• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

250 Courses delivered Online

Document Control : Office Skills, Admin, Secretarial & PA Training

By Wise Campus

Document Control: Document Control Course Online Do you wish to strengthen your document control abilities? If so, you are welcome to enrol in our specially created Document Control Course, which is intended to provide participants an in-depth understanding. You will learn about the advantages of document management as well as the document control lifecycle in this Document Control course. The Document Control course also explains how to make a document control system more efficient. Additionally, the Document Control course places a strong emphasis on the underlying expertise, best practices, and legal ideas related to document control. Following your completion of our Document Control programme, you'll be more efficient at work. Join in our Document Control programme to get the skills you need to become more productive and structured. Learning Outcome of Document Control Course After completing the Document Control, learners will know about: Introduction to document control. The basics of document control. Keep document identification as a Document Control expert. Document classifying, filing & information security for Document Controlling. Document Control also explains documents lifecycle and document distribution. Project document control, prepare final documentation controlling and specifications for Document Control in an organisation. The Document Control course teaches electronic document management systems. Interactions with project teams, engineering teams, managers described in other modules of Document Control course. Main Course: Document Control Course Free Courses are including with this Document Control: Document Control Course Along with The Document Control Course, We Offer a free Office Management and Administration Course Along with The Document Control Course, We Offer a free Executive Secretary & PA Training Course Special Offers of this Document Control: Document Control Course This Document Control Course includes a FREE PDF Certificate. Lifetime access to this Document Control Course Instant access to this Document Control Course Get FREE Tutor Support to this Document Control Course Document Control: Document Control Course Online You will learn the fundamentals of document control as well as how to recognize it in this course on document control. The classification and security of the document management system are also covered in the Document management course. Furthermore, the course on document control has a strong emphasis on the document control lifecycle, legal ideas, best practices, and underlying expertise. After completing our Document Control program, you will be more efficient at creating the final paperwork and management. You may manage teams, engineering, and document control as a document control specialist. Who is this course for? Document Control: Document Control Course Online This Document Control course is open to students without any prior understanding of Document Control. Requirements Document Control: Document Control Course Online To enrol in this Document Control: Document Control Course, students must fulfil the following requirements. To join in our Document Control: Document ControlCourse, you must have a strong command of the English language. To successfully complete our Document Control: Document Control Course, you must be vivacious and self driven. To complete our Document Control: Document Control Course, you must have a basic understanding of computers. A minimum age limit of 15 is required to enrol in this Document Control: Document Control Course. Career path Document Control: Document Control Course Online Training in Document Control: document Control is a special chance to develop important abilities and progress your career.

Document Control : Office Skills, Admin, Secretarial & PA Training
Delivered Online On Demand1 hour 6 minutes
£12

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Risk Analysis for Professionals

5.0(10)

By GBA Corporate

Overview The Risk Analysis course is a highly demanded certification for roles in project risk management. It recognizes skills, competency, and competency in assessing and identifying project risks, mitigating threats and capitalising on opportunities, while still possessing core knowledge and practical application in all areas of project management. The risk management specialist role on project teams is becoming more important to an organization's success. This course has been designed to benefit professionals who have the responsibility of regularly making important business decisions and wish to enhance their Risk Management abilities and apply them to their businesses. Upcoming Events Online (USD 2250) Online Streaming Live (Flexible Dates) For more dates and Venue, Please email sales@gbacorporate.co.uk

Risk Analysis for Professionals
Delivered in Internationally or OnlineFlexible Dates
FREE

IUT110 Business Processes in SAP for Utilities

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Managers Project managers Project teams Overview Participants gain an overview of the business processes that can be mapped using SAP for Utilities Customer Relationship and Billing ('CR&B'). The most important customer business processes are introduced briefly using examples. The integration of CR&B with standard SAP components is exemplified. Participants gain an overview of the business processes that can be mapped using SAP for Utilities Customer Relationship and Billing ('CR&B').The most important customer business processes are introduced briefly using examples. The integration of CR&B with standard SAP components is exemplified. Overview CR&B application components Integration of CR&B with standard SAP ERP system Integration of CR&B with standard SAP CRM system Execution of the most important business processes Customer information Customer information with IC Web Client Master data Move-in/out handling Device maintenance Meter reading Billing and invoicing Energy data management Intercompany data exchange Contract accounts receivable and payable Additional course details: Nexus Humans IUT110 Business Processes in SAP for Utilities training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the IUT110 Business Processes in SAP for Utilities course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

IUT110 Business Processes in SAP for Utilities
Delivered OnlineFlexible Dates
Price on Enquiry

