• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

25397 Courses delivered Online

Working with Elected Members (In-House)

By The In House Training Company

It is important for Officers to understand the roles and responsibilities, processes and procedures involved when working with Elected Members. They also need to appreciate the significance of Elected Members as the decision-makers in local government. Officers have a responsibility to work and communicate with Elected Members effectively. This very successful course is designed to help Officers with this. Note: this is very much an indicative outline. The programme is tailored to the needs of each particular organisation. To provide managers with the knowledge and understanding they need to have productive working relationships with Elected Members and provide appropriate support. By the end of the course participants will: Understand the roles, responsibilities, processes and procedures in place for working with Elected Members Be able to identify the best way to approach potentially sensitive issues Understand the skills and behaviours required for working effectively with Members Be able to deploy their influencing skills more successfully Review their learning and have an action plan to take back and implement at work Note: this is very much an indicative outline. The programme is tailored to the needs of each particular organisation. 1 Introduction Welcome and introductions Objectives and programme overview 2 Working in a political environment What is political awareness? Contact and experience with Members Importance of the role of Members 3 Why be an Elected Member? Perceptions of what Elected Members are and do Values of Members and their motivations for doing what they do 4 Political decision-making in local government Current challenges and drivers affecting the organisation / the council Roles and responsibilities of Officers and Members Centrality of Members' strategic role 5 (Option) A day in the life of an Elected Member An Elected Member gives a talk about what they do 6 Having a beneficial relationship between Officers and Members 7 Member / Officer communication Discussion of the formal processes, service procedures, etc (whether enshrined in a protocol, Memorandum of Understanding, etc) Response times and requirements Procedures required by Heads of Service [if appropriate] 8 Influencing styles and strategies Different forms of power and how they impact Developing an appropriate 'influencing style' Exploring strategies for improving communication and influencing at work 9 Review and evaluation Review and evaluation of learning Personal action plans

Working with Elected Members (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Communicating with others when you've got fatigue

By Pamela Rose - Fatigue Coach

Fatigue journeys vary from person to person - no two experiences are the same. But there's one challenging topic that seems to feature in most people's journeys at one time or another... communication! In this webinar recording I share tips and advice on how to tackle five of the most common conversation challenges when you're on a fatigue recovery journey. How this webinar will help you There are many reasons why conversations with others can be challenging when you've got fatigue - the key one being that fatigue challenges seem to be very difficult to understand (or even believe) if you haven't been through one yourself. And this really doesn't help when it comes to interacting with others - whether that be your loved ones, colleagues, or those you've only just met. I've helped countless people figure out how to communicate with those around them, in ways that don't negatively impact their health - while keeping both parties feeling as positive about the interaction as possible. This has given me a clear view of the most common challenges people face, and the solutions that tend to work best. And that's what I share with you in this recording of a webinar held recently. Of course, conversations are contextual and every single one is unique. But the tips and suggestions I share here can be tailored and customised to many different situations. I can't commit to running this as a live event terribly often, so I recorded the last time I ran it - and now offer it to you to purchase on demand. Meaning you can access this help straight away! Contents A quick introduction! Comms_intro.mov 2 mins101 MB The webinar recording In this 49 minute video, hear me give advice and tips on how to tackle these tricky communication situations: Communicating your situation to those you live with/are close to - in a way that goes well, and doesn't negatively impact your health/symptoms How to talk to people who are 'helpfully' trying to tell you how to cure yourself (when you know it's wrong!) Socialising with friends when you have fatigue Navigating conversations at large events (weddings, parties etc) How to talk to people who don't understand fatigue (or even believe in it) Main event.mp4 49 mins83 MB A copy of the slides I presented Communicating when fatigued0410.pdf 1.38 MB The Q&A digest This is a written capture of the Q&A discussion, held after my main presentation. I didn't record the Q&A in order to allow those who attended live to feel comfortable switching their cameras on and participating in the discussion. I hope you find this written summary helpful. Comms webinar Q&A capture.pdf 65.6 KB

Communicating with others when you've got fatigue
Delivered Online On Demand1 hour
£10

VMware Carbon Black Cloud Audit and Remediation

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Audit and Remediation Identify the architecture and data flows for Carbon Black Cloud Audit and Remediation communication Describe the use case and functionality of recommended queries Achieve a basic knowledge of SQL Describe the elements of a SQL query Evaluate the filtering options for queries Perform basic SQL queries on endpoints Describe the different response capabilities available from VMware Carbon Black Cloud This course teaches you how to use the VMware Carbon Black© Cloud Audit and Remediation? product to build queries for IT hygiene, incident response, and vulnerability assessment to support your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Query Basics Osquery Available tables Query scope Running versus scheduling Recommended Queries Use cases Inspecting the SQL query SQL Basics Components Tables Select statements Where clause Creating basic queries Filtering Results Where clause Exporting and filtering Basic SQL Queries Query creation Running queries Viewing results Advanced Search Capabilities Advanced SQL options Threat hunting Response Capabilities Using live response Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud Audit and Remediation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud Audit and Remediation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud Audit and Remediation
Delivered OnlineFlexible Dates
Price on Enquiry

