Why not book a 1-2-1 bespoke online session, where you and I can edit some of your images together via Zoom. Alternatively, we can edit some of my images and you can see and learn how I brings my images to life. I have 25 years of Editing skills that I'd love to share with you. You can let me know what you would like to get from our session and what editing software you would like to cover and get things rolling. Online 1-2-1 Post Processing Tuition I (Simon) started my editing career back in 2006 while travelling through Peru and picked up a copy of Adobe's Photoshop. The program was overwhelming. Today I can edit an image from start to finish in just minutes. That’s what I want to share with you. Simple, clear and powerful editing tips that work. Don't struggle alone. Book a session now and find out just how far we can take you. You'll be amazed how easy it can be with the right tuition. You can book a 1-2-1 online session for yourself or even purchase a voucher as a gift for a friend or family member. It makes a great and unusual gift. And, I promise they will love it! Included > 1-Hour Online Session *or multiples of (covering anything you would like to learn and understand. We will chat before your session so we can cover those topics) > Access to ongoing support and tutorage via our private Students facebook Group Excluded > Adobe CC Subscription > Lumenzia (This plugin is highly recommended if you would like to learn about luminosity masks - 2hr recommended) > Laptop and accessories (microphone is essential, A webcam is optional but a good idea) Required > Adobe CC Subscription and the software pre-installed on your computer. > Access to a working copy of Adobe Lightroom and Adobe Photoshop. (I recommend running the latest versions in order to get the most from our session)
Energy Engineer Course Overview This Energy Engineer Course offers a comprehensive introduction to energy systems, focusing on both traditional and renewable sources. Learners will explore the history of energy consumption, understand key concepts of sustainable energy, and gain insight into various renewable technologies including solar, wind, and geothermal power. Designed to enhance technical knowledge and environmental awareness, this course equips learners with the skills to evaluate energy applications and contribute to eco-friendly solutions. By completing this course, participants will be prepared to support energy-efficient initiatives and advance their careers in energy engineering or related fields. Course Description The course covers a broad range of energy topics, from non-renewable fuels to cutting-edge renewable energy technologies such as fuel cells, ocean, and geothermal energy. Learners will examine the principles behind each energy type and the practical considerations involved in their application. The programme emphasises environmental responsibility, exploring how energy choices impact sustainability and ecological balance. Participants will develop critical thinking skills to assess energy systems and understand the role of engineers in promoting greener alternatives. This course is delivered through detailed content and case studies that deepen understanding and support career progression within the energy sector. Energy Engineer Course Curriculum Module 01: History of Energy Consumption Module 02: Non-Renewable Energy Module 03: Basics of Sustainable Energy Module 04: Fuel Cell Module 05: Solar Energy Module 06: Wind Energy Module 07: Ocean Energy Module 08: Geothermal Energy Module 09: Application of Renewable Energy Module 10: Being Environment-Friendly (See full curriculum) Who Is This Course For? Individuals seeking to build expertise in energy engineering and sustainability. Professionals aiming to enhance their career in energy management or environmental consulting. Beginners with an interest in renewable energy technologies and sustainable development. Engineers and technical staff wishing to update their knowledge of energy systems. Career Path Energy Engineer Renewable Energy Consultant Sustainability Analyst Environmental Project Manager Energy Systems Designer Green Building Specialist
Duration 2 Days 12 CPD hours This course is intended for AdministratorDatabase Administrators Overview Describe the components of ASMExplain and apply Automatic Storage Management (ASM) initialization parametersManage ASM instances and associated processesMonitor ASM using the V$ASM dynamic performance viewsUnderstand Flex ASM architecture and componentsUnderstand ASM Deployment AlternativesInstall and configure Flex ASMManage Flex ASMEmploy ASM space management techniquesCreate and delete Automatic Storage Management (ASM) disk groupsSet the attributes of an existing ASM disk groupPerform ongoing maintenance tasks on ASM disk groupsExplain key performance and scalability considerations for ASM disk groupsDescribe the Automatic Storage Management (ASM) architectureUse different client tools to access ASM filesDescribe the format of a fully qualified ASM file name This Oracle Database 12c: ASM Administration training teaches you about Oracle ASM architecture. Expert Oracle University instructors will help you develop a deeper understanding of both standard ASM and Flex ASM applications. This Oracle Database 12c: ASM Administration training teaches you about Oracle ASM architecture. Expert Oracle University instructors will help you develop a deeper understanding of both standard ASM and Flex ASM applications.