U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The audience includes implementers, developers, system administrators, project teams, database administrators and engine project technical teams. The audience also includes consultants that are looking to gain an understanding of Maximo Asset Management 7.6.0.x and the engine. Overview After completing this course, you should be able to perform the following tasks: List the components of Tivoli's process automation engine Understand Maximo modules and applications Understand Tivoli's Process Automation Engine Create the foundation data necessary for Maximo Asset Management Customize the engine database and applications Automate IBM Service Management applications using workflows Use the Maximo Work Centers Use the Integration Framework to import and export data This course is designed for anyone planning to use Maximo Asset Management and Tivoli?s process automation engine with one of the IBM System Management (ISM) products. It is a course that introduces you to the features and functions of both products. IBM Maximo Asset Management Overview This unit focuses on Maximo as an overall product and how Maximo assists companies with their asset management lifecycle. Tivoli Process Automation Engine This unit describes the functions of Tivoli?s process automation engine and introduces the products that are based on the engine. This unit also introduces Start Centers and basic navigation. Architecture and components This unit covers the architecture of Tivoli?s process automation engine. The various components that make up the system are described. The unit will address Java EE servers and the basic use of WebSphere© as it relates to the engine. The unit then covers the organization of the administrative workstation and system properties. The unit briefly describes the setup of the system for using attachments. Foundation Data This unit covers the creation of foundation data for Tivoli?s process automation engine. The foundation data is the software constructs that are necessary in the basic configuration of the product. These constructs include organizations, sites, locations, classifications, and various engine financial configurations. Security Security addresses the need to protect system resources from unauthorized access by unauthenticated users. Resources in the system are protected by Authentication and Authorization. Database architecture This unit illustrates the possible database configurations using the Database Configuration application. It also presents specific command lines that you can run to configure the changes made on the attributes of business objects using the Database Configuration application. Work Management Work Management is a collection of components and products that work together to form a powerful process and work management system. This unit provides a look at work management and focuses on using Work Management to generate, process, and complete work orders. Customizing an application This unit provides an overview of the Application Designer and Migration Manager. You will learn how to change, duplicate and create applications. You will learn the process to move from development, integration testing, user acceptance testing and moving to production. Automation This unit provides a high-level overview of key automation application programs and their functionality. It describes cron tasks, which are used to automate jobs in the system. The unit then discusses various communication tools in the system such as Communication Templates and the E mail Listener application. Finally, automated means of notification using escalations and actions are covered. Workflow This unit focuses on workflow. You learn about the Workflow Designer and its tools. You also learn how to modify an existing workflow and how to manage the included workflows. Reporting This unit provides an overview of the data analysis and reporting options that you can use in the system to analyze data. You create query by example (QBE) reports, result sets, key performance indicators (KPI), and query-based reports (QBRs). Students can optionally review Appendix A to learn how to create a simple enterprise report using Business Intelligence Reporting Tools (BIRT) designer. This report provides an example of how developers create more complex, widely used reports for users. Integration Framework In this unit, a high-level overview of the Integration Framework is provided. The Integration Framework architecture and components are described and basic configuration steps are described. The configuration and steps for loading and exporting data to and from the system are covered. You have the opportunity to practice them also. Budget Monitoring This unit provides information on a new feature introduced in Maximo 7.6.0.8, the Budget Monitoring application. In this application, you can create budget records to monitor transactions in a financial period. Inspection Tools and Tasks This unit introduces the new Inspection application. You can use the Inspections tools to create online inspection forms by using your desktop computer or laptop, and you can use the forms to complete an inspection by using your desktop computer, laptop, or tablet. Troubleshooting This unit focuses on troubleshooting as a systematic approach to solving a problem. The goal is to determine why something does not work as expected and to resolve the problem. It discusses the configuration of logging in the application. It also covers basic troubleshooting techniques, some important component logs, and information about obtaining help from Tivoli Support. Additional course details: Nexus Humans U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

U5TR712 - IBM Maximo Asset Management - System Administration and Development v7.6x
Delivered OnlineFlexible Dates
Price on Enquiry

Commercial awareness for project staff and engineers (In-House)