S4220 SAP Production Planning in SAP S/4HANA

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Application Consultant Business Analyst Business Process Architect Business Process Owner / Team Lead / Power User Data Consultant / Manager Help Desk / COE Support Program / Project Manager Solution Architect System Architect Technology Consultant Trainer Overview Please refer to overview This course will provide you with a deep understanding of the production planning process, how to configure it, and how to apply the concepts of demand management and material requirements planning in SAP S4/HANA. SAP S/4HANA Production Planning Overview Outlining Production Planning in SAP S/4HANA Considering Prerequisites for Production Planning in SAP S/4HANA Master Data for SAP S/4HANA Production Planning Outlining Master Data for SAP S/4HANA Production Planning Prerequisites and Tools for Advanced Planning in SAP S/4HANA Outlining Advanced Planning: PP/DS in SAP S/4HANA Reviewing Master Data for Advanced Planning Activating Advanced Planning Evaluating Alerts with the Alert Monitor Planning Production with the Product View Demand Management in SAP S/4HANA with Planning Strategies Applying Planning Strategies for Make-to-Order Production Applying Planning Strategies for Make-to-Stock Production Advanced Production Planning in SAP S/4HANA Exploring Steps in PP/DS Material Requirements Planning Exploring Heuristics and Functions in PP/DS Applying the PP/DS Planning Run Detailed Scheduling in SAP S/4HANA Exploring Concepts and Principles for Detailed Scheduling Applying transactional Tools for Detailed Scheduling Applying Apps for Detailed Scheduling Using Detailed Scheduling in the Planning Run Using the PP/DS Optimizer Additional course details: Nexus Humans S4220 SAP Production Planning in SAP S/4HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the S4220 SAP Production Planning in SAP S/4HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

S4220 SAP Production Planning in SAP S/4HANA
Delivered OnlineFlexible Dates
Price on Enquiry

Building Successful Work Relationships (Second Edition)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Professionals desiring to improve working relationships and maximize cooperation and productivity will benefit from this course. Overview After completing this workshop, students will be able to: Describe the importance of effective work relationships Identify the interdependencies between you and your colleagues Communicate effectively to create rapport and connect with others Identify and maintain your network of professional relationships Develop collaborative, trust-based relationships that achieve meaningful results In the interdependent workplace, we rely on each other to get things done. A professional network isn?t something we can take for granted ? mapping work relationships can be a complex task and understanding different behavioral styles takes effort - but it pays off! Good working relationships means more than just reducing conflict and misunderstandings. It also means building trust, increasing influence, and benefitting from the knowledge and advice of co-workers and senior managers. This workshop will help you develop relationship building skills so you can communicate who you are, what you need, and why you need it in a way that builds trust, respect, and a professional reputation. The Importance of Work Relationships Expectations of Work Relationships The Value of Relationships Effects of Work Relationships Mapping Your Work Relationships A Network of Relationships Mapping Work Relationships Languages of Appreciation Identifying Interdependencies Clarifying Purpose Systems Thinking Analyzing Independencies Bridging Work Styles Understanding Behavioral Styles Strengths and Trouble Spots Bridging Different Styles Building Your Network Relationships, Communication, and Results Networking Principles Reputation Management Collaborating For Success Understanding Personalities Aspects of Trust Recognizing Blind Spots Additional course details: Nexus Humans Building Successful Work Relationships (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Building Successful Work Relationships (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Building Successful Work Relationships (Second Edition)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black Cloud Enterprise EDR

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of VMware Carbon Black Cloud Enterprise EDR Identify the architecture and data flows for VMware Carbon Black Cloud Enterprise EDR communication Perform searches across endpoint data to discover suspicious behavior Manage watchlists to augment the functionality of VMware Carbon Black Cloud Enterprise EDR Create custom watchlists to detect suspicious activity in your environment Describe the process for responding to alerts in VMware Carbon Black Cloud Enterprise EDR Discover malicious activity within VMware Carbon Black Cloud Enterprise EDR Describe the different response capabilities available from VMware Carbon Black Cloud This course teaches you how to use the VMware Carbon Black© Cloud Enterprise EDR? product and leverage its capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Data Flows and Communication Hardware and software requirements Architecture Data flows Searching Data Creating searches Search operators Analyzing processes Analyzing binaries Advanced queries Managing Watchlists Subscribing Alerting Custom watchlists Alert Processing Alert creation Analyzing alert data Alert actions Threat Hunting in Enterprise EDR Cognitive Attack Loop Malicious behaviors Response Capabilities Using quarantine Using live response Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud Enterprise EDR training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud Enterprise EDR course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud Enterprise EDR
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Threat Intelligence Analyst (C|TIA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration

EC-Council Certified Threat Intelligence Analyst (C|TIA)
Delivered OnlineFlexible Dates
Price on Enquiry