Duration 2 Days 12 CPD hours This course is intended for Participants who have actual experience in the data centre and/or IT infrastructures are best suited. Attendance of the CDCP© course is recommended but not a requirement. Overview After completion of the course the participant will be able to: 1. Develop and review their data centre strategy 2. Use different risk assessment methodologies together with practical tips specifically for data centre migrations to reduce the risk during a data centre migration 3. Understand different migration strategies 4. Understand the legal aspects when migrating a data centre 5. Understand the importance of Business Service Reviews and Service Level Objectives 6. Size and design the target data centre 7. Understand the importance of detailed discovery and how dependencies influence migration waves 8. Understand the safety requirements during migration 19. Get lots of practical tips when moving to another data centre This course is designed to expose participants to a step-by-step methodology which will enable them to reduce the risks involved when undertaking a data centre migration. It will also give participants a lot of valuable practical hints and tips by trainers having extensive experience in moving and consolidating mission critical data centre. Data Centre Strategy Data centre lifecycle Reasons to migrate a data centre Alternatives to data centre migration Consolidation Outsourcing Cloud computing Upgrade existing data centre or build new Project Management Project management and methods Scope statement Statement Of Work (SOW) Work Breakdown Structure (WBS) Allocate time to the project Cost and estimation methodology Project communication Risk Management Risk management and methods Risk identification Risk assessment methodologies Qualitative approach Semi-quantitative approach Quantitative approach Risk evaluation Risk treatment Risk in data centre migrations Migration Strategies Different data centre migration strategies Heterogeneous migration Homogeneous migration Physical migration Different IT transformations Pre-migration transformation Migration transformation Post-migration transformation Legal Aspects Regulatory requirements Contractual considerations Legal aspects when decommissioning High Level Discovery & Planning The importance of Business Service Reviews The concept of Availability The concept of Recoverability The importance of Service Level Objectives Requirements on designing the target IT architecture Information needed for high level planning Design Target Data Centre Requirements for the target data centre Sizing the data centre Architectural requirements Cooling requirements Power requirements Security Detailed Discovery and Planning The importance of discovery Automated discovery tools Asset management Network and system dependencies Detailed migration planning Migration waves Staffing Warranties and insurance Safety Safety precautions Technical safety review Electrical safety Lifting Personal safety during migration Fire safety during migration Security Controversy between access and security Access control Managing security during migration Security during migration Key management Practical hints and tips Continuous improvement Implementation Rehearsal Route investigation Resourcing Logistics team Packing Transport Installing the equipment Post migration support End of Project Why project closure Lessons learned Phased completion of project Criteria for project closure The outcome of the project End of project Exam: Certified Data Centre Migration Specialist Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Duration 3 Days 18 CPD hours This course is intended for This intermediate course is for application programmers who need to write embedded SQL COBOL or PL/I programs in either a DB2 9 or DB2 10 for z/OS environment. Overview Incorporate static SQL statements in an application program Prepare the program for execution Validate execution results are correct Produce code to support multiple rows being returned from the database manager using cursors Identify considerations regarding units of work, concurrency, and restart of programs Identify differences between static and dynamic SQL Provide test data for applications Discuss program and DB2 options relative to performance of static SQL This course enables you to acquire the skills necessary to produce application programs that manipulate DB2 databases. Emphasis is on embedding Structured Query Language (SQL) statements and preparing programs for execution. CV720G;CF82G;DB2 Concepts Identify DB2 family products Explain DB2 workstation component functions Identify DB2 objects Identify the key differences between static SQL and other application alternatives for accessing DB2 data Program Structure I Embed INSERT, UPDATE, DELETE and single-row SELECT statements in application programs Effectively communicate with DB2 when processing NULL values and determining success of statement execution Demonstrate use of DB2 coding aids Code CONNECT statements within an application program Identify connection types and impacts on a unit of work Program for the Call Attach