Linux engineer certification training course description LPIC-2 is the second certification in LPI's multi level professional certification program. This course teaches the skills necessary to pass the LPI 201 exam; the first of two LPIC-2 exams. Specifically, the course covers the administration of Linux systems in small to medium sized mixed networks. What will you learn Perform advanced administration tasks. Perform advanced file system administration. Linux engineer certification training course details Who will benefit: Linux administrators. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Linux engineer certification fundamentals training course contents Part I The LPI 201 Exam Starting a System The Linux Boot Process, Firmware Startup, BIOS Startup, UEFI Startup, Linux Bootloaders, GRUB Legacy, GRUB 2, Alternative Bootloaders, Secure Bootloaders, Process Initialization, SysV Method, systemd Method, Upstart Method, System Recovery, Kernel Failures, Root Drive Failure. Maintaining the System Fluid Messaging, Static Messaging, System backups, Backup Strategies, Performing Backups, Installing Programs from Source, Obtaining and unpacking Installation Files, Compiling Programs, Resource Usage: Managing, measuring, predicting and troubleshooting. Mastering the Kernel What Is the Kernel? Kernel Features, Parts of the Kernel, Kernel Versions, Obtaining Source Code, Creating the Configuration File, Compiling and Installing the Kernel, Compiling and Installing Modules, Creating an Initial RAM Disk, Booting the New Kernel, Creating a Kernel Package, Maintaining the Kernel, Working with Module Files, Module Commands, Working with Hardware, Automatically Detecting Hardware, Troubleshooting the Kernel. Managing the Filesystem The Linux Filesystem, Filesystem Structures, Filesystem Types, Making Filesystems, Attaching Filesystems, Memory-Based Linux Filesystems, the Btrfs Filesystem, Btrfs Subvolumes, Btrfs Snapshots, Optical Filesystems, Swap Filesystems, Network-Based Filesystems, Auto-Mounting, Encrypted Filesystems, Maintaining Linux Filesystems, Adjusting a Filesystem, Checking and Repairing a Filesystem, SMART. Administering Advanced Storage Devices Configuring RAID, Implementing RAID on Linux, Managing a RAID Array, Adjusting Storage Devices, Looking at Drive Interface Concepts, Testing and Tuning Drives, Implementing iSCSI, Managing Logical Volumes, LVM, Creating Logical Volumes, Supporting Logical Volumes, Understanding the Device Mapper. Navigating Network Services Networking Basics, The Physical Layer, The Network Layer, The Transport Layer, The Application Layer, Configuring Network Features, Network Configuration Files, Graphical Tools, Command-Line Tools, Basic Network Troubleshooting, Checking the Log Files, the ARP Cache, Sending Test Packets, Testing Network Routes, Testing Client/Server Connectivity, Finding Host Information, Network Security, Advanced Network Troubleshooting, Viewing Open Network Connections, Viewing Network Statistics, Scanning the Network, Capturing Network Traffic.
Leading SAFe®: Virtual In-House Training During this course, attendees gain the knowledge necessary to lead a Lean-Agile enterprise by using the Scaled Agile Framework® (SAFe®) and its underlying principles derived from Lean, systems thinking, Agile development, product development flow, and DevOps. Participants in the class gain insights into mastering business agility to thrive in competitive markets. They discuss how to establish team and technical agility and organize and re-organize around the flow of value. Attendees also learn and practice the skills to support and execute PI Planning events and coordinate multiple Agile Release Trains (ARTs). Class participants will explore the importance of adopting a customer-centric mindset and Design-Thinking approach to Agile Product Delivery. Learners will also understand how to implement a Lean Portfolio Management function within their enterprise. What you will Learn After attending this class, attendees should be able to: Lead the transformation to business agility with SAFe® Become a Lean-Agile leader Understand customer needs Design Thinking Enable Agile Product delivery Implement Lean Portfolio Management Thrive in the digital age with business agility Become a Lean-Agile leader Establish Team and Technical Agility Build solutions with Agile Product Delivery Explore Lean Portfolio Management Lead the change Become a Certified SAFe® Agilist