BIT602 SAP Workflow with SAP Fiori

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Application Consultant Business Process Architect Business Process Owner / Team Lead / Power User Developer Development Consultant Enterprise Architect Solution Architect System Architect Technology Consultant Overview This course will prepare you to: Get an overview about the workflow functions and functionality in SAP S/4HANA, S/4HANA Cloud and SAP Cloud Platform Explain the possible extensions of workflows in these technologies You want to learn about the workflow functionality in S/4HANA, S/4HANA Cloud and SAP Cloud Platform? This course provides a business overview of processes, which are working 'right out-of-the box'. It explains possible extensions and comes with several exercises to deepen the theoretical lessons. Introduction Explain workflow @SAP and in SAP S/4HANA Use SAP Fiori My Inbox App, Setup and Configuration Explain the installation and set up of the My Inbox app Access the My Inbox app Add a BWF system as a task provider Add a SAP BPM system as a task provider Use roles for SAP Fiori Define the gateway scenario and catalogs Use the task gateway service Perform further settings Implement BADIs Create dynamic columns for SWF_USER_ATTR Create push notifications for the SAP Fiori Launchpad Flexible Workflow Explain Flexible Workflow Use a Workflow Scenario Explain SAP S/4HANA Cloud workflow Responsibility Management SAP Cloud Platform Workflow Service Use SAP Cloud Platform Workflow for workflow application development Strategy Recommendations and Migration Options Discuss strategy recommendations for enterprise workflow with SAP Discuss migration options for existing workflows Additional course details: Nexus Humans BIT602 SAP Workflow with SAP Fiori training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT602 SAP Workflow with SAP Fiori course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BIT602 SAP Workflow with SAP Fiori
Delivered OnlineFlexible Dates
Price on Enquiry

BC401 SAP ABAP Objects

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Developers, Developer Consultants, Help Desk/COE Support, and Program/Project Managers. Overview Understand the concepts of object-oriented programmingDevelop business applications with ABAP Objects In this course, students will gain an understanding of the concepts of object-oriented programming and develop business applications with ABAP Objects. Introduction to Object-Oriented Programming Explaining the Object-Oriented Programming Model Analyzing and Designing with Unified Modeling Language (UML) Fundamental Object-Oriented Syntax Creating Local Classes Creating Objects Accessing Methods and Attributes Implementing Constructors in Local Classes Implementing Class Constructors in Local Classes Inheritance and Casting Implementing Inheritance Implementing Upcasts Using Inheritance Implementing Polymorphism Using Inheritance Implementing Downcasts Using Inheritance Interfaces and Casting Defining and Implementing Local Interfaces Implementing Polymorphism Using Interfaces Integrating Class Models Using Interfaces Object-Oriented Events Implementing Events in Local Classes Implementing Events in Local Interfaces Object-Oriented Repository Objects Creating Global Classes Defining and Implementing Global Interfaces Implementing Inheritance in Global Classes ABAP Object-Oriented Examples Using the ABAP List Viewer (ALV) Describing Business Add-Ins (BAdIs) Global Classes in ABAP Development Tools Developing Eclipse-Based ABAP Programs Class-Based Exceptions Explaining Class-Based Exceptions Defining and Raising Exceptions Implementing Advanced Exception Handling Techniques Unit Testing Unit Testing with ABAP Unit Object-Oriented Design Patterns Implementing Advanced Object-Oriented Techniques Implementing the Singleton Pattern Implementing Factory Classes Using Friendship Implementing Persistent Objects Runtime Type Services Using Runtime Type Identification (RTTI) Creation of a Comprehensive Object-Oriented Application Developing a Comprehensive Object-Oriented Application Additional course details: Nexus Humans BC401 SAP ABAP Objects training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BC401 SAP ABAP Objects course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BC401 SAP ABAP Objects
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Security Best Practices

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, cloud engineers, including security engineers, delivery and implementation engineers, professional services, and Cloud Center of Excellence (CCOE) Overview In this course, you will learn to: Design and implement a secure network infrastructure Design and implement compute security Design and implement a logging solution Currently, the average cost of a security breach can be upwards of $4 million. AWS Security Best Practices provides an overview of some of the industry best practices for using AWS security and control types. This course helps you understand your responsibilities while providing valuable guidelines for how to keep your workload safe and secure. You will learn how to secure your network infrastructure using sound design options. You will also learn how you can harden your compute resources and manage them securely. Finally, by understanding AWS monitoring and alerting, you can detect and alert on suspicious events to help you quickly begin the response process in the event of a potential compromise. Module 1: AWS Security Overview Shared responsibility model Customer challenges Frameworks and standards Establishing best practices Compliance in AWS Module 2: Securing the Network Flexible and secure Security inside the Amazon Virtual Private Cloud (Amazon VPC) Security services Third-party security solutions Module 3: Amazon EC2 Security Compute hardening Amazon Elastic Block Store (EBS) encryption Secure management and maintenance Detecting vulnerabilities Using AWS Marketplace Module 4: Monitoring and Alerting Logging network traffic Logging user and Application Programming Interface (API) traffic Visibility with Amazon CloudWatch Enhancing monitoring and alerting Verifying your AWS environment Additional course details: Nexus Humans AWS Security Best Practices training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Best Practices course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Security Best Practices
Delivered OnlineFlexible Dates
Price on Enquiry