• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

37378 Courses delivered Online

China Tourist Welcome Programme

By Centre for Competitiveness

China Tourist Welcome Programme Preparing your Hospitality Business for the Chinese Tourist in 2023 Request a free call with an accredited COTRI practitioner to learn more about how the 'China Tourist Welcome' programme can provide your business with the tools to both attract and appropriately 'welcome' Chinese visitors. Register above for a free session with us and we will contact you to schedule an online call. The COTRI ‘China Tourist Welcome’ (CTW) programme, is a bespoke accredited programme delivered in-company by the Centre for Competitiveness, as Ireland's COTRI Country Partner. Our programme is certified by COTRI, (China Outbound Tourism Research Institute), the world's leading independent research institute for Chinese outbound tourism, and is recognised by Tourism NI, Fáilte Ireland and Tourism Ireland. The training and support programme helps Hotels, Restaurants, Coach Tour Companies and Tourist Destinations, Activities and Products to position themselves at the forefront of the biggest global outbound tourism source market, by understanding the different Chinese market segments, adapt products and services to meet the needs of the Chinese Tourist. It will also provide access to a networking partnership that offers exclusive benefits designed to promote your hospitality & Tourism business in the Chinese marketplace. It is designed for individual organizations or groups of enterprises within a destination, and targets management and team leaders to develop their awareness and competences so that they can create and manage a special ‘Ireland Welcome’ for the Chinese Tourists.  2023 is the Year of the Rabbit and the National Holiday period, or Golden Week for China is from the 1st of October to the 7th of October, so be ’China Ready’ and provide the products & services that meets the needs of this growing tourist market for the Island of Ireland. Want more information? To learn more on how the 'China Tourist Welcome' programme can help your business, register above for a free session with us and we will contact you to schedule an online call.

China Tourist Welcome Programme
Delivered OnlineFlexible Dates
Price on Enquiry

GCSE & IGCSE tuition

By Wessex Tutors & Exam Centre

GCSE & IGCSE one-to-one tuition

GCSE  & IGCSE tuition
Delivered in Southampton or OnlineFlexible Dates
Price on Enquiry

Successful project management (In-House)

By The In House Training Company

The aim of this course is to provide an overview of the key principles and techniques for leading and managing project work. It will focus on the core principles and generic methods of project management, showing how these can be applied to typical projects. The scope of the programme includes: The course also emphasises the importance of the leadership and team-working skills needed by project managers and team members in carrying out their roles. The principal training objectives for this programme are to: Explain and demonstrate the key principles of successful project management Demonstrate a range of useful project management tools and techniques Define the role of, and help participants understand the skills required by, the project leader Illustrate the use of project skills through examples and case studies Identify ways to improve project management, both individually and corporately DAY ONE 1 Introduction (Course sponsor) Why this programme has been developed Review of participants' needs and objectives 2 Key concepts and requirements for success Projects and project management Lessons from past projects; the essential requirements for success Differences between projects; characteristic project life cycles The challenges of project management; the role of the project manager Project exerciseA team exercise to demonstrate the challenges of project management 3 Defining project objectives and scope Identifying the stakeholders; key roles and responsibilities Getting organised; managing the definition process Working with the 'customer' to define the project scope 4 Project case study: part 1 Defining the project objectives: syndicate teams define the objectives and scope for a typical project 5 Project planning The nature of planning; recognising planning assumptions Planning the plan; the importance of team involvement Developing the work breakdown structure Estimating task resources, timescales and costs Developing the project schedule Analysing the plan and identifying the critical path 6 Project case study: part 2 Creating the project plan Syndicate teams begin development of their project plans (for completion after session 7) Team presentations and group discussion (after session 7) DAY TWO 7 Managing project risks Understanding and defining project risks Classifying risks and adopting an appropriate risk strategy Identifying, evaluating and managing project risks Agreeing ownership of project risks; the risk register Integrating planning and risk management 8 Project control Pro-active and re-active control; striking the right balance Pre-requisites for effective, pro-active project control Avoiding unnecessary 'scope creep' and controlling change Selecting the data needed to provide early warning of problems Monitoring project performance: 'S' curves, slip charts, earned value Getting good data and assessing project status Defining the roles and responsibilities for control Setting up a routine process for keeping up to date Managing and controlling multiple projects 9 Project case study: part 3 Controlling the project Teams control their project as new developments take place 10 Course review and transfer planning (Course sponsor present) Identify actions to be implemented individually Identify corporate opportunities for improving project management Sponsor-led review and discussion of proposals Conclusion

