• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1222 Communication courses in Cardiff delivered Live Online

Restaurant Management Level 3

By NextGen Learning

Course Overview The Restaurant Management Level 3 course offers a comprehensive exploration of the skills and strategies required to successfully manage a restaurant. Covering key areas such as menu planning, staff recruitment, financial management, and customer relations, this course prepares learners to navigate the dynamic restaurant industry with confidence. Whether aspiring to open a new venue or improve existing operations, learners will gain valuable insights into creating efficient layouts, maintaining safety standards, managing inventory, and implementing effective marketing strategies. The course blends theoretical knowledge with real-world industry standards, equipping participants to handle the complexities of restaurant management. By completing this course, learners will be able to develop structured plans for running a successful restaurant, cultivate a strong team culture, and deliver exceptional customer experiences. This qualification provides a valuable stepping stone towards achieving career goals in the vibrant hospitality sector. Course Description The Restaurant Management Level 3 course delves into the essential elements that underpin a thriving restaurant business. Topics covered include restaurant selection and set-up, legal and health regulations, drinks and food management, technology integration, financial planning, staff training, and customer engagement. Learners will explore how to create compelling menus, implement inventory systems, and foster teamwork within a restaurant environment. Emphasis is placed on strategic decision-making, operational efficiency, and building a reputable brand image. The course is structured to support learners in developing managerial skills, with a strong focus on leadership, communication, and customer satisfaction. Designed for those seeking a detailed understanding of the restaurant business, this programme empowers learners with the knowledge needed to excel in both operational and supervisory roles. Upon completion, learners will possess the expertise to contribute significantly to any restaurant’s success or embark on entrepreneurial ventures in the food and hospitality industry. Course Modules Module 01: An Overview of the Restaurant Industry Module 02: Choosing Your Restaurant Module 03: Restaurant Layout Management and Legal Requirements Module 04: Menu Planning Module 05: Drinks Management Module 06: Purchasing, Receiving, Inventory, and Storage Module 07: Financing Your Business Module 08: Finding, Recruiting, and Training Employees Module 09: Running a Safe and Clean Restaurant Module 10: Handling Service Using Technology Module 11: Teamwork and Daily Routine of a Restaurant Module 12: Customer Relations and Marketing Policy (See full curriculum) Who is this course for? Individuals seeking to pursue a career in restaurant management. Professionals aiming to enhance their leadership skills within the hospitality industry. Beginners with an interest in understanding restaurant operations. Entrepreneurs planning to open or manage a restaurant business. Hospitality staff looking to transition into management roles. Career Path Restaurant Manager Assistant Restaurant Manager Hospitality Supervisor Food and Beverage Manager Front of House Manager Catering Manager Restaurant Owner or Entrepreneur Operations Manager in Hospitality Businesses

Restaurant Management Level 3
Delivered OnlineFlexible Dates
£9.99

Trade Supplier Level 2

By Rachel Hood

Ensuring an efficient flow of goods and services between manufacturers and their skilled trade customer base.