Junos Service Provider Switching training course description This course provides students with an overview of switching concepts such as LANs, Layer 2 address learning, bridging, virtual LANs (VLANs), provider bridging, VLAN translation, spanning-tree protocols, and Ethernet Operation, Administration, and Maintenance (OAM). This course also covers Junos operating system-specific implementations. Junos Service Provider Switching is an intermediatelevel course. What will you learn Describe carrier Ethernet. Describe the function of an Ethernet LAN. Implement VLAN tagging. Describe the components of provider bridging. Identify and use available tools to resolve network issues. Configure and monitor Ethernet OAM, ERP, LAG, STP, the RSTP, the MSTP, and the VSTP. Junos Service Provider Switching training course details Who will benefit: Individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: Junos Intermediate Routing Duration 2 days Junos Service Provider Switching training course contents Ethernet Switching and Virtual LANs Ethernet LANs Bridging Configuring and Monitoring VLANs Automating VLAN Administration Configuring and Monitoring IRB Layer 2 Address Learning and Forwarding Layer 2 Firewall Filtering Ethernet Switching and VLANs Lab Virtual Switches Routing Instances Overview Configuring and Monitoring Virtual Switches Interconnecting Routing Instances Logical Systems Virtual Switches Lab Provider Bridging Expanding the Bridged Network Provider Bridging Configuring and Monitoring Provider Bridging Provider Bridging Lab Spanning-Tree Protocols Overview of STP Overview of RSTP Overview of MSTP Overview of VSTP Configuring and Monitoring Spanning-Tree Protocols Understanding BPDU, Loop, and Root Protection MSTP Lab Ethernet OAM OAM Overview LFM CFM Configuring and Monitoring Ethernet OAM Ethernet OAM Lab High Availability and Network Optimization ERP Overview Configuring and Monitoring ERP Link Aggregation Group Overview Configuring and Monitoring a LAG MC-LAG Overview Configuring and Monitoring an MC-LAG High Availability and Network Optimization Lab Troubleshooting and Monitoring Introduction to Troubleshooting and Monitoring Troubleshooting and Monitoring Tools Troubleshooting Case Study: Network Congestion Troubleshooting and Monitoring Lab Appendix A: Carrier Ethernet Ethernet in the WAN Ethernet Standards Organizations MX Series Layer 2 Features Appendix B: Deprecated Syntaxes Appendix C: MX Series Overview
Five half-day Leadership modules with mini work placed projects to bring the learning into action in the workplace.
Enhance your knowledge with Energy Edge's course on methanol bunkering and fuel cell technology for vessels. Enroll now!
About this training This 5-day training course enables participants to learn and understand the fundamental concepts of well test analysis. The methodology described in the course, which has become the standard of the industry, presents a systematic way of interpreting well tests in homogeneous and heterogeneous reservoirs, including fissured and multilayered systems. Recommendations for designing tests in such formations, examples, and problem-solving sessions for practical experience and immediate application are included in the course. Training Objectives Upon completion of this course, participants will be able to: Understand the well test analysis methodology Present the straight line, log-log pressure, derivative and deconvolution analysis methods Learn the most common reservoir behaviours and boundary effects Carry out the gas and multiphase analysis Target Audience The course is intended for individuals who involved with the design and interpretation of well tests. The following personnel will benefit from the knowledge shared in this course: Petroleum Production Engineers Production and Wellsite Geologist Geophysicist Reservoir Engineer Drilling Engineer Trainer Your expert course leader has taught numerous well test interpretation industry courses around the world and has been involved in many consulting projects. He is a member of the Society of Petroleum Engineers (SPE) since 1969, and he was elected a Distinguished Member in 2002 and an Honorary Member in 2009. He has chaired or organized many SPE Advanced Technology Workshops. He is a recognized expert in well test analysis and has published over one hundred technical papers and was responsible for many advances in well test interpretation, including: the use of Greens functions; wellbore storage and skin, fractured wells, and wells with double porosity behavior; the first major commercial computer-aided interpretation software; single-well and multi-well deconvolution; and a well test interpretation methodology which has become standard in the oil industry. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Embark on an exhilarating journey into the captivating realm of Physics Phenomena with our comprehensive course package. Delve into the latest developments in the UK's scientific landscape, where breakthroughs in Basic Electricity, Ohm's Law, and Circuit Analysis are reshaping the way we understand and harness energy. This package covers everything from Particle Physics to the mysteries of the cosmos explored in Astronomy and the Big Bang Theory. Immerse yourself in the intricacies of Electrical circuit laws and Methods and grasp the fundamentals of Engineering Mechanics. Uncover the secrets of renewable energy and explore the dynamics of electrical power systems and high-voltage engineering. With modules spanning from Supercharger Automobile Engineering to Aerospace Engineering, this course package is your key to unlocking the secrets of the universe. This Physics Phenomena Package Consists