Facility (CAF) Program Preparation Identify the additional steps necessary to prepare a program that contains embedded SQL for execution Describe the functions of the DB2 PRECOMPILE and BIND processes Describe factors relevant to the BIND process, including RUNSTATS positioning, package status, parameters, and authorization requirements Program Structure II Use DECLARE, OPEN, FETCH, and CLOSE CURSOR statements to handle select criteria that may return multiple rows in application programs Issue positioned UPDATE and DELETE statements Identify how scrollable cursors can be used Recovery and Locking Concepts Define a unit of recovery Identify the basic locking strategies used by DB2 Dynamic SQL Introduction Describe the difference between static and dynamic SQL List the types of dynamic statements Code dynamic SQL in a program Managing Test Data Identify methods to insert data into a table Use the LOAD or IMPORT utility Identify the purpose of the RUNSTATS utility Identify the purpose of the REORG utility Performance Considerations Use programming techniques that enhance DB2 application performance by following general guidelines, using indexable predicates, and avoiding unnecessary sorts Identify the access paths available to DB2 List common causes of deadlocks and avoid such causes when possible Use the EXPLAIN tools as aids to develop applications that emphasize performance Additional course details: Nexus Humans CV722 IBM DB2 11 for z/OS Application Programming Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CV722 IBM DB2 11 for z/OS Application Programming Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This is an intermediate and beyond level SQL course geared for experienced end users, data scientists, business analysts, application developers and database administrators. Students should have recently attended a basic SQL class or have equivalent experience. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert practitioner, attendees will learn advanced skills needed to: Advanced Query Techniques Manipulating Table Data Using SQL's Data Manipulation Language (DML) User-Defined Functions Stored Procedures Triggers A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. Next Level SQL explores how to identify and use advanced querying techniques to manipulate and index tables. All hands-on work in this course is ANSI SQL compliant and should work with most SQL databases such as Oracle, SQL Server, MySQL, MS Access, Informix, Sybase, or any other ANSI SQL compliant database. Advanced Query Techniques Join inner outer (Left, Right, Full) Subqueries Simple Correlated Using the Exists Operator Tips for Developing Complex Queries Performing Set Operations Aggregating Results Using Group by Creating Temporary Tables Manipulating Table Data Using SQL's Data Manipulation Language (DML) Inserting Data into Tables Updating Existing Data Deleting Records Truncating Tables Implementing Data Integrity with Transactions Beginning Explicit Transactions Committing Transactions Rolling Back Transactions User-Defined Functions Definition and Benefits of Use CREATE FUNCTION Syntax RETURN Clause and the RETURNS Statement Scalar vs. Table Functions Comparison with Stored Procedures Returning Scalar Values and Tables ALTER and DROP FUNCTION Stored Procedures Definition and Benefits of Use CREATE PROCEDURE Syntax Variables and Parameters Control of Program Flow ALTER and DROP PROCEDURE Implementation Differences Triggers Definition and Benefits of Use Alternatives (e.g., Constraints) CREATE TRIGGER Syntax Trigger Types 'Inserted' (or 'NEW') and 'Deleted' (or 'OLD') Tables Event Handling and Trigger Execution ALTER and DROP TRIGGER Additional course details: Nexus Humans Advanced SQL Programming (TTSQL005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced SQL Programming (TTSQL005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for System integrators, Consultants, Solution architects Overview By the end of the course, you should be able to meet the following objectives: Create a vSphere design given a case study Identify and assess the business objectives of the vSphere environment Identify business requirements, constraints, assumptions, and risks, for all layers in the vSphere environment Apply a framework to a design Analyze design choices for vCenter, ESXi, storage, networking, vSphere clusters, and virtual machines Identify design decisions to ensure manageability, which include scalability, capacity planning and lifecycle management Identify design decisions to ensure that the vSphere environment is highly available Identify design decisions to ensure that the vSphere environment performs well Identify design decisions to ensure that the vSphere environment is secure Identify design decisions to ensure that the vSphere environment can recover from data loss or disaster This three-day course equips you with the knowledge, skills, and abilities to design a VMware vSphere 8 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security. The approach presented follows VMware best practices. This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions. Course Introduction Introductions and course logistics Course objectives Infrastructure Assessment Describe various design framework principles Follow a proven process to design a virtualization