• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3285 Courses in Cardiff delivered Online

Better Business Cases Foundation: In-House Training

By IIL Europe Ltd

Better Business Cases™ Foundation: In-House Training: In-House Training Better Business Cases™ is based on the Five Case Model - which is the UK government's best practice approach to structuring spending proposals and making effective business decisions. Using this best practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the foundation course is to enable participants to work effectively with a team to develop a strong business case in their work environment. What You Will Learn At the end of this program, you will be able to: Describe the philosophy and the underlying rationale of the Five Case Model Identify different types of business case, their purpose, who is responsible for them Recognize when the different types are required in the development of a spending proposal Develop the business case in relation to other recognized and recommended best practices for programme and project management Overview of the Five Case Model Five key components of a business case and the order in which they are presented Three key stages in the development of a spending proposal Definition of a programme / project and the key differences between programmes and projects Purpose of a Business Justification Case (BJC) and in what circumstances it should be considered Purpose of a Strategic Outline Case (SOC) Purpose of an Outline Business Case (OBC) Purpose of a Full Business Case (FBC) Relationship between policies, strategies, programmes, and projects and their deliverables Developing the Strategic Case Purpose and core content of a Strategic Case Purpose of SMART robust spending objectives and the key objectives for spend: economy, efficiency, effectiveness, re-procurement, and statutory or regulatory compliance Four main categories of benefits criteria and the parties involved in their development Three key categories of risk Purpose of identifying constraints and dependencies Difference between direct and indirect benefits Developing the Economic Case Purpose and core content of an Economic Case Purpose of critical success factors and the key critical success factors based upon the Five Case Model Purpose of the long list options and how to generate options and undertake SWOT analysis Minimum of four short-list options, how they are derived, and what they should include (Reference Project / Public Sector Comparator [PSC]) Difference between the preferred way forward and the preferred option Purpose, objectives, key participants, and outputs of Workshop Stage 2 - identifying and assessing the options Rules that should be followed for the treatment of costs and benefits Key differences between economic appraisals and financial appraisals Factors considered when selecting the preferred option Developing the Commercial Case Purpose and core content of a Commercial Case Guiding principles when apportioning risk between the contractual parties Purpose of payment mechanisms Purpose of Step 9 in the development framework: Contracting for the deal Developing the Financial Case Purpose and core content of a Financial Case The financial statements required for all projects The possible impacts to consider Developing the Management Case Purpose and core content of a Management Case Purpose of a programme / project management strategy, framework, and plan Purpose of a change management strategy, framework, and plan Purpose of a benefits realization strategy, framework, and register / plan Purpose of a risk management strategy, framework and register / plan Purpose of a post programme / project evaluation strategy, framework, and plan

Better Business Cases Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Step-by-Step Guide to Developing a Solid Execution Strategy

4.9(27)

By Apex Learning

Overview This comprehensive course on Mechanical Engineering will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Mechanical Engineering comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Mechanical Engineering. It is available to all students, of all academic backgrounds. Requirements Our Mechanical Engineering is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 10 sections • 17 lectures • 01:12:00 total length •The 5 Components of an Execution Strategy: 00:09:00 •Anytime Fitness Case Example: 00:02:00 •Zynga Case Example: 00:02:00 •Why Your Execution Strategy Matters: 00:02:00 •What Investors Look For: 00:01:00 •The Why of Milestones: 00:03:00 •Examples of Milestones: 00:02:00 •Yelp Case Study: 00:01:00 •Your Staffing Plan: 00:09:00 •Your Startup Plan: 00:12:00 •Common Mistakes: 00:04:00 •Risk and Risk Mitigation: 00:08:00 •Identifying Risks: 00:01:00 •Risk Mitigation: 00:03:00 •Key Performance Indicators (KPIs): 00:07:00 •Workshop - Create Your Execution Plan: 00:06:00 •Resource - Step-by-Step Guide to Developing a Solid Execution Strategy: 00:00:00

Step-by-Step Guide to Developing a Solid Execution Strategy
Delivered Online On Demand1 hour 12 minutes
£12

RESILIA Foundation: Virtual In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: Virtual In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

