• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

685 Associate courses in Sheerness delivered Live Online

Autumn Series 2025 - Organisation & Relationship Systems Coaching Training

By CRR UK

CRRUK equips professionals with the concepts, skills and tools to build conscious, intentional relationships, and to coach relationship systems of any size.

Autumn Series 2025 - Organisation & Relationship Systems Coaching Training
Delivered Online + more
£4,920

2nd July Louise Buckley #Agent121. Looking for: ADULT FICTION

5.0(3)

By I Am In Print

LOOKING FOR: ADULT FICTION Louise Buckley has worked in publishing for well over a decade. She was inspired to enter the publishing industry after completing an MA in Creative Writing and then spent a hugely enjoyable year working as a bookseller for Waterstones, wishing that she could have a hand in publishing books. After a year working at Dorling Kindersley, she then spent almost five years working in the commercial fiction division at Pan Macmillan, where she published a mix of commercial bestsellers and award-winning authors. Most recently, she was an Associate Literary Agent at Zeno Agency Ltd. As an agent she represented a roster of commercial and literary fiction, including Anne Griffin’s When All is Said, which spent five weeks at number one in Ireland and sold into 17 territories. She is delighted to be working with Hannah at Hannah Sheppard Literary Agency. Louise is looking for:- Literary and upmarket fiction that focusses on the underdog, the repressed, the suppressed. Louise is especially interested in novels that represent working-class people or children going through difficult circumstances (think Shuggie Bain by Douglas Stuart, My Name is Leon by Kit de Waal or Boys Don’t Cry by FÍona Scarlett). Irish literary and book club fiction. Think Claire Keegan, Louise Kennedy or Anne Griffin. In commercial fiction she loves novels set during the Second World War, such as The Nightingale by Kristin Hannah, The Beekeeper of Aleppo by Christi Lefteri or The Midwife of Auschwitz by Anna Stuart. Louise recently read and loved The Last List of Mabel Beaumont by Laura Pearson and would love to see anything in the same ‘older person going on a journey’ category, a more recent The Unlikely Pilgrimage of Harold Fry. Louise had a lot of fun publishing a ‘pet fiction’ novel as an editor (Molly and the Cat Café) and would love to find an author who can write an Alfie the Doorstep Cat/Dog. She has a soft spot for novels featuring time-travel or parallel universes, a ‘what if’ that plays around with conventions. At the literary end this would be books like Life After Life by Kate Atkinson, The Shining Girls by Lauren Beukes or This is How You Lose the Time War by Amal El-Mohtar and Max Gladstone. At the more commercial end Louise loved Wrong Place, Wrong Time by Gillian McAllister, Dark Matter by Blake Crouch and Oona Out of Order by Martina Montimore. She also enjoys novels set in the real world but featuring a hefty dose of magic or the supernatural. They can be commercial or literary, present-day or historical. Think Rivers of London by Ben Aaronovitch, Threadneedle by Cari Thomas, A Discovery of Witches by Deborah Harkness or The Gifts by Liz Hyder. And also cosy fantasy in the vein of Legends and Lattes or The House in the Cerulean Sea. Cosy or humorous crime. Recently, Louise absolutely loved Over My Dead Body by Maz Evans. When she was an editor Louise published the hit Luckiest Girl Alive by Jessica Knoll and would love to represent incisive, intelligent suspense written by authors such as Jessica Knoll and Gillian Flynn, or something a little more subversive and blackly comic like My Sister, the Serial Killer by Oyinkan Braithwaite. More generally, Louise would also love to see novels with a disabled protagonist or someone (like herself) who is living with an invisible disability. As an ex-primary school teacher, she also warmly welcomes submissions from teachers, especially if the submission falls into one of the other categories she has listed. Following-on from this, she enjoys reading stories that follow a ‘beating the system’ narrative. Horror. Louise is currently really enjoying the horror resurgence and would love some more horror for her list. She is looking for all types of horror from the more literary, suspenseful horror along the lines of Andrew Michael Hurley to the more commercial like Witchcraft for Wayward Girls by Grady Hendrix. Louise is also a big fan of horror mash-ups, especially body transformation horror such as Nightbitch, and horror mixed with, say, vampires, in the vein of Hungerstone or The Lamb. She would also love to see some dark academia. Think If We Were Villains or In My Dreams I Hold a Knife, and is a huge fan of gothic horror, so would love to see something that’s a modern-day Shirley Jackson or Rebecca. Louise is NOT looking for: -romance -romantasy -epic, traditional fantasy -space opera -straightforward women’s fiction -children’s fiction of any kind -non-fiction Louise would like you to submit a covering letter, 1 page synopsis and the first three chapters or 5,000 words of your manuscript in a single word document, whichever is shorter. (In addition to the paid sessions, Louise is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 25th June 2025

