• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

17037 Other courses in Southend-on-Sea delivered Online

MS-721T00 Collaboration Communications Systems Engineer

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Collaboration Communications Systems Engineers are responsible for planning, deploying, configuring, maintaining, and troubleshooting Microsoft Teams Phone, meetings, and personal and shared space devices, including Microsoft Teams Rooms and Surface Hub. Collaboration Communications Systems Engineers have a fundamental understanding ofÿnetworking, telecommunications, audio/visual and meeting room technologies, identity and access management. They are proficient in managing and monitoring Teams Phone, meetings, and certified devices using the Microsoft Teams admin center, PowerShell, the Microsoft Teams Rooms Pro Portal, and the Call Quality Dashboard. They deploy and configure Microsoft Teams Phone with PSTN connectivity through Microsoft Calling Plans, Operator Connect, Teams Phone Mobile, and Direct Routing. Collaboration Communications Systems Engineers work with Teams Administrators, Microsoft Identity and Access Administrators, and Microsoft 365ÿAdministrators. In addition, they may work with owners of other workloads, including facilitiesÿmanagers, network engineers, security engineers, device manufacturers, telephony providers, and Microsoft Certified solutions providers. This training course is designed to give participants the knowledge and skills to become a Collaboration Communications Systems Engineer. Participants should understand the fundamentals of networking, telecommunications, audio/visual and meeting room technologies, identity and access management, and Microsoft Teams. They will gain hands-on experience configuring and deploying Microsoft Teams Phone, meetings and certified devices including Microsoft Teams Rooms and Surface Hub. The course will also cover how to manage and monitor Teams Phone, meetings, and certified devices using the Microsoft Teams admin center, PowerShell, the Microsoft Teams Rooms Pro Portal, and the Call Quality Dashboard. In addition, the course will cover configuring and deploying Microsoft Teams Phone with PSTN connectivity through Microsoft Calling Plans, Operator Connect, Teams Phone Mobile, and Direct Routing. Prerequisites Microsoft 365 and Microsoft Teams Networking, telecommunications, and audio/visual basics Identity and access management basics 1 - Introduction to Teams meetings and calling Overview of Teams meetings and events Overview of Teams Phone Overview of auto attendants and call queues Overview of Teams devices 2 - Plan for Teams Phone Plan to deploy Teams Phone Plan for Teams Phone PSTN connectivity Determine license requirements Plan for Teams Phone devices Plan and design Teams Phone features Plan for voicemail 3 - Plan for Microsoft Teams Rooms and Surface Hub Determine license requirements for Microsoft Teams Rooms and shared devices Understand differences between Microsoft Teams Rooms on Android and Windows Understand Microsoft Teams Rooms on Surface Hub 2S Understand and plan Teams Room accessories, components, and peripherals Understand Teams Rooms management options 4 - Plan and optimize network performance for Teams media Understand Teams network requirements Design network for media optimization Design and implement QoS 5 - Configure and deploy Teams Phone Configure emergency calling for Teams Calling Plans Manage and configure Microsoft PSTN numbers Configure Operator Connect and Teams Phone Mobile Configure Teams Phone policies Create and manage Teams policies Configure Audio Conferencing 6 - Configure and deploy Teams Phone with Direct Routing Design Direct Routing call flows Implement SIP trunking with Direct Routing Configure Emergency Calling for Direct Routing Extend Teams Direct Routing infrastructure Deploy and maintain a survivable branch appliance 7 - Extend Teams Phone with additional services Understand how Teams interacts with additional services Configure compliance recording in Teams Configure and integrate a certified contact center in Teams Design and deploy voice bots in Teams 8 - Manage meetings and events experiences Explore meetings and events in Microsoft Teams Configure meeting settings Create and manage meeting policies Configure audio conferencing Create and manage meeting templates and template policies Create and manage meetings customization policies Configure live events settings Create and manage live events policies Examine live events across Microsoft 365 9 - Guided project - Create and assign Teams policies to meet business requirements in Microsoft Teams Prepare 10 - Configure and manage voice users Enable users for Teams Phone Enable users for Direct Routing with Teams Phone Enable additional calling features for Teams Phone Enable users for Teams Phone Mobile 11 - Configure auto attendants and call queues Design call flows for auto attendants and call queues Configure auto attendants and call queues Deploy a channel-based call queue Configure resource accounts Configure Microsoft 365 groups for voicemail Interpret call queue conference modes Interpret call queue routing methods Configure holidays for auto attendants and call queues Configure custom music on hold 12 - Configure, deploy, and manage Teams devices Manage Microsoft Teams Phones Manage Microsoft Teams Room Systems Microsoft Teams Rooms management options Manage Surface Hub 2S devices Configure Microsoft Teams SIP gateway Manage Microsoft Teams displays Remote provisioning and sign in for Teams Phones Update Microsoft Teams devices remotely Manage Microsoft Teams device tags 13 - Guided project - Prepare meeting room experiences Prepare 14 - Monitor and troubleshoot Teams collaboration communications systems Diagnose and troubleshoot phone number assignment Diagnose and troubleshoot Teams client issues Diagnose and troubleshoot call failure and call quality issues Report on and troubleshoot Teams calls with Call Quality Dashboard Diagnose and troubleshoot Direct Routing issues Troubleshoot and monitor Teams devices Troubleshoot Teams meetings and calling Troubleshoot Teams Rooms devices