solution Define customer business objectives and requirements Use a systematic method to evaluate and document a conceptual model Create a logical design from a conceptual model Recognize key information contained in the physical design Designing for Manageability: Capacity Planning Make capacity planning design decisions that adhere to business requirements Design capacity planning strategies that meet the needs of the vSphere environment and follow VMware best practices Calculate compute and storage requirements for the VMs in the vSphere environment Designing for Manageability: Scalability Make scalability design decisions that adhere to business requirements Design scalability strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Manageability: Lifecycle Management Make lifecycle management design decisions that adhere to business requirements Design lifecycle management strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Availability Make availability design decisions that adhere to business requirements Design availability strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Performance Make performance design decisions that adhere to business requirements Design performance strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Security Make security design decisions that adhere to business requirements Design security strategies that meet the needs of the vSphere environment and follow VMware best practices Designing for Recoverability Make recoverability design decisions that adhere to business requirements Design recoverability strategies that meet the needs of the vSphere environment and follow VMware best practices Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Design [V8] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Design [V8] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate course for individuals responsible for developing and implementing effective storage management techniques. Overview Establish a DFSMS configuration to automatically enforce your installation's storage management policies Convert service level requirements into appropriate parameters for data class, storage class, management class, and storage groups Create and test Automatic Class Selection (ACS) routines Convert volumes and move data to system-managed volumes with DFSMS Data Set Services (DFSMSdss) Specify appropriate management class and storage group parameters for DFSMS Hierarchical Storage Management (DFSMShsm) processing of system-managed data sets Plan to maintain your DFSMS environment using Naviquest Establish procedures to control, manage, and recover the storage management subsystem with ISMF and operator commands Develop a DFSMS implementation plan In this course you will learn how to plan and implement DFSMS and learn how to manage temporary and permanent data sets with an emphasis on disk storage. Course introduction and DFSMS overview Specify the storage administration functions that can be automatically performed by the system Identify the types of data set services that need to be established by negotiating service level agreements Correlate data set service requirements to the SMS configuration components: data class, storage class, management class, storage group, and automatic class selection routines Activating SMS Identify the functions eligible for exploitation with the installation of DFSMS Data Facility Product (DFSMSdfp) and the activation of SMS Create SMS control data sets Code SYS1.PARMLIB operands necessary to bring up SMS Create a minimal configuration Activate a configuration Writing ACS routines Identify the purpose of the ACS routines Develop an understanding of the statements Differentiate between literals and masks Describe the read variables available in the ACS routines Managing temporary data sets Create/alter storage classes and storage groups Identify steps to install and use the starter set Write ACS routines to handle temporary data sets Activate a system to manage temporary data sets Code commands to change volume/group SMS status Issue operator commands to display current status Exploiting DFSMS Describe the purpose of the data class Identify the features that the data class can exploit Create data sets using the space parameter Define Virtual Storage Access Method (VSAM) and volume attributes for data class Identify special data sets and their exploitation through the data class Managing permanent data sets Create/alter data classes, storage classes, management classes, and storage groups Translate current (DFSMShsm) service level agreements to management class parameters Identify alternatives and concerns for standard naming conventions Establish the controls for automatic backup of data sets Establish the controls for automatic volume dump Write ACS routines to manage permanent data Create a configuration that manages permanent data sets Create a new managed data set Identify function of storage class exit provided by Custom-Built Installation Process Offering (CBIPO) and resulting System Management Facility (SMF) records Using Naviquest Create test cases using Naviquest Perform storage administration tasks in batch Create online DFSMS reports Create model commands using Naviquest Use the COPYFILT macro Device preparation and data movement Initialize volumes as system-managed