• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

595 Technology courses in Glasgow delivered Live Online

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Although there are no mandatory prerequisites, the course is particularly suited for the following audiences: Cybersecurity engineer Cybersecurity investigator Incident manager Incident responder Network engineer SOC analysts currently functioning at entry level with 2+ years of experience Overview After taking this course, you should be able to: Describe the types of service coverage within a SOC and operational responsibilities associated with each. Compare security operations considerations of cloud platforms. Describe the general methodologies of SOC platforms development, management, and automation. Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections. Describe Zero Trust and associated approaches, as part of asset controls and protections. Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC. Use different types of core security technology platforms for security monitoring, investigation, and response. Describe the DevOps and SecDevOps processes. Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, CommaSeparated Values (CSV). Describe API authentication mechanisms. Analyze the approach and strategies of threat detection, during monitoring, investigation, and response. Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs). Interpret the sequence of events during an attack based on analysis of traffic patterns. Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools). Analyze anomalous user and entity behavior (UEBA). Perform proactive threat hunting following best practices. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity fundamentals and prepares you for the role of Information Security Analyst on a Security Operations Center team. You?ll learn to automate for security using cloud platforms and how to apply your knowledge to real-world scenarios Course Outline Understanding Risk Management and SOC Operations Understanding Analytical Processes and Playbooks Investigating Packet Captures, Logs, and Traffic Analysis Investigating Endpoint and Appliance Logs Understanding Cloud Service Model Security Responsibilities Understanding Enterprise Environment Assets Threat Tuning Threat Researching and Threat Intelligence Practices Understanding APIs Understanding SOC Development and Deployment Models Performing Security Analytics and Reports in a SOC Malware Forensics Basics Threat Hunting Basics Additional course details: Nexus Humans Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Test Automation Essentials (TT3511)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The content is appropriate for test automation engineering roles, test manager roles, test lead roles, test architect roles, as well as developer roles. This course assumes you have a foundational understanding of testing and the purpose of automation. This course will be beneficial to anyone who is accountable for assessing, planning, designing, and implementing an integrated set of technology (testing infrastructure) that supports development, testing, and deployment. Overview Working in an interactive learning environment, led by our expert facilitator, attendees will learn to: Document the current state of test automation in your organization Define a custom test automation plan and architecture to fit their situation Create an initial implementation plan Identify initial key measures Develop a metrics dashboard for tracking the value of test automation Lay out a future strategy and roadmap to get there Introduction to Test Automation is a one-day, hands-on event designed to provide participants with the skills required to develop a custom test automation plan and architecture for their organization. Throughout the course, students will examine and work through various practical examples, learning how to create an integrated test automation plan and develop a test automation architecture. Participants will also learn about the possible real-world challenges they may face while trying to accomplish their goals, exploring the practical positive aspects of engaging their technical team, along with the possible frustrations of experiencing too much isolation between test automators and test designers. Getting Started Automation beginnings Software as a series of imperfect translations The Compelling Business Needs for Automation Automation the next opportunity Islands of Automation Getting products to market more quickly, at the right costs and quality Automation Challenges and Requirements Automation Challenges Test Automation Key Requirements Foundational material for your automation plan Templates Questions Examples Virtual Consulting included with this course Automation plan vision and strategy Vision, Strategy, Approach Example Defining your end in mind Deciding where to start Engaging Others Conducting a current state tools inventory Assessing your current state - tools and processes Tools inventory example and template Radar Chart as a means of presenting current state information Consider the best automation approach Waterfall vs. agile cycles of work Aligning tools with your methodologies Strategies for Automating The Test Automation Pyramid Developing your test automation architecture Blocks of automation capabilities Islands of Automation Integrated Tools Architecture Template Integrated Tools Architecture Examples Test automation architecture examples Examples of different test automation architectures and frameworks Selenium Key Test Automation Architecture Characteristics Acceptance test-driven and behavior-driven testing overview Test automation approaches FitNesse Cucumber Gherkin script overview Tool workflow Considerations for what to automate and when Categories of tests that might be automated We have many tool choices Key points in Test Tool Architecture Planning Piloting and Implementing automation Selecting and evaluating tools and rolling them out Selling Automation - qualitative questions Selling Automation - quantitative questions Measuring automation benefits Measures in technical terms Measures in business terms Measures of testing vs. measures of test automation Next Steps A few keys to success

