• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1372 Software courses in Cardiff delivered Live Online

Definitive Kerberos for engineers

5.0(3)

By Systems & Network Training

Kerberos for engineers training course description This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols. What will you learn Describe what Kerberos is. Explain how Kerberos works. Install Kerberos. Configure Kerberos. Troubleshoot Kerberos. Kerberos for engineers training course details Who will benefit: Engineers interested in security. Prerequisites: TCP/IP foundation for engineers Duration 2 days Kerberos for engineers training course contents What is Kerberos? Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows. Kerberos concepts and technology AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets. Installation and administration of Kerberos Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients. Hands on Windows and Linux Kerberos. Kerberos protocols The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO. Hands on Using Wireshark to 'see' Kerberos. Troubleshooting Kerberos Approach, debugging tools, errors and solutions. Hands on Kerberos troubleshooting. Kerberos security concerns Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos. Hands on Kerberos logging. Software which uses Kerberos Kerberos logins, Kerberos and web based applications, Directory services. Advanced Kerberos issues Cross realm authentication, Windows issues, Windows and UNIX interoperability, Hands on Using a Windows DC for UNIX clients.

Definitive Kerberos for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

BA29 - User Acceptance Testing for Business Analysts

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for the Business Analyst professional who is involved with testing the functionality of technology projects. Overview Develop an understanding about basic concepts associated with User Acceptance TestingSee how UAT applies to the Software Development Lifecycle (SDLC)Recognize benefits of improved quality of deployed software using User Acceptance TestingIdentify the key roles, activities and deliverables which make up User Acceptance Testing Use a Business Use Case to define scenarios for testingCreate a UAT test plan and write UAT test cases with associated test dataUnderstand the process for testing functional and non-functional requirementsIdentify the challenges of testing vendor-supplied applications This course looks at the issues which drive the need for a UAT process & describes the components of the process. It is designed to help Business Analysts to develop an understanding of their role, the process, and the deliverables associated with UAT. Day 1 Software Testing - the Basics Understanding the Tester?s Terminology The UAT Planning Process Day 2 UAT Test Coverage Creating & Executing the UAT Test Cases Verifying the Test Results Testing Vendor-Supplied Applications Additional course details: Nexus Humans BA29 - User Acceptance Testing for Business Analysts training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA29 - User Acceptance Testing for Business Analysts course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA29 - User Acceptance Testing for Business Analysts
Delivered OnlineFlexible Dates
Price on Enquiry

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

MySQL Course Intermediate, 3 DAYS

4.6(12)

By PCWorkshops

Practical MySQL Course Intermediate, to leave you fully conversant with queries, DML and DDL statements. Hands-on, Practical MySQL Course Intermediate. PCWorkshops MySQL Course Intermediate Certificate. Max 4 people per course, we keep it personalised.

MySQL Course Intermediate, 3 DAYS
Delivered OnlineFlexible Dates
£600

Introduction to Social Media Marketing

5.0(1)

By Let’s Do Business Group

Want learn how to use social media to market your business effectively? Join this short course from Let’s Do Marketing to learn how to create your social media strategy for success – and come away with the knowledge, skills and confidence to start connecting with your customers online!

Introduction to Social Media Marketing
Delivered Online + more
£35

HP iMC for engineers

5.0(3)

