Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows:Anyone interested in knowing about DNA Center and SD-AccessPersonnel involved in SD-Access Design and ImplementationNetwork Operations team with SD-Access solutionNetwork admin staff that deal with User AccessChannel Partner SEs and other sales supportNetwork Access Control administrationNetwork AdministratorsNetwork ArchitectsNetwork Engineers Overview Upon completing this course, the learner will be able to meet these overall objectives:Know and understand Cisco?s SD-Access concepts, features, benefits, terminology and the way this approach innovates common administrative tasks on today?s networks.Differentiate and explain each of the building blocks of SD-Access SolutionExplain the concept of ?Fabric? and the different node types that conform it (Fabric Edge Nodes, Control Plane Nodes, Border Nodes)Describe the role of LISP in Control Plane and VXLAN in Data Plane for SD-Access SolutionUnderstand the role of DNA Center as solution orchestrator and Intelligent GUIBe familiar with workflow approach in DNA Center and its 4 Steps: Design, Policy, Provision and Assurance DNA Center and SD-Access offer Cisco?s next-generation programmable digital network to help automate common network access security features and streamline the redundant, complex configuration required to allow different groups of users access to the network infrastructure. This network security training course allows network administrators to quickly allow differentiated access for end users on the network while allowing the network to react automatically to day zero and other types of attacks. Introduction to Cisco?s Software Defined Access (SD-Access) SD-Access Overview SD-Access Benefits SD-Access Key Concepts SD-Access Main Components SD-Access Campus Fabric The concept of Fabric Node types Fabric Edge Nodes Control Plane Nodes Border Nodes LISP as protocol for Control Plane VXLAN as protocol for Data Plane Concept of Virtual Network Fabric-enabled WLAN DNA Center and Workflow for SD-Access Introduction to DNA Center Workflow for SD-Access in DNA Center Integration with Cisco ISE for Policy Enforcement Integration with Cisco NDP for Analytics and Assurance Relationship with APIC-EM controller DNA Center Workflow First Step - Design Creating Enterprise and Sites Hierarchy Discuss and Demonstrate General Network Settings Loading maps into the GUI IP Address Administration Administering Software Images Network Device Profiles DNA Center Workflow Second Step - Policy 2-level Hierarchy Policy Types ISE Integration with DNA Center Cross Domain Policies DNA Center Workflow Third Step - Provision Devices Onboarding Fabric Domains Adding Nodes DNA Center Workflow Fourth Step ? Assurance Introduction to Analytics NDP Fundamentals Overview of DNA Assurance Components of DNA Assurance DNA Center Assurance Dashboard Implementing WLAN in SD-Access Solution WLAN Integration Strategies in SD-Access Fabric SD-Access Wireless Architecture Sample Design for SD-Access Wireless Campus Fabric External Connectivity for SD-Access Enterprise Sample Topology for SD-Access Role of Border Nodes Types of Border Nodes Single Border vs. Multiple Border Designs Collocated Border and Control Plane Nodes Distributed (separated) Border and Control Plane Nodes
Duration 3 Days 18 CPD hours This course is intended for This course is designed for IT Professionals who deploy and manage Microsoft SharePoint and OneDrive in their organizations. Students in this course are interested in Microsoft SharePoint and OneDrive. Overview Configure SharePoint Sites. Manage sites storage limits. Deploy OneDrive sync client. Use Group Policy to control OneDrive sync client settings. Manage external sharing for data in Microsoft SharePoint and OneDrive. Configure user profile properties. Manage audiences. Use the App Catalog to manage custom apps. Create and manage term groups, term sets, and terms. Describe the difference between modern and classic search experiences. Content is the most critical digital asset for every organization. In this course, you will learn how to plan, configure, and manage SharePoint Sites and OneDrive to enable modern content services that transform the content lifecycle. Specifically, this course discusses the modern SharePoint site structure, such as SharePoint hub sites. It provides best practices for the adoption