MS-721T00 Collaboration Communications Systems Engineer
Delivered OnlineFlexible Dates
£2,380

ITIL© 4 Strategic Leader: Digital and IT Strategy (DITS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is aimed at people in senior roles including CIOs, chief digital officers and other aspiring CxOs, as well as consultants and others involved in digital transformations, service delivery and strategic delivery. Overview By the end of this course, you will understand: The internal and external factors to consider while crafting digital strategy How IT strategy differs from digital strategy and how they can be integrated Creating a digital strategy that achieves the most value from digital Implementing and sustaining digital strategy Developing and nurturing digital capabilities for continual business innovation and value co-creation This course takes you on a digital strategy journey. Its iterative, eight-step model moves from ?vision? through to ?actions? and is about creating sustainable, digital momentum. You experience the four key capabilities to develop a holistic, digital capability framework: digital leadership, managing innovation and emerging technologies, risk management and structuring a digital enterprise. This class includes an exam voucher. Prerequisites Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in IT Service Management. 1 - ITIL GUIDING PRINCIPLES TO ALL ASPECTS OF DIGITAL AND IT STRATEGY Focus on Value Start Where You Are Progress Iteratively with Feedback Collaborate and Promote Visibility Think and Work Holistically Keep It Simple and Practical Optimise and Automate 2 - LEVERAGE DIGITAL STRATEGY TO REACT TO DIGITAL DISRUPTION Digital Technology Digital Business Digital Organisation Digitisation Digital Transformation Business Strategy and Business Models Digital and IT Strategy Products Services Relationship Between Digital, IT Strategy and Components of ITIL SVS. 3 - RELATIONSHIP BETWEEN CONCEPTS OF DIGITAL AND IT STRATEGY, SERVICE VALUE SYSTEM AND SERVICE VALUE CHAIN Environmental Analysis External Analysis: PESTLE Internal Analysis: Four Dimensions of Service Management 4 - HOW AN ORGANISATION USES DIGITAL AND IT STRATEGY TO REMAIN VIABLE IN ENVIRONMENTS How an Organisation?s Viability is Related to Agile, Resilient, Lean, Continuous and Co-Creational it is How to Analyse the VUCA Factors and Address them in a Digital and IT Strategy Organisation?s Position in a Particular Market or Industry Digital Positioning Tool to Determine Appropriate Position for a Digital Organization 5 - EXPLAIN AND COMPARE THREE LEVELS OF DIGITAL DISRUPTION Ecosystem Industry/Market Organisational Influenced factors Achieving Customer/Market Relevance Achieving Operational Excellence Internal and External Focus Balanced Approach 6 - STRATEGIC APPROACHES BY DIGITAL AND IT TO ACHIEVE CUSTOMER/MARKET RELEVANCE AND OPERATIONAL EXCELLENCE How to Apply Approaches to Achieve Customer/Market Relevance Customer Journeys Omnichannel Delivery and Support Context-Sensitive Delivery and Support Customer Analytics Customer Feedback and 360ø Approaches How to Achieve Operational Excellence in the Four Dimensions of Service Management Understand the Financial Aspects of Digital and IT Strategy in Terms of the Following Financial Policies Portfolio Optimization Funding Projects, Products and Services Balancing Cost of Innovation and Operation Charging Models Assess Strategic Approaches for Digital Organizations 7 - RISKS AND OPPORTUNITIES OF DIGITAL AND IT STRATEGY Concept of Risk Management in the Context of a Digital Organisation Context of Digital and IT Strategy Identify Risk Assess Risk Concept of Risk Posture and Show How to Determine an Acceptable Balance Between Opportunity and Risk Explain the Concept of Innovation, Including its Key Elements and Techniques Apply Techniques to Develop and Maintain a Culture of Innovation 8 - STEPS AND TECHNIQUES INVOLVED IN DEFINING AND ADVOCATING FOR DIGITAL AND IT STRATEGY How to Use Digital Readiness Assessment to Perform Gap Analysis Between an Organisation?s Current and Desired Positions Approaches for Scraping Data from Dynamic Websites How to Define and Communicate a Vision and a Strategy How to Use Business Cases to Advocate for a Digital and IT Strategy 9 - IMPLEMENTATION OF A DIGITAL AND IT STRATEGY How to Define Operating Models for Digital Organisations Major Skills Required of Leaders in Digital Organisation Apply Approaches to Strategy Coordination and Implementation: Large-Scale Transformation Incremental Transformation Mergers and Acquisitions Individual Changes Approaches to POMs (Parallel Operating Models) How to Assess Success of a Digital and IT Strategy Typical Activities of a Digital Transformation Programme