By Systems & Network Training

HP iMC for engineers training course description A hands on course focusing on network management using HP iMC on Microsoft Windows or UNIX. What will you learn Describe the network management architecture. Use HP NNMi. Diagnose faults using HP iMC. Recognise the MIB structure. HP iMC for engineers training course details Who will benefit: Network administrators. Network operators Those wishing to find out more about how their NMS works Anyone wishing to implement NFV using OpenStack. Prerequisites: Introduction to Virtualization Duration 2 day HP iMC for engineers training course content Network management What is network management? Benefits, issues. Getting started with HP iMC Starting HP iMC, IP discovery, IP monitoring, controlling IP discovery. Hands on Initial HP iMC configuration. Using HP iMC Viewing devices, Device view, IP view, network view, polling. Hands on Using HP iMC. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Configuring network devices for HP iMC. Parts of SNMP SNMP architecture, MIBs, The protocol. HP iMC SNMP configuration. Hands on HP iMC SNMP configuration. MIBs The MIB2 groups, additional MIBs, MIB compilers, vendor MIBs. HP iMC MIB loader and browser. Hands on MIB browsing. Monitoring devices Polling, obtaining MIB information. Hands on HP iMC performance management. Configuration and change management Configuration templates, software library, configuration compare, configuration audit and reports. Hands on Using the configuration center. Reports Report templates, Real time reports, scheduling reports. Hands on Using real time reports. HP iMC fault management Alarms, polling, fault management, setting thresholds and configuring traps. Syslog. Hands on Working with alarms. Security alarms.