and deployment of OneDrive within your organization. It also covers sharing, security, and monitoring in SharePoint and OneDrive in Microsoft 365. Additionally, you will learn how to manage user profiles and apps with proper permission settings. We will also discuss how to plan and configure Managed Metadata, Business Connectivity Services, and search allowing content to be found, consumed, and governed across Microsoft 365. Plan and Configure SharePoint Sites Overview of SharePoint in Microsoft 365 Configure SharePoint sites Manage SharePoint site Configure and Manage OneDrive Overview of OneDrive in Microsoft 365 Deploy OneDrive Manage OneDrive Sharing and Security in SharePoint and OneDrive Manage SharePoint site permissions Manage sharing in SharePoint and OneDrive Manage security in SharePoint and OneDrive Manage User Profiles and Apps Manage User Profiles Manage apps Plan and Configure Managed Metadata and Business Connectivity Services Plan and configure Managed Metadata Plan and configure Business Connectivity Services Plan and Configure Search Plan search Configure search Additional course details: Nexus Humans MS-040T00-A Manage SharePoint and OneDrive in Microsoft 365 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-040T00-A Manage SharePoint and OneDrive in Microsoft 365 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, virtualization administrators, and hybrid infrastructure engineers interested in deploying large-scale virtualization solutions and managing virtual servers in their datacenters, based on the Red Hat Virtualization open virtualization management platform. Overview As a result of completing this offering, you should be able to create and deploy Red Hat Virtualization and virtual servers. Using a single, full-service management interface, Red Hat Virtualization Manager, you will be able to configure, manage, and migrate systems within the virtualization environment. In this course you will develop the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat© Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam.This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux© 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6.This course covers the same material as RH318, but includes the Red Hat Certified Specialist in Virtualization exam (EX318). Red Hat Virtualization overview Explain the purpose and architecture of Red Hat Virtualization. Install and configure Red Hat Virtualization Install a minimal Red Hat Virtualization environment and use it to create a virtual machine. Create and manage datacenters and clusters Organize hypervisors into groups using datacenters and clusters. Manage user accounts and roles Configure user accounts using a central directory service, then use roles to assign access to resources based on job responsibilities. Adding physical hosts Add additional Red Hat Virtualization hosts automatically, and move and remove hosts from datacenters as needed. Scale Red Hat Virtualization infrastructure Add Red Hat Virtualization hosts automatically, configure Red Hat Enterprise Linux hosts when appropriate, and move and remove hosts from data centers as needed. Manage Red Hat Virtualization networks Separate network traffic into multiple networks on one or more interfaces to improve the performance and security of Red Hat Virtualization. Manage Red Hat Virtualization storage Create and manage data and ISO storage domains. Deploy and manage virtual machines Operate virtual machines in the Red Hat Virtualization environment. Migrate virtual machines Migrate and control automatic migration of virtual machines. Manage virtual machine images Manage virtual machine snapshots and disk images. Automating virtual machine deployment Automate deployment of virtual machines by using templates and cloud-init. Back up and upgrade Red Hat Virtualization Back up, restore, and upgrade the software in a Red Hat Virtualization environment. Explore high-availability practices Explain procedures to improve the resilience and reliability of Red Hat Virtualization by removing single points of failure and implementing high-availability features. Perform comprehensive review Demonstrate skills learned in this course by installing and configuring Red Hat Virtualization; using the platform to create and manage virtual machines; and backing up and updating components of Red Hat Virtualization.
