• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4517 Courses delivered Online

ISO 27001 Lead Implementer E-Learning Course

5.0(1)

By Cognicert Limited

The “ISO 27001:2022 Lead Implementer ” course provides comprehensive training in the ISO 27001:2022 standard and all its requirements from the Implementer ’s point of view, as well as basic skills necessary to execute the requirements. It’s a practical-oriented training that should be considered “a must” for every ISO 27001:2022 Implementer. This intensive course is specifically designed to participants to serve as ISO 27001:2022 Lead Implementers. The interactive training program, complete with quizzes, will provide the necessary technical knowledge and understanding of all ISO 27001:2022 requirements to implement the requirement of the standard.

ISO 27001 Lead Implementer E-Learning Course
Delivered Online On Demand12 hours
£149.99

Definitive SIP for engineers

5.0(3)

By Systems & Network Training

SIP training course description A hands on course covering IP telephony with SIP. The course starts with a brief review of knowledge students should already possess including RTP and RTCP. The main focus is on SIP though, progressing from what SIP is through SIP signalling, call processing and architectures, moving onto more advanced issues including security, multimedia, and interoperability. Hands-on practicals follow each major theory session. What will you learn Explain how SIP works. Analyse SIP packets. Deploy SIP IP telephony solutions. Integrate SIP with other telephony solutions. SIP training course details Who will benefit: Technical staff working with SIP. Prerequisites: Definitive VoIP for engineers Duration 3 days SIP training course contents VoIP review What is VoIP? Brief review of IP, Brief review of telephones and voice. RTP, RTCP, mixers and translators. Hands on Analysing RTP packets. What is SIP? Why SIP? SIP history, SIP standards, SIP capabilities, key services, how SIP works, and a basic SIP call. Hands on Peer to peer SIP. SIP messages SIP sessions, SIP flows, Message structure, INVITE, ACK, BYE, CANCEL, OPTIONS, REGISTER. Extension methods. Response codes. SIP call flows. Hands on Analysing SIP packets. SIP architectures UA client, UA server, Proxy servers, Redirect servers, registrars. SIP phones, gateways, application servers, and other products. Stateful and stateless servers. Various call scenarios. Hands on SIP proxies. SIP addressing URLs, SIP addresses, registration, Location and Directory servers. Address tracking. Hands on SIP and DNS. Supplementary services SIP signalling, signalling compression, Call hold, Call forwarding, Home and away scenarios, transfers, conferences, call control. Hands on Analysing SIP supplementary services. SDP What is SDP? Multimedia, multimedia session announcement, invitation and others. Relationship with SIP. Hands on Video conferencing with SIP. SIP security Access control, Authentication, encryption, firewalls. Hands on SIP authentication. Interoperability Inter working with PSTN, ISUP to SIP mapping, SIP and 3G, SIP-T, SIP and SIGTRAN. SIP and H323. Hands on SIP and gateways. SIP mobility Terminal mobility, service mobility, personal mobility, Mobile IP, SIP signalling flows in 3G.

Definitive SIP for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

IT Security & Data Analysis Course - CPD Certified

By Wise Campus

IT Security & Data Analysis Course - CPD Certified Open up your IT passion by unlocking our IT security course! Do you want to begin a career as a professional in IT security? Do you want to expand your knowledge about IT security? With the help of this IT Security course, you'll be more determined than ever to advance your professional career and broaden your knowledge in this IT security area. Although they sound similar, information security and IT security refer to different types of security. Information security refers to the practices and tools used to prevent unauthorised access to sensitive corporate data, whereas IT security is the protection of digital data through computer network security. Even though maintaining IT security may be expensive, a significant breach may cost a company far more. This IT Security Course will provide you with a solid foundation so that you can develop the confidence to become an expert in IT Security and acquire more sophisticated skills to fill in the gaps for increased effectiveness and productivity. If you think you have what it takes to enter this IT security field, an IT security course can help you with your initial training and job preparation. IT Security is ready with all the necessary data that is meant to instruct and direct people in the requirements for this position. Don't wait any longer. Enrol in our IT security course to become a certified IT security professional. IT Security & Data Analysis Course - CPD CertifiedCourse This IT Security: IT Security Course includes a FREE PDF Certificate. Lifetime access to this IT Security: IT Security Course Instant access to this IT Security: IT Security Course Get FREE Tutor Support to this IT Security: IT Security Course IT Security & Data Analysis Course - CPD Certified Unlock your career potential with our IT Security course! Ready to dive into the world of IT Security? Our comprehensive IT Security course equips you with essential skills to protect digital data and secure networks. You’ll gain expertise in areas like information security vs. IT Security, learning the differences and critical tools needed for each. This IT Security course prepares you to tackle real-world challenges, understand the financial impacts of security breaches, and become a trusted expert. Don’t miss out—enrol in our IT Security course today and set yourself on the path to becoming a certified IT Security professional! Who is this course for? IT Security & Data Analysis Course - CPD Certified Anyone who wants to work in the IT industry can take our It Security: IT Security course. Requirements IT Security & Data Analysis Course - CPD Certified To enrol in this IT Security Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our IT Security: IT Security Course. Be energetic and self-motivated to complete our IT Security: IT Security Course. Basic computer Skill is required to complete our IT Security: IT Security Course. If you want to enrol in our IT Security: IT Security Course, you must be at least 15 years old. Career path IT Security & Data Analysis Course - CPD Certified Many doors in the job market will be made available by the IT Security course. For instance, an IT technician, a cyber security analyst, or a penetration tester. The average salary for IT security professionals in the UK ranges between £60,000 and £100,000 per annum.

