Categories
Information Technology
Discover easy-to-use Information Technology templates and training courses for operation procedures, business continuity plan, risk assessment, and more. Use them to gain practical knowledge, streamline your work, and stay on top of industry best practices. Customize these resources to fit your needs and excel in the Information Technology industry with confidence.
- Template
Monthly/Quarterly Server Maintenance Checklist
Use this during periodic checks to cover critical items and make sure nothing is overlooked.
by SafetyCultureDownloads: 600+Get - Template
ITAR Compliance Checklist
Use this comprehensive checklist to conduct annual compliance audits and detect ITAR non-compliance based on export clearance requirements, ITAR-controlled technical data, use of ITAR exemptions, and more. This 60-item checklist has been designed for compliance officers to easily determine ITAR compliance based on 26 categories, including registration, licenses, and voluntary disclosure.
by SafetyCultureDownloads: 600+Get - Course
Privacy Policy
As companies collect more information than ever before, developing a privacy policy takes on a greater level of importance. This course talks about the key elements that a privacy policy should have, its region-specific requirements as well as the implications of non-compliance to privacy laws.
by SafetyCultureGet3 LessonsDownloads: 600+ - Template
Cyber Security Audit Checklist
A cyber security audit checklist is used by IT supervisors to inspect the overall IT security of the organization including hardware, software, programs, people, and data. It is used to assess the organization from potential vulnerabilities caused by unauthorized digital access.
by SafetyCultureDownloads: 600+Get - Course
Resilience and Risk Management (Security)
With external and unexpected threats happening in the world, our mindsets should change to adapt to these threats and allow us to deal with their impact faster and better. In this course, from a security perspective, we aim to highlight the practice of identifying, preparing, preventing, or recovering from threats that we encounter. To do this, we will discuss the convergence of the current methods with new and innovative ways on resilience and risk management.
by SafetyCultureGet4 LessonsDownloads: 500+ - Template
Computer Preventive Maintenance Checklist Template
This computer preventive maintenance checklist contains practical instructions on conducting weekly maintenance of IT assets. This template can be edited to fit the needs of your business and can be shared to fellow IT team members.
by SafetyCultureDownloads: 500+Get - Template
Technical Due Diligence Checklist for IT/Software
Use and customize this technical due diligence checklist for IT investments to review potential software acquisitions and check factors, such as legal, security, open source, and code quality compliance.
by SafetyCultureDownloads: 500+Get - Template
CCTV System Installation Handover Checklist
Comprehensive CCTV system handover documentation covering installation details, user training, equipment specifications, connectivity setup, and customer sign-off procedures.
by Steve Kelso, from the CommunityDownloads: 500+Get - Template
Display and Projector System Testing Report
Comprehensive testing results for 10 LCD displays and 6 projector systems, including power functionality, source switching, and projection screen operations.
by Christien Specha, from the CommunityDownloads: 500+Get - Course
Dealing with Synthetic Identity Fraud
You've already heard about identity theft, but there's a new crime in town. This course can help financial institutions know more about synthetic identities, how they're used for crime, and how to avoid them.
by SafetyCultureGet4 LessonsDownloads: 400+ - Template
ISO 27001:2022 Checklist
This checklist can be used to assess the readiness of the organization for ISO 27001 certification. Help discover process gaps and review your organization's ISMS based on the ISO 27001:2013 standard.
by SafetyCultureDownloads: 400+Get - Template
DFARS Compliance Self-Assessment Checklist
This DFARS compliance checklist is used in performing self-assessment on information systems. DoD contractors can use this checklist to evaluate if current information systems provide adequate security by adhering to DFARS requirements and regulations. This checklist is based on the NIST MEP Cybersecurity Self-Assessment Handbook and was converted using SafetyCulture.
by SafetyCultureDownloads: 400+Get - Course
Salesforce for the Sales Force
A good company is able to provide their customers with well-rounded services from the start until the end of their transaction. Let Salesforce help you with doing exactly that! Know more about Salesforce as a customer relationship management (CRM) platform for sales through this course.
by SafetyCultureGet4 LessonsDownloads: 400+ - Course
Defendiendo los derechos humanos en la era de la Inteligencia Artificial
Si has usuado las redes sociales, alguna aplicación de navegación o algún filtro de imagenes, es probable que la Inteligencia Artificial (IA) te haya impactado. No eres solo tú: la IA está afectando los derechos humanos en todo el mundo. Este curso te informará y educará sobre cómo la IA afecta tus derechos y cómo puedes protegerlos. El 3 de septiembre, la UNESCO y UNITAR lanzaron en conjunto un nuevo curso breve de aprendizaje en línea sobre Inteligencia artificial y Derechos Humanos. Diferentes expertos desglosan conceptos complejos sobre la IA en actividades sencillas construidas en torno a nuestras interacciones tecnológicas diarias. El curso se centra en cómo la libertad de expresión, el derecho a la privacidad y el derecho a la igualdad se ven afectados al utilizar la IA.
by UNESCOGet9 LessonsDownloads: 400+ - Template
Software Quality Assurance Checklist
Software quality engineers can use this SQA checklist to ensure that the software in development passes standards set by the organization or regulating bodies. Assess the software's performance, efficiency, and usability, and check for bugs, deficiencies, and security issues.
by SafetyCultureDownloads: 400+Get - Template
ISO 27001:2013 ISMS Audit Checklist
This ISO 27001:2013 ISMS audit checklist helps teams evaluate information security management readiness and maintain compliance. It covers context and scope, leadership, planning, support, operations, performance evaluation, and improvement, plus Annex A controls such as access control, asset management, cryptography, physical security, operations security, communications security, system development, supplier relationships, incident management, business continuity, and compliance. Use it for internal audits, gap assessments, and certification preparation.
by Mickey Jawa, from the CommunityDownloads: 400+Get - Course
How to Log In (EdApp)
This is a short course on how to log in to EdApp through your desktop and mobile phone.
by SafetyCultureGet2 LessonsDownloads: 300+ - Course
Introduction to Artificial Intelligence
Introduction to Artificial Intelligence is a free, mobile-first course developed by Insightful AI Hub, designed to provide learners with a foundational understanding of AI concepts. Through four interactive lessons, the course covers essential topics such as the basics of AI, algorithms and data, machine learning, and neural networks. With a gamified experience and editable content, it offers an engaging learning environment suitable for both self-learners and group training sessions.
by Insightful AI Hub GLGet4 LessonsDownloads: 300+ - Template
Cyber Security Threat Assessment Checklist
A cyber security threat assessment checklist helps to identify threats (natural, human, and environmental) that may occur within the information systems. It is used to identify the risk ratings (High, Medium, Low) which may affect the performance of operating environment.
by SafetyCultureDownloads: 300+Get