Duration 3 Days 18 CPD hours This course is intended for This course is for information technology professionals, security professionals, network, system managers and administrators tasked with installing, configuring and maintaining Symantec Data Center Security: Server Advanced. Overview At the completion of the course, you will be able to: Describe the major components of Symantec Data Center Security: Server Advanced and how they communicate. Install the management server, console and agent. Define, manage and create assets, policies, events and configurations. Understand policy creation and editing in depth. course is an introduction to implementing and managing a Symantec Data Center Security: Server Advanced 6.0 deployment. Introduction Course Overview The Classroom Lab Environment Introduction to Security Risks and Risk Security Risks Security Risk Management Managing and Protecting Systems Corporate Security Policies and Security Assessments Host-Based Computer Security Issues SDCS:Server Advanced Overview SDCS: Server Advanced Component Overview Policy Types and Platforms Management Console Overview Agent User Interface Overview DEMO of Management Console Installation and Deployment Planning the Installation Deploying SDCS:SA for High Availability Scalability Installing the Management Server Installing the Management Console Installing a Windows Agent Installing a UNIX Agent LAB: Install Manager and Agents Configuring Assets Asset and Agent Overview Viewing Agents and Assets Managing Agents Managing Agents on Assets LAB: Create Asset Groups LAB: Examine Agent Interface Policy Overview Policies Defined Prevention Policy Overview Process Sets Resource Access Policy Options Detection Policy Overview IDS Capabilities Rules Collectors Policy Management Workspace User Interface on Agent Example Use Cases LAB: Paper Based Scenarios LAB: What type of security strategy should be used? Detailed Prevention Policies Policy Editor Policy Structure Global Policy Options Service Options Program Options Policy Processing Order Network Rules File Rules Registry Rules Process Sets Predefined Policies LAB: Deploy Strict policy LAB: Examine Functionality Advanced Prevention Profiling Applications Customizing Predefined Policies LAB: Modify Policy Previously Deployed LAB: Re-examine Functionality LAB: Preparing for Policy deployment LAB: Best Practice - Covering Basics LAB: Further Enhance Strict Policy LAB: Create Custom Process Set LAB :Secure an FTP Server LAB: Troubleshoot Policy/pset Assignment Using CLI Detection Policies Detection Policies Structure Collectors Rules Predefined Detection Policies Creating a Detection Policy Using the Template Policy LAB: Deploy Baseline Policy LAB: Create Custom Policy Event Management Events Defined Viewing Events Reports and Queries Overview Creating Queries and Reports Creating Alerts LAB: View Monitor Types and Search Events LAB: Create Real Time Monitor Agent Management and Troubleshooting Configurations Defined Creating and Editing Configurations Common Parameters Prevention Settings Detection Settings Analyzing Agent Log Files Diagnostic Policies Local Agent Tool ? sisipsconfig LAB: Create Custom Configurations LAB: Implement Bulk Logging LAB: Disable Prevention on Agent Using CLI LAB: Use Diagnostic Policy to Gather Logs LAB: Troubleshoot a Policy System Management Managing Users and Roles Server Security Viewing and Managing Server Settings Viewing and Managing Database Settings Viewing and Managing Tomcat Settings LAB: Create a New User LAB: View System Settings
Duration 5 Days 30 CPD hours This course is intended for Technology ConsultantSystem AdministratorSystem ArchitectHelp Desk / COE Support Overview Explain the architecture of SAP NetWeaver AS JavaStart and stop SAP NetWeaver AS JavaCarry out basic configurations for SAP NetWeaver AS JavaClassify network security conceptsSet up SSL encryption for SAP NetWeaver AS JavaExplain the architecture of the User Management EngineConfigure the User Management EngineCarry out user and authorization maintenanceUnderstand and change the standard logon procedure of SAP NetWeaver AS JavaMaintain destinations and the JCo RFC ProviderUnderstand the architecture and the tasks of the SAP NetWeaver Development InfrastructureExplain the process flow of the development process using the SAP NetWeaver Development InfrastructureSpecify the options for monitoring SAP NetWeaver AS JavaConnect SAP NetWeaver AS Java to a central Monitoring systemDisplay Monitoring and logging