• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

685 Compliance courses in Glasgow delivered Live Online

IMPORT PROCEDURES

By Export Unlocked Limited

This module aims to develop knowledge from research activities to gain an understanding of international trade theory, global economic development and growth, currency and exchange rates, trade policies and their impact on an organisation, free trade agreements, direct investment from financial sources outside the UK, tariffs and no trade barriers, supply chain and logistics, intercultural management and international law and treaties.

IMPORT PROCEDURES
Delivered Online
£395

Requirement and Implementation to Internal Auditing

5.0(10)

By GBA Corporate

Overview This course is specially designed to enhance generic auditing skills and to attain the necessary skills as required and implementation to be a certified Internal Auditor. It is not aimed at any particular ISO Management Standard or process.  Objective Improve their knowledge of best practices in the audit industry Validate their proficiency and skills in audit Differentiate themselves from their peers and create a unique advantage for themselves Set the precedence for continued improvement and advancement Recognise and apply the International Standards for the Professional Practice of Internal Auditing Become a more competent professional who is knowledgeable in organizational governance

Requirement and Implementation to Internal Auditing
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Cybersecurity Maturity Model Certification (CMMC): Certified Professional

By Nexus Human

Duration 4.375 Days 26.25 CPD hours This course is intended for This course provides a jump start on learning material that relates to the CMMC program, and to the planned Certified Professional (CP) certification in particular. It discusses the CMMC program, the current CMMC Model, and other CMMC materials as they exist today. The course may be of interest to individuals who wish to pursue the CMMC-CP certification when it is released. It may also be useful to stakeholders in organizations who will be involved in CMMC assessments, and who wish to gain a general understanding of the program and its requirements for their business planning purposes Overview In this course, you will examine the current CMMC model (Version 1.02), framework, context, and application within the DoD, as well as the expectations and requirements that will be imposed upon organizations that do business with the DoD. It will also help you to identify threats to cybersecurity and privacy within an IoT ecosystem and implement appropriate countermeasures. You will gain the skills to: · Identify risks within the defense supply chain and the established standards for managing them. · Describe how the CMMC model ensures compliance with federal acquisition regulations. · Identify responsibilities of the CMMC Certified Professional, including appropriate ethics and behavior. · Identify regulated information and establish the Certification and Assessment scope boundaries for evaluating the systems that protect that regulated information. · Evaluate OSC readiness and determine the objective evidence you intend to present to the assessor. · Use the NIST 800-171A and CMMC Assessment Guide to assess objective evidence for processes and practices. · Implement and evaluate practices required to meet CMMC maturity level 1. · Implement and evaluate processes and practices required to meet CMMC maturity level 2. · Implement and evaluate processes and practices required to meet CMMC maturity level 3. · Identify processes and practices required to meet CMMC maturity levels 4 and 5. · Work through the logistics of a CMMC assessment, including planning for and conducting the assessment, as well as any follow-up processes, such as remediation and adjudication. The Cybersecurity Maturity Model Certification (CMMC), managed by the CMMC Accreditation Body (CMMC-AB), is a program through which an organization's cybersecurity program is measured by their initial and ongoing compliance with applicable cybersecurity practices as well as their integration of corresponding policies and plans into their overall business operations. By Fiscal Year 2026, all organizations providing products or services to the United States Department of Defense (DoD) must obtain at least a Maturity Level 1 certification under this program. Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses Against Threats Ensuring Compliance through CMMC Topic A: Identify Limitations of Self-Certification Topic B: Identify Benefits of CMMC Topic C: Describe the CMMC Model Architecture Performing the General Responsibilities of a CMMC CP Topic A: Identify Responsibilities of the CMMC CP Topic B: Demonstrate Appropriate Ethics and Behavior Identifying and Scoping Regulated Information Topic A: Identify Regulated Information Topic B: Establish the Certification and Assessment Scope Boundaries Initiating the Assessment Process Topic A: Evaluate Readiness Topic B: Determine Objective Evidence Assessing Objective Evidence Topic A: Assess the Practices Using the CMMC Assessment Guides Topic B: Assess the Processes Using the CMMC Assessment Guide Level 3 Implementing and Evaluating CMMC Level 1 TTopic A: Maturity Level 1 Domains and Practices Topic B: Determine Scope Boundaries at Maturity Level 1 Topic C: Perform a Maturity Level 1 Gap Analysis Topic D: Perform a Maturity Level 1 Evidence Validation Implementing and Evaluating CMMC Levels 2 and 3 Topic A: Process Maturity Requirements for CMMC Levels 2 and 3 Topic B: Maturity Level 2 Practices Topic C: Maturity Level 3 Practices Identifying CMMC Levels 4 and 5 Topic A: Maturity Level 4 Processes and Practices Topic B: Maturity Level 5 Processes and Practices Working Through a CMMC Assessment Topic A: Define the Assessment Logistics Topic B: Resolve Assessment Related Issues Appendix A: Additional Documentation the CP Should Study