HP iMC for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

MD-102T00 Microsoft 365 Endpoint Administrator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Microsoft 365 Endpoint Administrator is responsible for deploying, configuring, securing, managing, and monitoring devices and client applications in a corporate setting. Their duties include managing identity, access, policies, updates, and apps. They work alongside the M365 Enterprise Administrator to develop and execute a device strategy that aligns with the requirements of a modern organization. Microsoft 365 Endpoint Administrators should be well-versed in M365 workloads and possess extensive skills and experience in deploying, configuring, and maintaining Windows 11 and later, as well as non-Windows devices. Their role emphasizes cloud services over on-premises management technologies. In this course, students will learn to plan and execute an endpoint deployment strategy using contemporary deployment techniques and implementing update strategies. The course introduces essential elements of modern management, co-management approaches, and Microsoft Intune integration. It covers app deployment, management of browser-based applications, and key security concepts such as authentication, identities, access, and compliance policies. Technologies like Microsoft Entra ID, Azure Information Protection, and Microsoft Defender for Endpoint are explored to protect devices and data. Prerequisites The Modern Desktop Administrator must be familiar with M365 workloads and must have strong skills and experience of deploying, configuring, and maintaining Windows 11 and later, and non-Windows devices. 1 - Explore the Enterprise Desktop Examine benefits of modern management Examine the enterprise desktop life-cycle model Examine planning and purchasing Examine desktop deployment Plan an application deployment Plan for upgrades and retirement 2 - Explore Windows Editions Examine Windows client editions and capabilities Select client edition Examine hardware requirements 3 - Understand Microsoft Entra ID Examine Microsoft Entra ID Compare Microsoft Entra ID and Active Directory Domain Services Examine Microsoft Entra ID as a directory service for cloud apps Compare Microsoft Entra ID P1 and P2 plans Examine Microsoft Entra Domain Services 4 - Manage Microsoft Entra identities Examine RBAC and user roles in Microsoft Entra ID Create and manage users in Microsoft Entra ID Create and manage groups in Microsoft Entra ID Manage Microsoft Entra objects with PowerShell Synchronize objects from AD DS to Microsoft Entra ID 5 - Manage device authentication Describe Microsoft Entra join Examine Microsoft Entra join prerequisites limitations and benefits Join devices to Microsoft Entra ID Manage devices joined to Microsoft Entra ID 6 - Enroll devices using Microsoft Configuration Manager Deploy the Microsoft Configuration Manager client Monitor the Microsoft Configuration Manager client Manage the Microsoft Configuration Manager client 7 - Enroll devices using Microsoft Intune Manage mobile devices with Intune Enable mobile device management Explain considerations for device enrollment Manage corporate enrollment policy Enroll Windows devices in Intune Enroll Android devices in Intune Enroll iOS devices in Intune Explore device enrollment manager Monitor device enrollment Manage devices remotely 8 - Execute device profiles Explore Intune device profiles Create device profiles Create a custom device profile 9 - Oversee device profiles Monitor device profiles in Intune Manage device sync in Intune Manage devices in Intune using scripts 10 - Maintain user profiles Examine user profile Explore user profile types Examine options for minimizing user profile size Deploy and configure folder redirection Sync user state with Enterprise State Roaming Configure Enterprise State Roaming in Azure 11 - Execute mobile application management Examine mobile application management Examine considerations for mobile application management Prepare line-of-business apps for app protection policies Implement mobile application management policies in Intune Manage mobile application management policies in Intune 12 - Deploy and update applications Deploy applications with Intune Add apps to Intune Manage Win32 apps with Intune Deploy applications with Configuration Manager Deploying applications with Group Policy Assign and publish software Explore Microsoft Store for Business Implement Microsoft Store Apps Update Microsoft Store Apps with Intune Assign apps to company employees 13 - Administer endpoint applications Manage apps with Intune Manage Apps on non-enrolled devices Deploy Microsoft 365 Apps with Intune Additional Microsoft 365 Apps Deployment Tools Configure Microsoft Edge Internet Explorer mode App Inventory Review 14 - Protect identities in Microsoft Entra ID Explore Windows Hello for Business Deploy Windows Hello Manage Windows Hello for Business Explore Microsoft Entra ID Protection Manage self-service password reset in Microsoft Entra ID Implement multi-factor authentication 15 - Enable organizational access Enable access to organization resources Explore VPN types and configuration Explore Always On VPN Deploy Always On VPN 16 - Implement device compliance Protect access to resources using Intune Explore device compliance policy Deploy a device compliance policy Explore conditional access Create conditional access policies 17 - Generate inventory and compliance reports Report enrolled devices inventory in Intune Monitor and report device compliance Build custom Intune inventory reports Access Intune using Microsoft Graph API 18 - Deploy device data protection Explore Windows Information Protection Plan Windows Information Protection Implement and use Windows Information Protection Explore Encrypting File System in Windows client Explore BitLocker 19 - Manage Microsoft Defender for Endpoint Explore Microsoft Defender for Endpoint Examine key capabilities of Microsoft Defender for Endpoint Explore Windows Defender Application Control and Device Guard Explore Microsoft Defender Application Guard Examine Windows Defender Exploit Guard Explore Windows Defender System Guard 20 - Manage Microsoft Defender in Windows client Explore Windows Security Center Explore Windows Defender Credential Guard Manage Microsoft Defender Antivirus Manage Windows Defender Firewall Explore Windows Defender Firewall with Advanced Security 21 - Manage Microsoft Defender for Cloud Apps Explore Microsoft Defender for Cloud Apps Planning Microsoft Defender for Cloud Apps Implement Microsoft Defender for Cloud Apps 22 - Assess deployment readiness Examine deployment guidelines Explore readiness tools Assess application compatibility Explore tools for application compatibility mitigation Prepare network and directory for deployment Plan a pilot 23 - Deploy using the Microsoft Deployment Toolkit Evaluate traditional deployment methods Set up the Microsoft Deployment Toolkit for client deployment Manage and deploy images using the Microsoft Deployment Toolkit 24 - Deploy using Microsoft Configuration Manager Explore client deployment using Configuration Manager Examine deployment components of Configuration Manager Manage client deployment using Configuration Manager Plan in-place upgrades using Configuration Manager 25 - Deploy Devices using Windows Autopilot Use Autopilot for modern deployment Examine requirements for Windows Autopilot Prepare device IDs for Autopilot Implement device registration and out-of-the-box customization Examine Autopilot scenarios Troubleshoot Windows Autopilot 26 - Implement dynamic deployment methods Examine subscription activation Deploy using provisioning packages Use Windows Configuration Designer Use Microsoft Entra join with automatic MDM enrollment 27 - Plan a transition to modern endpoint management Explore using co-management to transition to modern endpoint management Examine prerequisites for co-management Evaluate modern management considerations Evaluate upgrades and migrations in modern transitioning Migrate data when modern transitioning Migrate workloads when modern transitioning 28 - Manage Windows 365 Explore Windows 365 Configure Windows 365 Administer Windows 365 29 - Manage Azure Virtual Desktop Examine Azure Virtual Desktop Explore Azure Virtual Desktop Configure Azure Virtual Desktop Administer Azure Virtual Desktop Additional course details: Nexus Humans MD-102T00 : Microsoft 365 Endpoint Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MD-102T00 : Microsoft 365 Endpoint Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MD-102T00 Microsoft 365 Endpoint Administrator
Delivered OnlineFlexible Dates
£2,975