IT Security & Data Analysis Course - CPD Certified
Delivered Online On Demand3 hours 6 minutes
£12

Palo Alto Networks : Strata Foundations

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Security Engineers Network Engineers Support staff Overview This course is intended to provide an understanding of Palo Alto Networks Next-Generation firewall technologies enable the student to perform a basic installation of Palo Alto Networks Next-Generation firewalls. Upon completion of this course, students will be able to: Explain the features and advantages of the Palo Alto Networks next-generation firewall architecture Understand the capabilities of App-ID, Content-ID, and User-ID Perform the basic configuration of the firewall including: Interfaces and virtual routers NAT Policies Security zones Objects Security policies Content security profiles View logs and basic reports This course was formerly named Palo Alto Networks Foundations of Next Generation Firewalls (EDU-150). ** Our foundation classes are just introductory trainings, NOT a full technical training. Your network has expanded beyond your organization\'s boundaries. Cloud locations and remote users (often using personal devices) have \'distributed\' the surface you need to both enable and protect.At the same time, the motivations of attackers and their sophistication have continued to evolve.Palo Alto Networks' next-generation firewalls are all based on a consistent Single-Pass Architecture, enabling security capability that is unique in the industry. This architecture is implemented in a portfolio of both physical and virtual appliances, designed to cover a range of performance and use case requirements.Features and management are consistent across the portfolio. Integration with GlobalProtect? mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with our threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures). WildFire? cloud-based malware analysis environment integration supports a rapid \'feedback loop\' that enables the firewall to stop advanced threats throughout the attack lifecycle. Course Outline Module 0: Introduction Module 1: Platforms & Architecture Module 2: Getting Started Module 3: Basic Administration Module 4: Connectivity Module 5: Security Module 6: Logging & Reporting Additional course details: Nexus Humans Palo Alto Networks : Strata Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Strata Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks : Strata Foundations
Delivered OnlineFlexible Dates
Price on Enquiry

Cybersecurity: Five Common Types of Cyberattacks

5.0(1)

By Enspark

Cybercriminals are increasingly relying on user error to perpetrate attacks. Employees are, therefore, the first line of defense when it comes to protecting your organization. One crucial step in making sure that everyone in your organization is prepared to keep your networks secure is for them to know what attacks look like. The five most common workplace computer attacks are explored in this video, along with how to spot and prevent them. Learning Objectives Identify the various forms of cyber crime and learn how to spot potential risks, enabling you to protect your computer and personal information effectively.;Recognize and respond to the five most common types of attempted cyber security attacks.;Explore the concept of denial of service (DoS) attacks and the dangers of typosquatting, equipping you with the ability to detect potential threats and contribute to overall cybersecurity resilience.

Cybersecurity: Five Common Types of Cyberattacks
Delivered Online On Demand12 minutes
£9.95

Red Hat system administration

5.0(3)

By Systems & Network Training

Red Hat training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Red Hat Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Red Hat training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Red Hat training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Red Hat system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497

Door Supervising Training

4.3(43)

