• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5232 Model courses

Business Analysis - Foundation

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The Foundation course is designed for individuals who want to gain an overview of Business Analysis (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding of business analysis principles and techniques. Key areas are: the role and competencies of a business analyst strategy analysis business system and business process modelling stakeholder analysis investigation and modelling techniques requirements engineering business case development The business analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered. The Foundation Seminar gives a good introduction to the spectrum of this responsibility. Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Analysis Structure and Benefits of Business Analysis Foundation Exam Details Business Analysis Certification Scheme What is Business Analysis? Intent and Context Origins of business analysis The development of business analysis The scope of business analysis work Taking a holistic approach The role and responsibilities of the business analyst The competencies of a Business Analyst Personal qualities Business knowledge Professional techniques The development of competencies Strategy Analysis The context for strategy The defiition of strategy Strategy development External environmental analysis Internal invironmental analysis SWOT analysis Executing strategy Business Analysis Process Model An approach to problem solving Stages of the business analysis process model Objectives of the process model stages Procedures for each process model stage Techniques used within each process model stage Investigation Techniques Interviews Observation Workshops Scenarios Prototyping Quantitative approaches Documenting the current situation Stakeholder Analysis and Management Stakeholder categories and identification Analysing stakeholders Stakeholder management strategies Managing stakeholders Understanding stakeholder perspectives Business activity models Modelling Business Processes Organizational context An altrnative view of an organization The organizational view of business processes Value propositions Process models Analysing the as-is process model Improving business processes (to-be business process) Defining the Solution Gab analysis Introduction to Business Architecture Definition to Business Architecture Business Architecture techniques Business and Financial Case The business case in the project lifecycle Identifying options Assessing project feasibility Structure of a business case Investment appraisal Establishing the Requirements A framework for requirements engineering Actors in requirements engineering Requirements elicitation Requirements analysis Requirements validation Documenting and Managing the Requirements The requirements document The requirements catalogue Managing requirements Modelling the Requirements Modelling system functions Modelling system data Delivering the Requirements Delivering the solution Context Lifecycles Delivering the Business Solution BA role in the business change lifecycle Design stage Implementation stage Realization stage

Business Analysis - Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

Hydraulic Fracturing: From Design to Execution and Post Frac Analysis

By EnergyEdge - Training for a Sustainable Energy Future

EnergyEdge course offers in-depth training on hydraulic fracturing. Learn about design, execution, and post-frac analysis. Enroll today!

Hydraulic Fracturing: From Design to Execution and Post Frac Analysis
Delivered In-PersonFlexible Dates
£2,599 to £2,699

AngularDart: Build Dynamic Web Apps with Angular and Dart

By Packt

Master Angular and Dart (AngularDart) and build high-performance, flexible, and dynamic web apps

AngularDart: Build Dynamic Web Apps with Angular and Dart
Delivered Online On Demand9 hours 51 minutes
£126.99

Coaching Skills for HR Professionals - ILM Recognised

By British School of Coaching

A practical programme for HR professionals who are keen to develop a coaching style of interaction either within their teams and/or with business stakeholders. Develop skills in taking a more engaging, non-directive approach to supporting your business and to encouraging a coaching style of communication in your organisation.

Coaching Skills for HR Professionals - ILM Recognised
Delivered OnlineFlexible Dates
£708