Cybersecurity Maturity Model Certification (CMMC): Certified Professional
Delivered OnlineFlexible Dates
Price on Enquiry

C)ISSM - Certified Information Systems Security Manager Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. Course Outline Introduction Information Security Governance Information Risk Management and Compliance Information Security Program Development and Management Information Security Incident Management Additional course details: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSM - Certified Information Systems Security Manager Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Business Transformation with Google Cloud

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Business decision-makers: directors (managers of managers), managers of individual contributors (ICs) or ICs working in non-IT functions/divisions (such as finance, marketing, sales, HR, product design) interested in understanding the applications of Google?s cloud technology for business improvement opportunities and transformational project(s). Through this interactive training, you?ll learn about core cloud business drivers?specifically Google?s cloud?and gain the knowledge/skills to determine if business transformation is right for you and your team, and build short and long-term projects using the ?superpowers? of cloud accordingly. You?ll also find several templates, guides, and resource links through the supplementary student workbook to help you build a custom briefing document to share with your leadership, technical teams or partners. Why cloud technology is revolutionizing business This module introduces cloud technology as a paradigm shift and explains how it?s irrevocably transforming business globally. It defines the fundamental building blocks of cloud technology?compute power and data?and what they mean for you and your business. And finally, it reveals how these building blocks help to create five superpowers using concrete use cases of their transformative abilities for business, education, and government sectors. Foster an innovation culture Cloud is not just about a technological transformation; it's a business and cultural transformation, too. This module explores how the superpowers of the cloud are brought to life through people. It looks specifically at how to organically create and scale innovation through culture and business practices. It offers key principles, drawing examples from Google?s success and real world scenarios, that you can apply in your day-to-day operations. Define the ideal business transformation challenge Previous modules describe the journey with cloud technology to include business and cultural changes as well. This module sets the groundwork to build a transformational solution using cloud technology for your role or your business. This process starts with distinguishing between scaled improvements and transformations. Next, the module demonstrates how to write an ideal challenge question and use insights generated from a data ecosystem to address the challenge. Finally, it introduces a framework that you can use to assess and refine your challenge ideas, preparing you to build a business case in a later module. Build trust with availability, security, and compliance This module addresses common concerns about data privacy and security when migrating to the cloud. It defines key terms - privacy, security, compliance, and reliability - and reveals today?s top cybersecurity challenges and threats. It discusses how data security and compliance can be maintained when data is in the cloud, as illustrated by the Shared Responsibility Model. And finally, it uses a concrete example to explain how learners can build a high-level security program in their own organization. Build a business case for your transformation challenge This module explains how to identify the most transformative solution for your business challenge. It then breaks down steps to achieve the transformational solution through creating smaller projects and plotting them onto a transformation roadmap. It describes how to use the data ecosystem you mapped in a previous module to support your overall project. Finally, it explains step by step how to build a business case and gives tips to help you pitch your project idea to gain buy-in from leadership, teams, and technical partners. Additional course details: Nexus Humans Business Transformation with Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Transformation with Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Transformation with Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Supervising First Aid for Mental Health

5.0(50)