Better Business Cases Foundation: Virtual In-House Training

By IIL Europe Ltd

Better Business Cases™ Foundation: Virtual In-House Training Better Business Cases™ is based on the Five Case Model - which is the UK government's best practice approach to structuring spending proposals and making effective business decisions. Using this best practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the foundation course is to enable participants to work effectively with a team to develop a strong business case in their work environment. What You Will Learn At the end of this program, you will be able to: Describe the philosophy and the underlying rationale of the Five Case Model Identify different types of business case, their purpose, who is responsible for them Recognize when the different types are required in the development of a spending proposal Develop the business case in relation to other recognized and recommended best practices for programme and project management Overview of the Five Case Model Five key components of a business case and the order in which they are presented Three key stages in the development of a spending proposal Definition of a programme / project and the key differences between programmes and projects Purpose of a Business Justification Case (BJC) and in what circumstances it should be considered Purpose of a Strategic Outline Case (SOC) Purpose of an Outline Business Case (OBC) Purpose of a Full Business Case (FBC) Relationship between policies, strategies, programmes, and projects and their deliverables Developing the Strategic Case Purpose and core content of a Strategic Case Purpose of SMART robust spending objectives and the key objectives for spend: economy, efficiency, effectiveness, re-procurement, and statutory or regulatory compliance Four main categories of benefits criteria and the parties involved in their development Three key categories of risk Purpose of identifying constraints and dependencies Difference between direct and indirect benefits Developing the Economic Case Purpose and core content of an Economic Case Purpose of critical success factors and the key critical success factors based upon the Five Case Model Purpose of the long list options and how to generate options and undertake SWOT analysis Minimum of four short-list options, how they are derived, and what they should include (Reference Project / Public Sector Comparator [PSC]) Difference between the preferred way forward and the preferred option Purpose, objectives, key participants, and outputs of Workshop Stage 2 - identifying and assessing the options Rules that should be followed for the treatment of costs and benefits Key differences between economic appraisals and financial appraisals Factors considered when selecting the preferred option Developing the Commercial Case Purpose and core content of a Commercial Case Guiding principles when apportioning risk between the contractual parties Purpose of payment mechanisms Purpose of Step 9 in the development framework: Contracting for the deal Developing the Financial Case Purpose and core content of a Financial Case The financial statements required for all projects The possible impacts to consider Developing the Management Case Purpose and core content of a Management Case Purpose of a programme / project management strategy, framework, and plan Purpose of a change management strategy, framework, and plan Purpose of a benefits realization strategy, framework, and register / plan Purpose of a risk management strategy, framework and register / plan Purpose of a post programme / project evaluation strategy, framework, and plan

Better Business Cases Foundation: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security Identify Drivers Affecting the Organization Obtain Senior Management Commitment to Information Security Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels 2 - Information Risk Management Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs Identify and Evaluate Risk Mitigation Strategies Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk 3 - Information Security Program Development Develop Plans to Implement an Information Security Strategy Security Technologies and Controls Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions Identify Resources Needed for Information Security Program Implementation Develop Information Security Architectures Develop Information Security Policies Develop Information Security Awareness, Training, and Education Programs Develop Supporting Documentation for Information Security Policies 4 - Information Security Program Implementation Integrate Information Security Requirements into Organizational Processes Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics 5 - Information Security Program Management Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues 6 - Incident Management and Response Develop an Information Security Incident Response Plan Establish an Escalation Process Develop a Communication Process Integrate an IRP Develop IRTs Test an IRP Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered OnlineFlexible Dates
£1,995

