• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2188 Courses in Manchester delivered Live Online

Spanish Supreme

By Personal Chef Edinburgh

Introduction to the bold, aromatic and authentic saffron – scented SPANISH CHICKEN AND PRAWN PAELLA and traditional chickpea-based stew from Madrid

Spanish Supreme
Delivered OnlineFlexible Dates
£120

Public Youth Mental Health First Aid

5.0(1)

By Changing Minds Training

This online course trains you as a Youth Mental Health First Aider (MHFAider®), giving you: An in-depth understanding of young people’s mental health and factors that affect wellbeing Practical skills to spot the triggers and signs of mental health issues Confidence to reassure and support a young person in distress Enhanced interpersonal skills such as non-judgemental listening Knowledge to help a young person recover their health by guiding them to further support – whether that’s through self-help sites, their place of learning, the NHS, or a mix – engaging with parents, carers and external agencies where appropriate Ability to support a young person with a long term mental health issue or disability to thrive Tools to look after your own mental wellbeing Format This is an online course delivered through the MHFA England Online Learning Hub Learning takes place through four live training sessions spread across one to two weeks, with self-learning activities in between. See course structure section below for more detail Each session is built around a Youth Mental Health First Aid action plan We limit numbers to 16 people per course so that the instructor can keep people safe and supported while they learn Course StructureSession 1: Introduction Individual learning (1 hour 15 minutes): Introduction to the Online Youth Mental Health First Aid course and the Online Learning Hub Activity 1: Why Youth Mental Health First Aid? Activity 2: What is ALGEE? Activity 3: What is mental health? Activity 4: Mental health and stigma Activity 5: Mental health quiz: Impact of mental health Activity 6: Risk and protective factors for mental health Activity 7: The Stress Container Live session (2 hours 35 minutes): Introduction to the course Outline of live session 1, the value of Youth Mental Health First Aid Introduce ALGEE Recap what mental health is Recap the Mental Health Continuum Stigma Recap why Youth Mental Health First Aid is important Recap risk and protective factors The Stress Container The Frame of Reference Session 2: Depression, Anxiety & Self-Care Individual learning (1 hour 15 minutes): Activity 8: Your Stress Container Activity 9: Your Frame of Reference Activity 10: What is depression? Activity 11: What is anxiety? Live session (2 hours 10 minutes): Introduction to live session 2 Recap of homework after live session 1 Recap depression Signs and symptoms of depression in a young person Recap anxiety Signs and symptoms of anxiety in a young person ALGEE for depression and anxiety in a young person ALGEE for depression and anxiety, action 1 ALGEE for depression and anxiety, action 2-5 Self-care and close Session 3: Suicide & PsychosisIndividual learning (1 hour 20 minutes) Activity 12: Adolescent brain development Activity 13: About suicide Activity 14: Suicide risk factors Activity 15: What is psychosis? Activity 16: Lived experience of psychosis Activity 17: ALGEE for psychosis Live session (2 hours 5 minutes) Introduction to live session 3 Recap suicide Explore the impact of suicidal feelings ALGEE for suicidal crisis Practice non-judgemental listening skills Recap psychosis Recap warning signs and symptoms of psychosis Recap ALGEE for psychosis Session 4: Self-harm, Recovery & Action PlanningIndividual learning (1 hour 35 minutes) Activity 18: What is self-harm? Activity 19: What are eating disorders? Activity 20: Resilience Workbook activity 7: My action plan for using Youth Mental Health First Aid (completed after live session) Live session (2 hours 25 minutes) Introduction to live session 4 Recap self-harm, the self-harm continuum Warning signs of self-harm in young people ALGEE for self-harm Recap eating disorders ALGEE for eating disorders Applying MHFA to family and carers; the Recovery Tree Evaluation forms and close

