• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4745 Operations courses delivered Online

Logistic and Supply Chain Management - Double Endorsed Certificate

By Imperial Academy

2 QLS Endorsed Course | CPD Certified | Free PDF + Hardcopy Certificates | 80 CPD Points | Lifetime Access

Logistic and Supply Chain Management - Double Endorsed Certificate
Delivered Online On Demand
£150

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

Airport Management

By Compete High

🛫 Welcome to the gateway of endless possibilities! Introducing our comprehensive course: Airport Management 🎓, your passport to a thriving career in the dynamic world of aviation. Whether you're an aspiring professional or a seasoned veteran looking to soar higher, this course is your runway to success.   ️ Unlock Your Potential: In the fast-paced realm of airport management, staying ahead requires a blend of industry knowledge, strategic thinking, and operational expertise. Our course equips you with the essential skills and insights needed to navigate this complex landscape with confidence. From terminal operations to airside management, you'll gain a holistic understanding of the intricacies involved in running a successful airport.   🌟 Benefits Galore: By enrolling in our Airport Management course, you'll reap a multitude of benefits that will set you apart in the competitive aviation industry: Expert Guidance: Learn from seasoned professionals and industry experts who bring real-world experience to the classroom. Practical Insights: Gain hands-on experience through case studies, simulations, and practical exercises that mirror real-life airport scenarios. Networking Opportunities: Connect with fellow students, instructors, and industry insiders to expand your professional network and uncover exciting career opportunities. Career Advancement: Elevate your career prospects and unlock new opportunities for growth and advancement within the aviation sector. Global Perspective: Explore the nuances of airport management on a global scale, preparing you for roles in diverse environments and settings.   Who is this for? 👨‍️ Whether you're a recent graduate looking to kickstart your career in aviation, a seasoned professional seeking to broaden your skill set, or an entrepreneur with aspirations of venturing into airport management, this course is tailor-made for you. No matter your background or experience level, our program is designed to accommodate learners of all stripes and empower you to thrive in the dynamic world of airport management.   Career Path: Upon completing our Airport Management course, a world of exciting career opportunities awaits: Airport Operations Manager: Oversee day-to-day operations, ensure compliance with safety regulations, and optimize efficiency to keep the airport running smoothly. Airline Operations Coordinator: Coordinate with airlines, ground services, and regulatory agencies to ensure seamless flight operations and exceptional customer service. Airport Security Manager: Implement and enforce security protocols to safeguard passengers, personnel, and assets against potential threats and risks. Aviation Consultant: Provide strategic guidance and expertise to airports, airlines, and other aviation stakeholders to optimize performance, streamline processes, and drive growth. Airport Planning and Development Specialist: Play a pivotal role in the expansion, modernization, and development of airport infrastructure and facilities to meet the evolving needs of travelers and stakeholders.   In conclusion, our Airport Management course is your ticket to success in the dynamic and rewarding field of aviation. Are you ready to take off on your journey to greatness? Enroll today and let your career soar to new heights! 🚀️ Course Curriculum Module 1 Introduction to Airport Management Introduction to Airport Management 00:00 Module 2 Airport Operations Airport Operations 00:00 Module 3 Airport Planning and Development Airport Planning and Development 00:00 Module 4 Airport Finances and Economics Airport Finances and Economics 00:00 Module 5 Airport Operations and Safety Airport Operations and Safety 00:00

Airport Management
Delivered Online On Demand5 hours
£4.99

Certified Information Privacy Professional (CIPP/E)

By Training Centre

  The IAPP offers the most encompassing, up-to-date and sought-after global training and certification program for privacy and data protection. The Certified Information Privacy Professional (CIPP) helps organizations around the world bolster compliance and risk mitigation practices, and arms practitioners with the insight needed to add more value to their businesses. Skilled privacy pros are in high demand and IAPP certification is what employers want. When you earn an IAPP credential, you earn the right to be recognized as part of an elite group of knowledgeable, capable and dedicated privacy professionals. With the GDPR effective as of May 2018, among its mandates was the requirement to appoint knowledgeable DPOs (data protection officers) tasked with monitoring compliance, managing internal data protection activities, training data processing staff, conducting internal audits and more. There's a lot to know, there's a lot at stake and there's a lot of opportunity for privacy professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe-and to take advantage of the career opportunity this sweeping legislation represents. About This Course   Delivered in a Modular format, the course includes; Module 1: Data Protection Laws Introduces key European data protection laws and regulatory bodies, describing the evolution toward a Harmonised European Legislative Framework. Module 2: Personal Data Defines and differentiates between types of data-including personal, anonymous, pseudo-anonymous and special categories. Module 3: Controllers and Processors Describes the roles and relationships of controllers and processors. Module 4: Processing Personal Data Defines data processing and GDPR processing principles, Explains the application of the GDPR and outlines the legitimate bases for processing personal data. Module 5: Information provision Explains controller obligations for providing information about data processing activities to data subjects and Supervisory Authorities. Module 6: Data Subjects 'Rights Describes data subjects' rights, applications of rights and obligations controller and processor. Module 7: Security or Processing Discusses considerations and duties of controllers and processors for Ensuring security of personal data and providing notification of data breaches. Module 8: Accountability Investigates accountability requirements, data protection management systems, data protection impact assessments, privacy policies and the role of the data protection officer. Module 9: International Data Transfers Outlines options and obligations for transferring data outside the European Economic Area, Decisions adequacy and appropriateness safeguards and derogations. Module 10: Supervision and Enforcement Describes the role, powers and procedures or Supervisory Authorities; the composition and tasks of the European Data Protection Board; the role of the European Data Protection Supervisor; and remedies, liabilities and penalties for non-compliance. Module 11: Compliance Discusses the applications of European data protection law, legal bases and compliance requirements for processing personal data in practice, employers-including processing employee data, surveillance, direct marketing, Internet technology and communications and outsourcing. Prerequisites   There are no prerequisites for this course but candidates would benefit from reading the freely available materials found on the IAPP website. What's Included?   1 years membership of the IAPP  Breakfast, Lunch and refreshments (Classroom courses only) Official Study Guide (European Data Protection, Law & Practice)* Participant Guide* Official Exam Q&A* Official Practice Exam Official Practice Exam* The Exam Fees * In electronic format for Live Online and hard copy for Classroom delegates     Who Should Attend?   The CIPP/E is ideal for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration, including those in the following positions: Cybersecurity Analysts Data Analysts Security Administrators Aspiring Data Protection Officers Accreditation Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