By John Academy

Overview In order to ensure safety and scrutinise everyone who enters through the door, a door supervisor requires a great deal of expertise. So, if you want to seek a career in this area, you must work on yourself first. Our exclusive Door Supervising Training course is the perfect place you can start your training. From the Door Supervising Training course, you will be able to grasp the essentials of this role. The course will teach you the major skills you need for door supervising. Then you will learn the strategies for managing conflict and physical interventions. Further, in the study, you will understand how to ensure health and safety while working. In addition, the course will teach you basic skills to perform first aid treatment. Course Preview Learning Outcomes Acquire the key skills required for door supervising Learn the process of handling conflict in the private security sector Develop the skills required for physical intervention Understand strategies required for ensuring health and safety Build the skills required to perform basic first aid Why Take This Course From John Academy? Affordable, well-structured and high-quality e-learning study materials Meticulously crafted engaging and informative tutorial videos and materials Efficient exam systems for the assessment and instant result Earn UK & internationally recognised accredited qualification Easily access the course content on mobile, tablet, or desktop from anywhere, anytime Excellent career advancement opportunities Get 24/7 student support via email What Skills Will You Learn from This Course? Door Supervising Basic First Aid Who Should Take this Door Supervising Training? Whether you're an existing practitioner or an aspiring professional, this course is an ideal training opportunity. It will elevate your expertise and boost your CV with key skills and a recognised qualification attesting to your knowledge. Are There Any Entry Requirements? This Door Supervising Training course is available to all learners of all academic backgrounds. But learners should be aged 16 or over to undertake the qualification. And a good understanding of the English language, numeracy, and ICT will be helpful. Door Supervising Training Certification After completing and passing the Door Supervising Training course successfully, you will be able to obtain a Recognised Certificate of Achievement. Learners can obtain the certificate in hard copy at £14.99 or PDF format at £11.99. Career Path​ This exclusive Door Supervising Training course will equip you with effective skills and abilities and help you explore career paths such as  Door Supervisor Security Guard Security Manager Bouncer Module 01: Working Within the Private Security Industry Working Within the Private Security Industry 00:25:00 Module 02: Door Supervising: An Introduction Door Supervising An Introduction 00:40:00 Module 03: Door Supervising Key Skills Door Supervising Key Skills 01:00:00 Module 04: Conflict Management for The Private Security Industry Conflict Management for The 00:30:00 Module 05: Physical Intervention Skills Physical Intervention Skills 00:20:00 Module 06: Health and Safety for the Private Security Professionals Health and Safety for the Private Security Professionals 00:30:00 Module 07: Basic First Aid Techniques Basic First Aid Techniques 00:25:00 Assignment Assignment - Door Supervising 00:00:00 Order Your Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Door Supervising Training
Delivered Online On Demand3 hours 50 minutes
£24.99

Computer Networking Course Online

By Hi-Tech Training

Computer Networking Online Virtual Classroom course is designed to enable participants to install, configure and test a fundamental computer network. The opportunities for employment within the area of network support are enormous as businesses continue to grow and utilise the new technology available to them. This is a vital role to ensure the smooth running of businesses reliant on their network and IT systems. This course provides learners with both the practical and theoretical knowledge of networks. During the course, participants will learn about the different components used to create a network including hardware, software and topologie

Computer Networking Course Online
Delivered OnlineFlexible Dates
£85 to £685

Symantec Control Compliance Suite (CCS) 11.0 Administration

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for computer professionals involved with security compliance using CCS 11.0. Overview At the completion of the course, you will be able to: Describe current security risk and compliance challenges. Define methods of proactive security. Describe CCS 11 and how it helps meet security and compliance needs. Describe general CCS 11.0 pre-deployment considerations. Install CCS 11. Perform initial CCS configuration tasks. Import assets and common fields. Describe how to install CCS Agents. Perform data collection and evaluation. Describe the components of standards. Copy and edit standards. Evaluate collected data in terms of a standard. Describe compliance and risk scores. Manage exceptions. Create, edit, and map control statements. Use Controls Studio to eliminate duplication of controls. Describe mandates, policies, and control statements. Build queries to gather data quickly from assets. Add external data integration and configure data connectors. Use CCS reporting features. Create, edit, and manage dashboards. Investigate contingencies using a ?what if?? analysis in dynamic dashboards. This course focuses on defining security controls that govern the enterprise, assess compliance with standards and other mandates, and create reports and dashboards to demonstrate compliance and show deficiencies to multiple audiences. Introduction to CCS 11.0 Overview of Security and Compliance Proactive Security Into to CCS11 Implementing Security and Compliance with CCS 11.0 Installing the CCS Suite General pre-deployment considerations Pre-installation requirements Installation tasks Initial configuration Getting started tasks Preparing for data collection Getting started with CCS 11.0 Importing assets Installing a UNIX Agent Collecting and evaluating data Standards Manager/CVSS and Risk Score Working with standards Assessing compliance with standards Managing exceptions Controls Studio About Controls Studio Working with Controls Studio Ad hoc queries Query building Querying your enterprise External data integration Connecting to external data sources Overview of third-party connectors Reporting and dashboards Reporting overview Working with dynamic dashboards Additional course details: Nexus Humans Symantec Control Compliance Suite (CCS) 11.0 Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Control Compliance Suite (CCS) 11.0 Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Control Compliance Suite (CCS) 11.0 Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Management Complete Course (Operation, HR, Admin, Security, Retail)

4.5(3)

