• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

162 Educators providing Courses delivered Online

Inner Dimension TV

inner dimension tv

Founded by husband and wife co-CEOs and world-renowned yoga instructors Travis Eliot and Lauren Eckstrom from their cozy living room in west Los Angeles, Inner Dimension was started with the goal to help you achieve your highest potential in body, energy, mind, heart, wisdom and soul. Not only will you find the best yoga and meditation content here, but we also hope you get to know all of our instructors intimately and find a sense of belonging and community. Let us be “your” yoga studio…all from the comfort of home! In my early twenties I felt trapped fulfilling the expectations of my culture and family. I was stalled in a comfortable yet loveless relationship that was dispassionate and wonted. I felt lost, confused, and alone. Most painfully, I was caught in a corporate job that while financially beneficial, sucked the life out of my soul. I was unable to perceive a way out, depressed because I couldn’t decipher what steps to take next to change my life, and at a total loss as to how to regain happiness. I was caught in unhealthy habits, addictions, and fears. It was a silent suffering, like slowly suffocating from carbon monoxide poisoning. Then I became crippled with anxiety. My heart would race, I would break out in a cold sweat, my vision would narrow, and I would edge nearer and nearer toward fainting or vomiting. The experience was visceral and terrifying. And, it brought me to yoga. I remember very little about my first yoga class except that it was the first time I sat face-to-face with my pain, and I survived! Laying down for Savasana, the final resting posture, I surrendered into the floor. Layers of stress, fear, and panic melted away. For the first time, in a long time, I felt at peace in my body and in my mind. I don’t remember when I went back to yoga again, but I know I did. I left class knowing I had just met my biggest challenge and my greatest gift. Yoga would eventually teach me that I could experience the depth of my pain, and not only survive but thrive. Meditation would eventually teach me that I could feel my feelings and not run away. Yoga and meditation shifted the entire course of my life. Today I live a life that many people dream of. I travel the world, do what I love, help others, and am married to a man I love and who loves me in return. I would not be here without the roadmap the practices of yoga, meditation, and personal growth provide and I promise they will help you achieve your unique vision of a life you are head over heels in love with too. I am honored to share these practices with you and I cannot wait to welcome you to our Inner Dimension family, a global community that is here to support you on your journey to a life you love.

Amalfi Corporate Solutions Uk

amalfi corporate solutions uk

London

Based in Surrey we are Automated Penetration Testing specialists, cyber security advisors, GDPR consultants, virtual DPO’s, cyber security awareness trainers, password management guru's, email security kings and offer the most flexible and cost effective IT support for SME's Automated penetration testing from Pcysys, Cycognito and Neuralegion overcomes the limitations of traditional periodic human based penetration testing thus improving and maintaining your security posture. We offer solutions for automated penetration testing of your infrastructure with Pcysys Pentera, your applications with Neuralegion and your Web Attack Surface/Shadow IT with Cycognito . In response to questions related to automated penetration testing a research VP at Gartner is quoted “I think we can risk saying Pen testing as it is today will cease to exist” We work with customers large and small Image British Film Institute Image Image Image Image Data Protection Officer - DPO Services Innovative program - from one day per month - no long term contract - makes having your own DPO affordable. Support Services With no complex on-boarding process we simply take on what you have and run with it. We don’t do ‘packages’ or introduce complexity, our contract is two pages, our price is fixed and our service is top drawer. Automated Penetration Testing Automated Penetration Testing – the bad guys never sleep. It is no longer enough to test once a year or rely on outdated technologies to detect weaknesses and attacks. AI and ML with real-time detection are now must have technologies. Email Security Health Check - FREE 30 seconds is all it takes for this Email Security Health Check and it is FREE. Works for in-house/cloud hosted/O365/GSuite. Test to see which of 17 email bourne threats get through your defences. Security Services From fully managed security awareness training programs and managed email protection systems which automate removal of malicious content to simple endpoint malware we cover the whole spectrum. DMARC - FREE email protection recommended by City of London Police and Global Cyber Alliance It is FREE and just needs to be configured and enabled. It helps protect against phishing, Business Email Compromise, Whaling and Spoofing as well as reducing SPAM Get a Personal Service IT support contracts get a personal service rather than a helpdesk Our range of services, enterprise in class but delivered at an SME price point, are designed to help you protect your data whilst not breaking the bank. Why Amalfitech For SMB and Enterprise Our solutions are tailored to the size of the company whether small, medium or large. Our small and mid-size business solutions are designed with costs and sustainability in mind, so you won’t get offered a low entry point and then get hit with high cost professional services. Everything is upfront, open and above all we are honest. Run by Techies Our customer facing staff are techies. The company is owned by techies. We don’t do high pressure sales. We just offer great advice and service. No Weekend Rates Is your current support company taking you offline during the working day to fix problems, or charging out of hours/weekend rates for services? Our fixed price unlimited, all-inclusive remote support packages have no extra charge for problem solving out of hours or at weekends. . IT Security Specialists and IT Support We are a GDPR and Data protection consultancy, IT security specialists and IT support company for small businesses. We are run by techies for the benefit of techies. Virtual CISO and DPO GDPR, PECR and Compliance Managed Security Internal Fraud Prevention Automated Penetration Testing Security Awareness Training IT Support and Maintenance Cloud Cost and Performance Optimisation The 'IT Sanity Check' for CEO's Image Image IT Solutions We provide new and creative solutions to difficult problems. Our goal is to help you through the minefield of rhetoric and marketing to make the best choice you can make, within your budget and that above all it works. Automated Penetration Testing Attacker and Insider threat Detection Email Phishing Testing, Prevention and Training Email and File Encryption Email/File/SharePoint Backup and Archiving VOIP Unified Endpoint Management OS and Application Containerisation Anti-Malware