Definitive IP CCTV for engineers

5.0(3)

By Systems & Network Training

IP CCTV training course description This hands on course covers the technologies used in IP CCTV systems. The focus is not on operating or cabling but more advanced configuration and troubleshooting. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install IP CCTV. Configure IP CCTV. Explain how IP CCTV protocols work. Troubleshoot IP CCTV. IP CCTV training course details Who will benefit: Technical staff working with IP CCTV. Prerequisites: None. Duration 2 days IP CCTV training course contents Introduction What is IP CCTV? Camera types, Video, Audio, two way audio, IP CCTV software. Hands on Installing IP CCTV. CCTV architecture Components, servers, storage, LANs, WANs. Centralised versus decentralised. Hands on Using IP CCTV. Ethernet What is Ethernet? Ethernet cabling, Inside versus outside, hubs, switches, PoE, VLANs. Hands on Ethernet connectivity. Wireless WiFi, other wireless solutions, 802.11, variations, frequencies, Access Points, bridges, repeaters. WEP, WPA, WPA2, Hands on WiFi Configuration Ways to configure, IP addresses, subnet mask, default gateway, DHCP, NAT, access from the Internet. Hands on CCTV configuration. How IP CCTV works TCP, UDP, IP, RTP, RTSP, SIP, PTZ, NTP, Wireshark. Port numbers. Hands on Using Wireshark to troubleshoot IP CCTV. Network issues with IP CCTV Bandwidth, video resolution, compressions, codecs, frame rates, audio. QoS. One way versus two way traffic. Hands on Analysing CCTV traffic. Security VPNs, Firewalls. Hands on CCTV through a firewall. Troubleshooting ping, tracert, arp, ipconfig, pathping, tracert. Cable issues, switch issues, WiFi issues.CCTV issues. Hands on CCTV troubleshooting. Miscellaneous Design issues, multicasting, gateways. DVR technology. Calculating storage requirements.

Definitive IP CCTV for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Total sFlow for engineers

5.0(3)

By Systems & Network Training

Total sFlow training course description A comprehensive hands on course covering sFlow. The course starts with the basics of flows moving swiftly onto configuring sFlow and studying the information it provides. What will you learn Describe sFlow. Use Nmap. Recognise how sFlow can be used. Describe the issues in using sFlow. Compare SFlow with SNMP and NetFlow. Total sFlow training course details Who will benefit: Technical staff working with sFlow. Prerequisites: TCP/IP foundation for engineers. Duration 1 day Total sFlow training course content What is SFlow? Where to monitor traffic. Packet based sampling, Time based sampling. Adaptive sampling. Flow samples, Counter samples. Hands on Wireshark flow analysis. Getting started with sFlow sFlow configuration. Enabling sFlow. Per interface. Hands on Accessing sFlow data using the CLI. sFlow architecture SFlow agents and collectors. When flows are exported. Distributed sFlow architecture, subagents. sFlow reporting products. SolarWinds. Hands on Collector software. sFlow features and benefits Troubleshooting with sFlow, controlling congestion, security and audit trail analysis. Hands on Using sFlow. sFlow versus other technologies Flows. sFlow impact and scalability. sFlow versus SNMP and RMON, SFlow versus NetFlow/IPFIX. Hands on Advanced sFlow configuration.

