Job Training Reports

A Computer Weekly buyer's guide to training programmes and tools
sponsored by TechTarget ComputerWeekly.com
EBOOK: It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.
Posted: 17 Mar 2022 | Published: 17 Mar 2022

TechTarget ComputerWeekly.com

Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.
Posted: 21 Feb 2022 | Published: 22 Feb 2022

TechTarget ComputerWeekly.com

Digital Revolution: Moving towards agility
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about Citic Pacific Mining's success, the role of the CIO and chief digital officer at GE, and how Australia is planning to develop its digital competencies.
Posted: 08 Feb 2021 | Published: 21 Mar 2018

TechTarget ComputerWeekly.com

Virtual Firsthand Training – A New Dimension of SAP® Education
sponsored by SAP America, Inc.
WHITE PAPER: This paper describes how new virtual learning options from the SAP® Education organization fulfill the requirements of many companies and consultants. Continue reading to learn how they reduce training investments, meet various needs, and offer a flexible learning approach.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

SAP America, Inc.

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

CW Europe – June 2015
sponsored by TechTarget ComputerWeekly.com
EZINE: Employment across Europe - Why industry has a responsibility to ensure the IT workforce adds to Europe's economic value.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

TechTarget ComputerWeekly.com

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Information Security Asean March 2016
sponsored by TechTarget
EZINE: Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals
Posted: 03 Mar 2016 | Published: 03 Mar 2016

TechTarget

Take Advantage of Oracle's 2 Day DBA Course
sponsored by Oracle Corporation
TRAINING GUIDE: This course is designed to complement the Oracle 2 Day DBA documentation. In this course you will find detailed information on the tasks outlined in the chapters of the Oracle 2 Day DBA manual, including step-by-step instructions.
Posted: 25 Feb 2009 | Published: 25 Feb 2009

Oracle Corporation