Introduction to Test Automation Essentials (TT3511)
Delivered OnlineFlexible Dates
Price on Enquiry

Internal Audit Skills Diploma

By NextGen Learning

Internal Audit Skills Diploma Course Overview The "Internal Audit Skills Diploma" offers an in-depth exploration of internal audit processes and procedures, providing essential knowledge for individuals seeking to excel in auditing roles. The course covers auditing as a form of assurance, the technology used in audits, internal control, risk management, and UK-specific audit standards. Upon completion, learners will have a solid understanding of internal audit processes, report generation, and the skills necessary to pursue a career as an auditor. Course Description This comprehensive diploma course equips learners with the key skills required for a successful career in internal auditing. Topics include auditing as a form of assurance, internal audit procedures, the integration of technology in audits, and methods for evaluating internal controls and risk. In addition, the course explores how to conduct audit interviews, report findings, and understand UK internal audit standards. Learners will also gain insights into the various career paths within auditing, making this course valuable for those looking to enter or advance in the industry. Internal Audit Skills Diploma Curriculum Module 01: Auditing as a Form of Assurance Module 02: Internal Audit Procedures Module 03: Technology-based Internal Audit Module 04: Internal Control and Control Risk Module 05: Audit Interviews Module 06: Reporting Audit Outcome Module 07: UK Internal Audit Standards Module 08: Career as an Auditor (See full curriculum) Who is this course for? Individuals seeking to enter the field of internal auditing. Professionals aiming to enhance their audit knowledge and career development. Beginners with an interest in auditing or risk management. Those pursuing a career in compliance, risk, or financial sectors. Career Path Internal Auditor Risk and Compliance Officer Audit Manager Financial Auditor Internal Controls Specialist Business Consultant

Internal Audit Skills Diploma
Delivered OnlineFlexible Dates
£7.99

Cisco ASA Essentials (ASAE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students who need to know how to implement and manage Cisco ASA 5500-X. Overview Upon successful completion of this course, students should be able to do the following:? Technology and features of the Cisco ASA? Cisco ASA product family? How ASAs protect network devices from attacks? Bootstrap the security appliance? Prepare the security appliance for configuration via the Cisco Adaptive Security Device Manager (ASDM)? Launch and navigate ASDM? Essential security appliance configuration using ASDM and the command-line interface (CLI)? Configure dynamic and static address translations? Configure access policy based on ACLs? Use object groups to simplify ACL complexity and maintenance? Use the Modular Policy Framework to provide unique policies to specific data flows? Handle advanced protocols with application inspection? Troubleshoot with syslog and tcp ping? Configure the ASA to work with Cisco Secure ACS 5.2 for RADIUS-based AAA of VPNs? Implement site-to-site IPsec VPN? Implement remote access IPsec and SSL VPNs using the Cisco AnyConnect 3.0 Secure Mobility Client? Work with the 5.x Legacy Cisco IPsec VPN client and Anyconnect VPN client? Deploy clientless SSL VPN access, including smart tunnels, plug-ins, and web-type ACLs? Configure access control policies to implement your security policy across all classes of VPN? Configure Active/Standby failover for both firewall and VPN high availability Student will gain the essential skills required to configure, maintain, and operate Cisco ASA 5500-X Series Adaptive Security Appliances based on ASA Software v9.x. Cisco ASA Essentials ? Lesson 1: Evaluating Cisco ASA Technologies ? Lesson 2: Identifying Cisco ASA Families Basic Connectivity and Device Management ? Lesson 1: Preparing the Cisco ASA for Network Integration ? Lesson 2: Managing Basic Cisco ASA Network Settings ? Lesson 3: Configuring Cisco ASA Device Management Features Network Integration ? Lesson 1: Configuring Cisco ASA NAT Features ? Lesson 2: Configuring Cisco ASA Basic Access Control Features Cisco ASA Policy Control ? Lesson 1: Cisco ASA Modular Policy Framework ? Lesson 2: Configuring Cisco ASA Connection Policy Cisco ASA VPN Architecture and Common Components ? Lesson 1: Implementing Profiles, Group Policies, and User Policies ? Lesson 2: Implementing PKI Services Cisco ASA Clientless Remote Access SSL VPN Solutions ? Lesson 1: Deploying Basic Clientless VPN Solutions ? Lesson 2: Deploying Advanced Application Access for Clientless SSL VPNs Cisco AnyConnect Remote Access SSL Solutions ? Lesson 1: Deploying a Basic Cisco AnyConnect Full-Tunnel SSL VPN Solution Cisco ASA Remote Access IPsec VPNs ? Lesson 1: Deploying Cisco Remote Access VPN Clients ? Lesson 2: Deploying Basic Cisco Remote Access IPsec VPN Solutions Cisco ASA Site-to-Site IPsec VPN Solutions ? Lesson 1: Deploying Basic Site-to-Site IPsec VPNs ? Lesson 2: Deploying Advanced Site-to-Site IPsec VPNs Cisco ASA High Availability and Virtualization ? Lesson 1: Configuring Cisco ASA Active/Standby High Availability Labs Lab 1: Prepare the ASA for Administration Lab 2: Fundamental ASA Configuration Lab 3: Network Address Translation (NAT) Lab 4: Basic Access Control Lab 5: Basic Protocol Inspection Lab 6: Licensing, ACS, and Public CA Lab 7: Basic Clientless SSL VPN Lab 8: Clientless SSL VPN - Thin Apps Lab 9: Basic AnyConnect Full Tunnel SSL VPN Lab 10: Remote Access IPSec VPN Lab 11: IPSec Site-to-Site VPN Lab 12: Active/Standby Failover