Trade Supplier Level 2
Delivered OnlineFlexible Dates
Price on Enquiry

Proofreading & Copyediting Level 5

By NextGen Learning

Proofreading & Copyediting Level 5 Course Overview This Proofreading & Copyediting Level 5 course offers an in-depth understanding of the essential skills required for proofreading and copyediting. Learners will explore key techniques for enhancing text accuracy, consistency, and clarity. Through detailed lessons, this course covers proofreading basics, the application of style guides, grammatical rules, and the intricacies of copyediting. Learners will also gain knowledge in legal checks and how to develop a successful career in this field. By the end of the course, participants will have a solid foundation in proofreading and editing, enabling them to produce high-quality written content that meets industry standards. Course Description This comprehensive course dives into the world of proofreading and copyediting, focusing on fundamental skills and advanced techniques. Learners will examine key concepts like applying style guides, understanding grammar rules, and maintaining text accuracy. Modules cover proofreading both on paper and on-screen, copyediting for language use, accuracy, and legal checks. A significant part of the course involves developing an understanding of professional editing practices, which will enable learners to work in various industries such as publishing, marketing, and legal sectors. The course structure is designed to offer a gradual progression, helping learners to refine their skills and gain confidence in producing error-free and well-polished content. Proofreading & Copyediting Level 5 Curriculum Module 01: Proofreading Basics Module 02: Applying the Style Guide Module 03: Spelling and Grammar Module 04: Proofreading on Paper Module 05: Proofreading On-Screen Module 06: Copy-Editing Basics Module 07: Copy-Editing – The Use of Language Module 08: Copy-Editing – Checking Accuracy and Facts Module 09: Copy-Editing – The Beginning and The End Module 10: Copy-Editing – Legal Checks Module 11: Finding Work and Developing Your Career (See full curriculum) Who is this course for? Individuals seeking to improve their proofreading and editing skills. Professionals aiming to advance in editing and publishing careers. Beginners with an interest in editing and writing industries. Anyone seeking to refine their written communication. Career Path Proofreader Copyeditor Content Editor Publishing Assistant Editorial Assistant Freelance Proofreader/Copyeditor Legal Proofreader Publishing Manager

Proofreading & Copyediting Level 5
Delivered OnlineFlexible Dates
£7.99

Report Writing

By NextGen Learning

Report Writing Course Overview This comprehensive course in report writing is designed to equip learners with the skills needed to write clear, structured, and effective reports in any professional setting. Covering essential topics such as planning, research, writing, and presentation, the course provides a solid foundation for producing high-quality reports. Learners will develop an understanding of grammar, punctuation, and the use of visual aids, such as tables and graphs, to enhance their reports. By the end of the course, participants will have the ability to create well-structured, concise, and informative reports suited to various industries. Course Description The course delves into the core principles of report writing, beginning with an introduction to the basics and progressing through the stages of planning, preparation, and writing. Learners will explore research techniques and how to collect relevant information effectively. Emphasis is placed on developing an organised structure for reports and revising for clarity and accuracy. The course also covers the technical aspects of grammar and punctuation, the inclusion of visual data, and proposal writing, enabling learners to present their findings professionally. With guidance on creative thinking, learners will refine their ability to approach report writing with a strategic mindset, ensuring their work is impactful and relevant in any workplace. Report Writing Curriculum Module 01: The Basics of Report Writing Module 02: Planning for Report Writing Module 03: Preparation for Report Writing Module 04: Research and Information Collection Module 05: Writing and Revising the Report Module 06: English Grammar and Punctuation Guide for Report Writing Module 07: Using Tables, Charts and Graphs in a Report Module 08: Proposal Writing Module 09: Presentation of the Report Module 10: Developing Creative Thinking and Creativity Module 11: Quick Check While Writing a Report (See full curriculum) Who is this course for? Individuals seeking to improve their report writing skills. Professionals aiming to enhance their report presentation abilities. Beginners with an interest in learning effective report writing. Those wishing to develop the skills necessary for clear communication in the workplace. Career Path Report Writer Business Analyst Technical Writer Project Manager Administrative Support Research Assistant