Public Youth Mental Health First Aid
Delivered OnlineJoin Waitlist
£325

Certified ScrumMaster: In-House Training

By IIL Europe Ltd

Certified ScrumMaster®: In-House Training This course covers Scrum and the principles and tools required to be an effective ScrumMaster. You will come away with a good understanding of the Scrum framework and the underlying principles required to make effective decisions regarding the application of Scrum to different situations. At the end of the course, you will receive membership to the Scrum Alliance for two years and, following completion of an online test, will become a Scrum Alliance Certified ScrumMaster®. Our Certified Scrum Trainers pay the initial, two-year membership fee for each student who successfully completes our Certified ScrumMaster® course. This membership fee also covers the cost of the CSM Test. A link to the test will be sent to you following your course. The CSM test has a passing score of 37 out of 50 questions within a 60-minute timeframe. You will have two attempts within 90 days after you receive your welcome e-mail to pass the test at no cost. After two attempts or 90 days, you will be charged $25 for each additional attempt. What you will Learn At the end of this program, you will be able to: Provide a clear understanding of the fundamental principles of Scrum Use the principles, practices, and tools required to be an effective ScrumMaster Make effective decisions regarding the application of the Scrum framework to different situations, including: Practical, project-proven practices The essentials for getting a project off on the right foot How to write user stories and structure your product backlog How to help both new and experienced teams be more successful How to successfully scale Scrum Tips and tricks from the instructor's many years of using Scrum in a wide variety of environments Getting Started Introduction Course structure Course goals and objectives Agile Principles and Scrum Overview Agile Principles Lean Principles Process control models Incremental and Iterative development Shifting the focus on product management Overview of the Scrum process The Team Dedicated cross-functional teams T-shaped people Sprint Planning Team capacity Facilitating the Sprint Planning meeting The Sprint backlog Sprint Burndown chart Scrum Roles and Responsibilities The team and building effective teams ScrumMaster responsibilities Product Owner responsibilities The Scrum project community What happens to traditional roles in Scrum? Scrum Meetings Daily Scrum Reviews Retrospectives Product Backlog and User Stories Product backlog characteristics User stories Getting your first backlog Getting backlog items ready Slicing User stories Estimation for Forward Planning Why comparative estimation works Planning poker Affinity estimation Release Planning and Tracking Progress Velocity Release planning Tracking release progress Scaling Scrum Scrum of Scrums Scaling the product backlog Scaling across a program and business areas Distributed teams

Certified ScrumMaster: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,595

Leading Cross-Cultural Virtual Teams: In-House Training

By IIL Europe Ltd

Leading Cross-Cultural Virtual Teams: In-House Training High-performing teams are a must in this world of intense competition and higher expectations. Global virtual teaming has become a necessity as organizations become increasingly distributed and suppliers and clients actively engage in joint projects. Teams work across geographical and organizational boundaries to deliver solutions and services to global users where distance and differences, both geographic and cultural, amplify the effect of issues and factors that are relatively straightforward when managing a team of people in the same location. This course delivers practical concepts and techniques that participants will start using immediately on their global projects. What you will Learn At the end of this program, you will be able to: Define relationships among foundational concepts (leadership and three dimensions of diversity) and explain their potential impacts on project performance Describe key components of successful project leadership and build selected Transformational Leadership skills Prepare to convert project challenges stemming from personal or cultural diversity into potential competitive advantage Implement selected best practices to meet key challenges facing virtual project teams Foster and grow an environment that supports continued success for CCVTs Foundation Concepts Basic definitions Critical success factors for leading cross-cultural virtual teams (CCVTs) A roadmap to success for leading CCVTs Leadership Excellence in Any Project Environment Leading effectively in a global environment Transformational leadership The four components of Transformational Leadership Leveraging Personal Diversity Overview of personal diversity Mind styles The theory of multiple intelligences Connecting Transformational Leadership and personal diversity Embracing Cultural Diversity Introduction to cultural intelligence The impact of culture Cultural Dimensions Theory The Culture Map Managing Virtual Diversity Overview of virtual diversity Virtual time management Virtual processes and technology Virtual leadership Creating an Environment for Success Supporting a cross-cultural virtual-team (CCVT-) friendly environment Building a foundation of trust Developing a team charter Recap and review Summary and Next Steps Personal action plan

Leading Cross-Cultural Virtual Teams: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,295