ITIL© 4 Strategic Leader: Digital and IT Strategy (DITS)
Delivered OnlineFlexible Dates
£1,785

How to be a Great Executive Sponsor: Virtual In-House Training

By IIL Europe Ltd

How to be a Great Executive Sponsor: Virtual In-House Training This three-hour course provides key tips and techniques for becoming an actively engaged, and impactful, Executive Sponsor of projects and programs. It will explain not just what your role is, but the very specific actions you can, and must, take to increase your project's probability of success. This three-hour course provides key tips and techniques for becoming an actively engaged, and impactful, Executive Sponsor of projects and programs. It will explain not just what your role is, but the very specific actions you can, and must, take to increase your project's probability of success. And, it will highlight the key personality and other traits that are found in successful Sponsors. Regardless if you're sponsoring an Agile software development project, a construction megaproject, or any other type of project in between, this course will help get you 'hit the ground running' and being an 'impact player' on day one. Various activities and discussions will acquaint you with this important role and what you need to do to become a great executive sponsor. What you Will Learn At the end of this program, you will be able to: Define project success so everyone is 'singing from the same sheet of music' Immediately apply the ten key attributes of a great sponsor on your project Recognize great sponsorship and determine if you're the right fit for the role Practice Sponsorship over the course of the project life cycle by engaging in very specific actions and activities Be a better investment manager by analyzing the behaviors of successful activist investors Foundation Concepts The quantifiable benefits of being an actively engaged Sponsor Sponsor defined Clarence Kelly Johnson and the SR-71 Blackbird: An example of the power of Sponsorship Defining Project Success Project success: More than meeting the triple constraints Benefits management: The Sponsor's focus The Investment - Life-cycle vs. the Project Life-cycle The three questions Sponsors need to ask to define project success 10 Key Attributes of a Great Sponsor 10 Key Attributes of a Great Sponsor The Makings of a Great Sponsor The most important skills and competencies of an executive sponsor What great Sponsors do and when Four Things a Great Sponsor Can Learn from an Activist Investor The story of Outerwall, Inc. and Glen Welling of Engaged Capital, LLC Sponsors and Activist Investors Sponsorship of the 2nd Avenue Subway in Manhattan: A classic textbook example

How to be a Great Executive Sponsor: Virtual In-House Training
Delivered OnlineFlexible Dates
£350