Courses matching "Posture"

Show all 253

Pilates - Mixed Ability - ONLINE

By For A Better You - Pilates & Pelvic Floor Health

Pilates is a great way to get your body moving, with low resistance body weight exercises it is suitable for any fitness level. If you work from home or are just wanted to improve yourself then look no further

Pilates - Mixed Ability - ONLINE
Delivered Online + more
£10

Zen Yoga, Thursdays 10am (ONLINE)

By Mark Westmoquette

Join Mark on Thursday mornings to move, explore, and wake up to your true nature. Mark's classes are all about re-connecting the body and mind in order to find a sense of health, integration, freedom and kindness. Most of the time his classes are based around the seasons, since the Chinese energy system is very connected to the time of year and changing seasons.

Zen Yoga, Thursdays 10am (ONLINE)
Delivered Online + more
£9

24-hour Postural Care from Cradle to Grave (Jan - Mar 25)

5.0(1)

By Born at the Right Time

CPD certified, digital study session, 24-hour postural care training, learning new ways to bring excellence to 24-postural care, focussing on supported lying.

24-hour Postural Care from Cradle to Grave (Jan - Mar 25)
Delivered Online + more
£255

Complete Stretching: 30+ Exercises For Flexibility & Posture

By iStudy UK

Stretching is not the most exciting part of your workout process, and as it doesn't really burn many calories, most people tend to neglect proper stretching exercises or avoid doing any. But it is not just about burning calories through extensive workouts and diet programs. So, why should we stretch?  It is crucial to do stretching regularly to enable your body adequate flexibility and build a healthy posture. Stretching is scientifically proven to improve posture, allows your muscles to be flexible, and increase range of motion. It also reduces muscular tension and risk to physical activity-related injury. This Complete Stretching course is designed to help you understand the benefits of stretching and the proper stretching techniques you can incorporate into your schedule to help you improve flexibility, improve functional performance and make your physical activities more efficient and safe. To help you with it, our expert fitness coach will guide you through 30+ stretching exercises in a simple, comprehensive step-by-step process. This course is the only stretching exercise guide you will ever need to be able to perform daily stretching routines that are simple, safe yet highly effective to actually follow through using proven science-based techniques. What you'll learn Increase Flexibility Improve Posture Do The Right Stretches For ALL Important Muscle Groups Stretching Safety & Correct Form Know The Difference Between Static & Dynamic Stretching How To Stretch For Muscle Growth How To Warm Up Correctly Before You Stretch Who is this Course for? If you are a health enthusiast, athlete, planning to get fitter, happier, or anyone looking for safe stretching exercises, this course is perfect for you.  It is also will help physical trainers who want to have a deeper understanding of the science behind stretching and various stretching techniques to benefit from. Requirements Fitness Mat, Rug, or a Soft surface to perform the exercise on. No specific qualifications are required. No prior health or fitness knowledge is assumed. Fully accessible from any internet-enabled smart device. Career Path A healthy body equals a healthy mind. And in contemporary business, physical fitness is perceived as a plus point in many professions. With a better physical self, you will be able to deal with the daily stress that modern life brings. The Internationally recognized CPD Accredited certification received upon course completion will boost up your resume if you are a working professional in the physical health sector or willing to pursue one. Introduction Introduction And Course Overview 00:01:00 Why Everyone Should Stretch Why Everyone Should Stretch 00:04:00 7 Most Common Stretching Mistakes 00:04:00 Stretching Safety 00:04:00 Static Stretching vs. Dynamic Stretching 00:05:00 Daily Stretching Routine 00:03:00 Your Stretching Routine & Strength Training 00:01:00 How To Warm Up Before Lifting Weights 00:03:00 Dynamic Stretching Exercises Arm Cicles Slow 00:01:00 Large Arm Circles 00:01:00 Jumping Jacks 00:01:00 Shoulder Fron Raise 00:01:00 Side Lateral Raises 00:01:00 Hip Circles 00:01:00 Knee Tucks 00:01:00 Squat 00:01:00 Walking Lunges 00:01:00 Side Lunge With Twist 00:01:00 Leg Swings 00:01:00 Double Leg Butt Kick 00:01:00 Normal Butt Kicks 00:01:00 Static Stretching Exercises Bent Over Lat Stretch 00:01:00 Neck Side bend 00:01:00 Standing Shoulder Stretch 00:01:00 Towel Tricep Stretch 00:01:00 Standing Pec Stretch 00:01:00 Bicep Stretch 00:01:00 Lying Abdominal Stretch 00:01:00 Seated Back Twist 00:01:00 Hip Abductor Stretch 00:01:00 Quad stretch 00:01:00 Hamstring Stretch 00:01:00 Calf Stretch 00:01:00 Gluteal Stretch 00:01:00 Outro Outro 00:02:00