Portfolio Management Skills: Virtual In-House Training

By IIL Europe Ltd

Portfolio Management Skills: Virtual In-House Training The main purpose of this workshop is to equip and enable people in a portfolio management office and PMO to effectively and efficiently support the Executive Leadership and Operational Management to plan, implement, manage, and evolve portfolio management in their organization. There is a deliberate focus on preparing you to become a strong and effective change advocate for meaningful portfolio management that delivers objective measurements of benefit contribution towards the strategic objectives to lead, manage, and continuously improve portfolio management governance, processes, and frameworks with and through the direction of a portfolio practice, principles, and delivery boards. What you Will Learn At the end of this program, you will be able to: Articulate the benefits of portfolio management Link the initiatives in an organization with its strategic objectives Participate in the introduction of portfolio management in an organization Create or improve the portfolio governance structure Lead the inventory of ongoing and new initiatives Assist the executives in the prioritization of initiatives through the use of Multi-criteria Analysis and other selection tools Support the executives in balancing the portfolio based on the optimal use of resources and priorities Create a portfolio delivery plan Define thresholds and variance reporting criteria Assist the executives and the financial team in the definition of Stage Gate Funding Lead the Stage Gate reviews Analyze the benefits that are being realized by the initiatives Foundation Concepts Definitions Benefits of Portfolio Management Objectives of Portfolio Management Portfolio Life Cycles Governing the Portfolio Portfolio Governance structure Roles and responsibilities Initial activities when starting portfolio management Prioritizing Initiatives Prioritize purpose Multi-Criteria Analysis Analytical Hierarchy Process (AHP) Strategic alignment Balancing the Portfolio Allocating resources and budgets Communicating decisions of initiatives status Planning the Portfolio Planning review cycles Using Stage Gate Funding Setting thresholds and variance reporting Tool examples Managing the Portfolio Delivery Project and Program Life Cycles Stage Gate Reviews Loop back to Prioritize, Balance and Plan Interaction with the Portfolio Delivery Board Project, Program and Functional Managers' roles and responsibilities

Portfolio Management Skills: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,250

Mac Support for PC Technicians

By Influential Training

Mac Support for PC, PC and Mac Support, PC to Mac support

Mac Support for PC Technicians
Delivered OnlineFlexible Dates
£1,045

Scrum Master Exam Prep: In-House Training

By IIL Europe Ltd

Scrum Master Exam Prep This workshop prepares you for the Scrum.org Professional Scrum Master (PSM)™ I certification. A voucher for the exam and the access information you will need to take the exam will be provided to you via email after you have completed the course. NOTE: If you have participated in any of IIL's other Scrum workshops, you can bypass this program and focus on reading/studying the Scrum Guide and taking practice exams from Scrum.org. A Scrum Master helps project teams properly use the Scrum framework, increasing the likelihood of the project's overall success. Scrum Masters understand Scrum values, practices, and applications and provide a level of knowledge and expertise above and beyond that of typical project managers. Scrum Masters act as 'servant leaders', helping the rest of the Scrum Team work together and learn the Scrum framework. Scrum Masters also protect the team from both internal and external distractions. The Professional Scrum Master™ I (PSM I) certificate is a Scrum.org credential that enables successful candidates to demonstrate a fundamental level of Scrum mastery. PSM I credential holders will grasp Scrum as described inThe Scrum Guide™1 and recognize how those concepts can be applied. They will also share a consistent terminology and approach to Scrum with other certified professionals. What you will Learn You'll learn how to: Successfully prepare for the Scrum.org PSM I exam Comprehend the Agile Manifesto and mindset Explain the fundamental principles of Scrum, including events, artifacts, and roles Guide the Scrum team in their responsibilities Define Ready and Done Write requirements in the form of user stories Estimate using planning poker and prioritize using MoSCoW Facilitate the team through the 5 Sprint events Fulfill the role of Scrum Master in a Scrum project Create Information Radiators to enable transparency Define the structure of the retrospective Getting Started Introductions Workshop orientation Exam prep preview Foundation Concepts Agile History, Values, and Mindset Introduction to Scrum Scrum events Scrum artifacts Scrum Roles and Responsibilities Product Owner responsibilities Scrum Master responsibilities The Team responsibilities Cross-functional teams Building effective teams The Product Backlog and User Stories The Product Backlog User Stories Definition of Done Backlog grooming Estimating User Stories Story points, planning poker Prioritizing User Stories The Sprint Team capacity and velocity The Sprint Planning Meeting The Sprint Backlog The Sprint Learning to self-manage, self-organize, self-improve Sprint Review and Retrospective Project Progress and Completion The Daily Scrum The Task Board and The Burndown Chart Information Radiators Closing a Scrum Project Summary and Next Steps Review of course goals, objectives, and content Exam prep next steps