QUALIFI Level 4 Diploma in Cyber Security

By School of Business and Technology London

Getting Started   The method of study adopted for the Cybersecurity courses program is intended to guide the learners who wish to enhance their core capacities within the cybersecurity field. The result of the Cyber Security Diploma, an accepted UK qualification, is for the aspirants to expertise in the skills needed by organisations worldwide. All the programs are designed to provide learning based on concepts and practical insights necessary for the present and future companies. Apart from this, we look forward to building up efficient team leaders, managers and leaders through the invention and delivery of learning required for the industry. The qualification will: Prepare learners for employment, and Support a range of senior IT and digital, data and security roles in the workplace.   Key Benefits   The ability to read and utilise relevant technical and security literature (including threat intelligence feeds). To apply subject knowledge & understanding to address familiar and unfamiliar problems. To appreciate the interdisciplinary nature of cyber security within business and service provision and broader operating environments and supply chains. Transferable skills and knowledge - including Project Management and Incident Response Instil a sense of respect and understanding of the global nature of the cyber threat environment. Upon completing this Level 4 diploma, learners can progress to a higher education Level 5 course in Cyber Security. Key Highlights How do you get hired to the next level of your career advancement as a unique team leader, manager or leader in Cyber Security Systems? Then, the Qualifi Level 4 Diploma in Cyber Security is the ideal starting point for your career journey. The course allows individuals to develop a more advanced career in a specific business or public organisation area by developing analytical knowledge and a deeper understanding of several core cybersecurity operational domains. It will also provide helpful generic management and leadership teaching at crucial points to help learners build essential support from within the business. Remember! The assessment for the qualification is done based on assignments only, and you do not need to worry about writing any exam. With the School of Business and Technology London, you can complete the qualification at your own pace, choosing online or blended learning from the comfort of your home. Learning and pathway materials and study guides developed by our Qualifi-approved tutors will be available around the clock in our cutting-edge learning management system. Most importantly, at the School of Business and Technology London, we will provide comprehensive tutor support through our dedicated support desk. If you choose your course with blended learning, you will also enjoy live sessions with an assigned tutor, which you can book at your convenience. Career Pathways The Qualifi Level 4 Level 4 Diploma in Cyber Security can open many career pathways including, but not limited to: Junior Cyber Security Consultant; with an estimated average salary of £44,490 per annum Junior Security Analyst; with an estimated average salary of £45,000 per annum IT Security Analyst; with an estimated average salary of £45,723 per annum Ethical Hackers; with an estimated average salary of £63,600 per annum Forensic Computer Analyst; with an estimated average salary of £44,391 per annum Penetration Tester; with an estimated average salary of £60,000 per annum Cyber Security Analyst; with an estimated average salary of £56,449 per annum Associate- Cyber Security; with an estimated average salary of £52,156 per annum About Awarding Body QUALIFI, recognised by Ofqual awarding organisation has assembled a reputation for maintaining significant skills in a wide range of job roles and industries which comprises Leadership, Hospitality & Catering, Health and Social Care, Enterprise and Management, Process Outsourcing and Public Services. They are liable for awarding organisations and thereby ensuring quality assurance in Wales and Northern Ireland. What is included?   Outstanding tutor support that gives you supportive guidance all through the course accomplishment through the SBTL Support Desk Portal. Access our cutting-edge learning management platform to access vital learning resources and communicate with the support desk team. Quality learning materials such as structured lecture notes, study guides, and practical applications, including real-world examples and case studies, will enable you to apply your knowledge. Learning materials are provided in one of the three formats: PDF, PowerPoint, or Interactive Text Content on the learning portal. The tutors will provide Formative assessment feedback to improve the learners' achievements. Assessment materials are accessible through our online learning platform. Supervision for all modules. Multiplatform accessibility through an online learning platform. This facilitates SBTL in providing learners with course materials directly through smartphones, laptops, tablets or desktops, allowing students to study at their convenience. Live Classes (for Blended Learning Students only) Assessment Time-constrained scenario-based assignments No examinations. Entry Requirements   The qualifications have been made available to all without artificial barriers denying access and progression. The primary requirement is to get through the interview, and they are expected to hold the following: Qualifications at Level 3 and; Some technical and risk management experience in a computing or security business environment and demonstrate ambition with clear career goals; A Level 4 qualification in another discipline and who want to develop their careers in cyber security   Progression   Learners completing the QUALIFI Level 4 Diploma can progress to: A Higher Education Level 5 course in Cyber Security, or Directly into employment in an associated profession. Why gain a QUALIFI Qualification?   