of the following Premium courses: Course 01: Basic Electricity, Ohm's Law and Circuit Analysis Diploma Course 02: Particle Physics Course 03: Astronomy and the Big Bang Theory Course 04: Electrical Circuits Laws and Methods Course 05: Engineering Mechanics Course for Beginners Course 06: Renewable Energy Course 07: Electrical Engineering With Electric Circuits Course 08: Energy Engineering Certificate and Sustainable Energy Level 3 Course 09: Electrical Power System and High Voltage Engineering Course 10: Supercharger Automobile Engineering Course 11: Electrical Training Certificate, Fire Safety Measures and Legislation Course 12: Sustainable Energy Course 13: Flight Mechanics: Aircraft Certification Course 14: Electrical 3 Phase Power Transformers Fundamentals Course 15: Aerospace Engineering Course 16: Training Diploma in Electric and Hybrid Vehicles Engineering Course 17: Electricity - Theory and Safety Training Course 18: Digital Electric Circuits & Intelligent Electrical Devices Course 19: MATLAB Simulink for Electrical Power Engineering Course 20: Short Circuit Analysis for HV Three Phase Systems 10 Extraordinary Career Oriented courses that will assist you in reimagining your thriving techniques- Course 01: Effective Communication Skills Diploma Course 02: Business Networking Skills Course 03: Influencing and Negotiation Skills Course 04: Delegation Skills Training Course 05: Time Management Course 06: Leadership Skills Training Course 07: Decision Making and Critical Thinking Online Course Course 08: Emotional Intelligence and Social Management Diploma Course 09: Assertiveness Skills Course 10: Touch Typing Complete Training Diploma Learning Outcomes: Upon completion of this Diploma in Geotechnical Engineering - CPD Certified bundle, you should be able to: Master Basic Electricity and Circuit Analysis for practical applications. Explore Particle Physics and its implications in modern technology. Comprehend the intricacies of Astronomy, including the Big Bang Theory. Acquire proficiency in Electrical circuit laws and diverse methodologies. Demonstrate expertise in Renewable Energy and its sustainable applications. Gain a comprehensive understanding of Electrical Power Systems and High Voltage Engineering. In this dynamic learning experience, discover the intersection of theory and application, from short circuit analysis for HV three-phase systems to the intricate world of Digital Electric Circuits and Intelligent Electrical Devices. Harness the power of MATLAB Simulink for Electrical Power Engineering and gain expertise in Flight Mechanics for Aircraft Certification. Elevate your skills in Electric and Hybrid Vehicles Engineering and master the essentials of Fire Safety Measures and Legislation in Electrical Training. Join us on a transformative educational journey where knowledge meets innovation and expertise meets possibility. CPD 300 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Enthusiasts seeking in-depth knowledge of Physics Phenomena. Professionals desiring to expand their expertise in Electrical Engineering. Individuals eager to explore diverse fields like Aerospace and Automotive Engineering. Please Note: Studyhub is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. Requirements To participate in this Physics Phenomena Package course, all you need is - A smart device A secure internet connection And a keen interest in Physics Phenomena Package Career path Aerospace Engineer: •50,000 - •70,000 Electrical Design Engineer: •35,000 - •50,000 Energy Consultant: •30,000 - •45,000 Renewable Energy Engineer: •40,000 - •60,000 Power Systems Engineer: •45,000 - •65,000 Particle Physicist: •40,000 - •60,000 Certificates CPD Accredited Certificate Digital certificate - Included CPD Accredited e-Certificate - Free CPD Accredited Hardcopy Certificate - Free Enrolment Letter - Free Student ID Card - Free
ISO 22301:2019 is an international standard of Security and resilience – Business continuity management systems (BCMS), its existence of it requires competent personnel to interpret its requirements, address those to integrate BCMS in an organization, and audit the organization to assess the implementation and effectiveness of overall implementation. This course is designed for professionals who are responsible for any aspect of Business continuity management systems (BCMS) as well as for those, specifically, who are pursuing their career in the field of auditing and certification. This course enhances the knowledge and skills of delegates to understand the standard and audit it effectively. The course is consisting of study material in form of self-study type written and exercises. Attendees of this course will be, on completion, competent to implement BCMS, Plan, Conduct & Report 1st, 2nd & 3rd party audits. Features of Couse ✔ 100% Online Self-paced: Considering busy schedules, we have designed this course to be attended online without bounding with the timings. To make it interactive, we have created different communication groups where candidates can discuss the points with