Scrum Master Exam Prep: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Architecting on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for solutions architects, solution-design engineers, developers seeking an understanding of AWS architecting and individuals seeking the AWS Solutions Architect-Associate certification. Overview Identify AWS architecting basic practices. Explore using the AWS management tools: The AWS Console, Command Line Interface (CLI), and CloudFormation in a lab environment. Examine the enforcement of accounts security using policies. Identify the elements that build an elastic, secure, virtual network that includes private and public subnets. Practice building an AWS core networking infrastructure. Determine strategies for a layered security approach to Virtual Private Cloud (VPC) subnets. Identify strategies to select the appropriate compute resources based on business use-cases. Practice building a VPC and adding an Elastic Cloud Compute (EC2) instance in a lab environment. Practice installing an Amazon Relational Database Service (RDS) instance and an Application Load Balancer (ALB) in the VPC you created. Compare and contrast AWS storage products and services, based on business scenarios. Compare and contrast the different types of AWS database services based on business needs. Practice building a highly available, auto-scaling database layer in a lab. Explore the business value of AWS monitoring solutions. Identify the role of monitoring, event driven load balancing, and auto scaling responses, based on usage and needs. Identify and discuss AWS automation tools that will help you build, maintain and evolve your infrastructure. Discuss network peering, VPC endpoints, gateway and routing solutions based on use-cases. Discuss hybrid networking configurations to extend and secure your infrastructure. Discuss the benefits of microservices as an effective decoupling strategy to power highly available applications at scale. Explore AWS container services for the rapid implementation of an infrastructure-agnostic, portable application environment. Identify the business and security benefits of AWS serverless services based on business examples. Practice building a serverless infrastructure in a lab environment. Discuss the ways in which AWS edge services address latency and security. Practice building a CloudFront deployment with an S3 backend in a lab environment. Explore AWS backup, recovery solutions, and best practices to ensure resiliency and business continuity. Build a highly available and secure cloud architecture based on a business problem, in a project-based facilitator-guided lab. Architecting on AWS is for solutions architects, solution-design engineers, and developers seeking an understanding of AWS architecting. In this course, you will learn to identify services and features to build resilient, secure and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size. AWS Authorized Instructors emphasize best practices using the AWS Well-Architected Framework, and guide you through the process of designing optimal IT solutions, based on real-life scenarios. The modules focus on account security, networking, compute, storage, databases, monitoring, automation, containers, serverless architecture, edge services, and backup and recovery. At the end of the course, you will practice building a solution and apply what you have learned with confidence. Prerequisites AWS Cloud Practitioner Essentials classroom or digital training, or Working knowledge of distributed systems Familiarity with general networking concepts Familiarity with IP addressing Working knowledge of multi-tier architectures Familiarity with cloud computing concepts 0 - Introductions & Course Map review Welcome and course outcomes 1 - Architecting Fundamentals Review AWS Services and Infrastructure Infrastructure Models AWS API Tools Securing your infrastructure The Well-Architected Framework Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - Account Security Security Principals Identity and Resource-Based Policies Account Federation Introduction to Managing Multiple Accounts 3 - Networking, Part 1 IP Addressing Amazon Virtual Private Cloud (VPC), Patterns and Quotas Routing Internet Access Network Access Control Lists (NACLs) Security Groups 4 - Compute Amazon Elastic Cloud Compute (EC2) EC2 Instances and Instance Selection High Performance Computing on AWS Lambda and EC2, When to Use Which Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - Storage Amazon S3, Security, Versioning and Storage Classes Shared File Systems Data Migration Tools 6 - Database Services AWS Database Solutions Amazon Relational Database Services (RDS) DynamoDB, Features and Use Cases Redshift, Features, Use Cases and Comparison with RDS Caching and Migrating Data Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - Monitoring and Scaling Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs Invoking Events 8 - Automation CloudFormation AWS Systems Manager 9 - Containers Microservices Monitoring Microservices with X-Ray Containers 10 - Networking Part 2 VPC Peering & Endpoints Transit Gateway Hybrid Networking Route 53 11 - Serverless Architecture Amazon API Gateway Amazon SQS, Amazon SNS Amazon Kinesis Data Streams & Kinesis Firehose Step Functions Hands-on Lab: Build a Serverless Architecture 12 - Edge Services Edge Fundamentals Amazon CloudFront AWS Global Accelerator AWS Web Application Firewall (WAF), DDoS and Firewall Manager AWS Outposts Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - Backup and Recovery Planning for Disaster Recovery AWS Backup Recovery Strategie Additional course details: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS
Delivered OnlineFlexible Dates
£2,025

AutoCAD Basics to Intermediate Level Course Bespoke and 1-2-1

By Real Animation Works

Autocad face to face training customised and bespoke.

AutoCAD Basics to Intermediate Level Course Bespoke and 1-2-1
Delivered in London or OnlineFlexible Dates
£580