This suite of qualifications provides enormous opportunities to learners seeking career and professional development. The highlighting factor of this qualification is that: The learners attain career path support who wish to pursue their career in their denominated sectors; It helps provide a deep understanding of the health and social care sector and managing the organisations, which will, in turn, help enhance the learner's insight into their chosen sector. The qualification provides a real combination of disciplines and skills development opportunities. The Learners attain in-depth awareness concerning the organisation's functioning, aims and processes. They can also explore how to respond positively to this challenging and complex health and social care environment. The learners will be introduced to managing the wide range of health and social care functions using theory, practice sessions and models that provide valuable knowledge. As a part of this suite of qualifications, the learners will be able to explore and attain hands-on training and experience in this field. Learners also learn to face and solve issues then and there by exposure to all the Units. The qualification will also help to Apply scientific and evaluative methods to develop those skills. Find out threats and opportunities. Develop knowledge in managerial, organisational and environmental issues. Develop and empower critical thinking and innovativeness to handle issues and difficulties. Practice judgement, own and take responsibility for decisions and actions. Develop the capacity to perceive and reflect on individual learning and improve their social and other transferable aptitudes and skills.   Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. UNIT1- Cyber Security Threat and Risk Reference No : CSEC01 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. Cybersecurity is defined as the process of securing essential data's, programs, network from cyber-attacks including harmful viruses and unauthorised logins. A threat to security will put everyone's sensitive information at risk. The module helps to focus on the security dangers threats and vulnerabilities to the organisation and implement security protection against it. " UNIT2- network security and Data Communications Reference No : CSEC02 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. This unit takes us to the Research in data communications, networking, and security cover both guided and wireless communications of voice, data, images and video and their impact on the organisations in which they are used. " UNIT3- Database Security and Computer Programming Reference No : CSEC03 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. Database security is a complex and challenging endeavour that involves all aspects of information security technologies and practices. The more accessible and usable the database, the more vulnerable it is to security threats; the more secure the database is to threats, the more difficult it is to access. " UNIT4- Incident Response, Investigations and Forensics Reference No : CSEC04 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. With the number of devices connected to the Internet exploding in recent years, the incidences of security breaches have likewise become a hot and rather disturbing topic. Within this scope, companies must know how to respond and deal with the consequences. All organisations should have an incident response plan that includes incident detection in addition to a response. From this unit, we get to know about these plans and technique and how to deal with it. " UNIT5- Security Strategy: Laws, Policies and Implementation Reference No : CSEC05 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. The purpose of this unit is to investigate potential success factors related to the implementation of information security in organisations, with a specific focus on the role of top management in implementing information security policies in organisations. " UNIT6- Cyber Security Threats and Risk: Banking and Finance Reference No : CSEC06 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. Cyber risk has emerged as a critical threat to financial stability, following recent attacks on financial institutions. This unit presents novel documentation of cyber risk around the world for financial institutions by analysing the different types of cyber incidents (data breaches, fraud, and business disruption) and identifying patterns using a variety of datasets. " UNIT7- Cyber Wars Reference No : CSEC07 Credit : 20 || TQT : 200 "The unit covers a total of 20 credits, 200 TQT,120 GLH. The Internet must be considered a very dangerous battlefield. Nobody is secure. It is a paradox that those countries which do not feel vulnerable may be the most threatened by cyberwar. A cyberattack may easily be ordered through the Internet. Such an attack is cheaper than an attack by conventional weapons, and at the same time, it causes more significant economic losses. This unit focuses on the techniques and tools to ensure cyber security. " Delivery Methods School of Business & Technology London provides various flexible delivery methods to its learners, including online learning and blended learning. Thus, learners can choose the mode of study as per their choice and convenience. The program is self-paced and accomplished through our cutting-edge Learning Management System. Learners can interact with tutors by messaging through the SBTL Support Desk Portal System to discuss the course materials, get guidance and assistance and request assessment feedbacks on assignments. We at SBTL offer outstanding support and infrastructure for both online and blended learning. We indeed pursue an innovative learning approach where traditional regular classroom-based learning is replaced by web-based learning and incredibly high support level. Learners enrolled at SBTL are allocated a dedicated tutor, whether online or blended learning, who provide learners with comprehensive guidance and support from start to finish. The significant difference between blended learning and online learning methods at SBTL is the Block Delivery of Online Live Sessions. Learners enrolled at SBTL on blended learning are offered a block delivery of online live sessions, which can be booked in advance on their convenience at additional cost. These live sessions are relevant to the learners' program of study and aim to enhance the student's comprehension of research, methodology and other essential study skills. We try to make these live sessions as communicating as possible by providing interactive activities and presentations. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.

