• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

453 ESC courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

SHUTTER SPEED CREATIVITY: TOWER BRIDGE, LONDON

By Matthew Williams-Ellis Photography Workshops

A photography workshop on how to use shutter speed creatively, including night photography and light trails. Workshop takes place in Central London.

SHUTTER SPEED CREATIVITY: TOWER BRIDGE, LONDON
Delivered In-Person3 hours, Jun 3rd, 18:00
£99

Managing Conflict

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for any business professional who encounters conflict in the workplace. Overview Recognize the impact of conflict in the workplace by identifying your personal reaction and developing a healthy attitude toward conflict. Analyze conflict by assessing the situation and identifying the source of the conflict. Utilize effective communication techniques to manage conflict in a proactive manner. Resolve conflict by evaluating approaches, and determining and implementing an action plan with the best solution. An organization improves its likelihood of success by effectively managing conflict. As a leader within your organization, you share in that responsibility. This course will help you cultivate the skills necessary to help manage conflict and ultimately to decrease the presence of conflict in the workplace. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. RECOGNIZING THE IMPACT OF CONFLICT * Identify Your Personal Reaction to Conflict * Develop a Healthy Attitude Toward Conflict 2. ANALYZING CONFLICT * Assess the Situation * Identify the Source of the Conflict 3. DEALING WITH CONFLICT * Listen Actively * Communicate Effectively * Respond to Negative Tactics * Avoid Conflict Escalation 4. RESOLVING CONFLICT * Evaluate Approaches to Conflict Resolution * Determine the Best Solution * Implement an Action Plan ADDITIONAL COURSE DETAILS: Nexus Humans Managing Conflict (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing Conflict (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Managing Conflict
Delivered OnlineTwo days, Jun 4th, 13:00
£435

Interpreting Blood Results

By BBO Training

Interpreting Blood Results BBO Training has been inundated with requests for courses following the success of our previous offerings, such as NMP Update, Minor Illness, and Diabetes. In response to this demand, we are delighted to introduce a full-day course on the crucial topic of 'Interpreting Blood Results within Primary Care.' This comprehensive program is tailored for experienced Practice Nurses, ANP's, ENP's, Paramedics, and Pharmacists who seek to enhance their proficiency in this vital area. Course Details: Course Schedule: - 09:15 - Coffee and Registration - 09:30 - Introduction and Course Objectives - 09:45 - The 'Full Blood Count,' Including Anemias and B12 - 11:30 - Coffee Break - 11:50 - The 'LFT' - How to Recognize and Manage Deranged LFTs - 12:30 - Lunch - 13:30 - U&E (Urea and Electrolytes) - 14:15 - Acute Kidney Injury (AKI) - 15:00 - Lipids - 15:45 - Evaluations and Course Conclusion Learning Outcomes: By the end of this course, participants will have achieved the following learning outcomes: 1. Understanding of FBC: Develop the ability to interpret a Full Blood Count (FBC), including knowing when to repeat, escalate, and manage simple anemias effectively. 2.Organ-Blood Test Link: Gain insight into the connections between various organs and their relevant blood tests, fostering a holistic understanding of patient health. 3. Medication-Test Relationship: Review the links between different drug groups and the necessary monitoring required for safe practice and prescribing. 4. Chronic Disease Relevance: Develop an awareness of why specific tests are appropriate within various chronic disease groups, improving patient care. 5. National Guidance Awareness: Examine the connections between national guidance (e.g., NICE) and professional judgment, ensuring adherence to best practices. 6. Professional Development: Enhance your awareness of ongoing development within your practice and uphold professional accountability in this specialized field. Our course is designed to provide valuable Continuing Professional Development (CPD) for GPs, nurses, and pharmacists. It's ideal for professional revalidation, with reflective discussions seamlessly integrated into the program. We look forward to welcoming you to this engaging and informative training session. Join us in advancing your knowledge and expertise in interpreting blood results within the primary care setting.

Interpreting Blood Results
Delivered Online6 hours 30 minutes, Jun 5th, 08:30
£180

5th June Florence Rees #Agent121. Looking for: ADULT FICTION, NON-FICTION

5.0(1)

By I Am In Print

LOOKING FOR: ADULT FICTION, NON-FICTION Florence has been at A M Heath for five years and represents a range of commercial fiction and non-fiction. The authors she represents include Jaspreet Kaur, Salma El-Wardany, Rachel Thompson, Annie Lord, Angelica Malin and Phil Ellis. Their books range from the heart-breaking and profound to the inspirational, funny and wise, with almost everything in between. She’s keen to find non-fiction and fiction writers who speak to a millennial and younger audience, be that a journalist who is looking to expand an idea, a screenwriter who is looking to try their hand at fiction or perhaps an activist with a social media platform.  She’s actively looking for writers who are under-represented in the publishing world, through non-traditional channels, as well as her submissions, and is interested in environmental and social issues. For fiction, she always loves comforting, funny and warm reads, as well as gripping page-turners. She’d love to see any of the above but her favourite thing is to escape with a story she can’t put down. If you think your book fits with that, then do send it to her.  In fiction, books that have really left Florence wanting one more chapter include Marian Keyes’s character, Rachel, from Rachel’s Holiday gifted Florence with a compassion for addiction that only the most skilled of writers can conjure. Florence finds Catherine Newman to be a genuis for making hospice care so funny in We All Want Impossible Things. Smart page turners such as Anatomy of a Scandal, Such a Fun Age and Tomorrow, and Tomorrow, and Tomorrow wowed Florence with clever, gripping prose and complicated, flawed characters she hadn't met before. She also loves older classics like the Cazalet Chronicles and Georgette Heyer’s Regency novels – comforting, funny and warm reads will always her cup of tea. Florence does not wish to receive, YA, Fantasy or Sci-fi.  Florence would like you to submit a covering letter, 1 page synopsis and the first 5,000 words of your manuscript in a single word document.  (In addition to the paid sessions, Florence is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk [agent121@iaminprint.co.uk] to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Friday 31 May 2024

5th June Florence Rees #Agent121. Looking for: ADULT FICTION, NON-FICTION
Delivered Online15 minutes, Jun 5th, 08:20 + 5 more
£72

Training with Birmingham Settlement

By Birmingham Settlement

Birmingham Settlement are running a programme of training sessions between April and July 2024. All sessions are half-a-day and are an excellent opportunity to learn about important topics, starting with Adult Safeguarding on the 18th April.  If you are interested in any of the courses or would like more information, contact our Trainer David Coombes via email david.coombes@bsettlement.org.uk [david.coombes@bsettlement.org.uk] or by phone 07399 560 766. Training Sessions: Adult Safeguarding April 18th 9.15am – 12.30pm (Sports & Community Centre, Kingstanding) Training will include: What is Adult Safeguarding? What is abuse? Categories of abuse. Those most at risk of abuse. Identifying the signs of abuse. Taking safeguarding action. The issue of client consent. Mental Health Awareness April 23rd 9.30am – 12.45pm (Nature & Wellbeing Centre, Ladywood) Training will include: Defining mental health and mental illness. Signs and symptoms of the most common mental health conditions. Identifying and responding to a mental health crisis. Maintaining positive mental wellbeing. How best to support mental health recovery. Trauma Informed Practice May 14th 9.30am – 12.45pm (Nature & Wellbeing Centre, Ladywood) Training will include: What is trauma? Symptoms of trauma. Impact of trauma on children. Understanding the impact of Adverse Childhood experiences. Key principles of trauma informed practice. Managing work stress and undertaking self-care. Professional Boundaries May 23rd 9.15am – 12.30pm (Sports & Community Centre, Kingstanding) Training will include: What are professional boundaries and why are they important? Professional vs Personal boundaries and how they differ. How trauma impacts personal power and the ability to establish boundaries. Signs of boundary violations. How boundaries support wellbeing. Conflict Resolution June 6th 9.15am – 12.30pm (Sports & Community Centre, Kingstanding) Training will include: Defining conflict and exploring the risks vs the benefits of conflict. Looking at anger and aggression. Understanding how the brain responds to threat and danger. Exploring the practical communication strategies effective in the prevention and de-escalation of conflict. Learning to respond rather than react. Equality, Diversity & Inclusion June 11th 9.30am – 12.45pm (Nature & Wellbeing Centre, Ladywood) Training will include: The Equality Act and protected characteristics. Different forms of discrimination. How ‘membership’ of specific groups might bring advantage or disadvantage. Understanding the ‘multi layered’ nature of discrimination. Understanding how diversity and inclusion can positively impact and change what we do. Dementia Awareness July 9th 9.30am – 12.45pm (Nature & Wellbeing Centre, Ladywood) Training will include: What is dementia? The different types of dementia. The signs and symptoms of dementia. Risk reduction strategies. Benefits of early diagnosis. Barriers to diagnosis, treatment, and support. How we can help. Disability Awareness July 18th 9.15 – 12.30pm (Sports & Community Centre, Kingstanding) Training will include: Defining disability, disability as a social construct, non-visible disabilities. Barriers facing those with disabilities and the positive actions and reasonable adjustments we all can make to create more inclusive and less discriminatory environments.

Training with Birmingham Settlement
Delivered In-Person in Kingstanding + 1 more locations3 hours 15 minutes, Jun 6th, 08:15 + 3 more
£50

Level 3 Conflict Management Course

By Canary Wharf Academy

Description: Level 3 Conflict Management Training equips participants with the skills and qualifications to deliver scenario-based conflict management training. Candidates gain insight into conflict dynamics, learning to de-escalate confrontations effectively while maintaining composure. Course Overview: Participants delve into conflict background, triggers, and stages of escalation. Key skills include maintaining composure, managing language and body cues, and addressing angry customer behaviour. Course content covers conflict response strategies, communication techniques, and problem-solving approaches. Key Learning Outcomes: * Identify components of confrontations and conflict escalation stages * Recognize signs of conflict and aggression, maintaining composure in responses * Manage language, body cues, and emotions effectively during conflicts * Employ skills to de-escalate angry customer behaviour and handle abusive situations Course Content Highlights: * Understanding conflict triggers and customer needs * Recognizing signs of aggression and escalating anger * Managing language, body cues, and emotional responses * Structuring conversations and calming situations effectively * Handling unpredictability and abusive behaviour * Designing and delivering conflict management scenarios for training purposes Assessment: Course assessment involves portfolio submission. No formal examination is required. Course Fee: Enroll in the Level 3 Conflict Management course for £319.99, covering all costs. Corporate or Group Booking: Special discounts are available for corporate or group bookings. Arrange training sessions at your location by contacting us. How to Book: Book online via PayPal, debit/credit card, invoice, or bank transfer. Alternatively, visit our office or contact us by phone for assistance. Instant booking confirmation will be provided via email. Assistance Needed? For inquiries or assistance, contact our dedicated team via phone or email. We're here to support you throughout your learning journey. Contact us today for guidance and assistance.

Level 3 Conflict Management Course
Delivered In-PersonFull day, Jun 10th, 09:00 + 1 more
£319.99

SOLD OUT! 12th June Becky Bagnell #Agent121. Looking for: MG, YA

5.0(1)

By I Am In Print

LOOKING FOR: MG, YA Becky Bagnell is the founder of the Lindsay Literary Agency and has been in publishing for over 25 years. She worked as a commissioning editor at Macmillan before becoming a literary agent in 2008. Becky's clients have been published in multiple languages across the world and include the multi-award winning authors, Pamela Butchart, Sue Wallman, Sam Gayton, Larry Hayes and J. M. Joseph. Becky is currently looking for escapist middle grade stories that take the reader on a crazy adventure either real world or fantastical. The ideal story has strong characters, an emotional storyline with an ending that's hopeful but doesn't need to be totally resolved. Diverse fiction would be great and YA with a quirky love story - think Wes Anderson meets John Green. Becky would like you to submit a covering letter, one page synopsis and the first three chapters of your completed manuscript in a single word document. (In addition to the paid sessions, Becky is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk [agent121@iaminprint.co.uk] to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 30 May 2024

SOLD OUT! 12th June Becky Bagnell #Agent121. Looking for: MG, YA
Delivered Online15 minutes, Jun 12th, 14:00 + 5 more
£72

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jun 17th, 13:00 + 5 more
£3495

Introduction to ECG Course (GPT009)

4.6(39)

By Geopace Training

Learn how to perform and read an ECG ... Nationally Recognised Qualification OCN Accredited - Level 3 (advanced level) CPD Accredited - The CPD Certification Service Introduces you to the fundamentals of setting up and operating an ECG machine Includes patient preparation Produce a valid (error free) ECG Learn and understand ECG traces Recognise recordings that require urgent attention Basic understanding of English language required OPEN TO ALL APPLICANTS VIRTUAL CLASSROOM OPTION INCLUDES COMPREHENSIVE PRACTISE@HOME ECG TRAINING KIT Final interpretation of all ECG recordings is the responsibility of a medical professional.

Introduction to ECG Course (GPT009)
Delivered Online or in Milton Keynes + 10 more locations3 hours, Jun 15th, 16:30 + 18 more
£195

Cisco Network Services Orchestrator Advanced Design (NSO300)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is system installers, system integrators, system administrators, network administrators, and solutions designers. Overview At the end of this course, you will be able to: Describe the NSO's transactional application framework and mapping model options Describe the Reactive Fastmap design pattern and the NSO Configuration Database (CDB) subscriber in the NSO Transaction model Simplify packages to remove the need for subscriber applications, scale orchestration solutions, and integrate NSO with external systems (east-west integration)Describe the Cisco ESC architecture and integration with NSO, and how the NSO VNF Orchestration (VNFO) Release 2 bundle interacts with ESC for orchestration This course explores how to create advanced services using the NSO application framework and Python scripting with both new and existing Layer 3 Multiprotocol Label Switching (MPLS) VPN services. Students will also learn how to manage and scale these services, and how to use NSO Network Functions Virtualization (NFV) orchestration features and Cisco Elastic Services Controller (ESC) to manage Virtualized Network Functions (VNFs). CISCO NSO PROGRAMMABILITY * NSO Application Framework * NSO Python Scripting * NSO Python and Template-Based Services * Resources AUGMENTING CISCO NSO SERVICE * Service Lifecycle and Integration Options Overview * Greenfield Layer 3 MPLS VPN Service * Brownfield Layer 3 MPLS VPN Service MANAGED SERVICES * Managed Services Overview * Stacked Service Design Overview * Design-Managed Network Services * Scaling Service Orchestration CISCO NSO NETWORK FUNCTIONS VIRTUALIZATION (NFV) ORCHESTRATION * ETSI MANO * Cisco ESC * Cisco NSO Orchestration ADDITIONAL COURSE DETAILS: Nexus Humans Cisco Network Services Orchestrator Advanced Design (NSO300) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Network Services Orchestrator Advanced Design (NSO300) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Network Services Orchestrator Advanced Design (NSO300)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "ESC"

Show all 386