Acquisitions and Mergers – IT Considerations and Impact

Acquisitions and Mergers – IT Considerations and Impact   Click for 10% off through Illumeo   During an acquisition or merger companies are very interested in revenue, losses, potential for growth and the like. Technology is all too often an after-thought.   In this course we discuss techniques and methodologies for evaluating the new infrastructure, as well […]

Acquisitions and Mergers – IT Considerations and Impact Read More »

Protect Your Data from Hackers, Virus and Phishing Schemes

Protect Your Data from Hackers, Virus and Phishing Schemes   Click for 10% off through Illumeo   “Your data may have been breached.”  It seems like that is a headline on an all too frequent basis.  These attacks can be avoided.  In this course we will discuss technologies that can be implemented to effectively prevent hacking attempts, viruses

Protect Your Data from Hackers, Virus and Phishing Schemes Read More »

An Introduction to Incident, Change, and Project Management for Hardware and Application Support

An Introduction to Incident, Change, and Project Management for Hardware and Application Support   Click for 10% off through Illumeo   Computer hardware and application support have become critical to the ongoing operations of nearly every business.  A formal process can help individuals and organizations clear the hurdles involved with change. In this course we

An Introduction to Incident, Change, and Project Management for Hardware and Application Support Read More »

Disaster Recovery for Information Technology (IT)

Disaster Recovery for Information Technology (IT)   Click for 10% off through Illumeo   A comprehensive disaster recovery plan is vital to ensuring the ongoing ability to conduct business in the event of a disruption.  Such plans provide detailed procedures to recover disrupted systems, and help return organizations to business as normal.  The primary purpose

Disaster Recovery for Information Technology (IT) Read More »

Information Technology (IT) General Controls

Information Technology (IT) General Controls   Click for 10% off through Illumeo   Information Technology (IT) Controls are integral to the protection of our business and personal lives.  They are comprised of tactics such as utilizing strong passwords, encrypting laptops and backing up files.  In this course you will learn about policies, procedures and controls

Information Technology (IT) General Controls Read More »

Comparing Corporate Security Methodologies

Comparing Corporate Security Methodologies   Click for 10% off through Illumeo   Biometric security is on the rise as younger generations and mobile users have become comfortable using tools such as fingerprint identification for access.  Biometrics have the benefit of non-repudiation and ease of use.  The question being, where is biometrics place in corporate security programs?

Comparing Corporate Security Methodologies Read More »

Shopping Cart