By Pochat Training

FAA Level 3 Award In Supervising First Aid For Mental Health (RQF) Classroom (two day course), Virtual (6 x 2 ½ hour sessions) Gives learners knowledge of Mental Health First Aid and associated conditions This course is especially suitable for managers, supervisors and other staff that have the power to make changes in the workplace Course Contents: What is Mental Health? Why people develop mental health conditions What the role of a mental health first aider is Knowing how to provide advice and practical support Knowing how to recognise and manage stress Understand the impact of substance abuse on mental health Understand the first aid action plan for mental health and be able to put it in place Know how to implement a positive mental health culture in the workplace Recognising a range of mental health conditions: Depression Anxiety Psychosis Eating disorders Suicide Self-harm PTSD Personality disorders Bipolar disorder Schizophrenia Benefits of this course: 37% of all work-related ill-health is due to mental health problems Problems with mental health cover 45% of all working days lost A whopping 12.8 million working days, or 49, 042 years, were lost due to mental health problems in 2018/19 602,000 workers suffered from work-related stress, depression or anxiety in 2018/19 One in four people will have a mental health problem at some point during their lives Whether work is causing or aggravating mental health problems, employers have a legal responsibility towards their employees Work-related mental health issues must to be assessed to measure the levels of risk to staff Where a risk is identified, steps must be taken to remove it or reduce it as far as reasonably practicable This two day r employees' mental health and wellbeing Accredited, Ofqual regulated qualification Our Mental Health First Aid Courses are nationally recognised, Ofqual regulated qualifications accredited by First Aid Awards Ltd in association with NUCO Training. This means that you can be rest assured that your Mental Health First Aid Certificates fulfill the upcoming legal requirements and are a very good way to make sure you and your employees have a supporting workplace to deal with staff's mental health conditions. The Ofqual Register number for this course is 603/3770/9

Supervising First Aid for Mental Health
Delivered in Chesterfield or Online + more
£195 to £210

Managing, Maintaining and Monitoring the Single Central Record

By Brightcore Consultancy

Whether you are new to managing, maintaining or monitoring the SCR or you want to refresh your knowledge, this three-hour masterclass will cover everything you need to know and to ensure is in place and will dispel some of the myths and confusion surrounding the SCR.

Managing, Maintaining and Monitoring the Single Central Record
Delivered Online
£80

Cisco NSO Administration and DevOps v4.0 (NSO303)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for DevOps engineers Integration engineers Network and software architects Network engineers Software engineers System administrators Overview After completing this course, you should be able to: Describe network and IT convergence Describe Cisco NSO architecture Describe Linux Configure Cisco NSO Set up access control to Cisco NSO system Describe Cisco NSO Integration Options Explain version control systems and basic git concepts Describe the purpose of continuous integration and continuous delivery Implement Cisco NSO high availability Describe scalable system management Describe software development methodologies Describe service maintenance Perform NED upgrades Use Cisco NSO for managing services and their associated device configurations Describe Cisco NSO change management Explain service problem management Use Cisco NSO for service monitoring and compliance reporting Describe Cisco NSO inventory management Describe Cisco NSO use cases The Cisco Network Services Orchestrator (NSO) Administration and DevOps (NSO303) v4.0 course continues the learning journey of the NSO Essentials for Programmers and Network Architects (NSO201) v4.0 and NSO Advanced for Python Programmers (NSO300) v4.0 courses by introducing you to the system administration and DevOps focusing on NSO; the robust bridge linking network automation and orchestration tools, examining the development, operation, and administration task functions. You will learn how to set up, configure, deploy, and maintain a Cisco Network Services Orchestrator solution, and learn best practices for using DevOps. The examples shown in this course demonstrate real-world scenarios to prepare you for deployment and management of new or existing NSO instances. The course guides you through the setup of a production ready NSO instances using system installation with access control settings, the deployment of NSO in Docker containers, and introduces modern DevOps concepts and tools such as Git and Continuous Delivery/Continuous Deployment (CI/CD). You will learn how to migrate CDM devices, how to build NETCONF NEDs from the NSO CLI, how to handle NSO Alarms, and many more features that benefit you in your journey with Cisco NSO. Course Outline Introducing Network and IT Convergence Introducing Cisco NSO Architecture Introducing Linux Explaining Cisco NSO Setup Exploring Access Control Describing Integration Options Explaining Version Control System Describing Continuous Integration and Continuous Delivery Introducing Scalability and High Availability Describing Scalable System Management Describing Software Development Methodologies Introducing Service Maintenance Performing Network Element Driver (NED) Upgrades Introducing Configuration Management Describing Change Management Explaining Service Problem Management Explaining Service Monitoring and Compliance Reporting Introducing Inventory Management Describing Cisco NSO Use Cases