Cisco ASA Essentials (ASAE)
Delivered OnlineFlexible Dates
Price on Enquiry

BW362 SAP BW on SAP HANA

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Technology Consultants Overview Enables you to implement and maintain SAP BW powered by SAP HANA.Outlines advantages of the new SAP 'In-Memory' database foundation for SAP BW.Explains HANA specific features as well as optimized existing as well as new data models and functions of SAP BW.Introduces the new SAP architecture framework of LSA++ and provides guidelines on how to convert your existing EDW-architecture into this new concept.Explains native HANA modeling and how both, HANA information views as well as BW InfoProviders, can complement each other in so-called 'mixed scenarios'. In this course, students gain the knowledge to enable themselves to implement and maintain SAP BW powered by SAP HANA. The course explains HANA specific features as well as optimized existing as well as new data models and functions of SAP BW. Getting Started SAP HANA Basics SAP BW Basics SAP HANA BW Modeling Tools SAP HANA Native Modeling Migration to SAP BW on HANA Migration Strategies and Tools SAP BW Migration Cockpit BW on HANA Data Management Multi-Temperature Data Management Optimizing BW Data Management based on Dynamic Tiering and Non- Active Concept Optimizing BW Data Management based on Nearline-Storage Optimization Areas in BW on HANA HANA-Optimized Data Modeling: InfoCubes HANA-Optimized Data Modeling: Advanced DataStore-Objects HANA-Optimized Data Modeling: CompositeProviders HANA-Optimized Data Staging HANA-Optimized Analytic Manager HANA-Optimized Analysis Processes Modeling with SAPïs Reference Architecture LSA++ Review of Layered Scalable Architecture (LSA) From LSA to LSA++: Streamline Core Layers LSA++: Open Operational Data Store Layer (Open ODS Views) LSA++: Agile Data Mart & BW Workspace Layer Hybrid Modeling in Mixed Scenarios Generation of HANA-Views of BW InfoProviders Mixed Scenarios SAP HANA Live HANA-Optimized BI Content Data Provisioning into SAP HANA and SAP BW Overview of Data Provisioning Methods to SAP HANA SLT Replication into SAP HANA SLT Replication into SAP BW Operational Data Provisioning into SAP BW DB-Connect and Open Hub Destination Additional Enhancements of BW 7.40 InfoObject Enhancements Authorization Enhancements Process Chain Monitoring HANA-Optimized BW Search HANA-Optimized BW Planning Obsolete BW Object Types Mobile Enablement Enhancements SAP HANA vs. BW Accelerator Summary & Outlook New Transactions and BW on HANA Roadmap Additional course details: Nexus Humans BW362 SAP BW on SAP HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BW362 SAP BW on SAP HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BW362 SAP BW on SAP HANA
Delivered OnlineFlexible Dates
Price on Enquiry