data using the SAP NetWeaver AdministratorImplement corrections for SAP NetWeaver AS Java In this course, students learn how to explain the architecture of SAP NetWeaver AS Java, carry out basic configurations for SAP NetWeaver AS Java, and much more. Fundamental Concepts of Java Describing the Fundamental Concepts of Java Describing the Architecture of the SAP NetWeaver Application Server (SAP NetWeaver AS) Outlining the Java Cluster Architecture Describing the Internal Structure of SAP NetWeaver AS for Java SAP NetWeavear AS for Java Start and Stop Procedures Starting and Stopping Procedures in SAP NetWeaver AS for Java Evaluating the Tools for Starting and Stopping an SAP System Evaluating Load Balancing Options in SAP NetWeaver AS for Java Operating the Java Startup and Control Framework Analyzing the Logs of Start and Stop Processes in SAP NetWeaver AS for Java Basic Configuration of SAP NetWeaver AS for Java Identifying the Administration Tools Used in Configuration Maintaining the Basic Configuration of SAP NetWeaver AS for Java with the Config Tool Configuring SAP NetWeaver AS for Java with SAP NetWeaver Administrator Configuring the Properties of the Central Services Instance Administering the Internet Communication Manager (ICM) Process Infrastructure Security Describing Network Security Setting Up the Secure Sockets Layer (SSL) User and Authorization Administration Configuring the SAP User Management Engine (UME) Maintaining Users and Groups Managing Java Authorization Administrating Special Principles Configuring the Logon Procedure in SAP NetWeaver AS for Java Java Connectors and Destinations Creating Connections to Other Systems Creating Connections to Other Systems with J2EE Connector Architecture (JCA) Change Management and Software Logistics Structuring the Java Development Approach Describing the Components of SAP NetWeaver Development Infrastructure Developing and Releasing Java Changes with SAP NetWeaver Development Infrastructure Transporting Java Developments Monitoring Monitoring SAP NetWeaver AS for Java Connecting to a Central Monitoring System (CEN) Configuring Availability Monitoring Configuring the Log and Trace Files Monitoring a System with SAP Solution Manager Software Maintenance Preparing for Software Maintenance Describing Java Support Packages, Stacks, and Patches Deploying Corrections with Software Update Manager (SUM) in SAP NetWeaver AS for Java Deploying Java Archives with Alternative Tools Outlining the Backup Strategy in SAP NetWeaver AS for Java
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, security DevOps, and security engineers Overview In this course, you will learn to: Establish a landing zone with AWS Control Tower Configure AWS Organizations to create a multi-account environment Implement identity management using AWS Single Sign-On users and groups Federate access using AWS SSO Enforce policies using prepackaged guardrails Centralize logging using AWS CloudTrail and AWS Config Enable cross-account security audits using AWS Identity and Access Management (IAM) Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices. Course Introduction Instructor introduction Learning objectives Course structure and objectives Course logistics and agenda Module 1: Governance at Scale Governance at scale focal points Business and Technical Challenges Module 2: Governance Automation Multi-account strategies, guidance, and architecture Environments for agility and governance at scale Governance with AWS Control Tower Use cases for governance at scale Module 3: Preventive Controls Enterprise environment challenges for developers AWS Service Catalog Resource creation Workflows for provisioning accounts Preventive cost and security governance Self-service with existing IT service management (ITSM) tools Module 4: Detective Controls Operations aspect of governance at scale Resource monitoring Configuration rules for auditing Operational insights Remediation Clean up accounts Module 5: Resources Explore additional resources for security governance at scale Additional course details: Nexus Humans AWS Security Governance at Scale training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Governance at Scale course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Ideal candidates include network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio. Overview After you successfully complete this course, expect to be able to: Ability to setup ClearPass as a AAA server Demonstrate Configuration Guest, OnGurad, Onboard