MEF Carrier Ethernet training course description The course progresses from a overview of the Carrier Ethernet service and how it works onto looking at the concepts in depth. Service attributes and management follow with the course finishing with studies of practical Carrier Ethernet. What will you learn Discuss and understand key Carrier Ethernet Concepts. Understand tasks related to designing, deploying and maintaining a Carrier Ethernet network. Offer effective solutions to implementing a Carrier Ethernet enterprise network given available customer resources and requirements. Carry out informed discussions using industry Carrier Ethernet 'vocabulary. Pass the MEF CECP 2.0 professional accreditation exam. MEF Carrier Ethernet training course details Who will benefit: Anyone working with Carrier Ethernet Prerequisites: The course attendees need to be conversant with data networks, as well as Ethernet and IP technologies. Duration 5 days MEF Carrier Ethernet training course contents Section One: Introduction to Carrier Ethernet Introduction to Carrier Ethernet: What is Carrier Ethernet? Evolution, advantages, The MEF, MEF specifications; UNI, EVC, OVC, EPL/EVPL, EP-LAN/ EVP-LAN, EP-Tree/EVP-Tree, etc, overview. How Carrier Ethernet Works: Service Frame Handling. Carrier Ethernet at Customer Premises, metro and core. Carrier Ethernet Workings, UNI attributes, Service Attributes (EVC and EVC per UNI attributes), Bandwidth Profiles, service multiplexing, L2 protocol processing; Carrier Ethernet equipment, CPE, aggregation and homing nodes, core equipment; management systems. The Setting Up of a Carrier Ethernet Service: Step 1: Choose service type, EPL/EVPL, EP-LAN/EVP-LAN, EPTree/EVP-Tree, EVLine...; Step 2: CPE tasks, UNI-C tasks (UNI attributes, service attributes (EVC and EVC per UNI) and bandwidth profiles), UNI-N tasks (L2 protocol handling). Step 3: Non-CPE tasks, Access, metro and core connections set up. Section Two: Carrier Ethernet Concepts in depth Carrier Ethernet Definitions in Depth: UNI, UNI I & II, UNI-N and UNI-C, etc.; NNI/ENNI; EVC; OVC, OVC type (P2P, M2M, Rooted MP), OVC end point (root, leaf, trunk), OVC end point map, OVC end point bundling; Service types in detail, EPL/EVPL, EP-LAN/EVP-LAN, EP-Tree/EVP-Tree, EVLine, Access EPL, Access EVPL . Carrier Ethernet Service Frame Handling: Unicast, multicast and broadcast frame delivery, Tagged, untagged and priority; Tagging, C and S-Tags, 802.3, 802.1d, 802.1q, 802.1ad, 802.1ah evolution, VLAN ID translation/preservation. CoS preservation. Other Key Carrier Ethernet Concepts: MTU, MTU at UNI, MTU at ENNI; Physical Layer Attributes, FE, GbE and 10GbE, Service Multiplexing and Bundling Concept and detail, rules and implications; Hairpin Switching Managing Bandwidth in a Carrier Ethernet Network: Token Bucket Algorithm, EIR, CIR, CBS, EBS, Coupling Flag; Frame Colors, recoloring, Color Awareness attribute, Color Forwarding; Bandwidth Profiles, rules and concepts. MEF CoS identifiers, DEI bit (in S-Tag), PCP bit (in C-Tag or S-Tag), or DSCP (in IP header), Multiflow bandwidth concepts; CoS Label/Color Identification. Section Three: Carrier Ethernet Service Attributes Overview: Carrier Ethernet 2.0; Blueprint C Service Attributes: Per UNI, Physical interfaces, Frame format, Ingress/egress Bandwidth Profiles, CEVLAN ID/EVC Map, UNI protection. EVC per UNI, Ingress/egress Bandwidth Profiles, etc.; Per EVC, CEVLAN ID Preservation, CoS ID Preservation, Relationship between SLA and SLP, Class of Service, etc. OVC, ENNI, OVC End Point per UNI and OVC End Point per ENNI, Ingress/egress bandwidth profiles, etc. Section Four: Managing Carrier Ethernet Networks Overview: MEF Service Lifecycle.Carrier Ethernet maintenance: Port, Link & NE failure, Service Protection Technologies, Fault Identification and Recovery, LAG, Active/Standby EVC, Single EVC with transport protection, G.8031, G.8032, MPLS FRR. SOAMs: Connectivity fault management, connectivity Monitoring, Loopback, Linktrace; Performance Management, Frame Delay, Inter Frame Delay Variation, Availability, Frame Loss Ratio, Resiliency, HLI, DMM, DMR, SLM, SLR; Key Concepts, Single vs dual ended, ordered UNI pair calculations. LOAMs: Link discovery, link monitoring, etc. Terminology and Concepts: MEG levels, MIPs. Section Five: Practical Carrier Ethernet Carrier Ethernet Transport Technologies:Layer 1: SDH. Layer 2: Bridging, provider