Report Writing
Delivered OnlineFlexible Dates
£7.99

Customer Service - Representative

By NextGen Learning

Customer Service - Representative Course Overview This course provides a comprehensive exploration of the vital role customer service plays in business success. Learners will discover why exceptional service is essential in building loyalty, enhancing satisfaction, and driving revenue growth. Covering key principles such as Total Quality Management, customer retention strategies, and managing challenging interactions, this course equips participants with the knowledge to deliver outstanding service consistently. By the end, learners will understand how to elevate their customer engagement and contribute meaningfully to their organisation’s reputation and profitability. Course Description The course delves into a wide range of customer service topics designed to sharpen communication, problem-solving, and relationship-building skills. Participants will examine the critical factors influencing customer satisfaction, including understanding customer behaviour, avoiding common service pitfalls, and mastering phone etiquette. The curriculum also highlights strategies for handling difficult customers and implementing a “concierge” level of service. Through focused study, learners will develop the ability to increase customer retention and recognise the financial value of loyal clients. This professional course is ideal for those seeking to enhance their service delivery and advance their careers in customer-facing roles. Customer Service - Representative Curriculum: Module 01: WHY Customer Service Is CRITICAL To Your Business! Module 02: Good Isn’t Good Enough! Module 03: We Are ALL in the “Helping Field” Module 04: Providing “Concierge” Level Of Service Module 05: The 5 Tenets Of TQM Module 06: How To Boost Customer Satisfaction Module 07: How To Avoid The 10 Deadly Sins Of Customer Service! Module 08: More Money $$$ – Through Customer Retention Module 09: How Much Is A Customer Worth? $$$ Module 10: Do You Understand Your Customer? Module 11: Dealing With Difficult Customers Module 12: “LEAP” Into Customer Service! Module 13: Exceptional Phone Service Module 14: WHY Customers Buy From YOU! $$$ Module 15: BONUS LECTURE!!! FINAL TIPS!!! (See full curriculum) Who is this course for? Individuals seeking to improve customer interaction skills. Professionals aiming to enhance career prospects in customer service. Beginners with an interest in customer service principles. Employees in client-facing roles wanting to boost service quality. Career Path Customer Service Representative Client Relations Officer Customer Support Specialist Call Centre Agent Retail Customer Advisor Hospitality Frontline Staff

Customer Service - Representative
Delivered OnlineFlexible Dates
£7.99

Master Emotional Intelligence for Crucial Moments

By NextGen Learning

Master Emotional Intelligence for Crucial Moments Course Overview: "Master Emotional Intelligence for Crucial Moments" is an in-depth course designed to enhance your emotional intelligence (EQ) to handle critical situations with clarity and confidence. Throughout this course, you will develop the skills to manage your emotions effectively, understand others’ emotions, and use these insights to navigate complex interactions. Learners will explore key emotional intelligence concepts, gaining the ability to apply them during high-pressure moments. This course equips you with the tools to improve decision-making, strengthen leadership qualities, and handle crises with emotional composure. By the end, you’ll be able to influence outcomes positively in both personal and professional settings, enhancing your overall interpersonal effectiveness. Course Description: This course offers comprehensive insights into mastering emotional intelligence, focusing on its application during crucial moments. You will explore how EQ can be used to pause and reflect, understand emotional triggers, and manage stress in critical situations. Topics such as taming emotional responses, using EQ in leadership, and emotional regulation in times of crisis are central to the course. Learners will engage with various tools and strategies that support emotional self-awareness, empathy, and leadership. By developing these skills, learners will gain an enhanced ability to maintain composure, inspire others, and lead with emotional intelligence in high-stakes environments. This course provides essential skills for those aiming to excel in leadership, communication, and conflict resolution, ensuring they remain calm and focused in the most challenging moments. Master Emotional Intelligence for Crucial Moments Curriculum: Module 01: The Crucial EQ Moment - It's In The Pause Module 02: Use Emotional Intelligence To Tame Your Brain And Cope During Crises Module 03: Emotionally Intelligent Leadership In Action (See full curriculum) Who is this course for? Individuals seeking to enhance their emotional intelligence for career growth. Professionals aiming to improve leadership and crisis management skills. Beginners with an interest in emotional intelligence and personal development. Anyone looking to strengthen their interpersonal skills in high-pressure situations. Career Path: Leadership Roles Conflict Resolution Specialist Human Resources Manager Executive Coach Organisational Development Consultant Crisis Management Advisor

Master Emotional Intelligence for Crucial Moments
Delivered OnlineFlexible Dates
£7.99