Successful project management (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

The Role of Assignment Experts in Study Skills Development

By Roy Butler

Discover how assignment experts enhance study skills, boost academic performance, and provide personalized support to help students succeed in their educational journey. Unlock your potential today!

The Role of Assignment Experts in Study Skills Development
Delivered Online On Demand1 hour
FREE

MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for the Dynamics 365 Supply Chain Management Functional Consultant Expert or those whose role includes implementing and configuring advanced features of Dynamics 365 Supply Chain Management. Overview Objectives: Create products as type Item and Service. Set up product unit conversions. Set up transfer orders Set up default order settings. Create product masters with predefined variants. Create and set up category hierarchies. Create product attributes. Create bill of materials using BOM designer Discrete manufacturing concepts Production order statuses Production stages Bill of materials (BOM) Resources Routes and operations Configure commodity pricing in Supply Chain Management. Configure product compliance in Supply Chain Management. Configure commodity pricing in Supply Chain Management. Configure product compliance in Supply Chain Management. Configure process manufacturing. Create and configure catch weight items. Configure approved vendors. Understand the features in engineering change management. Learn how the end-to-end engineering change management process works. Set up engineering organizations. Work with product versioning. Create dimension groups by using the version dimensions. Create product life cycle states. Use engineering categories. Set up engineering change severities and severity rules. Set up product owners. Use a workflow with engineering change management. Create an engineering change request. Learn about business impacts. Create an engineering change order. Important terminology to help you understand the concepts and processes that are associated with product configuration. Product configuration end-to-end scenario. Different areas that span the product configuration process. The product configuration model. How to build a product configuration model. Configure the costing sheet. Perform BOM calculation and analyze costs by using the costing sheet. IoT intelligence and insights in Supply Chain Management This course is designed to build your in Dynamics 365 Supply Chain Management application knowledge. This course will cover the most important features and functionalities needed by Dynamics 365 Supply Chain Management functional consultant including: The product information and how to configure, create, and manage your product and inventory. Supply chain management configuration and processing. The transportation management features, and the warehouse management features. Asset Management functionalities. Master planning configuration and processing. Sales and procurement processes. Create products and product masters in Dynamics 365 Supply Chain Management Product information workspace Concept of a product Create products Set up unit conversions Batch disposition codes Default order settings Define products as not stocked Create product masters with variants Gain productivity by using the Variant suggestions page Create and set up category hierarchies and attributes Set up item pricing Create bill of materials in Dynamics 365 Supply Chain Management Work with the BOM designer BOM and formula versions BOM line types BOM levels Get started with discrete manufacturing in Dynamics 365 Supply Chain Management Discrete manufacturing life cycle Master planning and planned production orders Bills of materials Working with BOM and item configurations Create a bill of materials Production orders Work with commodity pricing and compliance in Dynamics 365 Supply Chain Management Configure commodity pricing Configure product compliance Configure process manufacturing in Dynamics 365 Supply Chain Management Process manufacturing item types Production type setup Set up packaging and batch attributes Shelf life related setup Item model group, product compliance, and approved vendors Catch weight Transaction adjustments Catch weight item handling policy Catch weight tags Configure approved vendors Get started with Engineering Change Management for Dynamics 365 Supply Chain Management Overview of features End-to-end walkthrough of features Set up versioned products in Dynamics 365 Supply Chain Management Create an engineering organization Create nomenclature for product versions Create product version number rules Create product dimension groups by using the version dimension Create product life cycle states Engineering attributes Product readiness policies Product release policies Create