bridging, PBB, PBBTE. Layer 2.5: MPLS VPWS, MPLS VPLS, MPLS-TP. Carrier Ethernet Access Technologies: fiber, SDH, active fiber, PON, GPON, 10G PON, OTN, WDM; copper, PDH, G-SDSL, 10Pass-TS, HFC; packet radio. Optimising mobile backhaul with Carrier Ethernet Key challenges solutions: Market pressure, LTE evolution, elements and architecture (RAN BS, NC, GWIF.), synchronization, bandwidth management. Circuit Emulation over Ethernet: Purpose, needs and applications. Synchronization: Phased, ToD, External Reference source, SynchE ,NTP, IEEE-1588 v2/ PTP, ACR; MEF Service Definitions for emulated circuits. Applying what you know: Practical examples and scenarios, Carrier Ethernet solutions; Practice Scenarios, Given a scenario, determine appropriate Ethernet services
Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in Microsoft Teams or in passing the Microsoft Teams Administrator Associate certification exam. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. A Microsoft Teams administrator must be able to plan, deploy, and manage teams, chat, apps, channels, meetings, audio/video conferencing, live events, calling, and Teams certified devices. A Microsoft Teams administrator has experience integrating Microsoft Teams with SharePoint, OneDrive, Exchange, Microsoft 365 Groups, and other Microsoft, third-party, and custom apps. A Microsoft Teams administrator understands and collaborates with other workloads and roles, such as Network, Voice, Identity, Access, Devices, Licensing, Security, Compliance, Information management, and User Adoption. Overview What is Microsoft Teams and how the components work together How to implement Governance, Security and Compliance for Microsoft Teams How to prepare an organizations environment for a Microsoft Teams deployment How to deploy and manage teams How to manage collaboration and communication experiences in Microsoft Teams Techniques to manage and troubleshoot communication in Microsoft Teams The Managing Microsoft Teams course is designed for persons who are aspiring to the Microsoft 365 Teams Admin role. A Microsoft Teams administrator plans, deploys, configures, and manages Microsoft Teams to focus on efficient and effective collaboration and communication in a Microsoft 365 environment. In this course, you will learn about various Teams management tools, security and compliance feature for Teams, network requirement for Teams deployment as well as different Teams settings and policies for managing collaboration and communication experience in Teams. Prerequisites A proficient understanding of basic functional experience with Microsoft 365 services. A proficient understanding of general IT practices, including using PowerShell. 1 - Explore Microsoft Teams Explore capabilities in Microsoft Teams Explore Microsoft Teams integration with Microsoft 365 Explore Microsoft Teams integration with Microsoft Power Platform Illustrate Microsoft Teams architecture Describe Microsoft Teams with Microsoft 365 Groups Describe Microsoft Teams with SharePoint and OneDrive Describe Microsoft Teams with Exchange Understand Microsoft Teams certified solutions 2 - Plan and deploy Microsoft Teams Designate Teams admin roles Understand Teams management tools Plan for Teams rollout Plan for Teams adoption Plan for Teams licensing Deploy Microsoft Teams clients 3 - Implement lifecycle management and governance for Microsoft Teams Plan for lifecycle management Plan for Teams governance Manage Microsoft 365 Groups creation Configure Microsoft 365 Groups expiration policy Configure Microsoft 365 Groups naming policy Plan policy assignment for users and groups Create and manage policy packages Manage Teams preview features using Teams update policies Create and manage teams templates and template policies 4 - Monitor your Microsoft Teams environment Monitor Microsoft Teams usage reports Monitor Microsoft 365 usage reports Interpret Microsoft Adoption Score Manage user access with Azure Active Directory access reviews Monitor the Microsoft 365 network connectivity dashboard Manage Teams notifications and alerts Manage feedback policies 5 - Manage access for external users Understand features in Azure Active Directory Work with external users in Microsoft Teams Manage access for external users Manage external collaboration in Azure AD Manage external collaboration in Microsoft 365 Manage external access in Microsoft