2nd July Louise Buckley #Agent121. Looking for: ADULT FICTION
Delivered Online + more
£72

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Existential Dialogues 2025: “In-Sanity, Who is Sane?” with Prof E. Spinelli

By Therapy Harley Street

Ten live dialogues between Prof Ernesto Spinelli and International Existential Therapists followed by an Experiential Study Group. A phenomenological approach to re-view psychopathology: We aim to explore the lived experiences of irregular perceptions of reality with an open mind. Each Saturday includes a live dialogue between Prof Ernesto Spinelli and an International Existential Therapist; a moment to share your thoughts and feelings with the teachers; and a final integration facilitated by Bárbara Godoy. This series of ten Dialogues set out to explore the multifaceted dimentions and complexities associated with Existential Therapies. It attempts to engage with various interpretations of insanity through the lens of patients' often painful, confounding, and deeply unsettling life experiences. TIMES AND DATES 2025 25 Jan. “Knots” with Prof. Ernesto Spinelli 2 Feb. “Healing” with Dr. Michael Guy Thompson 22 Mar. “Difference” with Dr. Todd DuBose 12 Apr. “Polarization” with Prof. Kirk Schneider 3 May “Character” with Prof. Robert Romanyshyn 21 Jun. “Opening” with Dr. Yaqui Martinez 19 Jul. “Meaning” with Dr. Jan Resnick 25 Oct. “Invention” with Dr. Betty Cannon 15 Nov. “Hallucination” with Prof. Simon du Plock 13 Dec. “Hysteria” with Bárbara Godoy Full course (including dialogues): £1260 (2 pm to 5 pm – UK time) Only Dialogues: £630 (2 pm to 3 pm – UK time) Venue: Online Zoom Read the full Programme here > Course Organised by:

Existential Dialogues 2025: “In-Sanity, Who is Sane?” with Prof E. Spinelli
Delivered Online + more
£630 to £1,260

Cisco Administering Cisco Contact Center Enterprise (CCEA)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Account and project managers Contact Center Enterprise (CCE) administrators Deployment engineers Technical sales Overview After taking this course, you should be able to: Navigate CCE configuration and scripting tools Configure a dialed number, call type, and media routing domain Build a basic Cisco Intelligent Contact Management (ICM) script Configure agents and skill groups Configure basic Interactive Voice Response (IVR) functionality Implement attributes and precision queues Configure Ring-No-Answer (RONA) using CCE configuration tools Configure and populate an agent team and primary supervisor Improve agent efficiency through finesse enhancements Build and test a basic Voice XML (VXML) application Implement roles, departments, and business hours Run Cisco Unified Intelligence Center (CUIC) reports using the Reporting tool The Administering Cisco Contact Center Enterprise (CCEA) v1.0 course teaches you the contextual information around call flow between components in the Cisco© Unified Contact Center Enterprise (UCCE) solution including intelligent contact routing, call treatment, network-to-desktop Computer Telephony Integration (CTI), and multichannel contact management over an IP infrastructure. You receive hands-on practice using administrative tools to perform routine adds, moves, and changes in an inbound contact center environment. Cisco Unified Contact Center Review Contact Center Basics Components and Architecture Deploying Basic Call Settings Associate Basic Call Settings Explore Media Routing Domains Building a Basic Cisco Unified Contact Center Enterprise Script Introduce Script Editor Use Script Editor Nodes Configuring Basic Agent Functionality Introduce Agent Functionality Configure Agent Desk Settings Configuring Basic Call Treatment and Queuing Explore Media Server and Files Introduce Microapps Implementing Precision Routing Introduce Precision Routing Basics Examine the Migration Path Configuring RONA Support Introduce RONA Functionality Identify RONA Timeout Considerations Configuring Agent Teams and Supervisors Configuring Teams and Supervisors Explore Agent Roles Administering the Cisco Finesse Desktop Administering Cisco Finesse Desktop Introduce Cisco Finesse Administration Implementing Voice XML Applications Introduce VXML Build a Basic Call Studio Project Configuring Roles, Departments, and Business Hours Examine Post-Call Survey Functionality Configure Post-Call Survey Running Unified CC Enterprise Reports with Unified Intelligence Center (IC) Configure Unified CC Enterprise Administrators Configure Departments