PMI-RMP Exam Prep: In-House Training

By IIL Europe Ltd

PMI-RMP® Exam Prep: In-House Training This course is aimed at preparing the participant to pass the PMI-RMP® (Risk Management Professional) exam. The course will also provide practical tips and tools that can be used in any organization's project management risk practices. In this expanded session, you will also have time to practice your exam taking skills with coaching from a credentialed instructor. The course includes the tool RMP-IQ, with sample exam questions to practice for the exam and allow participants to see their knowledge level in the various domains. What You Will Learn At the end of this course, participants will be able to: Explain the value and benefits of the PMI-RMP® credential Perform a self-assessment of your knowledge and skills Prepare a study plan that will allow you to pass the exam Foundation Concepts The Risk Management Professional (PMI-RMP®) Exam PMI's Standard for Risk Management Portfolios, Programs and Projects Key risk definitions Risk management life cycle Levels of Risk Management Enterprise Risk Management Portfolio Risk Management Program Risk Management Project Risk Management Risk Strategy and Planning: Part 1 Task 1: Perform a preliminary document analysis Task 2: Assess project environment for threats and opportunities Task 3: Confirm risk thresholds based on risk appetites Risk Strategy and Planning: Part 2 Task 4: Establish risk management strategy Task 5: Document the risk management plan Task 6: Plan and lead risk management activities with stakeholders Agile, programs, and portfolio aspects of risk strategy and planning Risk Identification: Part 1 Objectivity and bias Task 1: Conduct risk identification exercises Risk Identification: Part 2 Task 2: Examine assumption and constraint analysis Task 3: Document risk triggers and thresholds based on context / environment Task 4: Develop risk register Agile, programs, and portfolio aspects of risk identification Risk Analysis: Part 1 Task 1: Perform qualitative analysis Risk analysis in an agile environment Risk Analysis: Part 2 Task 2: Perform quantitative analysis Task 3: Identify threats and opportunities Program and portfolio aspects of risk analysis Risk Response Task 1: Plan risk responses Agile, programs, and portfolio aspects of risk response planning Task 2: Implement risk responses Monitor and Close Risks: Part 1 Task 1: Gather and analyze performance data Monitor and Close Risks: Part 2 Task 2: Monitor residual and secondary risks Task 4: Monitor project risk levels Task 3: Provide information required to update relevant project documents Agile, programs, and portfolio aspects of monitoring and closing risks

PMI-RMP Exam Prep: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

LEVEL 4 ENDORSED CERTIFICATION DIPLOMA

By Export Unlocked Limited

Level 4 Endorsed Diploma - International Trade Qualification Complete all 15 modules and 3 assessments, from a choice of 7 to earn a Level 4 Diploma in International Trade.

LEVEL 4 ENDORSED CERTIFICATION DIPLOMA
Delivered OnlineFlexible Dates
£3,995

Increase Revenue with an Effective Go-To-Market Strategy

By The Teachers Training

Overview Increase Revenue with an Effective Go-To-Market Strategy Course is yet another 'Teacher's Choice' course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this Increase Revenue with an Effective Go-To-Market Strategy Course and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills. Consisting of several modules, the course teaches you everything you need to succeed in this profession. The course can be studied part-time. You can become accredited within 05 Hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website. Why Choose Teachers Training Some of our website features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Be motivated and hard-working Over the age of 16. Certification CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. Section 01: Create a Unique Competitive Advantage Unique Competitive Advantage Explained 00:05:00 Unique Competitive Advantage - Company Examples 00:03:00 How to Determine Your Unique Competitive Advantage 00:01:00 Step 1 - Evaluate Your Strengths 00:02:00 Step 2 - Evaluate Your Competitive Landscape 00:03:00 Step 3 - Identify Your Unique Competitive Advantage 00:04:00 Step 4 - Test Your Unique Competitive Advantage 00:02:00 Common Mistakes 00:02:00 Workshop - Unique Competitive Advantage in Action 00:03:00 Section 02: Positioning Product or Service Positioning is about Your Customer's Point of View 00:08:00 What Investors Are Looking for 00:02:00 Ben and Jerry's Case Study 00:02:00 Keys to Success 00:03:00 The Positioning Framework Overview 00:06:00 Step 1 - Create Meaningful Attributes - Part 1 00:05:00 Step 1 - Create Meaningful Attributes - Part 2 00:06:00 Step 1 - Create Meaningful Attributes - Part 3 00:05:00 Viking Cruises - Case Study 00:02:00 Step 2 - Custom Attributes 00:04:00 Step 3- Evaluate / Rank Attributes 00:04:00 Step 4 - Evaluating Positioning Rankings 00:03:00 Step 5 - Positioning of Your Attributes 00:02:00 Step 6 - Your Positioning Statement 00:04:00 Common Mistakes 00:02:00 Workshop - Position Your Product or Service in Action 00:03:00 Section 03: Determine Your Target Market Target Market Essentials 00:05:00 Why is Your Target Market So Important? 00:05:00 Define Your Target Market 00:02:00 Step 1 - Define Standard Attributes - Demographics 00:06:00 Step 1 (continued) - Define Standard Attributes - More Demographics 00:05:00 Step 1 (continued) - Define Standard Attributes - Psychographics 00:06:00 Step 2 - Develop Custom Attributes 00:10:00 Step 3 - Validation 00:01:00 Step 4 - Adjust Your Strategy 00:02:00 Workshop - Developing Your Target Market 00:02:00 Section 04: Build a Compelling Value Proposition Characteristics of Unique Value Propositions 00:02:00 Types of Customer Benefits UVPs Express 00:04:00 Examples of Unique Value Propositions 00:01:00 What Investors Are Looking For 00:01:00 Value Proposition vs. Competitive Advantage 00:02:00 Understand Your Competitor's Unique Value Proposition 00:03:00 Streaming Services Example 00:02:00 The Value Proposition Framework 00:01:00 Step 1 - Brainstorming 00:07:00 Step 2 - Create a Value Proposition List 00:01:00 Step 3 - Determine Uniqueness 00:03:00 Step 4 - Prioritize Top Value Propositions 00:02:00 Step 5 - Tell a Story 00:04:00 Common Mistakes 00:01:00 Workshop - Build Your Unique Value Proposition 00:04:00 Downloadable Resources Resource - Increase Revenue with an Effective Go-To-Market Strategy 00:00:00