engineering categories Configure engineering change management for Dynamics 365 Supply Chain Management Set up engineering change severities Set up severity rule sets Set up product owners Engineering workflows Request and follow up with product changes in Dynamics 365 Supply Chain Management Engineering change requests Engineering change orders up with product changes in Dynamics 365 Supply Chain Management Get started with product configuration in Dynamics 365 Supply Chain Management Elements of a product configuration model Expression constraints and table constraints in product configuration models Validate and test a product configuration model Finalize a model for configuration Set up a product configuration model Calculations for product configuration models Solver strategy for product configuration Reuse product configurations Release a product configuration model Customize a product configuration model Work with the costing sheet in Dynamics 365 Supply Chain Management Costing versions Cost groups Calculation groups Costing sheets BOM calculations BOM Measurements BOM Reports Configure formulas for process manufacturing in Dynamics 365 Supply Chain Management Formulas, formula lines, and formula versions Formula features Approve and activate formulas and formula versions Use step consumption Coproducts By-products Burden allocation Planning items Get started with production control in Dynamics 365 Supply Chain Management Core concepts in production control Understand unified manufacturing Manufacturing principles Overview of the production process and production life cycle Batch orders Discrete manufacturing Process manufacturing Lean manufacturing Configure production control for unified manufacturing Capacity planning Integration between the General ledger and the Production control modules IoT intelligence and insights Describe the value proposition for mixed-reality Guides for production floor workers Use warehouse management for manufacturing in Dynamics 365 Supply Chain Management Production input location Production output location Staging and order picking Release BOM and formula lines to the warehouse Cross-docking Planned cross docking Visibility into material exceptions Work with manufacturing execution in Dynamics 365 Supply Chain Management Understand the manufacturing executions Identify roles in manufacturing execution Planning consideration for manufacturing execution Configure manufacturing execution Setup time and attendance for manufacturing execution processes Control production with manufacturing execution Create and process report as finished journals with co-products and by-products Calculate and approve raw time registrations Report as finished from the job card device Get started with Asset Management for Dynamics 365 Supply Chain Management Asset Management terminology and concepts Functional locations and assets Assets and work orders Install the Asset Management mobile workspace Use the Asset Management mobile workspace Asset Management integration capabilities Integrate Asset Management with Dynamics 365 Guides Schedule work orders in Asset Management for Dynamics 365 Supply Chain Management Configure workers for work order scheduling Schedule and dispatch work orders Calculate capacity load on scheduled work orders Configure and perform the procure-to-purchase process in Dynamics 365 Supply Chain Management Procurement scenario Overview of the procure-to-purchase process Set up procurement categories Use procurement catalogs Create a purchase requisition Create and process a request for quotation Create purchase orders Vendor categories and catalogs Evaluate a vendor and put a vendor on hold Use purchasing policies Configure activity-based subcontracting and production flow costing in Dynamics 365 Supply Chain Management Subcontracting capabilities Subcontracting a vendor Subcontracting service Transfer activities as subcontracting activities Subcontracting as an alternate resource Cost accounting of subcontracted services Subcontracting cost flow Backflush costing Products and material in Work in Progress Standard cost Costing lean manufacturing Calculation of standard cost Calculate unused quantities Calculation of production variances to standard cost Ledger entries created from processing a production flow Configure and use agreements in Dynamics 365 Supply Chain Management Work with trade agreements Create sales agreements Create purchase agreements Configure trade allowance management Configure brokerage contract management Configure royalty contract management Configure vendor rebates Rebate management module Work with capa Additional course details: Nexus Humans MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-335T00: Microsoft Dynamics 365 Supply Chain Management, Expert
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Administering BIG-IP