PERSON CENTRED PLANNING TRAINING

By Inclusive Solutions

Person Centred Planning (PCP) is a powerful tool for visioning, future planning and team building. It gets everyone on the same page and creates a progressive, constructive atmosphere so it is especially useful for people who are feeling ‘stuck’ or in a really desperate situation. The PCP processes we teach are called “PATH” and “MAPs”, and are both used for different situations. “To facilitate a group, family, team or organisation in thinking together around a given challenge or issue. Here is an opportunity to experience for real the person centred, futures planning tool – MAP/PATH” (Pearpoint, Forest, O’Brien. 1989). PCP can focus on an individual, with family and friends in the room supporting them, or focus on a group who want to set goals, and realise their potential as a team. PCP focuses on hopes and dreams, so is a very positive approach to planning, and utilises graphic facilitation, making it a very friendly way of working that is accessible to everyone.  This unique, hands on PCP training course explores the difference between ‘person-centred thinking’ and ‘service-centred thinking’. Traditionally, we have not always listened deeply enough to the needs of those we are planning for. Often ‘medical model’ thinking dominates our planning for those with the most complex needs. Typically we plan ‘about’ rather than ‘with’ children and adults.  We examine this ‘service centred’ approach that most professionals are used to, and question its limitations. This values based approach to inclusion will give participants the ‘theory’ behind why thinking and working in a person centred way is so important, and challenges people to strive for more for the people we are planning around. In addition to the knowledge and theory, this course empowers participants to facilitate their own Person Centred Plans using the PATH or MAPs process and provides the skills to do this effectively. Learning objectives  Strengthen understanding of how to think in a person centred way Knowledge of the steps of PATH / MAPs process Ability to facilitate PATH/MAPs process Ability to graphically facilitate a PCP meeting Develop problem solving and planning skills Inclusive Solutions offer: We could provide training for a team of staff, or we could facilitate a PATH or MAP around a disabled person. We can also offer bespoke training packages, please enquire for more details.  1 day “Introduction to PCP” with up to 100 attendees focusing on ‘Person Centred Thinking’ – includes live demonstration of PATH or MAPs Process (for a member of the group / with a student and their family/friends). 2 day “PCP Skills training” – More skills focused, lots of practice. Includes Graphics academy, Process academy and Coaching (Best with under 30 attendees). 2 day “Introduction to PCP with Skills training” – includes live demonstration of PATH or MAPs process, Graphics academy, Process academy and Coaching (Best with under 30 attendees). Half day PATH or MAP for a disabled person, led by two experienced Inclusive Solutions facilitators. Full day PATH or MAP for a team, organisation or group such as a full school staff led by two experienced Inclusive Solutions facilitators. Typical Structure of 2-Day “Introduction to PCP with Skills” Training This course is most useful when delivered over 2 days so we have time to cover the ‘skills’ behind facilitating a PATH or a MAP. Here is an example of what usually happens. If you need us to, we can tailor any of our courses to suit your specific needs.  Day 1 AM What makes a good welcome?Service centred thinking and working – what does it involve, how does it make people feel?Reflections on current practices – what is useful and what is harmful?Introduction to underpinning values of person centred thinking and working In depth exploration of the fundamentals of inclusion – encouraging identity, focusing on gifts and capacities Sharing success stories, and personal insight from experienced psychologistsShowcasing a number of practical PCP process in actionIntroduction to the “5 service accomplishments”, or “5 ordinary needs” PM  Full PATH process demonstration, led by 2 experienced facilitators – one process facilitator and one graphic facilitatorVolunteers will make notes on what they see the facilitators doing and feedback at the end of the dayFeedback, Q&A Day 2 AM Graphics Academy – we will ease you into the world of graphic facilitation and show you how simple it really is – includes live coaching and graphics tutorial, then participants will practice on each other by facilitating the first 1 or 2 sections of the PATH Process Academy – we will give you some pointers about holding the group, and facilitating in an inclusive way, this is another chance to practice your new graphics skills PM The group is divided up, and volunteers are selected to facilitate PATH meetings The group then run the PATH’s simultaneously with an experienced coaches in the room to guide and to be available for questionsWe reconvene to feedback about the process and digest all we have learntBrief Q&A session and then final reflections

PERSON CENTRED PLANNING TRAINING
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£2,500 to £6,900

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Business Strategy Planning

5.0(10)