Teams Manage guest access in Microsoft Teams Manage file sharing in SharePoint and OneDrive 6 - Implement security for Microsoft Teams Configure conditional access and multifactor authentication for Microsoft Teams Configure Safe Attachments for Microsoft Teams Configure Safe Links for Microsoft Teams Examine the Defender for Cloud Apps Monitor security reports for Microsoft Teams Plan and configure enhanced encryption policies 7 - Implement compliance for Microsoft Teams Create and manage sensitivity labels Create and manage retention policies Create and manage Data Loss Prevention policies Deploy communication compliance Enable scoped directory search Create information barrier policy Create security and compliance alerts for Microsoft Teams 8 - Plan and configure network settings for Microsoft Teams Examine network requirements for Microsoft Teams Plan for network deployment using Network Planner Configure network ports and protocols for Microsoft Teams Implement Quality of Service Configure reporting labels for location-enhanced Call Analytics reports Configure tenant data for Call Quality Dashboard reports Assess network readiness Manage network topology 9 - Create and manage teams Create teams Create a team from existing resources Plan and create org-wide teams Manage teams Manage users in a team Configure dynamic membership Archive restore and delete a team 10 - Manage collaboration experiences for chat and channels Create and manage channels in a team Create and manage Teams policies for channels Configure teams settings Create and manage messaging policies Manage channel moderation Manage access to channels 11 - Manage apps for Microsoft Teams Explore apps in Microsoft Teams Describe admin settings for Teams apps Manage access to Teams apps at the organization level Create and manage app permission policies Create and manage app setup policies Manage permissions and consent for Teams apps Plan and configure connectors Manage custom apps uploads Publish custom apps to Microsoft Teams Manage purchasing of apps in the Microsoft Teams app store Customize the organization's app store Customize the branded experience of an app 12 - Introduction to Teams meetings and calling Overview of Teams meetings and events Overview of Teams Phone Overview of auto attendants and call queues Overview of Teams devices 13 - Manage meetings and events experiences Explore meetings and events in Microsoft Teams Configure meeting settings Create and manage meeting policies Configure audio conferencing Create and manage meeting templates and template policies Create and manage meetings customization policies Configure live events settings Create and manage live events policies Examine live events across Microsoft 365 14 - Plan for Microsoft Teams Rooms and Surface Hub Determine license requirements for Microsoft Teams Rooms and shared devices Understand differences between Microsoft Teams Rooms on Android and Windows Understand Microsoft Teams Rooms on Surface Hub 2S Understand and plan Teams Room accessories, components, and peripherals Understand Teams Rooms management options 15 - Configure, deploy, and manage Teams devices Manage Microsoft Teams Phones Manage Microsoft Teams Room Systems Microsoft Teams Rooms management options Manage Surface Hub 2S devices Configure Microsoft Teams SIP gateway Manage Microsoft Teams displays Remote provisioning and sign in for Teams Phones Update Microsoft Teams devices remotely Manage Microsoft Teams device tags 16 - Plan for Teams Phone Plan to deploy Teams Phone Plan for Teams Phone PSTN connectivity Determine license requirements Plan for Teams Phone devices Plan and design Teams Phone features Plan for voicemail 17 - Configure and deploy Teams Phone Configure emergency calling for Teams Calling Plans Manage and configure Microsoft PSTN numbers Configure Operator Connect and Teams Phone Mobile Configure Teams Phone policies Create and manage Teams policies Configure Audio Conferencing 18 - Configure and manage voice users Enable users for Teams Phone Enable users for Direct Routing with Teams Phone Enable additional calling features for Teams Phone Enable users for Teams Phone Mobile 19 - Configure auto attendants and call queues Design call flows for auto attendants and call queues Configure auto attendants and call queues Deploy a channel-based call queue Configure resource accounts Configure Microsoft 