other fellows as well as the trainers of course. Also, they can interact with trainers on monthly demonstration classes. ✔ Testing the Learning: Each section of course is covered with exercise to check your knowledge in real-time, and overall result is affected by exercises you complete. ✔ Self-Scheduling: This 40 Hours full fledge course is designed to match your schedule. You will get a life time access to this course and complete it on your ease. ✔ Superlative Material: The training is designed, developed and reviewed by competent auditors with extensive experience of auditing in different regions of world. ✔ Approved Course: The course is approved by one of the well-known personal certifying body “Exemplar Global”. With the approved course, you will get many benefits from Exemplar global which includes but not limited to; Exemplar Global graduate certificate with being listed on their website as auditor as well as badge of auditor from Exemplar Global. Extended learning content from Exemplar Global Complimentary access to online events, online magazine, newsletters, and low-cost professional Access to an exclusive LinkedIn Community Opportunity to explore career enhancement and employment opportunities Who should attend this? This course is recommended to be attended by those who are involved in implementation and/ or auditing of Business continuity management systems (BCMS), specifically BCMS Managers, Auditors and others willing to add credibility with a widely accepted qualification for auditing. Also, recommended to satisfy the applicable requirement of training and competence, if any. This course can add values to your profile if you are Intending to perform audits of Business continuity management systems (BCMS). A BCMS Executive/ Management Representative An Existing Internal Auditor A Business continuity management systems (BCMS) Consultant Responsible for implementing the Business continuity management systems (BCMS) standard. Responsibility to evaluate the outcome of internal ISO 22301:2019 – Business continuity management systems (BCMS) audits and have responsibility/ authority to improve the effectiveness of the Business continuity management systems (BCMS). Pursuing to make career in Business continuity management systems (BCMS) auditing. Course Duration: 40 Learning Hours and extended time of exercise & Exam. Certificate: Those who pass all exercises with 50% at least in each exercise will be awarded with successfully completion certificate with approval of Exemplar Global and a Lifetime validity. Note: Each exercise have 2 retakes, if a candidate fails in all 3 terms, the course will be block there and candidate will have to purchase it again by paying 20% of original price. Language of Course: English Pre-Requisites: ISO 22301:2019 awareness training course.
Gain the skills and essential knowledge needed for completing the manual bookkeeping activities that underpin all accountancy and finance roles. Course Overview Students studying this qualification will develop practical accountancy skills in the double-entry bookkeeping system and in using associated documents and processes. They will cover transactions for accuracy, make entries in appropriate books and ledgers and calculate sales invoices and credit notes. Gain the skills and essential knowledge needed for completing the manual bookkeeping activities that underpin all accountancy and finance roles. The jobs it can lead to: • Trainee bookkeeper • Finance assistant • Accounts administrator • Clerical assistant Entry Requirements: Students can start with any qualification depending on existing skills and experience. For the best chance of success, we recommend that students begin their studies with a good standard of English and maths. Course Content: Introduction to Bookkeeping: This unit provides students with an understanding of manual and digital bookkeeping systems, including the associated documents and processes. Students will learn the basic principles that underpin the double-entry bookkeeping systems. Learning outcomes: • Understand how to set up bookkeeping systems. • Process customer transactions. • Process supplier transactions. • Process receipts and payments. • Process transactions into the ledger accounts. Principles of Bookkeeping Controls: This unit builds on the knowledge and skills acquired from studying Introduction to Bookkeeping and explores control accounts, journals and reconciliations. Students will develop the ability to prepare the value added tax (VAT) control accounts as well as the receivables and payables ledger accounts. They will use the journal to record a variety of transactions, including the correction errors. Students will be able to redraft the initial trial balance, following adjustments. Learning outcomes: • Use control accounts. • Reconcile a bank statement with the cash book. • Use the journal. • Produce trial balances. DURATION 3 Months WHATS INCLUDED Course Material Case Study Experienced Lecturer Refreshments Certificate
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.