By Apex Learning

Overview This comprehensive course on Business Strategy Planning will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Business Strategy Planning comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Business Strategy Planning. It is available to all students, of all academic backgrounds. Requirements Our Business Strategy Planning is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 24 sections • 163 lectures • 14:21:00 total length •Learn Business Fundamentals and Create Your Own Business Plan Today!: 00:02:00 •Quickfire Strategy Quiz How much do you know about your business strategy?: 00:02:00 •Quickfire Strategy Quiz - My 'Answers': 00:10:00 •How to get the most from this Course: 00:09:00 •Using the Course Map Matrix: 00:06:00 •Guide to the Course Assignments: 00:04:00 •Download All Course Materials Here: 00:03:00 •Section Introduction: Connecting Business Strategy to the Business Plan: 00:02:00 •Business Strategy to Business Plan: 00:04:00 •What do we mean by Business Strategy?: 00:02:00 •What is a Business Plan?: 00:06:00 •What do we mean by Corporate Strategy?: 00:07:00 •Should You Be Creating Shareholder Value?: 00:07:00 •Introduction to Strategic Management: 00:06:00 •Section Introduction: The Value of Strategic Analysis: 00:01:00 •Strategic Analysis - The First Step: 00:02:00 •What is Strategic Analysis?: 00:05:00 •Frameworks for Strategic Analysis: 00:10:00 •Strategic Analysis Frameworks Case Study: Apple: 00:11:00 •Section Introduction: Frameworks and Theories Business Strategists Must Know: 00:02:00 •Why are these Business Models important?: 00:02:00 •The Story of the Hedgehog and the Fox: 00:03:00 •Why are Management Theories Useful in Business Strategy?: 00:09:00 •SWOT Analysis: 00:05:00 •Introduction to Michael Porter's Five Forces Model: 00:06:00 •Lafley and Martin Five Step Strategy Model: 00:06:00 •The 5Cs Model: 00:06:00 •What is PEST or Broad Factors Analysis?: 00:05:00 •PESTEL Analysis: 00:05:00 •Ansoff Matrix: 00:07:00 •Value Chain: 00:05:00 •Business Model Synthesis: 00:08:00 •Black Swan Events - Coronavirus: 00:05:00 •Section Introduction: Critical Evaluation of Leadership: 00:01:00 •Vision and Leadership - Starting at the Top: 00:06:00 •What Skills Are We Looking For In Management?: 00:07:00 •What is the Purpose of a Vision Statement?: 00:03:00 •Section Introduction: Products Services and Competitive Advantage: 00:02:00 •What do we mean by Products and Services: 00:03:00 •Why Product Differentiation is Critical: 00:05:00 •Product Diversification in Business Strategy: 00:06:00 •How Does Quality Management fit into your Business Strategy?: 00:04:00 •What do we mean by Competitive Advantage?: 00:06:00 •Bowman's Strategic Clock - Strategic Positioning: 00:09:00 •Products, Services and Technology in the Business Plan: 00:06:00 •Section Introduction: Competition - Know Your Enemy: 00:02:00 •Competitor Analysis: 00:05:00 •BCG Matrix: 00:06:00 •Competitors and Competitive Forces: 00:10:00 •Competitive Intensity: 00:09:00 •Industry Life Cycle: 00:05:00 •Competition - Business Plan Tie In: 00:02:00 •Section Introduction: Industry, Markets and Competition: 00:02:00 •What do we mean by External Strategic Analysis: 00:09:00 •How Does Industry Analysis Help?: 00:05:00 •Conducting PEST or Broad Factors External Analysis: 00:11:00 •What are the Business and Funding Life Cycles?: 00:10:00 •Value Chains: Connecting Companies to their External Environment: 00:08:00 •Addressing the Total Addressable Market (TAM): 00:05:00 •Market Segmentation: Choosing Customers: 00:07:00 •Bargaining Power of Suppliers: 00:06:00 •Bargaining Power of Customers/Buyers: 00:06:00 •Business Plan: Industry, Markets and Competition: 00:04:00 •Section Introduction - Operations and Customer Management: 00:02:00 •What are Business Operations?: 00:03:00 •Strategic Analysis with the Business Model Canvas: 00:14:00 •How can Corporate Structure impact Strategy?: 00:07:00 •Organisational Development: 00:04:00 •Reviewing the Operations of the Firm: 00:03:00 •Click and Mortar - Online meets Offline: 00:05:00 •eCommerce Business Models: 00:06:00 •Internal Strategic Analysis - Business Plan Tie In: 00:05:00 •Section Introduction: Six Minute Strategist SWOT Assignment: 00:02:00 •Section Introduction: Customer Value Proposition: 00:02:00 •Understanding the Customer Value Proposition: 00:03:00 •Positioning Your Firm in the Market: 00:04:00 •What do we mean by a Profit Model?: 00:05:00 •Hax's Delta Model: 00:09:00 •Switching Costs and Customer Strategy: 00:03:00 •Managing the Customer Experience: 00:05:00 •What is the Customer Journey?: 00:06:00 •Customers, Customer Value and the