Cisco NSO Administration and DevOps v4.0 (NSO303)
Delivered OnlineFlexible Dates
Price on Enquiry

SAP System Security Fundamentals

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for System Security Administrator Security Architect Technology Consultant Overview This course will prepare you to Understand SAP Security fundamentals Get an overview of the main SAP concepts for security Be prepared to learn more in detail about each SAP concept for security This course will prepare you to Understand SAP Security fundamentals. Get an overview of the main SAP concepts for security. Be prepared to learn more in detail about each SAP concept for security. SAP Access Governance and Control Overview of Security Fundamentals Introduction to SAP Access Governance SAP NetWeaver Application Security Overview Describe SAP User Experience Explain Basic User Administration for AS ABAP Explain Basic Role Administration for AS ABAP Describe SAP Fiori Catalog and Group Administration Concept Describe AS JAVA Security Discuss Custom Development and Security SAP Access Governance and Compliance Describe SAP Access Governance Explain SAP GRC Access Control Describe SAP Identity Management Describe SAP Cloud Identity Access Governance Infrastructure Security Explaining Network Topology Enabling Secure Network Communication (SNC) Enabling Secure Sockets Layer (SSL) Implementing Single Sign-On (SSO) in SAP Systems Security Monitoring with SAP Solution Manager Monitoring Security with SAP Solution Manager SAP Data Privacy Governance and Cybersecurity Introduce EU General Data Privacy Regulation (GDPR) Discuss SAP Support for GDPR Compliance Additional course details: Nexus Humans SAP System Security Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SAP System Security Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SAP System Security Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for the Dynamics 365 Supply Chain Management Functional Consultant Expert or those whose role includes implementing and configuring advanced features of Dynamics 365 Supply Chain Management. Overview Objectives: Create products as type Item and Service. Set up product unit conversions. Set up transfer orders Set up default order settings. Create product masters with predefined variants. Create and set up category hierarchies. Create product attributes. Create bill of materials using BOM designer Discrete manufacturing concepts Production order statuses Production stages Bill of materials (BOM) Resources Routes and operations Configure commodity pricing in Supply Chain Management. Configure product compliance in Supply Chain Management. Configure commodity pricing in Supply Chain Management. Configure product compliance in Supply Chain Management. Configure process manufacturing. Create and configure catch weight items. Configure approved vendors. Understand the features in engineering change management. Learn how the end-to-end engineering change management process works. Set up engineering organizations. Work with product versioning. Create dimension groups by using the version dimensions. Create product life cycle states. Use engineering categories. Set up engineering change severities and severity rules. Set up product owners. Use a workflow with engineering change management. Create an engineering change request. Learn about business impacts. Create an engineering change order. Important terminology to help you understand the concepts and processes that are associated with product configuration. Product configuration end-to-end scenario. Different areas that span the product configuration process. The product configuration model. How to build a product configuration model. Configure the costing sheet. Perform BOM calculation and analyze costs by using the costing sheet. IoT intelligence and insights in Supply Chain Management This course is designed to build your in Dynamics 365 Supply Chain Management application knowledge. This course will cover the most important features and functionalities needed by Dynamics 365 Supply Chain Management functional consultant including: The product information and how to configure, create, and manage your product and inventory. Supply chain management configuration and processing. The transportation management features, and the warehouse management features. Asset Management functionalities. Master planning configuration and processing. Sales and procurement processes. Create products and product masters in Dynamics 365 Supply Chain Management Product information workspace Concept of a product Create products Set up unit conversions Batch disposition codes Default order settings Define products as not stocked Create product masters with variants Gain productivity by using the Variant suggestions page Create and set up category hierarchies and attributes Set up item pricing Create bill of materials in Dynamics 365 Supply Chain Management Work with the BOM designer BOM and formula versions BOM line types BOM levels Get started with discrete manufacturing in Dynamics 365 Supply Chain Management Discrete manufacturing life cycle Master planning and planned production orders Bills of materials Working with BOM and item configurations Create a bill of materials Production orders Work with commodity pricing and compliance in Dynamics 365 Supply Chain Management Configure commodity pricing Configure product compliance Configure process manufacturing in Dynamics 365 Supply Chain Management Process manufacturing item types Production type