up to Cisco Premier
sponsored by Comstor
WHITE PAPER: Access this one-page resource to learn about Step Up to Cisco Premier, a unique training that can help your associates receive the Cisco Premier certification so you can identify your company as a qualified, trained, and experienced Cisco resource.
Posted: 08 Feb 2012 | Published: 27 Jan 2012

Comstor
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement