• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

489 Intelligence courses delivered Live Online

VMware Carbon Black EDR: Install, Configure, Manage [V7.x]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security analyst, threat hunters, or incident responders Security professionals who work with enterprise and endpoint security tools Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of a Carbon Black EDR implementation Perform the installation, upgrade, and configuration of the Carbon Black EDR server Describe the purpose and use of multiple datastores in the server Perform live queries across endpoints to gather additional data Perform effective searches across the dataset to find security artifacts related to the endpoints Manage Threat Intelligence Feeds and Watchlists Describe connectors in Carbon Black EDR Troubleshoot server and sensor problems Analyze data found in the Heads-Up Display Manage investigations to group and summarize security incidents and artifacts Perform the different response capabilities available to users in Carbon Black EDR Use the Carbon Black EDR API to automate tasks This three-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in installing, configuring, and managing the VMware Carbon Black© EDR? environment. This course introduces you to product features, capabilities, and workflows for managing endpoint security. Hands-on labs enable learners to reinforce topics by performing operations and tasks within the product in a training environment. Course Introduction Introductions and course logistics Course objectives Planning and Architecture Describe the architecture and components of Carbon Black EDR Identify the communication requirements for Carbon Black EDR Server Installation, Upgrade, and Administration Install the Carbon Black EDR server Describe the options during the installation process Install a Carbon Black EDR sensor Confirm data ingestion in the Carbon Black EDR server Identify built-in administration tools Manage sensor groups Manage users and teams Server Datastores Describe the datastores used in Carbon Black EDR Interact with the available datastores Live Query Describe live query capabilities Perform queries across endpoints Searching and Best Practices Describe the capabilities and data available in the process search Perform process searches to find specific endpoint activity Describe the capabilities and data available in the binary search Perform binary searches to find application data Describe the query syntax and advanced use cases Perform advanced queries across the dataset Threat Intelligence Feeds and Watchlists Define Threat Intelligence Feeds Manage the available Threat Intelligence Feeds Describe the use of Watchlists Manage Watchlists in the environment Connectors in Carbon Black EDR Configure connectors in Carbon Black EDR Troubleshoot connectors Troubleshooting Identify the available troubleshooting scripts in the Carbon Black EDR server Run troubleshooting scripts to identify problems Generate a sensor log bundle Identify the location of sensor registry keys Head-Up Display Identify panels relating to endpoint data Analyze endpoint data provided by the panels Identify panels relating to operations data Analyze operations data provided by the panels Identify panels relating to server data Analyze server data provided by the panels Define alert generation in Carbon Black EDR Manage alerts Investigations Describe investigations Explore data used in an investigation Manage investigations Manage investigation events Responding to Endpoint Incidents Describe isolation in Carbon Black EDR Manage isolating endpoints Describe live response capabilities Manage live response sessions Describe hash banning Manage banned hashes Overview of Postman and the Carbon Black EDR API Explain the use of the API Differentiate the APIs available for Carbon Black EDR Explain the purpose of API tokens Create an API token Explain the API URL Create a valid API request Import a collection to Postman Initiate an API request from Postman Perform operations manually using Postman Analyze the use cases for Postman Show basic automation tasks using the API and curl Compare the usage of curl with Postman Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR: Install, Configure, Manage [V7.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR: Install, Configure, Manage [V7.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black EDR: Install, Configure, Manage [V7.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec ProxySG 6.6 Basic Administration (BCCPA)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The ProxySG 6.6 Basic Administration course is intended for students who wish to master the fundamentals of the ProxySG. It is designed for students who have not taken any previous training courses about the ProxySG. Overview Describe the major Secure Web Gateway functions of the ProxySG.License and configure a ProxySG.Deploy a ProxySG in either explicit or transparent mode.Use the Visual Policy Manager to write policies to manage web filtering, authentication, and SSL traffic management.Use ProxySG access logs to generate reports. The ProxySG 6.6 Basic Administration course is an introduction to deployment options and management of the individual key features offered using the ProxySG 6.6 solution. Introduction to the Symantec ProxySG Secure Web Gateway Describe the functions of a proxy server Differentiate proxy servers from firewalls Describe the key features and benefits of the ProxySG List the various ProxySG models Access online Symantec community resources ProxySG Security Deployment Options Describe the three network deployment methods Describe the three possible roles of the ProxySG ProxySG Management Console Describe the relationship between the Management Console and the ProxySG CLI Describe the primary function of the major areas of the Management Console Use the Management Console to access on-box help and Symantec product documentation Traffic Interception Using Proxy Services Understand the functions of proxy services, listeners, and proxy types Describe the three most common proxy services Explain how the intercept and bypass settings affect what happens to network traffic passing through the ProxySG Explain the function of common global proxy service settings Hypertext Transfer Protocol Understand how a connection is initiated over the transport layer Identify the components of an HTTP URL Explain the two types of HTTP messages: request and response Identify common response codes Introduction to the Visual Policy Manager Describe the relationship among the VPM, CPL, and the Management Console Describe the default processing order for policy layers and rules Describe triggers and actions that can be used in writing policy Identify the types of objects that the VPM supports Describe some of the best practices to be followed when using the VPM to create policy Filtering Web Content Describe the main concepts of web filtering Describe the primary category databases Describe the category types available to policy Describe how WebFilter and WebPulse work together Using Threat Intelligence to Defend the Network Understand Intelligence Services as provided by the Global Intelligence Network Understand Geolocation and Threat Risk Levels and how they can be used in policy Ensuring Safe Downloads Describe how malware can be transmitted via HTTP Explain the methods, advantages, and disadvantages of file type detection Describe some of the considerations in deciding what content to block as possible malware sources Notifying User of Internet Usage Policies Explain the function and various components of built-in and custom exception pages Describe the function of Notify User objects Identify the types of pages that can be sent to users by using Notify User objects Describe splash pages and coaching pages using Notify User objects in the VPM Access Logging on the ProxySG Describe, at a high level, how the ProxySG performs access logging Describe the components of a ProxySG access log facility Identify default log facilities and log formats Describe common use cases for periodic and continuous uploading of access logs

Symantec ProxySG 6.6 Basic Administration (BCCPA)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black EDR Administrator

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of the Carbon Black EDR server Identify the architecture and data flows for Carbon Black EDR communication Describe the Carbon Black EDR server installation process Manage and configure the Carbon Black EDR sever based on organizational requirements Perform searches across process and binary information Implement threat intelligence feeds and create watchlists for automated notifications Describe the different response capabilities available from the Carbon Black EDR server Use investigations to correlate data between multiple processes This course teaches you how to use the VMware Carbon Black© EDR? product and leverage the capabilities to configure and maintain the system according to your organization?s security posture and policies. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs. Course Introduction Introductions and course logistics Course objectives Planning and Installation Hardware and software requirements Architecture Data flows Server installation review Installing sensors Server Administration Configuration and settings Carbon Black EDR users and groups Process Search and Analysis Filtering options Creating searches Process analysis and events Binary Search and Banning Binaries Filtering options Creating searches Hash banning Search best practices Search operators Advanced queries Threat Intelligence Enabling alliance feeds Threat reports details Use and functionality Watchlists Creating watchlists Use and functionality Alerts / Investigations / Response Using the HUD Alerts workflow Using network isolation Using live response

VMware Carbon Black EDR Administrator
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Network Defender (C|ND) v.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Administrators Network security Administrators Network Security Engineer Network Defense Technicians CND Analyst Security Analyst Security Operator Anyone who involves in network operations Overview A dedicated focus on IoT security Network virtualization practices for the remote workforce Enhanced Cloud Security & IoT and Operational Technology (OT) Modules Introduction to threat intelligence In-depth Attack Surface Analysis Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the National Infocomm Competency Framework (NICF) as well as a job-task analysis and cybersecurity education framework by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and to the Department of Defense (DoD) job roles for system/network administrators. The program prepares network administrators how to identify what parts of an organization need to be reviewed and tested for security vulnerabilities and how to reduce, prevent, and mitigate risks in the network. CND covers the protect, detect, respond and predict approach to network security. Course Outline Network Attacks and Defense Strategies Administrative Network Security Technical Network Security Network Perimeter Security Endpoint Security-Windows Systems Endpoint Security-Linux Systems Endpoint Security- Mobile Devices Endpoint Security-IoT Devices Administrative Application Security Data Security Enterprise Virtual Network Security Enterprise Cloud Network Security Enterprise Wireless Network Security Network Traffic Monitoring and Analysis Network Logs Monitoring and Analysis Incident Response and Forensic Investigation Business Continuity and Disaster Recovery Risk Anticipation with Risk Management Threat Assessment with Attack Surface Analysis Threat Prediction with Cyber Threat Intelligence

EC-Council Certified Network Defender (C|ND) v.2
Delivered OnlineFlexible Dates
Price on Enquiry

Leadership - turning values into action (In-House)

By The In House Training Company

A question of trust. Leadership implies followership. And that means trust. Because who's going to follow a leader they don't trust? This programme takes a values-driven approach to leadership. It gets current and aspiring leaders to hold up the mirror to themselves and to see their reflections as leaders of people. It asks them whether what they see justifies their view of themselves as leaders. It helps them understand just what it takes to be an effective leader. And it does so in a highly practical, constructive manner. It helps the course participants to truly understand the core skills of effective leadership. It focuses on the difference between leadership and management, defining what high performing teams do and how they do it. It helps people to see their teams from different perspectives, allowing them to adapt their styles to maximise team outputs. And it explores concepts such as emotional intelligence, authentic leadership and the RAIV approach (relationships-achievement-independence-vocation) to help explore underlying values and use them to drive effective leadership. Because what worth do our values have unless we put them into practice? The course will help you:• Appreciate the key skills a leader needs to be effective• Understand what the organisation expects of you as a leader• Recognise your leadership style and the impact it has on others• Consider your role models - who inspires you?• See leadership from the 'followers' perspective - how do you like to be led?• Discover what holds you back - limiting beliefs• Examine your core values -do they support your ambition?• Explore the concept of Emotional Intelligence - how do we manage ourselves?• Discover how to lead through change• Explore the concept of 'Authentic Leadership' - consider how it can work for you• Practice some of the skills essential to motivating and influencing for success• Use the RAIV approach to generating enthusiasm and commitment• Plan how best to 'walk the leadership talk' - in your role, in your organisation Above all, this course will help you put theory into practice, values into actions, in a mature, considered, effective way. Day 1 1 Welcome and introduction Participants are welcomed to the programme and invited to share their personal objectives and people challenges Participants given an action plan template to complete throughout the workshop Participants required to bring an inspirational quote to share with the group 2 What is leadership? The concept of 'leadership' The role of a leader Skills assessment for all participants# Leadership v Management Assess your team effectiveness 3 Your leadership style Leadership questionnaire You and your role models Push v Pull styles of leadership Empowerment v Control Team goals and role profiling Day 2 1 You, the leader Your core values Your communication style Situational leadership The Emotional Bank Account Buy Me Today 2 Are you Emotionally Intelligent? (EI) What is emotional intelligence? Self-assessment exercise Manage your emotions Nine strategies for promoting EI 3 Leading through change Identify the major changes affecting you / your team Types of change The roles of resistance How safe are you to talk to? Forcefield Analysis Day 3 1 Authentic Leadership (AL) What is AL? Managing perceptions is managing their truth A leadership challenge 2 Motivating and influencing for success What motivates you? Motivational theory Leading by example Influencing skills required Influencing styles The influence challenge! 3 Creating enthusiasm and commitment The RAIV approach (relationships-achievement-independence-vocation) Building self-worth What drives your team? Your leadership legacy Your commitment to leadership

Leadership - turning values into action (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Data storytelling

By Fire Plus Algebra

Data has become the most important resource for every organisation – but the insights gained from data analysis will only ever be truly valuable if they can be clearly expressed to other people.  This course is for anybody who works with data, and needs to communicate the meaning that's in the numbers to colleagues, customers, bosses or external stakeholders.  It will give you or your team the confidence and skills to translate raw data into compelling visual stories for your key audiences. The principles and skills covered apply to the simplest PowerPoint chart, to more complex interactive visualisations.  We’ll work with you before the course to ensure that we understand your organisation and what you’re hoping to achieve.  Sample learning content Session 1: What makes a great data-driven story The key elements of a successful infographic or presentation. Industry best practice, and discussion of good (and bad) examples. A simple framework for identifying the Audience, Story and Action. Session 2: Data in context How to balance function and aesthetic appeal. Identifying the right graph, chart, infographic or other visual. Framing the data and providing contextual information. Session 3: Designing for the human brain Using colours to add emphasis and meaning. Design and layout principles, and creating hierarchies of information. The principle of ‘self-sufficiency’, and removing clutter. Session 4: Navigation and narrative Tailoring visualisations for different types of communications. Structuring presentations and longer reports. Thinking in layers to create interactive dashboards. Delivery We deliver our courses over Zoom, to maximise flexibility. The training can be delivered in a single day, or across multiple sessions. All of our courses are live and interactive – every session includes a mix of formal tuition and hands-on exercises. To ensure this is possible, the number of attendees is capped at 16 people.  Tutor Alan Rutter is the founder of Fire Plus Algebra. He is a specialist in communicating complex subjects through data visualisation, writing and design. He teaches for General Assembly and runs in-house training for public sector clients including the Home Office, the Department of Transport, the Biotechnology and Biological Sciences Research Council, the Health Foundation, and numerous local government and emergency services teams. He previously worked with Guardian Masterclasses on curating and delivering new course strands, including developing and teaching their B2B data visualisation courses. He oversaw the iPad edition launches of Wired, GQ, Vanity Fair and Vogue in the UK, and has worked with Condé Nast International as product owner on a bespoke digital asset management system for their 11 global markets.
 Testimonial “I was familiar with Alan’s work as a Guardian Masterclass instructor on data visualisation and digital journalism, which made it easy for me to recommend him for onsite training at the Liverpool School of Tropical Medicine. We had a large group of people interested in honing their abilities to depict their research and stories in engaging ways. Alan’s course provided great insight about common communication pitfalls and how to avoid them, how to become better communicators by understanding the audience diversity, and it showcased some great online tools for creating infographics. This should be mandatory training for all students, academics, report writers and those involved with conveying research to the media as it will help increase the clarity and accessibility of our own research stories.”
 Dr Lee Haines | Liverpool School of Tropical Medicine

Data storytelling
Delivered OnlineFlexible Dates
£2,405.97

Business Analysis Process Model

5.0(10)

By GBA Corporate

Overview Objective Understanding the Importance of Business Analysis Model Determining various techniques of Process Modelling Understanding the scope of modelling Efficiently mapping the business landscape Analysing the enterprise structure How to avoid project failures. Learning efficient skills of being a successful business analyst. Understand and document various techniques for the organization delivers value. Successful project conversion Building team, changing the organization and overcoming resistance. Creating an effective Business Case.

Business Analysis Process Model
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

VMware Workspace ONE: Deploy and Manage [V22.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Workspace ONE UEM and Workspace ONE Access operators and administrators, account managers, solutions architects, solutions engineers, sales engineers, and consultants Overview By the end of the course, you should be able to meet the following objectives: Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM Outline the components of Workspace ONE UEM Explain the general features and functionality enabled with Workspace ONE UEM Summarize the basic Workspace ONE administrative functions Explain and deploy common Workspace ONE integrations Securely deploy configurations to Workspace ONE UEM managed devices Onboard device endpoints into Workspace ONE UEM Summarize the alternative management methodologies for rugged devices Discuss strategies to maintain environment and device fleet health Configure and deploy applications to Workspace ONE UEM managed devices Analyze a Workspace ONE UEM deployment Enable email access on devices Integrate Workspace ONE UEM with content repositories and corporate file shares Explain the general features and functionalities that Workspace ONE Access enables Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access Summarize and implement Workspace ONE productivity services into the digital workspace environment Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce In this five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform, endpoint management solution with VMware Workspace ONE© UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. After the course, you will have the foundational knowledge for effectively implementing Workspace ONE UEM.Also, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE© Access? with Workspace ONE UEM to securely distribute business-critical applications from any device and to configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure Workspace ONE Access and Workspace ONE UEM system and productivity integrations.You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on. Overall, the course lays out the foundational principles of identity and access management.Please note - This course is a combination of the VMware Workspace ONE: Skills for UEM and the VMware Workspace ONE: Integrations course. Course Introduction Introductions and course logistics Course objectives Platform Architecture Summarize the features and functionality of Workspace ONE UEM Outline the benefits of leveraging Workspace ONE UEM Recognize the core and productivity components that make up the Workspace ONE UEM platform Summarize high availability and disaster recovery for the Workspace ONE solution Administration Navigate and customize the Workspace ONE UEM console Summarize the hierarchical management structure Explain the features and functions of Workspace ONE Hub Services Outline account options and permissions Enterprise Integrations Outline the process of integrating with directory services Explain certificate authentication and practical implementation with Workspace ONE Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console Describe VMware Dynamic Environment Manager and its architecture Onboarding Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management Outline the steps for setting up autodiscovery in the Workspace ONE UEM console Enroll an endpoint through the VMware Workspace ONE© Intelligent Hub app Summarize the platform onboarding options Managing Endpoints Explain the differences between device and user profiles Describe policy management options for Windows and macOS Describe the functions and benefits of using compliance policies Explain the use case for Freestyle Orchestrator Describe the capabilities that sensors and scripts enable. Alternative Management Methods Describe the function and benefits of device staging Configure product provisioning in the Workspace ONE UEM console Understand the benefits of deploying a VMware Workspace ONE© Launcher? configuration to Android devices List the system and device requirements for Linux device management in Workspace ONE UEM Applications Describe the features, benefits, and capabilities of application management in Workspace ONE UEM Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console Describe the benefits of using Apple Business Manager content integration Describe the benefits of using server-to-client software distribution List the functions and benefits of VMware Workspace ONE© SDK Device Email List the email clients supported by Workspace ONE UEM Configure an Exchange Active Sync profile in the Workspace ONE UEM console Configure VMware Workspace ONE© Boxer settings Summarize the available email infrastructure integration models and describe their workflows Configure email compliance policies and notifications services Content Sharing Describe the benefits of using Content Gateway Describe the Content Gateway workflows Describe the benefits of integrating content repositories with Workspace ONE UEM Configure a repository in the Workspace ONE UEM console Maintenance Manage endpoints from the Device List view and the Details view. Analyze endpoint deployment and compliance data from the Workspace ONE UEM Monitor page. Workspace ONE Access Summarize the benefits of Workspace ONE Access Outline the core features and functions enabled by Workspace ONE Access Navigate the Workspace ONE Access console Explain the functions of directory integration with Workspace ONE Access Explain the various types of authentication protocols enabled by Workspace ONE Access Integrating Workspace ONE UEM and Workspace ONE Access Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access Outline the process of connecting Workspace ONE UEM and Workspace ONE Access Examine the workflow of integrations Summarize the key features of an integrated solution Productivity Integrations Identify the functions enabled by VMware Unified Access Gateway? Outline the purpose of the VMware AirWatch© Secure Email Gateway? edge service Explain the features enabled by the VMware Workspace ONE© Tunnel? edge service Summarize the capabilities enabled by the Content Gateway edge service SAML 2.0 Authentication Outline the authentication methods supported by Workspace ONE Access Summarize the main properties of the SAML protocol Summarize the SAML authentication workflow Explain the application SSO authentication workflow with SAML Mobile Single Sign-On Describe the concept of mobile SSO Outline the mobile SSO workflows Intelligence and Automation Summarize the features of Workspace ONE© Intelligence? Outline the benefits of using Workspace ONE Intelligence Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Workspace ONE: Deploy and Manage [V22.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Workspace ONE: Deploy and Manage [V22.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Workspace ONE: Deploy and Manage [V22.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Train The Trainer

5.0(3)

By Lapd Solutions Ltd

Train the Trainer, Trainer Development,

Train The Trainer
Delivered in Birmingham + 1 more or UK Wide or OnlineFlexible Dates
£1,250 to £1,500

Designing conversations with AI: a guide for UX professionals

5.0(5)

By UX Academy

Artificial Intelligence brings exciting new opportunities to the field of Conversational User Interfaces (CUI). Learn key concepts and proven design methods to deliver cutting-edge experiences and reach better business outcomes. Silvia Podesta is a Designer in the Client Engineering Team at IBM Nordics. She leverages design thinking, service and UX design to help clients identify opportunities for innovation and pioneer transformational experiences through IBM technology.

Designing conversations with AI: a guide for UX professionals
Delivered OnlineFlexible Dates
FREE