Certified Information Privacy Professional (CIPP/E)
Delivered OnlineFlexible Dates
£1,395

Certified Information Privacy Manager (CIPM)

By Training Centre

  Make a difference in your organization and in your career. The CIPM designation says that you're a leader in privacy program administration and that you've got the goods to establish, maintain and manage a privacy program across all stages of its lifecycle. The CIPM is the world's first and only certification in privacy program management. When you earn a CIPM, it shows that you don't just know privacy regulations-you know how to make it work for your organization. In other words, you're the go-to person for day-to-day operations when it comes to privacy. Developed in collaboration with the law firms, Bird and Bird, Field Fisher, Wilson/Sonsini and Covington and Burling, the CIPM encompasses pan-European and national data protection laws, key privacy terminology and practical concepts concerning the determination of control measures designed to protect personal data and trans-border data flows. About This Course   Delivered in a modular format, the course covers;   Module 1: Introduction to privacy program management Identifies privacy program management responsibilities, and describes the role of accountability in privacy program management. Module 2: Privacy governance Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organization, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks. Module 3: Applicable laws and regulations Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organizational strategy. Module 4: Data assessments Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments. Module 5: Policies Describes common types of privacy-related policies, outlines components and offers strategies for implementation. Module 6: Data subject rights Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten. Module 7: Training and awareness Outlines strategies for developing and implementing privacy training and awareness programs. Module 8: Protecting personal information Examines a holistic approach to protecting personal information through privacy by design. Module 9: Data breach incident plans Provides guidance on planning for and responding to a data security incident or breach. Module 10: Measuring, monitoring and auditing program performance Relates common practices for monitoring, measuring, analyzing and auditing privacy program performance   The CIPM body of knowledge outlines all the concepts and topics that you need to know to become certified. The exam blueprint gives you an idea of how many questions from each topic area you can expect on the exam.  Prerequisites   There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site What's Included?   Breakfast, Lunch and refreshments (Classroom based courses only)  The Official Study Guide (Privacy Programme Management - Third Edition)*  Official Exam Q&A's*  Official Practice Exam Participant Guide* 1 years membership of the IAPP  The Exam Fees * In electronic format for Live Online and hard copy for Classroom delegates   Who Should Attend?   The CIPM is ideal for IT and information security leaders responsible for developing Data Protection frameworks and applying best practice, including those in the following positions: Data Analysts Cyber Security Analysts and Managers Aspiring Data Protection Officers IT Managers  Accreditation Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

Certified Information Privacy Manager (CIPM)
Delivered OnlineFlexible Dates
£1,395

IASSC Lean Six Sigma Black Belt (Exam Included) – 8 Day Evening Live Online Class

By Hudson

8 day live online class Total duration: 24 hours Classes run once a month from 18:30-21:30 GMT (13:30-14:30 EST) over an 8 day period

IASSC Lean Six Sigma Black Belt (Exam Included) – 8 Day Evening Live Online Class
Delivered Online On Demand
£1,795

Warehouse Associate

5.0(1)

By LearnDrive UK

Advance your career with our comprehensive Warehouse Associate course. From mastering warehouse operations to understanding cutting-edge technology and automation, this course is your roadmap to success in the logistics and warehousing sector.