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for network administrators, operators, and engineers responsible for managing the normal day-to-day operation and administration of a BIG-IP application delivery network. This course presents the prerequisite knowledge for many other of F5's BIG-IP instructor-led training courses. Overview Getting started with the BIG-IP system Traffic processing with BIG-IP Local Traffic Manager (LTM) Using the TMSH (TMOS Shell) command line interface Using NATs and SNATs Monitoring application health and managing object status Modifying traffic behavior with profiles, including SSL offload and re-encryption Modifying traffic behavior with persistence, including source address affinity and cookie persistence Troubleshooting the BIG-IP system, including logging (local, high-speed, and legacy remote logging), and using tcpdump User roles and administrative partitions vCMP concepts Customizing application delivery with iRules This course gives network administrators, network operators, and network engineers a functional understanding of the BIG-IP system as it is commonly deployed in an application delivery network. The course introduces students to the BIG-IP system, its configuration objects, how it processes traffic, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions. Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Configuring the Management Interface Activating the Software License Provisioning Modules and Resources Importing a Device Certificate Specifying BIG-IP Platform Properties Configuring the Network Configuring Network Time Protocol (NTP) Servers Configuring Domain Name System (DNS) Settings Configuring High Availability Options Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Traffic Processing Building Blocks Identifying BIG-IP Traffic Processing Objects Configuring Virtual Servers and Pools Load Balancing Traffic Viewing Module Statistics and Logs Using the Traffic Management Shell (TMSH) Understanding the TMSH Hierarchical Structure Navigating the TMSH Hierarchy Managing BIG-IP Configuration State and Files BIG-IP System Configuration State Loading and Saving the System Configuration Shutting Down and Restarting the BIG-IP System Saving and Replicating Configuration Data (UCS and SCF) Using NATs and SNATs Address Translation on the BIG-IP System Mapping IP Addresses with NATs Solving Routing Issues with SNATs Configuring SNAT Auto Map on a Virtual Server Monitoring for and Mitigating Port Exhaustion Monitoring Application Health Introducing Monitors Types of Monitors Monitor Interval and Timeout Settings Configuring Monitors Assigning Monitors to Resources Managing Pool, Pool Member, and Node Status Using the Network Map Modifying Traffic Behavior with Profiles Introducing Profiles Understanding Profile Types and Dependencies Configuring and Assigning Profiles Introducing SSL Offload and SSL Re-Encryption Managing Object State Modifying Traffic Behavior with Persistence Understanding the Need for Persistence Introducing Source Address Affinity Persistence Managing Object State Administering the BIG-IP System Configuring Logging Legacy Remote Logging Introducing High Speed Logging (HSL) High-Speed Logging Filters HSL Configuration Objects Configuring High Speed Logging Using TCPDUMP on the BIG-IP System Leveraging the BIG-IP iHealth System Viewing BIG-IP System Statistics Defining User Roles and Administrative Partitions Leveraging vCMP Configuring High Availability Introducing Device Service Clustering (DSC) Preparing to Deploy a DSC Configuration Configuring DSC Communication Settings Establishing Device Trust Establishing a Sync-Failover Device Group Synchronizing Configuration Data Exploring Traffic Group Behavior Understanding Failover Managers and Triggers Achieving Stateful Failover with Mirroring