QUALIFI Level 4 Diploma in Cyber Security
Delivered Online On Demand11 months
£843.45

ILM Level 5 Certificate In Leadership And Management

By School of Business and Technology London

Getting Started The ILM Level 5 Certificate in Leadership and Management is designed for practising project managers, department heads, and middle managers, helping them to develop skills and experience, improve performance and prepare for senior management responsibilities. At the Certificate level, the mandatory unit focuses on understanding different leadership styles and adopting the most effective style to motivate staff and achieve organisational goals. Another unit covers using and evaluating action learning for leadership development, planning, and undertaking activities to develop the learner's leadership performance. The benefits of an ILM qualification are endless. The Level 5 management course focuses on the development of an individual's ability to lead, motivate and inspire a team, to provide strategic leadership as well as improve day-to-day operational management, benchmarking their managerial skills and raising their profile within the organisation-making ILM Level 5 one of the best management qualifications to have. The Institute of Leadership and Management (ILM) Level 5 Certificate will build upon and broaden senior managers' skills, giving them the practical techniques to excel as strong and effective leaders. The ILM Level 5 Certificate aims at those with considerable management experience and those looking to take their next career step to higher-ranking leadership positions within an organisation. Studying with ILM delivered by SBTL offers the learner real, practical and transferable skills that can immediately be implemented in the workplace. Key Benefits The Level 5 Certificate in Leadership and Management is designed for practising middle managers, helping them to develop their skills and experience, improve performance and prepare for senior management responsibilities. Benefits for individuals  Understand yourself as a leader  Use feedback and self-review to enhance your leadership skills  Learn solid techniques for planning and implementing complex pieces of work  Put these skills into practice in your workplace  Raise your profile, get results and get a nationally recognised qualification.  Benefits for employers  Short, concise qualification focused on workplace-based activity  Give managers the tools to manage their own professional development  Managers with the self-awareness to lead and the practical skills to deliver results in your organisation. About Awarding Body Institute of Leadership & Management (ILM) is a professional body that helps people worldwide improve their leadership capabilities and advance their careers. All ILM qualifications are awarded by The City and Guilds of London Institute, founded in 1878 and incorporated into the Royal Charter. ILM qualifications are regulated and approved by Ofqual, the governing body for qualifications in the UK. What is included? A dedicated tutor for individual students to help and provide suggestions throughout the course. Providing formative assessment with formative feedback will support the learner to improve their achievements. Our online learning platform will provide all of the assessment materials. Platform independent accessibility of Online learning portal, SBTL delivers the course straight to the student's smartphone, tablet, laptop or desktop, enabling them to study at their convenience. Entry Requirements Must be 19 years of age and over Substantial experience as a manager or supervisor Should possess provable academic ability to complete a level 5 qualification Progression These qualifications will provide progression opportunities to other qualifications including: ILM Level 5 Diploma in Principles of Leadership and Management Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. Structure Credit Value: Minimum 13 credits Maximum 36 credits Rules of Combination: Minimum 13 credits, maximum 36 credits Minimum of 7 credits from Group 1 Maximum of 6 credits from Group 2 Unit Code Unit Title Credit Group 1 8607-506 Managing Stress and Conflict in the Organisation 3 8607-511 Managing Projects in the Organisation 4 Group 2 8607-402 Managing Equality and Diversity in Own Area 4 8607-415 Motivating people in the workplace 2 Delivery Methods School of Business & Technology London provides various flexible delivery methods to its learners, including online learning and blended learning. Thus, learners can choose the mode of study as per their choice and convenience. The program is self-paced and accomplished through our cutting-edge Learning Management System. Learners can interact with tutors by messaging through the SBTL Support Desk Portal System to discuss the course materials, get guidance and assistance and request assessment feedbacks on assignments. We at SBTL offer outstanding support and infrastructure for both online and blended learning. We indeed pursue an innovative learning approach where traditional regular classroom-based learning is replaced by web-based learning and incredibly high support level. Learners enrolled at SBTL are allocated a dedicated tutor, whether online or blended learning, who provide learners with comprehensive guidance and support from start to finish. The significant difference between blended learning and online learning methods at SBTL is the Block Delivery of Online Live Sessions. Learners enrolled at SBTL on blended learning are offered a block delivery of online live sessions, which can be booked in advance on their convenience at additional cost. These live sessions are relevant to the learners' program of study and aim to enhance the student's comprehension of research, methodology and other essential study skills. We try to make these live sessions as communicating as possible by providing interactive activities and presentations. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.

ILM Level 5 Certificate In Leadership And Management
Delivered Online On Demand11 months
£426.44