By Studyhub UK

Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents and interests with our special Management Complete Course (Operation, HR, Admin, Security, Retail) Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides professional training that employers are looking for in today's workplaces. The Management Complete Course (Operation, HR, Admin, Security, Retail) Course is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Management Complete Course (Operation, HR, Admin, Security, Retail) Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Management Complete Course (Operation, HR, Admin, Security, Retail) Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At StudyHub, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from StudyHub, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this Management Complete Course (Operation, HR, Admin, Security, Retail)? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Management Complete Course (Operation, HR, Admin, Security, Retail) there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Management Complete Course (Operation, HR, Admin, Security, Retail) course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skill. Prerequisites This Management Complete Course (Operation, HR, Admin, Security, Retail) does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Management Complete Course (Operation, HR, Admin, Security, Retail) was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as bonus, you will be able to pursue multiple occupations. This Management Complete Course (Operation, HR, Admin, Security, Retail) is a great way for you to gain multiple skills from the comfort of your home. Course Curriculum Management Complete Course (Operation, HR, Admin, Security, Retail) Operations Management Introduction to Operations Management 00:23:00 Project Management 00:22:00 Business Development and Succession Planning 00:27:00 Process Management 00:26:00 Supply Chain Management 00:23:00 Planning & Forecasting Operations 00:23:00 Procurement & Purchasing Management 00:23:00 Manufacturing & Delivery Operations 00:19:00 Quality Management 00:23:00 Managing Risk and Recovery 00:29:00 Performance Management 00:21:00 Talent Management 00:20:00 Communication Skills 00:26:00 Negotiation Techniques 00:19:00 Conflict Management 00:17:00 Stress Management 00:19:00 Time Management 00:40:00 Business Environment 00:19:00 Business Writing Skills 00:39:00 HR Management Course Module 01: Introduction to Human Resource 00:17:00 Module 02: Employee Recruitment and Selection Procedure 00:32:00 Module 03: Employee Training and Development Process 00:22:00 Module 04: Performance Appraisal Management 00:19:00 Module 05: Employee Relations 00:14:00 Module 06: Motivation and Counselling 00:19:00 Module 07: Ensuring Health and safety at the Workplace 00:17:00 Module 08 : Employee Termination 00:15:00 Module 09: Employer Record and Statistics 00:11:00 Module 10: Essential UK Employment Law 00:26:00 Administrative Management Module 01: Introduction to Office Administration 00:16:00 Module 02: Skills of an Effective Administrator 00:17:00 Module 03: Business Etiquette 00:21:00 Module 04: Business Telephone Skills 00:21:00 Module 05: Representing Your Boss and Company 00:36:00 Module 06: Mail Services and Shipping 00:27:00 Module 07: Travel Arrangements 00:26:00 Module 08: Organising Meeting and Conferences 00:27:00 Module 09: Organisational Skills 00:27:00 Module 10: Customer Service 00:18:00 Module 11: Effective Planning and Scheduling 00:48:00 Module 12: Invoicing/Petty Cash 00:29:00 Security Management Diploma Module 01: Introduction to Security Management 00:30:00 Module 02: Organisational Security Management 00:26:00 Module 03: Security Risk Analysis and Risk Reduction 00:23:00 Module 04: Physical and Information Security Protection 00:32:00 Module 05: Business Resilience and Crisis Management 00:17:00 Module 06: Cyber Security and Fraud Prevention 00:25:00 Module 07: Security Investigations and Threat Awareness 00:24:00 Module 08: Laws and Regulations 00:25:00 Retail Management Introduction to Retail Management 00:22:00 Retail Strategy 00:13:00 Retail Buying and Merchandising 00:17:00 Retail Pricing 00:32:00 Supply Chain Management in Retailing 00:12:00 The Sales Process and Dealing with Customers at the Checkout 00:10:00 Importance of Consumer Behaviour 00:12:00 Taking Trends and Targeting Customers Effectively 00:11:00 The Importance of Communicating with Customers 00:18:00 Choosing a Retail Location 00:14:00 Retail Psychology 00:13:00 Negotiate the Right Deal with Suppliers 00:12:00 Develop Store Security Procedures 00:16:00 Management Skills for Leading Your Team 00:17:00 Selling in Multiple Channels1 00:21:00 Retail Brand Management 00:16:00 Health & Safety for Retail Stores 00:21:00 Consumer Rights Act 00:15:00 Mock Exam Mock Exam - Management Complete Course (Operation, HR, Admin, Security, Retail) 00:20:00 Final Exam Final Exam - Management Complete Course (Operation, HR, Admin, Security, Retail) 00:20:00

Management Complete Course (Operation, HR, Admin, Security, Retail)
Delivered Online On Demand24 hours
£10.99