F5 Networks Administering BIG-IP
Delivered OnlineFlexible Dates
Price on Enquiry

Developing on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Intermediate software developers Overview In this course, you will learn to: Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript Interact with AWS services and develop solutions by using the AWS SDK Use AWS Identity and Access Management (IAM) for service authentication Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as data stores Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions Use Amazon Cognito for user authentication Use Amazon ElastiCache to improve application scalability Leverage the CI/CD pipeline to deploy applications on AWS In this course, you learn how to use the AWS SDK to develop secure and scalable cloud applications using multiple AWS services such as Amazon DynamoDB, Amazon Simple Storage Service, and AWS Lambda. You explore how to interact with AWS using code and learn about key concepts, best practices, and troubleshooting tips. Module 0: Course Overview Agenda Introductions Student resources Module 1: Introduction to AWS Introduction to the AWS Cloud Cloud scenarios Infrastructure overview Introduction to AWS foundation services Module 2: Introduction to Developing on AWS Getting started with developing on AWS Introduction to developer tools Introduction to management tools Module 3: Introduction to AWS Identity and Access Management Shared responsibility model Introduction to IAM Use authentication and authorization Module 4: Introduction to the Lab Environment Introduction to the lab environment Lab 1: Getting started and working with IAM Module 5: Developing Storage Solutions with Amazon Simple Storage Service Overview of AWS storage options Amazon S3 key concepts Best practices Troubleshooting Scenario: Building a complete application Lab 2: Developing storage solutions with Amazon S3 Module 6: Developing Flexible NoSQL Solutions with Amazon DynamoDB Introduction to AWS database options Introduction to Amazon DynamoDB Developing with DynamoDB Best practices Troubleshooting Scenario: Building an end-to-end app Lab 3: Developing flexible NoSQL solutions with Amazon DynamoDB Module 7: Developing Event-Driven Solutions with AWS Lambda What is serverless computing? Introduction to AWS Lambda Key concepts How Lambda works Use cases Best practices Scenario: Build an end-to-end app Module 8: Developing Solutions with Amazon API Gateway Introduction to Amazon API Gateway Developing with API Gateway Best practices Introduction to AWS Serverless Application Model Scenario: Building an end-to-end app Lab 4: Developing event-driven solutions with AWS Lambda Module 9: Developing Solutions with AWS Step Functions Understanding the need for Step Functions Introduction to AWS Step Functions Use cases Module 10: Developing Solutions with Amazon Simple Queue Service and Amazon Simple Notification Service Why use a queueing service? Developing with Amazon Simple Queue Service Developing with Amazon Simple Notification Service Developing with Amazon MQ Lab 5: Developing messaging solutions with Amazon SQS and Amazon SNS Module 11: Caching Information with Amazon ElastiCache Caching overview Caching with Amazon ElastiCache Caching strategies Module 12: Developing Secure Applications Securing your applications Authenticating your applications to AWS Authenticating your customers Scenario: Building an end-to-end app Module 13: Deploying Applications Introduction to DevOps Introduction to deployment and testing strategies Deploying applications with AWS Elastic Beanstalk Scenario: Building an end-to-end app Lab 6: Building an end-to-end app Module 14: Course wrap-up Course overview AWS training courses Certifications Course feedback

Developing on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

Understanding Behaviors and Personality Types Using the DISC Assessment

By Nexus Human

Duration 2 Days 12 CPD hours Overview Create heightened self-awareness and personal discovery Establish a space of mutual respect by adapting your communication Work with resistance to gain commitment and buy-in Recognize and enhance trust by leading from any position Distinguish among varying attitudes and behaviors to make your teams work as a stronger unit One of DISC?s most intriguing applications is leveraging behavioral identification and adaptability. This workshop will guide you on the path of heightened self-awareness and personal discovery. You can make this your cornerstone seminar, revealing your unique behavioral style blend and how to apply that knowledge prescriptively to others, based on their style blend; thus boosting communication effectiveness. Studies indicate that 92% of workplace conflict is the result of misunderstanding and communication breakdowns. Your entire organization can apply DISC?s prescriptive lessons of behavioral adaptability to reduce employee conflict and turnover, increase productivity, and optimize team performance. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. Understanding The World Of Disc What is DISC? Breaking down the four main styles: Dominant Influencing Steady Conscientious Determining behaviors to read styles: Indirect vs. Direct Open vs. Guarded 2. Building Stronger Self-Awareness Rating your own style Understanding the Platinum Rule Grid Breaking down your profile Natural Style Adapted Style 3. Reading And Adapting To Others? Behaviors Applying the Platinum Rule Identifying characteristics in others Communication strategies with others Adapting your approaches 4. Getting Buy-In From Others Selling yourself to others Getting buy-in from each profile Understanding the cycle of getting buy-in Assessing Solving Confirming agreement Assuring satisfaction 5. Trust-Based Leadership High performance leadership characteristics The key to listening to build trust Motivating strategies with each profile 6. Making Teams Work Understanding how we each make decisions Seeing the power in each style as a role Blending team styles for teamwork Reviewing the team needs to optimize effectiveness