Cisco Administering Cisco Contact Center Enterprise (CCEA)
Delivered OnlineFlexible Dates
Price on Enquiry

Developing women academic leaders: coaching workshop programme for women/identify as women academics higher education aspiring to leadership roles - series 1 2023/24

By Coach Academic

This coaching programme is for aspiring women leaders in higher education, delivered in real time, fully online. Five workshops have been designed to support you in a group environment to work actively towards realising your professional goals, whatever they may look like, focused on leadership at all levels in higher education. HE needs leaders like you - workshops with Coach Academic will help to propel you to becoming one. For all academics who are female/identify as female. During this coaching experience you will explore and learn from: - your values and beliefs, and how they impact on your professional identity and actions - your beliefs about higher education, leadership, and yourself - your strengths and how to harness them for impact - your areas for development, and embracing the actions you choose to address these - your internal and external blockers, and how to manage these - your motivation - why do you want to lead in HE? From these you will be able to build your confidence and your leadership identity, and take concrete steps towards becoming the leader you aspire to be.

Developing women academic leaders: coaching workshop programme for women/identify as women academics higher education aspiring to leadership roles - series 1 2023/24
Delivered OnlineFlexible Dates
£300

Developing women academic leaders: coaching workshop programme for women/identify as women academics higher education aspiring to leadership roles - series 2 2023/24

By Coach Academic

This coaching programme is for aspiring women leaders in higher education, delivered in real time, fully online. Five workshops have been designed to support you in a group environment to work actively towards realising your professional goals, whatever they may look like, focused on leadership at all levels in higher education. HE needs leaders like you - workshops with Coach Academic will help to propel you to becoming one. For all academics who are female/identify as female. During this coaching experience you will explore and learn from: - your values and beliefs, and how they impact on your professional identity and actions - your beliefs about higher education, leadership, and yourself - your strengths and how to harness them for impact - your areas for development, and embracing the actions you choose to address these - your internal and external blockers, and how to manage these - your motivation - why do you want to lead in HE? From these you will be able to build your confidence and your leadership identity, and take concrete steps towards becoming the leader you aspire to be.

Developing women academic leaders: coaching workshop programme for women/identify as women academics higher education aspiring to leadership roles - series 2 2023/24
Delivered OnlineFlexible Dates
£300

Software development fundamentals

5.0(3)

By Systems & Network Training

Software development training course description This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-361, and build an understanding of these topics: Core programming, Object-Oriented programming, general software development, web applications, desktop applications, and databases. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. What will you learn Describe core programming. Explain Object Oriented programming. Describe general software development. Describe Web applications. Describe desktop applications. Explain how databases work. Software development training course details Who will benefit: Anyone looking to learn the fundamentals of software. Prerequisites: None. Duration 3 days Software development training course contents Core programming Computer storage and data types How a computer stores programs and the instructions in computer memory, memory stacks and heaps, memory size requirements for the various data storage types, numeric data and textual data. Computer decision structures Various decision structures used in all computer programming languages; If decision structures; multiple decision structures, such as If…Else and switch/Select Case; reading flowcharts; decision tables; evaluating expressions. Handling repetition For loops, While loops, Do...While loops and recursion. Understand error handling Structured exception handling. Object-oriented programming Classes Properties, methods, events and constructors; how to create a class; how to use classes in code. Inheritance Inheriting the functionality of a base class into a derived class. Polymorphism Extending the functionality in a class after inheriting from a base class, overriding methods in the derived class. Encapsulation Creating classes that hide their implementation details while still allowing access to the required functionality through the interface, access modifiers. General software development Application life cycle management Phases of application life cycle management, software testing. Interpret application specifications Application specifications, translating them into prototypes, code, select appropriate application type and components. Algorithms and data structures Arrays, stacks, queues, linked lists and sorting algorithms; performance implications of various data structures; choosing the right data structure. Web applications Web page development HTML, CSS, JavaScript. ASP.NET web application development Page life cycle, event model, state management, client-side versus server-side programming. Web hosting Creating virtual directories and websites, deploying web applications, understanding the role of Internet Information Services. Web services Web services that will be consumed by client applications, accessing web services from a client application, SOAP, WSDL. Desktop applications Windows apps UI design guideline categories, characteristics and capabilities of Store Apps, identify gestures. Console-based applications Characteristics and capabilities of console- based applications. Windows Services Characteristics and capabilities of Windows Services. Databases Relational database management systems Characteristics and capabilities of database products, database design, ERDs, normalisation concepts. Database query methods SQL, creating and accessing stored procedures, updating and selecting data. Database connection methods Connecting to various types of data stores, such as flat file; XML file; in-memory object; resource optimisation.