By The In House Training Company

Nowadays not only do we rely on our commercial and sales staff to hit that bottom line but we expect our engineers and project teams to play their part too - not only through their engineering and management skills but by behaving in a commercially minded way in their dealings with their counterparts in customer or supplier organisations. This means understanding, amongst other things, the issues surrounding the commencement of work ahead of contract, having a clear contract baseline, recognising the broader implications of contract change, the need for timeliness and the consequences of failing to meet the contracted timetable. This practical one-day programme has been designed specifically to give engineers, project staff and others just that understanding. The course is designed principally to provide engineers and project staff with an appreciation of contractual obligations, liabilities, rights and remedies so that they understand the implications of their actions. It is also suitable for business development staff who are negotiating contracts on behalf of the business. The main focus of the day is on creating an awareness of when a situation may have commercial implications that would harm an organisation's business interests if not recognised and handled appropriately and how taking a positive but more commercial approach to those situations can lead to a more positive outcome for the business. As well as providing an understanding of the commercial imperatives the day also focuses on specific areas affecting engineers and project staff, such as the recognition and management of change, the risks when working outside the contract and managing delays in contracts. The course identifies the different remedies that may apply according to the reasons for the delay and provides some thoughts on pushing back should such situations arise. On completion of this programme the participants will: appreciate the need for contractual controls and will have a better understanding of their relevance and how they can be applied, particularly the issues of starting work ahead of contract, implementing changes and inadvertently creating a binding contract by their behaviour; have gained an understanding of the terminology and procedural issues pertaining to contracting within a programme; and be more commercially aware and better equipped for their roles. 1 Basic contract law - bidding and contract formation Purpose of a contract Contract formation - the key elements required to create a legally binding agreement Completeness and enforceability Express and implied terms Conditions v warranties The use of, and issues arising from, standard forms of sale and purchase Use of 'subject to contract' Letters of intent Authority to commit 2 Change management Recognising changes to a contracted requirement Pricing change Implementation and management of change 3 Key contracting terms and conditions By the end of this module participants will be able to identify the key principles associated with: Pricing Getting paid and retaining payment Cashflow Delivery and acceptance Programme delaysExamining some reasons for non-performance...Customer failureContractor's failureNo fault delays ... and the consequences of non-performance: Damages claimsLiquidated damagesForce majeureContinued performance Waiver clauses and recent case law Use of best/reasonable endeavours Contract termination 4 Warranties, indemnities and liability Express and implied warranties Limiting liability 5 Protection of information Forms of intellectual property Background/foreground intellectual property Marking intellectual property Intellectual property rights Copyright Software Confidentiality agreements Internet

Commercial awareness for project staff and engineers (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Project planning and risk management (In-House)

By The In House Training Company

Many organisations find that project teams struggle to create and maintain effective plans. Estimates are often overly optimistic and risks go unmanaged until the inevitable happens. Resource managers also find it hard to forecast the likely loading on their departments and requests for support are not provided in a consistent format. This programme has been developed to address these needs in a very practical, hands-on format. Case study work can be based on simulations or on the organisation's current projects for maximum benefit to participants. The aim of this training is to develop and enhance participants' planning and risk management skills in order to maximise the success of project work undertaken by the organisation. The principal training objectives for this programme are to: Provide a structured, integrated approach to planning and risk management Demonstrate practical tools and techniques for each stage of planning Show how to organise and involve relevant people in the planning process Explain how to use the plan for forecasting and pro-active project control Identify ways to improve planning, both individually and corporately The course will emphasise the importance of participative planning techniques that improve the quality of plans whilst reducing overall time and cost of planning. The course will encourage discussion of internal procedures and practices and may be customised to include them if required. DAY ONE 1 Introduction (Course sponsor) Why this programme has been developed Review of participants' needs and objectives 2 Projects and planning Why plan? The benefits of good planning / penalties of poor planning Planning in the project lifecycle; the need for a 'living' plan The interaction between target setting and the planning process Team exercise: planning the project 3 Planning the plan Defining the application and structure of the plan Impact of planning decisions during the project lifecycle Using available time to create an effective plan 4 Defining deliverables Assessing the context; reviewing the goals and stakeholders Developing the scope and defining deliverables; scope mapping Understanding customer priorities; delivering value for money Case study: defining the project deliverables 5 Creating the work breakdown Building the work breakdown structure Detailing the tasks and sub-tasks; structured brainstorming Defining task ownership; the task responsibility matrix 6 Creating and using a logical network Developing the logical network; task boarding Determining the critical path and calculating float Accelerating the plan; concurrent programming and risk Individual and group exercises DAY TWO 7 Developing resource schedules Deriving the Gantt chart from the network Developing the detailed resource schedules Calculating the expenditure profile ('S' curve) 8 Estimating task durations and costs Understanding estimates: effort, availability and duration Estimating tools and techniques Application of estimating techniques during the project lifecycle 9 Case study Developing the project plan Refining the project plan Team presentations and discussion 10 Managing risks and refining the plan Awareness of contractual issues associated with risk Identifying and evaluating risks; deciding ownership Managing risks: determining levels of provision and contingency Controlling risks: maintaining an up-to date risk register 11 Planning for pro-active control The earned value analysis (EVA) concept and its predictive value Deriving the measures needed for cost and delivery performance Practical issues associated with implementing EVA 12 Using and maintaining the plan Tracking progress and updating the plan Publishing and controlling the plan 13 Course review and transfer planning (Course sponsor present) Identify ways of implementing the techniques learnt Sponsor-led review and discussion of proposals Conclusion