and Profiling features Integrate with External AD Server Understand Monitoring and Reporting Demonstrate Scaling and deployment of best practices Configure AAA services for both wired and wireless networks Demonstrate the configuration of Aruba Downloadable User Roles. Demonstrate the configuration of Dynamic Segmentation with Aruba switches. This course prepares participants with foundational skills in Network Access Control using the ClearPass product portfolio. This 5-day classroom session includes both instructional modules and labs to teach participants about the major features of the ClearPass portfolio. Participants will learn how to setup ClearPass as an AAA server, and configure the Policy Manager, Guest, OnGuard and Onboard feature sets. In addition, this course covers integration with external Active Directory servers, Monitoring and Reporting, as well as deployment best practices. The student will gain insight into configuring authentication with ClearPass on both wired and wireless networks. Intro to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard ClearPass for AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles Authentication and Security Concepts Authentication Types Servers Radius COA Active Directory Certificates Intro to NAD NAD Devices Adding NAD to ClearPass Network Device Groups Network Device Attributes Aruba Controller as NAD Aruba Switch Aruba Instant Monitoring and Troubleshooting Monitoring Troubleshooting Logging Policy Simulation ClearPass Insight Insight Dashboard Insight Reports Insight Alerts Insight Search Insight Administration Insight Replication Active Directory Adding AD as Auth Source Joining AD domain Using AD services External Authentication Multiple AD domains LDAP Static Host Lists SQL Database External Radius Server Guest Guest Account creation Web Login pages Guest Service configuration Self-registration pages Configuring NADS for Guest Guest Manager Deep Dive Web Login Deep Dive Sponsor Approval MAC Caching Onboard Intro to Onboard Basic Onboard Setup Onboard Deepdive Single SSID Onboarding Dual SSID Onboarding Profiling Intro to Profiling Endpoint Analysis Deep Dive Posture Intro to Posture Posture Deployment Options OnGuard Agent Health Collection OnGuard workflow 802.1x with Posture using Persistent/dissolvable agent OnGuard web Login Monitoring and Updates Operation and Admin Users Operations Admin Users Clustering and Redundancy Clustering Redundancy LAB Licensing ClearPass Licensing Base License Applications ClearPass Exchange Intro Examples General HTTP Palo Alto Firewall Configuration Case Study Objectives Discussion Advanced Labs Overview Wired Port Authentication 802.1X for access layer switch ports Profiling on Wired Network Configuration of Dynamic Segmentation Aruba Downloadable User Roles Downloadable User Role Enforcement in ClearPass Aruba Controller/Gateway configuration Aruba Switch configuration Troubleshooting
Workshop is designed to support participants in using the Six Stages Framework in Board development and Diversity, Equity and Inclusion
Duration 5 Days 30 CPD hours This course is intended for This course is designed for Collaboration engineers and administration professionals in job roles such as: Network administrator Network architect Network designer Network engineer Network manager Overview After taking this course, you should be able to: Analyze and troubleshoot SIP, H.323, and media protocols Implement time-of-day routing, call park, call pickup, and meet-me conferences in Cisco Unified Communications Manager Implement call coverage in Cisco Unified Communications Manager Configure and troubleshoot Cisco Unified Communications Manager Device Mobility Configure and troubleshoot Cisco Unified Communications Manager Extension Mobility Configure and troubleshoot Cisco Unified Communications Manager Unified Mobility Implement Cisco Unified Communications Manager Express for SIP phones Implement globalized call routing within and between Cisco Unified Communications Manager clusters Implement Media Gateway Control Protocol (MGCP) fallback and Survivable Remote Site Telephony (SRST) in Cisco Unified Communications Manager and in Cisco IOS XE gateways Implement Call Admission Control and Automated Alternate Routing (AAR) in Cisco Unified Communications Manager Implement URI calling in Cisco Unified Communications Manager for calls within a cluster and between clusters Troubleshoot multisite Cisco Unified Communications Manager deployments Implement Intercluster