Flow Assurance for Offshore Production

By EnergyEdge - Training for a Sustainable Energy Future

About this training course This 5-days comprehensive training not only an introduction into the issue associated with the development of oil and gas fields but also provides an in depth understanding of the issues to be considered in the development of these fields. The theme throughout this training course is Flow Assurance and Innovative Technologies. Each day consists of lectures in the morning and a hands-on workshop in the afternoon. The workshop allows the participants to appreciate the design process associated with field developments. Various software will be available during the workshop to predict Multiphase flows through wells, pipelines and risers, as well as evaluating reservoir production profiles using alternative technologies to develop reservoirs. Further software to assess Surge and environmental safety will also be available. The field design approach will consider an integrated solution through modelling the reservoir decline, wells, flowlines, risers and the host facility. The participants will have a total appreciation of the methodology required to develop offshore oil and gas fields and have an understanding of all of the Flow Assurance issues and technology requirements. Training Objectives After the completion of this training course, participants will be able to: Understand the process required and identify data to analyse Flow Assurance for oil and gas fields. Examine and Identify the Flow Assurance issues required to be evaluated for oil and gas fields design. These include; Wax, Hydrates, Slugging, Corrosion, Sand Erosion, Scaling and Surge. Establish the studies to be undertaken for each area of Flow Assurance including 'Rules of Thumb' and software to be used. Prioritize the need for innovative methods and the technologies to solve Flow Assurance issues and the need for economics considerations. Appreciate the need for an integrated analysis of the oil and fields from the reservoir to the host processing facility. Gain an appreciation of the emerging and enabling technologies for offshore fields application. Dive deeper into the operational strategies requirements to mitigate Flow Assurance issues. Target Audience This training course is suitable and will greatly benefit the following specific groups: Reservoir Engineers Flow Assurance Engineers Thermodynamics Engineers Process and Chemical Engineers Pipeline Engineers Facilities Engineers Control and Subsea Engineers working in the Oil and Gas industries Engineers in other disciplines may attend that require an appreciation of Flow Assurance Course Level Intermediate Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 5 days in total (35 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training Course delivery: This course is limited to a maximum of 20 participants only. A basic understanding of thermo-hydraulics would be advantageous. Morning Lectures and afternoon hands-on practical workshop. Special features: PC-based simulation software demonstration Workshop for hands-on training Course References & Additional resources: 'Flow Assurance for Oil and Gas Fields Production Transport', 1st Edition Handouts Pre & Post Assessment Trainer Your expert course leader is a renowned specialist in flow assurance management for the oil & gas field developments. His expertise enables him to support the operating and contracting companies as well as financial institutions regarding due diligence on offshore development investment decisions and associated operational system risks. Technical assessment of fields for acquisition and production enhancement opportunity. He possesses specialist expertise in evaluating difficult pipeline fluids transport such as Ethylene, Carbon Dioxide and Hydrogen through feasibility studies and technical reviews for clients. He has an exceptional academic background and natural leadership abilities are supported by practical experience of diverse projects worldwide, along with numerous publications at key conferences and publication of four books. Particular interests in developing novel and innovative technologies for subsea applications to solve difficult flow assurance problem areas and improve field development economics. He has worked on major industry projects including; Concorde aircraft fuelling system, the Channel Tunnel aerodynamics and the first deep water oil field development (Foinaven) in the West of Shetland. He is also currently developing a renewable energy solar farm and carbon neutral energy crop (Miscanthus) for domestic and commercial power generation application. He has developed in-house resources including specialist oil & gas field development evaluation software for subsea and onshore field infrastructure development options including; costing and financial analysis, reservoir viability, flow assurance assessment, subsea processing and boosting technologies, flow induced vibrations, surge analysis, heat transfer and chemical injection systems.

Flow Assurance for Offshore Production
Delivered in Internationally or OnlineFlexible Dates
£3,255 to £3,785

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

PRINCE2 Foundation: In-House Training

By IIL Europe Ltd

PRINCE2® Foundation: In-House Training Projects fail for a variety of reasons including poor planning, lack of defined quality criteria, poor understanding of the business drivers, inadequate control, and lack of senior management involvement in other words, lack of a structured best practice approach to project delivery. PRINCE2® (6th Edition is the current version) is a structured, process-based approach to project management providing a methodology which can be easily tailored and scaled to suit all types of projects. It is the de facto standard for project management in the UK Government and is used extensively in more than 150 countries worldwide with in excess of 20,000 organizations already benefiting from its powerful approach. It can be used easily in combination with PMI®'s PMBOK® Guideto provide a robust project management methodology, or to augment an existing PMBOK®-based methodology with additional rigor around areas such as Quality, Organization, and Benefits Realization. The goals of this course are to provide participants with a thorough grounding in PRINCE2® and its benefits and to prepare them to sit the Foundation exam. What you will Learn You'll learn how to: Identify the benefits and principles underlying a structured approach to project management Define the PRINCE2® method in depth, including the principles, themes, and processes Prepare and practice for the Foundation exam Getting Started Introductions Course structure Course goals and objectives Overview of the PRINCE2® Foundation exam PRINCE2® Introduction Introducing PRINCE2® The structure of PRINCE2® What PRINCE2® does not provide What makes a project a 'PRINCE2® project'? Project Management with PRINCE2® Defining a project Managing a project Controlling the variables The Project Manager's work PRINCE2 Principles PRINCE2® Principles The Seven Principles Tailoring and Adopting PRINCE2® Defining tailoring Defining embedding What can be tailored? Who is responsible for tailoring? Introduction to the PRINCE2® Themes What is a PRINCE2® Theme? What are the PRINCE2® Themes? Tailoring the themes Format of the theme chapters Business Case Need for a business case Elements of a business case How a business case is developed Managing Benefits Organization Need for a special type of organization PRINCE2® organization structure Roles in a PRINCE2® project Combining roles Quality Relevance of quality to project work Quality, quality control, and quality assurance Quality management approach and the quality register Who is responsible for quality? Plans Need for plans and their hierarchy Approach to planning Content of a PRINCE2® plan Product-based planning Risk The need to manage risks What is a risk? Risk and continued business justification A risk management option Change Change is inevitable Different types of change Baselines and configuration management Issue and change control in PRINCE2® Progress Controlling a PRINCE2® project The application of tolerance Types of control Raising exceptions Introduction to Processes Processes and the project lifecycle The PRINCE2® journey Structure of the process chapters Tailoring the processes Starting up a Project Appointing people to the PRINCE2® roles Establishing some baselines Should we go further with this work? Planning for initiation Directing a Project Should we start / continue the project? Responding to internal / external influences Should we close this project? Initiating a Project Establishing the project's approaches Creating the project plan Refining the business case Assembling the PID Controlling a Stage Authorizing and reviewing work Monitoring and reporting Handling non-planned situations Triggering the next process Managing Product Delivery Accepting work from the Project Manager Getting the work done by the team Routine and non-routine reporting Handing back the completed work Managing a Stage Boundary Taking stock of what we have done Updating the PID Consider the options for continuing / stopping Producing exception plans Closing a Project PRINCE2® at the end of a project Transition of product to operational use How well did we do? Tying up all the loose ends