Architecting Hybrid Cloud Infrastructure with Anthos

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class is primarily intended for the following participants: Technical employees using GCP, including customer companies, partners and system integrators deployment engineers, cloud architects, cloud administrators, system engineers , and SysOps/DevOps engineers. Individuals using GCP to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments. Overview Connect and manage Anthos GKE clusters from GCP Console whether clusters are part of Anthos on Google Cloud or Anthos deployed on VMware. Understand how service mesh proxies are installed, configured and managed. Configure centralized logging, monitoring, tracing, and service visualizations wherever the Anthos GKE clusters are hosted. Understand and configure fine-grained traffic management. Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization. Install a multi-service application spanning multiple clusters in a hybrid environment. Understand how services communicate across clusters. Migrate services between clusters. Install Anthos Config Management, use it to enforce policies, and explain how it can be used across multiple clusters. This two-day instructor-led course prepares students to modernize, manage, and observe their applications using Kubernetes whether the application is deployed on-premises or on Google Cloud Platform (GCP). Through presentations, and hands-on labs, participants explore and deploy using Kubernetes Engine (GKE), GKE Connect, Istio service mesh and Anthos Config Management capabilities that enable operators to work with modern applications even when split among multiple clusters hosted by multiple providers, or on-premises. Anthos Overview Describe challenges of hybrid cloud Discuss modern solutions Describe the Anthos Technology Stack Managing Hybrid Clusters using Kubernetes Engine Understand Anthos GKE hybrid environments, with Admin and User clusters Register and authenticate remote Anthos GKE clusters in GKE Hub View and manage registered clusters, in cloud and on-premises, using GKE Hub View workloads in all clusters from GKE Hub Lab: Managing Hybrid Clusters using Kubernetes Engine Introduction to Service Mesh Understand service mesh, and problems it solves Understand Istio architecture and components Explain Istio on GKE add on and it's lifecycle, vs OSS Istio Understand request network traffic flow in a service mesh Create a GKE cluster, with a service mesh Configure a multi-service application with service mesh Enable external access using an ingress gateway Explain the multi-service example applications: Hipster Shop, and Bookinfo Lab: Installing Open Source Istio on Kubernetes Engine Lab: Installing the Istio on GKE Add-On with Kubernetes Engine Observing Services using Service Mesh Adapters Understand service mesh flexible adapter model Understand service mesh telemetry processing Explain Stackdriver configurations for logging and monitoring Compare telemetry defaults for cloud and on-premises environments Configure and view custom metrics using service mesh View cluster and service metrics with pre-configured dashboards Trace microservice calls with timing data using service mesh adapters Visualize and discover service attributes with service mesh Lab: Telemetry and Observability with Istio Managing Traffic Routing with Service Mesh Understand the service mesh abstract model for traffic management Understand service mesh service discovery and load balancing Review and compare traffic management use cases and configurations Understand ingress configuration using service mesh Visualize traffic routing with live generated requests Configure a service mesh gateway to allow access to services from outside the mesh Apply virtual services and destination rules for version-specific routing Route traffic based on application-layer configuration Shift traffic from one service version to another, with fine-grained control, like a canary deployment Lab: Managing Traffic Routing with Istio and Envoy Managing Policies and Security with Service Mesh Understand authentication and authorization in service mesh Explain mTLS flow for service to service communication Adopt mutual TLS authentication across the service mesh incrementally Enable end-user authentication for the frontend service Use service mesh access control policies to secure access to the frontend service Lab: Managing Policies and Security with Service Mesh Managing Policies using Anthos Config Management Understand the challenge of managing resources across multiple clusters Understand how a Git repository is as a configuration source of truth Explain the Anthos Config Management components, and object lifecycle Install and configure Anthos Config Management, operators, tools, and related Git repository Verify cluster configuration compliance and drift management Update workload configuration using repo changes Lab: Managing Policies in Kubernetes Engine using Anthos Config Configuring Anthos GKE for Multi-Cluster Operation Understand how multiple clusters work together using DNS, root CA, and service discovery Explain service mesh control-plane architectures for multi-cluster Configure a multi-service application using service mesh across multiple clusters with multiple control-planes Configure a multi-service application using service mesh across multiple clusters with a shared control-plane Configure service naming/discovery between clusters Review ServiceEntries for cross-cluster service discovery Migrate workload from a remote cluster to an Anthos GKE cluster Lab: Configuring GKE for Multi-Cluster Operation with Istio Lab: Configuring GKE for Shared Control Plane Multi-Cluster Operation