setup Set up packaging and batch attributes Shelf life related setup Item model group, product compliance, and approved vendors Catch weight Transaction adjustments Catch weight item handling policy Catch weight tags Configure approved vendors Get started with Engineering Change Management for Dynamics 365 Supply Chain Management Overview of features End-to-end walkthrough of features Set up versioned products in Dynamics 365 Supply Chain Management Create an engineering organization Create nomenclature for product versions Create product version number rules Create product dimension groups by using the version dimension Create product life cycle states Engineering attributes Product readiness policies Product release policies Create engineering categories Configure engineering change management for Dynamics 365 Supply Chain Management Set up engineering change severities Set up severity rule sets Set up product owners Engineering workflows Request and follow up with product changes in Dynamics 365 Supply Chain Management Engineering change requests Engineering change orders up with product changes in Dynamics 365 Supply Chain Management Get started with product configuration in Dynamics 365 Supply Chain Management Elements of a product configuration model Expression constraints and table constraints in product configuration models Validate and test a product configuration model Finalize a model for configuration Set up a product configuration model Calculations for product configuration models Solver strategy for product configuration Reuse product configurations Release a product configuration model Customize a product configuration model Work with the costing sheet in Dynamics 365 Supply Chain Management Costing versions Cost groups Calculation groups Costing sheets BOM calculations BOM Measurements BOM Reports Configure formulas for process manufacturing in Dynamics 365 Supply Chain Management Formulas, formula lines, and formula versions Formula features Approve and activate formulas and formula versions Use step consumption Coproducts By-products Burden allocation Planning items Get started with production control in Dynamics 365 Supply Chain Management Core concepts in production control Understand unified manufacturing Manufacturing principles Overview of the production process and production life cycle Batch orders Discrete manufacturing Process manufacturing Lean manufacturing Configure production control for unified manufacturing Capacity planning Integration between the General ledger and the Production control modules IoT intelligence and insights Describe the value proposition for mixed-reality Guides for production floor workers Use warehouse management for manufacturing in Dynamics 365 Supply Chain Management Production input location Production output location Staging and order picking Release BOM and formula lines to the warehouse Cross-docking Planned cross docking Visibility into material exceptions Work with manufacturing execution in Dynamics 365 Supply Chain Management Understand the manufacturing executions Identify roles in manufacturing execution Planning consideration for manufacturing execution Configure manufacturing execution Setup time and attendance for manufacturing execution processes Control production with manufacturing execution Create and process report as finished journals with co-products and by-products Calculate and approve raw time registrations Report as finished from the job card device Get started with Asset Management for Dynamics 365 Supply Chain Management Asset Management terminology and concepts Functional locations and assets Assets and work orders Install the Asset Management mobile workspace Use the Asset Management mobile workspace Asset Management integration capabilities Integrate Asset Management with Dynamics 365 Guides Schedule work orders in Asset Management for Dynamics 365 Supply Chain Management Configure workers for work order scheduling Schedule and dispatch work orders Calculate capacity load on scheduled work orders Configure and perform the procure-to-purchase process in Dynamics 365 Supply Chain Management Procurement scenario Overview of the procure-to-purchase process Set up procurement categories Use procurement catalogs Create a purchase requisition Create and process a request for quotation Create purchase orders Vendor categories and catalogs Evaluate a vendor and put a vendor on hold Use purchasing policies Configure activity-based subcontracting and production flow costing in Dynamics 365 Supply Chain Management Subcontracting capabilities Subcontracting a vendor Subcontracting service Transfer activities as subcontracting activities Subcontracting as an alternate resource Cost accounting of subcontracted services Subcontracting cost flow Backflush costing Products and material in Work in Progress Standard cost Costing lean manufacturing Calculation of standard cost Calculate unused quantities Calculation of production variances to standard cost Ledger entries created from processing a production flow Configure and use agreements in Dynamics 365 Supply Chain Management Work with trade agreements Create sales agreements Create purchase agreements Configure trade allowance management Configure brokerage contract management Configure royalty contract management Configure vendor rebates Rebate management module Work with capa Additional course details: Nexus Humans MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert
Delivered OnlineFlexible Dates
Price on Enquiry