Lookup Service (ILS) between Cisco Unified Communications Manager clusters and enable General Data Protection Regulation (GDPR) Configure and troubleshoot Cisco Unified Border Element In this course, you will learn how to use Cisco© Unified Communications Manager features to consolidate your communications infrastructure into a scalable, portable, and secure collaboration solution. This course prepares you for the 300-815 Implementing Cisco Advanced Call Control and Mobility Services (CLACCM) concentration exam and CCNP-Collaboration certification. Course Outline Analyzing and Troubleshooting Signaling and Media Protocols Implementing Cisco Unified Communications Manager Supplemental Services Implementing Call Coverage in Cisco Unified Communications Manager Configuring and Troubleshooting Cisco Unified Communications Manager Device Mobility Configuring and Troubleshooting Cisco Unified Communications Manager Extension Mobility Configuring and Troubleshooting Cisco Unified CM Unified Mobility Implementing Cisco Unified Communications Manager Express Implementing Globalized Call Routing Implementing Remote Site Survivability Implementing Call Admission Control in Cisco Unified Communications Manager Implementing URI Calling in Cisco Unified Communications Manager Troubleshooting Multisite Cisco Unified Communications Manager Deployments Examining Global Dial Plan Replication Configuring and Troubleshooting Cisco Unified Border Element Lab outline Analyze SIP, H.323, and Media Protocols Troubleshoot SIP and Media Protocols Implement Cisco Unified Communications Manager Supplemental Services Implement Call Hunting and Call Queueing in Cisco Unified Communications Manager Configure Device Mobility Troubleshoot Cisco Unified Communications Manager Device Mobility Configure Cisco Unified Communications Manager Extension Mobility Troubleshoot Cisco Unified Communications Manager Extension Mobility Configure Cisco Unified Mobility Troubleshoot Cisco Unified Mobility Implement Endpoints in Cisco Unified Communications Manager Express Implement Endpoint Addressing and Call Routing in Cisco Unified Communications Manager Express Implement Calling Privileges in Cisco Unified Communications Manager Express Implement Hunt Groups, Call Park, and Paging in Cisco United Communications Manager Express Implement Globalized Call Routing Implement TEHO, PSTN Backup, and CoS in a Globalized Call-Routing Deployment Implement MGCP Fallback and Survivable Remote Site Telephony Implement Call Admission Control Implement a URI-Based Dial Plan for Multisite Deployments Troubleshoot Globalized Call Routing Troubleshoot Call Admission Control Implement Global Dial Plan Replication Implement Cisco Unified Border Element Troubleshoot Cisco Unified Border Element
Registration starts at 7:30 AM. The training will begin promptly at 8:00 AM. Please plan your arrival accordingly to ensure you don't miss any important information. Reduce Emissions, Save Costs, Earn a CPC Hours, and Ensure Full Compliance Topics Covered: FORS Lo-CITY Driver Training (3.5 hours): • Relationship between driving style, fuel consumption, and environmental impact • Benefits of regular vehicle maintenance and checks • Fuel-efficient driving techniques • Utilising in-vehicle technology for fuel economy • Benefits of journey planning • Alternative fuels for commercial vehicles Highway Code Training Content: Course introduction, objectives, and expectations. Introduction to the Highway Code and its relevance. Types of road users and training for various groups. Respecting and understanding the risks to different road user categories. Confirmation of knowledge quizzes covering all aspects of the Highway Code and traffic regulations. Course Details: Format: Remote Session (7 hours) CPC Hours: Yes Cost: £89.50 - Includes course fee, Driver CPC Upload fee, VAT This award-winning program (awarded the prestigious Education in Transport award at the 2017 National Courier Awards) is perfect for any fleet operator looking to: Meet FORS Gold accreditation requirements. Improve driver performance and fuel efficiency. Reduce their environmental footprint. Enhance corporate social responsibility. Please note that this course is delivered online and provides 7 hours of Driver CPC training. Ready to get started? Book online or feel free to contact our training department at training@totalcompliance.co.uk or call 0345 9001312 to register for this valuable course. Please review our Terms and Conditions for more information.