Move data into/out from system-managed control Convert volumes to/from system-managed Move data to utilize new hardware capabilities Controlling DFSMS Code commands to change SMS volume/group status Issue commands to save configurations and use alternate Active Control Data Set (ACDS) Issue command to use alternate Communication Data Set (COMMDS) Issue VARY SMS commands Communicate with the security administrator about storage management requirements Additional considerations Establish a plan for implementing SMS Locate sources of implementation planning checklists Identify the tools available to document the current system Identify multiple site considerations for recovery and exploitation Additional course details: Nexus Humans SS84 IBM DFSMS Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SS84 IBM DFSMS Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Experienced system integrators and consultants responsible for designing and deploying vSphere environments Overview By the end of the course, you should be able to meet the following objectives: Identify the business objectives for the vSphere environment Identify business requirements, constraints, assumptions, and risks for all layers in the vSphere environment Apply a framework to a design Analyze design choices and best-practice recommendations Create a design that ensures availability, manageability, performance, recoverability, and security Design the core management infrastructure for an enterprise Design the virtual data center for an enterprise Design the compute infrastructure for an enterprise Design the storage and networking infrastructures for an enterprise Design virtual machines to run applications in a vSphere infrastructure Design security, manageability, and recoverability features for an enterprise This three-day training course equips you with the knowledge, skills, and abilities to design a VMware vSphere© 7 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security, and that uses VMware best practices. This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions. Given a case study, you practice your design skills by working with peers on a design project Course Introduction Introductions and course logistics Course objectives Infrastructure Assessment Follow a proven process to design a virtualization solution Define customer business objectives Gather and analyze business and application requirements Document design requirements, constraints, assumptions, and risks Use a systematic method to evaluate and document design decisions Create a conceptual design Core Management Infrastructure Determine the number of VMware vCenter© Server ApplianceTM instances to include in a design Choose the appropriate single sign-on identity source Choose the time synchronization method Choose methods to collect log files and VMware ESXi? core dumps Design a vCenter Server deployment topology that is appropriate for the size and requirements of the data center Virtual Data Center Infrastructure Calculate total compute capacity requirements for a virtual data center Create a virtual data center cluster design that meets business and workload requirements Evaluate in the virtual data center the use of several management services, such as VMware vSphere© High Availability and VMware vSphere© Distributed Resource Scheduler? Evaluate the use of resource pools in the virtual data center design Compute Infrastructure Create a compute infrastructure design that includes the appropriate ESXi boot, installation, and configuration options Choose the ESXi host hardware for the compute infrastructure Storage Infrastructure Calculate storage capacity and performance requirements for a design Evaluate the use of different storage platforms and storage management solutions Design a storage platform infrastructure and storage management architecture that meets the needs of the vSphere environment Network Infrastructure Evaluate the use of different network component and network management solutions Design a network component architecture that includes information about network segmentation and virtual switch types Design a network management architecture that meets the needs of the vSphere environment Virtual Machine Design Make virtual machine design decisions, including decisions about resources Design virtual machines that meet the needs of the applications in the vSphere environment and follow VMware best practices Infrastructure Security Make security design decisions for various layers in the vSphere environment Design a security strategy that meets the needs of the vSphere environment and follows VMware best practices Infrastructure Manageability Make infrastructure manageability design decisions that adhere to business requirements Design an infrastructure manageability strategy that meets the needs of the vSphere environment and follows VMware best practices Infrastructure Recoverability Make infrastructure recoverability design decisions that adhere to business requirements Design an infrastructure recoverability strategy that meets the needs of the vSphere environment and follows VMware best practices Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Design [v7.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Design [v7.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.