Architecting Hybrid Cloud Infrastructure with Anthos
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black EDR: Install, Configure, Manage [V7.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security analyst, threat hunters, or incident responders Security professionals who work with enterprise and endpoint security tools Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of a Carbon Black EDR implementation Perform the installation, upgrade, and configuration of the Carbon Black EDR server Describe the purpose and use of multiple datastores in the server Perform live queries across endpoints to gather additional data Perform effective searches across the dataset to find security artifacts related to the endpoints Manage Threat Intelligence Feeds and Watchlists Describe connectors in Carbon Black EDR Troubleshoot server and sensor problems Analyze data found in the Heads-Up Display Manage investigations to group and summarize security incidents and artifacts Perform the different response capabilities available to users in Carbon Black EDR Use the Carbon Black EDR API to automate tasks This three-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Carbon Black© EDR? environment. This course introduces you to product features, capabilities, and workflows for managing endpoint security. Hands-on labs enable learners to reinforce topics by performing operations and tasks within the product in a training environment. Course Introduction Introductions and course logistics Course objectives Planning and Architecture Describe the architecture and components of Carbon Black EDR Identify the communication requirements for Carbon Black EDR Server Installation, Upgrade, and Administration Install the Carbon Black EDR server Describe the options during the installation process Install a Carbon Black EDR sensor Confirm data ingestion in the Carbon Black EDR server Identify built-in administration tools Manage sensor groups Manage users and teams Server Datastores Describe the datastores used in Carbon Black EDR Interact with the available datastores Live Query Describe live query capabilities Perform queries across endpoints Searching and Best Practices Describe the capabilities and data available in the process search Perform process searches to find specific endpoint activity Describe the capabilities and data available in the binary search Perform binary searches to find application data Describe the query syntax and advanced use cases Perform advanced queries across the dataset Threat Intelligence Feeds and Watchlists Define Threat Intelligence Feeds Manage the available Threat Intelligence Feeds Describe the use of Watchlists Manage Watchlists in the environment Connectors in Carbon Black EDR Configure connectors in Carbon Black EDR Troubleshoot connectors Troubleshooting Identify the available troubleshooting scripts in the Carbon Black EDR server Run troubleshooting scripts to identify problems Generate a sensor log bundle Identify the location of sensor registry keys Head-Up Display Identify panels relating to endpoint data Analyze endpoint data provided by the panels Identify panels relating to operations data Analyze operations data provided by the panels Identify panels relating to server data Analyze server data provided by the panels Define alert generation in Carbon Black EDR Manage alerts Investigations Describe investigations Explore data used in an investigation Manage investigations Manage investigation events Responding to Endpoint Incidents Describe isolation in Carbon Black EDR Manage isolating endpoints Describe live response capabilities Manage live response sessions Describe hash banning Manage banned hashes Overview of Postman and the Carbon Black EDR API Explain the use of the API Differentiate the APIs available for Carbon Black EDR Explain the purpose of API tokens Create an API token Explain the API URL Create a valid API request Import a collection to Postman Initiate an API request from Postman Perform operations manually using Postman Analyze the use cases for Postman Show basic automation tasks using the API and curl Compare the usage of curl with Postman Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR: Install, Configure, Manage [V7.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR: Install, Configure, Manage [V7.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black EDR: Install, Configure, Manage [V7.x]
Delivered OnlineFlexible Dates
Price on Enquiry

SWSA v3.0-Securing the Web with Cisco Web Security Appliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SWSA v3.0-Securing the Web with Cisco Web Security Appliance
Delivered OnlineFlexible Dates
Price on Enquiry

Operations/Departmental Manager Level 5

By Rachel Hood

Managing teams and projects in line with a private, public or voluntary organisation's operational or departmental strategy.

Operations/Departmental Manager Level 5
Delivered OnlineFlexible Dates
Price on Enquiry