Total sFlow for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,397

Enscape Rendering Training

By London Design Training Courses

Why Choose Enscape Rendering Training Course? Course info Best real-time visualization plugin, integrates with design tools like Revit, SketchUp, Rhino, ArchiCAD, and Vectorworks. Experience swift and real-time visualization within your preferred applications, eliminating extra costs and adjustments. Elevate your design projects effortlessly with Enscape. Duration: 5 hrs Method: 1-on-1, Personalized attention Schedule: Tailor your own hours of your choice, available from Mon to Sat between 9 am and 7 pm What does the Enscape Training & Interactive Workshop offer? The Enscape Training & Interactive Workshop is designed to help you get up and running with Virtual Reality (VR) in a cost-effective manner. It covers hardware and software setup, navigation techniques, real-time updates, material settings, and more. The workshop also allows participants to experience VR firsthand. What will I learn in the Enscape (VR) Training and Interactive Workshop? The workshop covers hardware setup, software installation, and configuration. You will learn how to migrate models from Revit and SketchUp into VR, navigate through designs, update objects and materials in real-time, and utilize various visual styles and settings. The course also includes interactive workshops with support from our expert tutors. Course Outline: Enscape Rendering Software Training (5 hours) Course 1: Enscape for Revit Hour 1: 1. Introduction to Enscape: Overview of Enscape rendering software, its features, and benefits. 2. Installing and Setting up Enscape: Step-by-step guidance on installing and configuring Enscape for Revit. 3. Enscape Interface: Familiarizing with the Enscape user interface and navigation controls within Revit. Hour 2: 4. Enscape Materials: Exploring material creation, application, and customization within Enscape for Revit. 5. Lighting in Enscape: Understanding different lighting options, adjusting light settings, and creating realistic lighting effects. Hour 3: 6. Enscape Camera Settings: Manipulating camera angles, perspectives, and settings for optimal visualization. 7. Enscape Rendering Settings: Exploring various rendering settings and techniques to enhance the quality of the final output. Hour 4: 8. Enscape Rendering Workflow: Demonstrating a step-by-step workflow for generating renderings and walkthroughs using Enscape in Revit. 9. Advanced Features: Introduction to advanced features such as creating panoramas, virtual reality (VR) walkthroughs, and creating animations in Enscape. Hour 5: 10. Tips and Tricks: Sharing tips and techniques for maximizing efficiency and achieving high-quality results in Enscape for Revit. 11. Q&A and Troubleshooting: Addressing participant questions, providing troubleshooting guidance, and discussing common challenges and solutions. OR Course Outline: Enscape Rendering Software Training (5 hours) Course 1: Enscape for Sketchup Hour 1: 1. Introduction to Enscape: Overview of Enscape rendering software, its features, and benefits for SketchUp users. 2. Installing and Setting up Enscape: Step-by-step guidance on installing and configuring Enscape for SketchUp. 3. Enscape Interface: Familiarizing with the Enscape user interface and navigation controls within SketchUp. Hour 2: 4. Enscape Materials: Exploring material creation, application, and customization within Enscape for SketchUp. 5. Lighting in Enscape: Understanding different lighting options, adjusting light settings, and creating realistic lighting effects. Hour 3: 6. Enscape Camera Settings: Manipulating camera angles, perspectives, and settings for optimal visualization in SketchUp. 7. Enscape Rendering Settings: Exploring various rendering settings and techniques to enhance the quality of the final output. Hour 4: 8. Enscape Rendering Workflow: Demonstrating a step-by-step workflow for generating renderings and walkthroughs using Enscape in SketchUp. 9. Advanced Features: Introduction to advanced features such as creating panoramas, virtual reality (VR) walkthroughs, and creating animations in Enscape. Hour 5: 10. Tips and Tricks: Sharing tips and techniques for maximizing efficiency and achieving high-quality results in Enscape for SketchUp. 11. Q&A and Troubleshooting: Addressing participant questions, providing troubleshooting guidance, and discussing common challenges and solutions.

Enscape Rendering Training
Delivered in London or OnlineFlexible Dates
£180