PRINCE2 Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

TESOL (TEFL) Trainer Certification

4.7(160)

By Janets

Teaching is a hugely rewarding profession, and teaching English as a foreign language (TEFL), or to speakers of other languages (TESOL) is a very fulfilling career path to take. It is estimated that two billion people will be learning or speaking English by 2020, so make the most of this TESOL course now, and fast track your career. This TESOL (TEFL) Trainer Certification has been designed by an expert TEFL trainer who has divided the course into user-friendly modules for your convenience. You will learn all about teaching English to non-native speakers – from planning lessons to classroom management and finding work. You will also explore strategies and methods for teaching the four language skills – listening, speaking, reading and writing. Learning Outcomes Deliver engaging English language lessons using diverse teaching approaches and methodologies. Analyse and apply linguistic principles to enhance language teaching effectiveness. Demonstrate proficiency in teaching all language skills: speaking, listening, reading, and writing. Develop comprehensive lesson plans and pedagogical strategies tailored to learners' needs. Manage classroom dynamics effectively to create a conducive learning environment. Implement innovative techniques for teaching English language effectively in diverse contexts. Evaluate learners' progress and provide constructive feedback to support their language development. Demonstrate proficiency in planning and executing language teaching sessions with confidence. Navigate the process of securing employment opportunities in the field of English language teaching. Provide mentorship and guidance to aspiring English language educators entering the profession. Why choose this course Affordable, Accessible, informative and well-structured study materials Earn a globally recognised accredited qualification Study in your own time, at your own pace, through any device Benefit from feedback through mock exams and multiple-choice assessments Excellent career advancement/career switch opportunities Get 24/7 help or advice from our email and live chat teams Who is this course for Experienced English language teachers seeking to enhance their pedagogical skills and advance in their careers. Education professionals transitioning into English language teaching from other disciplines or specialisations. Individuals aspiring to become teacher trainers or TESOL/TEFL course instructors. Language school managers or administrators responsible for training and professional development of teaching staff. Academic coordinators involved in curriculum development and language programme management. Entry requirements This course is available to learners of all academic backgrounds, but you must be 16 or above to undertake the qualification. Apart from that, all you need is an internet connection, a good understanding of English and a passion for learning. Certification CPD Accredited Certificate After the successful completion of the final assessment, you will receive a CPD-accredited certificate of achievement. The PDF certificate is for £9.99, and it will be sent to you immediately after through e-mail. You can get the hard copy for £15.99, which will reach your doorsteps by post. Career path TESOL/TEFL Trainer Teacher Training Coordinator Curriculum Developer for TESOL/TEFL Programmes Teacher Mentor or Supervisor Academic Manager in Language Schools or Institutes Education Consultant in Language Teaching and Learning TESOL/TEFL Course Director or Manager Educational Materials Writer for Language Teaching Resources Course Content Introduction to Teaching English Linguistics Basics Working With a Variety of Approaches Teaching Speaking Teaching Listening Teaching Reading Teaching Writing Planning Pedagogy Planning Lessons Managing Classrooms Getting a job

TESOL (TEFL) Trainer Certification
Delivered Online On Demand10 hours 55 minutes
£9.99

Learn how to prepare a 1st Class GRI Sustainability Report

By FBRH Consultants

This GRI, IEMA & CPD course is geared for busy professionals who want to understand how to proceed and create a 1st Class GRI Standards Sustainability Report and have a plan for immediate sustainability action without wasting time.

Learn how to prepare a 1st Class GRI Sustainability Report
Delivered Online On Demand
£700