Software development fundamentals
Delivered in Internationally or OnlineFlexible Dates
£2,367

19th June Camille Burns #Agent121. Looking for: MG, YA FICTION inc YA/CROSSOVER ROMANCE, AND CHILDREN'S & ADULT NON-FICTION

5.0(3)

By I Am In Print

LOOKING FOR:  MIDDLE GRADE, CHILDREN'S NON-FICTION, YA FICTION, YA NON-FICTION Prior to joining DKW in 2023, Camille worked at David Higham Associates as Agent’s Assistant to Jane Gregory and in the Children’s Translation Rights team. She has also worked in editorial for an academic publisher, in rights and marketing for an audiobook publisher and as an intern at Felicity Bryan Literary Agency. Camille loves engaging with narratives on a structural level in order to draw out their best qualities. Camille has an MSc in Publishing from Edinburgh Napier University and an MA in English Literature from the University of Edinburgh. She was Secretary of the Association of Authors’ Agents, as well as Co-Chair for the AAA’s Bridge Committee for early career agents and assistants, from late 2021 to early 2024. She also previously volunteered at the Story Museum in Oxford. Camille is looking to grow her list with a particular focus on middle grade, young adult and adult/crossover fiction, as well as non-fiction for all ages. Books that she has loved and that speak to her taste include Lockwood and Co by Jonathan Stroud (MG), I’ll Give You The Sun by Jandy Nelson (YA), Fourth Wing by Rebecca Yarros (crossover) and Every Summer After by Carley Fortune (adult). For more information, please visit Camille's page on the Diamond Kahn Woods Literary Agency website. Camille would like you to submit a covering letter, 1 page synopsis and the first three chapters or 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Camille is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Friday 13th June 2025

19th June Camille Burns #Agent121. Looking for: MG, YA FICTION inc YA/CROSSOVER ROMANCE, AND CHILDREN'S & ADULT NON-FICTION
Delivered Online + more
£72

Anti-Money Laundering (AML) Training For MLROs, MLCOs And Law Firm Management Course

By DG Legal

In January 2024 alone, reports were published about the SRA taking enforcement action against 3 firms and 4 individuals for failure to comply with the Money Laundering Regulations 2017. The fines issued for these non-compliances total over £570,000 plus costs. The absence of staff training, or requirement to complete additional training, was noted in a number of these cases. As a manager of a law firm, or more crucially an MLRO or MLCO, the ultimate responsibility for the firm's compliance, including with the MLR 2017, lies with you. It is your responsibility to ensure that the firm puts in place, reviews and updates compliant policies, controls and procedures. You must ensure that the firm maintains an up to date practice wide risk assessment. You are required to ensure that your employees are regularly given training on the MLR 2017 and associated risks. If a breach occurs, the SRA will take a wider look at the firm and identify any supervisory deficiencies that may have contributed to failures by fee earners or support staff. It has proven that it will not shy away from holding to account managers, compliance officers and MLRO/MLCOs for failures by their firms to comply with requirements of the MLR 2017. This course will cover the following to assist firms MLROs, MLCOs and Management with fulfilling their AML management responsibilities: How to comply with your obligations and stay compliant FWRA – linked with PCPs Mandatory AML Policies and Procedures - SRA have concerns Training and supervising staff Audits SRA requirements Reporting SARS POCA/TA Fulfilling reporting officer and compliance officer duties Target Audience The online course is suitable for MLROs, MLCOs, firm management and those supporting these roles. Resources Comprehensive and up to date course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Helen Torresi, Consultant, DG Legal Helen is a qualified solicitor with a diverse professional background spanning leadership roles in both the legal and tech/corporate sectors. Throughout her career, she has held key positions such as COLP, HOLP, MLCO, MLRO and DPO for law firms and various regulated businesses and services. Helen’s specialised areas encompass AML, complaint and firm negligence handling, DPA compliance, file review and auditing, law management, and operational effectiveness in law firms, particularly in conveyancing (CQS).

Anti-Money Laundering (AML) Training For MLROs, MLCOs And Law Firm Management Course
Delivered Online + more
£135 to £180