Complete Stretching: 30+ Exercises For Flexibility & Posture
Delivered Online On Demand53 minutes
£25

ADVANCED PRESENTATION SKILLS

5.0(4)

By Improving Communications Uk

AS YOU DELIVER THIS INFORMATION, YOU ARE COACHED TO IMPROVE YOUR PUBLIC-SPEAKING STYLE IN THESE (AND A FEW OTHER) AREAS: BODY LANGUAGE, POSTURE, WORD CHOICE, CONFIDENCE, EYE CONTACT, VERBAL TICS/FILLER WORDS, AND VOLUME. You will be coached to overhaul your content and visual aids (frequently PowerPoint) used during the presentation by: stating your purpose clearly, reducing the amount of text on slides, making messages more user-friendly, and choosing best graphics to support message. Attendees Will Be Able To: Increase ability to motivate the audience by delivering organized and engaging presentations; Gain more efficiency by crafting carefully-worded, streamlined messages, free of verbal tics and filler words; Increase enthusiasm through focus on body language and stage presence; and Convince listeners with strong evidence presented in speech and visual aids. Online Format—Advanced Presentation Skills is a 4-hour interactive virtual class for up to six people. Register for this class and you will be sent ONLINE login instructions prior to the class date. The Diversity Sensitivity & Awareness workshop was excellent. It provided a unique approach to addressing the topic. The session was interactive, interesting and very informative, leaving participants with a greater understanding of the merits of diversity and an inspiration to continue to broaden that knowledge base. Sandra Hess Moll, Director of Employment Services / Affirmative Action CoordinatorMcHenry County College

ADVANCED PRESENTATION SKILLS
Delivered Online + more
£395

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Finding your Balance - Yoga for postural awareness - A six week online course.

By Healing With Yoga

Find ease in your posture and your natural balance on this 6 week online Yoga course with Pippa Graham. This is an experiential course that will bring awareness to the key postural structures in your body and integrate a new understanding of alignment and sensation.

Finding your Balance -  Yoga for postural awareness - A six week online course.
Delivered OnlineJoin Waitlist
£76

Back Injury Prevention Training: Workplace Safety Techniques

4.3(43)

By John Academy

Discover effective techniques and strategies to prevent back injuries in the workplace with our comprehensive training course. Learn about ergonomics, proper posture, safe lifting, and exercises to support a healthy back. Enhance workplace safety and reduce injury risks with expert guidance. Enroll now!

Back Injury Prevention Training: Workplace Safety Techniques
Delivered Online On Demand2 hours
£23.99

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495

Computer Workstation Safety: A Comprehensive Guide

4.8(9)

By Skill Up

Boost your digital era well-being with our pivotal guide to Computer Workstation Safety, blending ergonomic mastery with staunch digital defence.

Computer Workstation Safety: A Comprehensive Guide
Delivered Online On Demand27 minutes
£25