Project planning and risk management (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Be on the Inside: Decode the Jargon of Project Management

By OnlinePMCourses

Understand the Terminology of Modern Project Management with this Handy Guide and Glossary

Be on the Inside: Decode the Jargon of Project Management
Delivered Online On Demand
FREE

Project Management Fundamentals

By OnlinePMCourses

Project Management Template Kit and Checklists

Project Management Fundamentals
Delivered Online On Demand
FREE

Successful project management (In-House)

By The In House Training Company

The aim of this course is to provide an overview of the key principles and techniques for leading and managing project work. It will focus on the core principles and generic methods of project management, showing how these can be applied to typical projects. The scope of the programme includes: The course also emphasises the importance of the leadership and team-working skills needed by project managers and team members in carrying out their roles. The principal training objectives for this programme are to: Explain and demonstrate the key principles of successful project management Demonstrate a range of useful project management tools and techniques Define the role of, and help participants understand the skills required by, the project leader Illustrate the use of project skills through examples and case studies Identify ways to improve project management, both individually and corporately DAY ONE 1 Introduction (Course sponsor) Why this programme has been developed Review of participants' needs and objectives 2 Key concepts and requirements for success Projects and project management Lessons from past projects; the essential requirements for success Differences between projects; characteristic project life cycles The challenges of project management; the role of the project manager Project exerciseA team exercise to demonstrate the challenges of project management 3 Defining project objectives and scope Identifying the stakeholders; key roles and responsibilities Getting organised; managing the definition process Working with the 'customer' to define the project scope 4 Project case study: part 1 Defining the project objectives: syndicate teams define the objectives and scope for a typical project 5 Project planning The nature of planning; recognising planning assumptions Planning the plan; the importance of team involvement Developing the work breakdown structure Estimating task resources, timescales and costs Developing the project schedule Analysing the plan and identifying the critical path 6 Project case study: part 2 Creating the project plan Syndicate teams begin development of their project plans (for completion after session 7) Team presentations and group discussion (after session 7) DAY TWO 7 Managing project risks Understanding and defining project risks Classifying risks and adopting an appropriate risk strategy Identifying, evaluating and managing project risks Agreeing ownership of project risks; the risk register Integrating planning and risk management 8 Project control Pro-active and re-active control; striking the right balance Pre-requisites for effective, pro-active project control Avoiding unnecessary 'scope creep' and controlling change Selecting the data needed to provide early warning of problems Monitoring project performance: 'S' curves, slip charts, earned value Getting good data and assessing project status Defining the roles and responsibilities for control Setting up a routine process for keeping up to date Managing and controlling multiple projects 9 Project case study: part 3 Controlling the project Teams control their project as new developments take place 10 Course review and transfer planning (Course sponsor present) Identify actions to be implemented individually Identify corporate opportunities for improving project management Sponsor-led review and discussion of proposals Conclusion

Successful project management (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Educators matching "Project Team"

Show all 13
Dctr

dctr

5.0(40)

Camberley

DCTR (pronounced like Doctor, we just dropped the o's) is a full service creative agency based in Surrey. We provide the creative services for all sectors in property, home improvement, retail, restaurants, hotels, other agencies and interior designers. There's two sides to us: 1) We're a creative studio that works with clients on a project-by-project, or account basis. 2) We're also a platform - we call it Doctor Photo. You don't have to use the platform to work with us, but for most photo edits and virtual furnishing jobs, we recommend you do. We want you to sell or rent your property at the best possible price - in the fastest time, and truly believe that great property marketing is the unlock to make that happen. Our wonderful team works really hard to create fresh creative and content that puts your consumer at the heart of what we do. Oh and we only work with nice people! 😁 There aren't many marketing agencies where you have the flexibility to order one photo-edit for less than the price of a coffee, as well as work with a full-service project team across CGI, Design & Film. Well none that we're aware of anyway 🤯 We're a team of 15, with a roster of freelance partners at the top of their game - keeping us agile and able to keep to deadlines. We don't really like the term prop-tech, but we do invest thousands every year in our own bespoke software platform and use industry standard tech to create the best quality assets for our clients. We've been rated 'Exceptional' 5 years in a row at the Property EA Masters - an accolade reserved for only 5% of the 600 suppliers out there. Our mums are extremely proud.