Warehouse Associate
Delivered Online On Demand1 hour
£5

Data Center Training Essentials: Mechanical & Cooling

4.5(3)

By Studyhub UK

In today's digital age, the heart of every successful business lies in its data center. Dive deep into the very essence of a data center's mechanical systems with our 'Data Center Training Essentials: Mechanical & Cooling' course. Understand how the right cooling mechanisms can significantly impact the efficiency and longevity of your servers. As the digital era progresses, ensuring optimal cooling in data centers is crucial. Our expertly designed modules will give you a profound understanding of both air and water cooling techniques, alongside insights into computational fluid dynamics. Learning Outcomes Understand the fundamental principles of mechanical systems in data centers. Differentiate between various data center cooling methodologies. Grasp the intricate concepts behind computational fluid dynamics. Master the operations and maintenance of water systems within data centers. Implement strategies to enhance the efficiency of cooling systems. Why choose this Data Center Training Essentials: Mechanical & Cooling course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Data Center Training Essentials: Mechanical & Cooling Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Data Center Training Essentials: Mechanical & Cooling course for? Professionals looking to broaden their knowledge in data center operations. Engineers aiming to specialize in data center mechanical systems. IT managers overseeing data center management and operations. Individuals keen to understand the intricacies of data center cooling. Students and fresh graduates aspiring for a career in data center operations. Career path Data Center Technician: £30,000 - £40,000 Data Center Operations Manager: £50,000 - £65,000 Cooling System Specialist: £35,000 - £47,000 Mechanical Engineer (Data Center Specialisation): £45,000 - £60,000 Facilities Manager (Data Center): £55,000 - £70,000 Thermal Analysis Engineer: £40,000 - £54,000 Prerequisites This Data Center Training Essentials: Mechanical & Cooling does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Data Center Training Essentials: Mechanical & Cooling was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Data Center Training Essentials: Mechanical & Cooling Module 01:Data Center Mechanical Introduction 01:01:00 Module 02: Data Center Air Cooling 00:51:00 Module 03: Data Center Computational Fluid Dynamics 01:02:00 Module 04: Data Center Water Cooling 00:53:00 Module 05: Data Center Water Systems Operation 01:03:00 Assignment Assignment - Data Center Training Essentials: Mechanical & Cooling 00:00:00

Data Center Training Essentials: Mechanical & Cooling
Delivered Online On Demand4 hours 50 minutes
£10.99

AML and KYC - QLS Endorsed Certificate

By Imperial Academy

Level 3 & 5 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access | Tutor Support

AML and KYC - QLS Endorsed Certificate
Delivered Online On Demand
£300

Hospitality and Catering - Level 3

4.5(3)

By Studyhub UK

Immerse yourself in the dynamic and ever-evolving world of hospitality with our Hospitality and Catering - Level 3 course. Dive deep into the intricate processes behind every hotel lobby and bustling kitchen. From an insightful peek into hotel industry operations to mastering the art of quality service management, this course encompasses every sector facet. Moreover, as technology continues to mould industries, get a glimpse of how e-hospitality changes the game. If you've ever dreamt of making your mark in this vibrant industry, this meticulously crafted course will be your guiding star. Learning Outcomes: Understand the core concepts of hospitality management and its application in the real world. Gain insight into the hospitality sector's recruitment, selection, development, and training processes. Master the operations of the front office, housekeeping, and food & beverage departments. Grasp the intricacies of marketing strategies specifically tailored to travel and tourism businesses. Acquire knowledge in managing customer satisfaction and explore the role of technology in the hospitality industry. Why buy this Hospitality and Catering - Level 3? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Hospitality and Catering - Level 3 you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? Individuals looking to kick-start their career in the hospitality sector. Those curious about hotel operations from the front desk to the back kitchen. Aspiring managers aiming to lead teams in hospitality settings. Marketing enthusiasts keen to explore the travel and tourism segment. Tech-savvy individuals interested in understanding e-hospitality. Prerequisites This Hospitality and Catering - Level 3 was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Hotel Manager: £35,000 - £50,000 per annum Front Office Manager: £25,000 - £35,000 per annum Food and Beverage Manager: £30,000 - £40,000 per annum Housekeeping Manager: £25,000 - £35,000 per annum Travel and Tourism Marketer: £30,000 - £45,000 per annum E-Hospitality Specialist: £35,000 - £55,000 per annum   Course Curriculum Hospitality and Catering - Level 3 Module 01: Introduction to Hospitality Management 00:24:00 Module 02: An Overview of Hotel Industry 00:18:00 Module 03: The Process of Selection and Recruitment in Hospitality Industry 00:21:00 Module 04: The Process of Development and Training in Hospitality Industry 00:24:00 Module 05: Management of Front Office Operations 00:19:00 Module 06: Management of Housekeeping, Engineering and Security Operations 00:27:00 Module 07: Management of Food and Beverage Operations 00:20:00 Module 08: Management of Service Quality in Hospitality Industry 00:20:00 Module 09: Marketing in Travel and Tourism Business 00:24:00 Module 10: Accounting in Hospitality Industry 00:26:00 Module 11: Customer Satisfaction 00:20:00 Module 12: E-Hospitality and Technology 00:22:00 Mock Exam Mock Exam - Hospitality and Catering - Level 3 00:20:00 Final Exam Final Exam - Hospitality and Catering - Level 3 00:20:00

Hospitality and Catering - Level 3
Delivered Online On Demand5 hours 5 minutes
£10.99