Increase Revenue with an Effective Go-To-Market Strategy
Delivered Online On Demand2 hours 48 minutes
£24.99

PMI-RMP Exam Prep: Virtual In-House Training

By IIL Europe Ltd

PMI-RMP® Exam Prep: Virtual In-House Training This course is aimed at preparing the participant to pass the PMI-RMP® (Risk Management Professional) exam. The course will also provide practical tips and tools that can be used in any organization's project management risk practices. In this expanded session, you will also have time to practice your exam taking skills with coaching from a credentialed instructor. The course includes the tool RMP-IQ, with sample exam questions to practice for the exam and allow participants to see their knowledge level in the various domains. What You Will Learn At the end of this course, participants will be able to: Explain the value and benefits of the PMI-RMP® credential Perform a self-assessment of your knowledge and skills Prepare a study plan that will allow you to pass the exam Foundation Concepts The Risk Management Professional (PMI-RMP®) Exam PMI's Standard for Risk Management Portfolios, Programs and Projects Key risk definitions Risk management life cycle Levels of Risk Management Enterprise Risk Management Portfolio Risk Management Program Risk Management Project Risk Management Risk Strategy and Planning: Part 1 Task 1: Perform a preliminary document analysis Task 2: Assess project environment for threats and opportunities Task 3: Confirm risk thresholds based on risk appetites Risk Strategy and Planning: Part 2 Task 4: Establish risk management strategy Task 5: Document the risk management plan Task 6: Plan and lead risk management activities with stakeholders Agile, programs, and portfolio aspects of risk strategy and planning Risk Identification: Part 1 Objectivity and bias Task 1: Conduct risk identification exercises Risk Identification: Part 2 Task 2: Examine assumption and constraint analysis Task 3: Document risk triggers and thresholds based on context / environment Task 4: Develop risk register Agile, programs, and portfolio aspects of risk identification Risk Analysis: Part 1 Task 1: Perform qualitative analysis Risk analysis in an agile environment Risk Analysis: Part 2 Task 2: Perform quantitative analysis Task 3: Identify threats and opportunities Program and portfolio aspects of risk analysis Risk Response Task 1: Plan risk responses Agile, programs, and portfolio aspects of risk response planning Task 2: Implement risk responses Monitor and Close Risks: Part 1 Task 1: Gather and analyze performance data Monitor and Close Risks: Part 2 Task 2: Monitor residual and secondary risks Task 4: Monitor project risk levels Task 3: Provide information required to update relevant project documents Agile, programs, and portfolio aspects of monitoring and closing risks

PMI-RMP Exam Prep: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

Digital Transformation: Things to Consider Before Making Changes

5.0(1)

By Enspark

How well do you know your client base? How can upgrading your technology or digitally streamlining serve them? Some companies undergo a digital transformation beginning with reviewing software and then growing frustrated when the impact is hard to find. This microlearning video outlines how to achieve the best results for your customers and organization by starting with exploring intended outcomes. This video is great for anyone involved in strategic planning at your organization. Length: 3:56 Length: 4:21 Learning Objectives Examine the importance of comprehensive audience research, eliminating assumptions and gaining a deep understanding of client behaviors and preferences, to lay the foundation for a data-driven digital transformation strategy.;Articulate clear and strategic objectives, addressing how digital transformation can advance overall business objectives and enhance customer engagement and experiences.;Shift the focus from technology to user impact, emphasizing the significance of reducing costs, saving time, and delivering superior customer experiences in the digital transformation strategy formulation.

Digital Transformation: Things to Consider Before Making Changes
Delivered Online On Demand7 minutes
£4.95