365 groups for voicemail Interpret call queue conference modes Interpret call queue routing methods Configure holidays for auto attendants and call queues Configure custom music on hold 20 - Troubleshoot audio, video, and client issues Troubleshoot Teams Collect and identify logs Clear Microsoft Teams client cache Identify issues with call analytics Identify issues with Call Quality Dashboard Use Power BI to analyze Call Quality Dashboard data Identify issues with the Direct Routing Health Dashboard Additional course details: Nexus Humans MS-700T00 Managing Microsoft Teams training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MS-700T00 Managing Microsoft Teams course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours Overview Identify and configure basic functions of Tableau. Connect to data sources, import data into Tableau, and save Tableau files Create views and customize data in visualizations. Manage, sort, and group data. Save and share data sources and workbooks. Filter data in views. Customize visualizations with annotations, highlights, and advanced features. Create and enhance dashboards in Tableau. Create and enhance stories in Tableau As technology progresses and becomes more interwoven with our businesses and lives, more and more data is collected about business and personal activities. This era of "big data" has exploded due to the rise of cloud computing, which provides an abundance of computational power and storage, allowing organizations of all sorts to capture and store data. Leveraging that data effectively can provide timely insights and competitive advantage. The creation of data-backed visualizations is a key way data scientists, or any professional, can explore, analyze, and report insights and trends from data. Tableau© software is designed for this purpose. Tableau was built to connect to a wide range of data sources and allows users to quickly create visualizations of connected data to gain insights, show trends, and create reports. Tableau's data connection capabilities and visualization features go far beyond those that can be found in spreadsheets, allowing users to create compelling and interactive worksheets, dashboards, and stories that bring data to life and turn data into thoughtful action. Prerequisites To ensure your success in this course, you should have experience managing data with Microsoft© Excel© or Google Sheets?. Lesson 1: Tableau Fundamentals Topic A: Overview of Tableau Topic B: Navigate and Configure Tableau Lesson 2: Connecting to and Preparing Data Topic A: Connect to Data Topic B: Build a Data Model Topic C: Save Workbook Files Topic D: Prepare Data for Analysis Lesson 3: Exploring Data Topic A: Create Views Topic B: Customize Data in Visualizations Lesson 4: Managing, Sorting, and Grouping Data Topic A: Adjust Fields Topic B: Sort Data Topic C: Group Data Lesson 5: Saving, Publishing, and Sharing Data Topic A: Save Data Sources Topic B: Publish Data Sources and Visualizations Topic C: Share Workbooks for Collaboration Lesson 6: Filtering Data Topic A: Configure Worksheet Filters Topic B: Apply Advanced Filter Options Topic C: Create Interactive Filters Lesson 7: Customizing Visualizations Topic A: Format and Annotate Views Topic B: Emphasize Data in Visualizations Topic C: Create Animated Workbooks Topic D: Best Practices for Visual Design Lesson 8: Creating Dashboards in Tableau Topic A: Create Dashboards Topic B: Enhance Dashboards with Actions Topic C: Create Mobile Dashboards Lesson 9: Creating Stories in Tableau Topic A: Create Stories Topic B: Enhance Stories with Tooltips
Motorsport is as much a business as it is a sport. Our new master’s programme will provide students with a broad range of modules which examine the national and international aspects of the industry from a commercial perspective. From governance, structure and international sports law, through to the importance and interdependence of commercial rights holders, promoters, manufacturer, teams, sponsors and the role played by the media, this course is aimed at enhancing the professional and career prospects of those with an aspiration of working within this exciting and challenging global industry. Our programme will help you to develop as professionals with a strong grounding in ethics and a clear sense of how motorsport relates to various cultures, stakeholders and the sectors it interacts with.
Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of Reconnaissance Incidents Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of System Hacking Attacks Assess the Impact of Web-Based Attacks Assess the Impact of Malware Assess the Impact of Hijacking and Impersonation Attacks Assess the Impact of DoS Incidents Assess the Impact of Threats to Mobile Security Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES Assess Command and Control Techniques Assess Persistence Techniques Assess Lateral Movement and Pivoting Techniques Assess Data Exfiltration Techniques Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION Implement a Vulnerability Management Plan Assess Common Vulnerabilities Conduct Vulnerability Scans Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE Deploy a Security Intelligence Collection and Analysis Platform Collect Data from Network-Based Intelligence Sources Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA Use Common Tools to Analyze Logs Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS Analyze Incidents with Windows-Based Tools Analyze Incidents with Linux-Based Tools Analyze Malware Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS Deploy an Incident Handling and Response Architecture Mitigate Incidents Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS Apply a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES Remediate Identity and Access Management Issues Implement Security During the SDLC Additional course details: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Course Information Join our comprehensive three-day programme designed as an invaluable external training opportunity for auditors, audit programme managers, and individuals subject to audits. This course is tailored to foster a deep understanding and cultivate essential skills for auditing the validation of computer systems intended for GxP environments (GLP, GCP, GMP, GDP, GPvP). Commencing with an overview of regulatory prerequisites and the system life cycle, the course swiftly transitions to focus on the pragmatic aspects of auditing computer system validation. Experience a blend of presentations, interactive discussions, and immersive practical workshops throughout the duration of the course. Delegates will benefit from practical examples of how to understand the framework of applicable regulations and guidance. Apply risk management techniques to audit planning Plan and conduct computerised system audits Assess system validation documentation to verify compliance Evaluate data integrity and security issues Prepare for regulatory inspection. The course is structured to encourage delegates to: Discuss and develop ideas Solve specific problems Understand the vulnerabilities of computerised systems Learn how to create a compliance checklist Link system development with good business practice. Is this course for you? Auditors Audit programme managers Individuals subject to audits. Tutors Tutors will be comprised of (click the photos for biographies): Nichola Stevens Director and Principal Consultant, Nuncius Compliance Solutions Ltd Barry McManus Consultancy Partner, Empowerment Quality Engineering Ltd Programme Please note timings may be subject to alteration. Day 1 09:00 Welcome and Introductions 09:45 Why We Validate and Regulatory Trends 10:30 Break 10:45 Audit Overview, High Level Process and Scheduling 11:30 System Lifecycle 12:30 Lunch 13:15 Exercise 1 - Audit Scheduling 14:45 Exercise 1 - Feedback 15:15 Break 15:30 Validation Deliverables 16:30 Risk Assessments 17:30 Close of Day 1 Day 2 09:00 Supplier Assessment 10:30 Break 10:45 Exercise 2 - Planning a Supplier Audit 12:00 Exercise 2 - Feedback 12:30 Lunch 13:15 Exercise 3 - Auditing a Computerised System Validation Package 15:30 Break 15:45 Exercise 3 - Feedback 16:30 Change Control 17:15 Close of Day Day 3 09:00 Infrastructure Qualification 09:45 Maintaining a Validated State - Operational Processes 11:00 Break 11:15 Exercise 4 - Auditing Systems in Operational Use 12:45 Lunch 13:30 Exercise 4 - Feedback 14:15 Exercise 5 - Auditing Trail Review 15:30 Break 15:45 Exercise 5 - Feedback 16:15 Course Objectives Summary and Any Additional Questions 16:45 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 19 Points Development Level Develop
Unity 3d face to face training customised and bespoke.
The Postgraduate Certificate (PG Cert.) consists of the first four modules from the MA Business of Motorsport Master’s Degree. You can then achieve a Postgraduate Diploma (PG Dip.) Business of Motorsport by studying the PG Dip. Top-Up, a further three modules from the MA.
Join our free webinar to learn how to set up a professional home or office studio for high-quality video creation using existing resources.