Business Plan: 00:03:00 •Section Introduction: Sales and Marketing: 00:02:00 •The 5 Ps of Marketing: 00:06:00 •How Can You Plan Your Marketing?: 00:11:00 •Push Marketing Strategy: 00:03:00 •Pull Marketing Strategy: 00:04:00 •Understanding AIDA: 00:07:00 •Progressive Sequence of 9 Agreements: 00:07:00 •Pricing Strategies: 00:11:00 •Sales and Marketing in the Business Plan: 00:06:00 •Section Introduction: Digital Business Strategy Transformation: 00:02:00 •Why Do You Need A Digital Strategy Blueprint?: 00:07:00 •What Skills and Assets do you need to be a Digital Entrepreneur?: 00:07:00 •Digital Strategy Blueprint Overview: 00:18:00 •Digital Strategy - Customer Centric Transformation: 00:07:00 •Digital Strategy - Customer Experience Transformation: 00:05:00 •Digital Strategy - Customer Channel Transformation: 00:06:00 •Digital Strategy - Customer Engagement Transformation: 00:19:00 •Digital Strategy - Digital Skills Transformation: 00:04:00 •Digital Strategy - Tools and Resources: 00:02:00 •Section Introduction: Understanding Financial Statements: 00:02:00 •Overview of Financial Statements: 00:03:00 •GAAP: Accruals vs Cash Accounting: 00:06:00 •Income Statement or Profit and Loss Account: 00:08:00 •Introduction to the Balance Sheet: 00:11:00 •Cash Flow Statement: 00:06:00 •Cash Flow Metrics Explained: 00:09:00 •Case Study - Apple Financial Statements: 00:04:00 •Financial Statements in the Business Plan: 00:06:00 •Section Introduction: Strategic Financial Analysis: 00:01:00 •What is Financial Analysis?: 00:11:00 •Income Statement Profitability Ratios: 00:04:00 •Balance Sheet Ratio Analysis: 00:12:00 •Cash Flow Statement Analysis: 00:05:00 •Valuation Ratios: 00:04:00 •Section Introduction: Financial Analysis - Case Study and Assignment: 00:01:00 •Apple Inc Financial Analysis - Solution: 00:03:00 •Discussion of Measurements of Growth Analysis: 00:05:00 •Discussion of Measures of Profitability Analysis: 00:07:00 •Discussion of Trading Performance Analysis: 00:03:00 •Discussion of Working Capital (Liquidity and Efficiency) Analysis: 00:12:00 •Section Introduction: Future Business Strategy Analyser Assignment: 00:01:00 •Section Introduction: Goal Setting and Performance Management: 00:02:00 •Introduction to Goal Setting: 00:03:00 •What do we mean by SMART Goals?: 00:04:00 •Key Performance Indicators: 00:04:00 •Strategic Dashboards: 00:07:00 •Corporate Performance Management: 00:04:00 •Objectives and Key Results: 00:04:00 •Year over Year Performance: 00:04:00 •Section Introduction: Growth Strategies: 00:02:00 •Organic vs Inorganic: 00:03:00 •The Advantage of First Mover Advantage: 00:05:00 •The Importance of Scalability: 00:04:00 •Merger and Acquisitions Growth Strategies: 00:10:00 •Buy and Build Growth Strategy: 00:08:00 •Negative Growth- Company Recovery Strategies: 00:09:00 •Post Coronavirus Strategies: 00:06:00 •Growth Strategies Business Plan Tie In: 00:03:00 •Section Introduction: Valuation, Funding, Exits and Returns: 00:02:00 •Valuation and Funding - A Consequence of our Business Strategy: 00:04:00 •How to Value a Company: 00:11:00 •Sources of Equity Funding: 00:08:00 •What is a Pre-Money Valuation?: 00:06:00 •How to Create a Pitch Deck for Investors: 00:06:00 •Sources and Uses of Funds in the Business Plan: 00:02:00 •What is a Cap Table?: 00:05:00 •Exit Strategies and Returns: 00:09:00 •Transaction Cost Management: 00:02:00 •Section Introduction: Risk Assessment: 00:01:00 •Risk Assessment - Strategic Plan Summary: 00:02:00 •Section Introduction: Business Plan Synthesis: 00:03:00 •Business Plan Synthesis: 00:03:00 •Business Plan - Executive Summary: 00:02:00 •Business Plan - History and Background: 00:02:00 •Business Plan - Management Summary: 00:04:00 •Business Plan Appendicies: 00:04:00 •Key Questions Check List: 00:01:00 •Business Plan - Audience Targeting: 00:03:00 •Business Plan Refinement: Types of Businesses: 00:02:00 •Summary and Wrap Up: 00:05:00 •Additional File: 00:00:00

Business Strategy Planning
Delivered Online On Demand14 hours 21 minutes
£12

Level 2 & 3 Industrial Psychology at QLS

By Imperial Academy

Level 3 QLS Endorsed Course | Endorsed Certificate Included | Plus 5 Career Guided Courses | CPD Accredited

Level 2 & 3 Industrial Psychology at QLS
Delivered Online On Demand
£129

Discover how to raise a Resilient child

By Ebiere Parent Coach

Discover how to raise a Resilient child

Discover how to raise a Resilient child
Delivered Online On Demand5 weeks
£9.99

Blender 2.8 Character Creation

By Packt

Learn to confidently use Blender 2.8 to create your own 3D characters

Blender 2.8 Character Creation
Delivered Online On Demand16 hours 34 minutes
£26.99