Understanding Behaviors and Personality Types Using the DISC Assessment
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Data Centre Risk Professional (CDRP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for There is no specific prerequisite for the CDRP© course. However, participants who have at least three years' experience in a data centre and/or IT infrastructures will be best suited. Overview After completion of the course, the participant will be able to: 1. Understand the different standards and methodologies for risk management and assessment 2. Establish the required project team for risk management 3. Perform the risk assessment, identifying current threats, vulnerabilities and the potential impact based on customised threat catalogues 4. Report on the current risk level of the data centre both quantitative and qualitative 5. Anticipate and minimise potential financial impacts 6. Understand the options for handling risk 7. Continuously monitor and review the status of risk present in the data centre 8. Reduce the frequency and magnitude of incidents 9. Detect and respond to events when they occur 10. Meet regulatory and compliance requirements 11. Support certification processes such as ISO/IEC 27001 12. Support overall corporate and IT governance Introduction to Risk Management Risk management concepts Senior management and risk Enterprise Risk Management (ERM) Benefits of risk management Data Centre Risk and Impact Risk in facility, power, cooling, fire suppression, infrastructure and IT services Impact of data centre downtime Main causes of downtime Cost factors in downtime Standards, Guidelines and Methodologies ISO/IEC 27001:2013, ISO/IEC 27005:2011, ISO/IEC 27002:2013 NIST SP 800-30 ISO/IEC 31000:2009 SS507:2008 ANSI/TIA-942 Other methodologies (CRAMM, EBIOS, OCTAVE, etc.) Risk Management Definitions Asset Availability/Confidentiality/Integrity Control Information processing facility Information security Policy Risk Risk analysis/Risk assessment/Risk evaluation/ Risk treatment Threat/Vulnerability Types of risk Risk Assessment Software The need for software Automation Considerations Risk Management Process The risk management process Establishing the context Identification Analysis Evaluation Treatment Communication and consultation Monitoring and review Project Approach Project management principles Project management methods Scope Time Cost Cost estimate methods Context Establishment General considerations Risk evaluation, impact and acceptance criteria Severity rating of impact Occurrence rating of probability Scope and boundaries Scope constraints Roles & responsibilities Training, awareness and competence Risk Assessment - Identification The risk assessment process Identification of assets Identification of threats Identification of existing controls Identification of vulnerabilities Identification of consequences Hands-on exercise: Identification of assets, threats, existing controls, vulnerabilities and consequences Risk Assessment - Analysis and Evaluation Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Risk evaluation Hands-on exercise: Assessment of consequences, probability and estimating level of risk Risk Treatment The risk treatment process steps Risk Treatment Plan (RTP) Risk modification Risk retention Risk avoidance Risk sharing Constraints in risk modification Control categories Control examples Cost-benefit analysis Control implementation Residual risk Communication Effective communication of risk management activities Benefits and concerns of communication Risk Monitoring and Review Ongoing monitoring and review Criteria for review Risk scenarios Risk assessment approach Data centre site selection Data centre facility Cloud computing UPS scenarios Force majeure Organisational shortcomings Human failure Technical failure Deliberate acts Exam: Certified Data Centre Risk Professional Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified Data Centre Risk Professional (CDRP)
Delivered OnlineFlexible Dates
Price on Enquiry

What is Stress and what is burnout? What are some of the very real physical symptoms that we experience and how do we counteract these. This session takes the time to explore what is going on in our bodies and minds at times of stress and looks at some ways to bring balance back to our systems.

Stress & Burnout
Delivered OnlineFlexible Dates
Price on Enquiry