Blockchain Architecture Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Technical Leaders Overview What is BlockchainHow does Blockchain workTypes of BlockchainsHow is Blockchain different from what we have todayWhat are use cases for BlockchainWhat does a Blockchain app look likeHow do I design a Blockchain appHow do I develop a Blockchain appHow do I test a Blockchain app This instructor-led 3 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms. What is Blockchain? A record keeping system Trust Decentralization Trustless environment How does Blockchain work? Announcements Blocks Nodes Chaining Verification Consensus Scalability Privacy Crypto Hashing Digital Fingerprinting PoW vs PoS Types of Blockchains Public vs Private Open vs closed Smart Contracts Blockchain as History Tokens / Coins Gas How is Blockchain different from what we have today? Decentralized Peer-to-peer architecture Software vs Firmware Database vs Blockchain Distributed database or other technology? Data Sovereignty Group Consensus What are Use Cases for Blockchain? Use Case Examples Currency Banking Services Voting Medical Records Supply Chain / Value Chain Content Distribution Verification of Software Updates (cars, planes, trains, etc) Law Enforcement Title and Ownership Records Social Media and Online Credibility Fractional asset ownership Cable Television billing High fault tolerance DDoS-proof Public or Private Blockchain? Who are the participants? What does a Blockchain app look like? DApp Resembles typical full stack web application Any internal state changes and all transactions are written to the blockchain Node.js IDE Public Blockchain visibility Private Blockchain solutions Oracles How do I design a Blockchain app? What does this solution need to let users do? Will the proposed solution reduce or remove the problems and pain points currently felt by users? What should this solution prevent users from doing? Do you need a solution ready for heavy use on day 1? Is your solution idea enhanced by the use of Blockchain? Does the use of Blockchain create a better end-user experience? If so, how? Has your business developed custom software solutions before? What level of support are you going to need? How big is the developer community? Does your vision of the future align with the project or platform's vision of the future? Does the platform aim to make new and significant contributions to the development space, or is it an efficiency / cost play? Should the solution be a public or private Blockchain? Should the solution be an open or closed Blockchain? Create a plan for contract updates and changes! Hybrid solutions Monetary exchanges? How do I develop a Blockchain app? AGILE approach pre-release Define guiding principles up front Software vs Firmware Announcements, not transactions! Classes, not contracts Link contracts to share functions Use calling contracts to keep contract address the same Hyperledger vs Ethereum CONSIDER No of Users * Avg No of Transactions (state changes) per User Should a Blockless solution be applied? Performance Security Anonymity Security Monolithic vs Modular Sandwich complexity model How do I test a Blockchain app? Recommend 5x to 10x traditional application testing time Security Networks

Blockchain Architecture Training
Delivered OnlineFlexible Dates
Price on Enquiry

Certified TIA-942 Design Consultant (CTDC)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Participants must possess a valid data centre training certificate such as CDCP or any other approved equivalent. Please submit a copy of your certificate for verification upon registration for the CTDC course. Overview After completion of the course the participant will be able to:1. Learn to properly comprehend and apply the ANSI/TIA-942 Standard requirements and guidelines2. Understand the proper intent of the ANSI/TIA-942 Standard to avoid both over- and/or under-investment3. Align the selection of redundancy levels and infrastructure investments to the business requirements.4. Understand the criteria and requirements for a high-availability data centre design and how to effectively establish the data centre from the perspective of the ANSI/TIA-942 Standard5. Understand how the ANSI/TIA-942 Standard relates to various worldwide standards This course, the participant will learn how to design an ANSI/TIA-942 compliant data centre. It will provide a clear understanding of the requirements of the ANSI/TIA-942 Standard and possible implementation variations. Introduction to Data Centre Facilities About the ANSI/TIA-942 Life of the ANSI/TIA-942 Standard Relation to other standards Architectural Electrical Mechanical Telecommunication Areas under scope High level redundancy definitions Redundancy options (N, N+1 etc.) Fault tolerant Concurrent maintainability Compartmentalisation Examples of redundancy levels Data Centre Space PlanningData Centre TopologiesRecommendations for Energy EfficiencyArchitectural Site selection Parking Multi-tenant building Building construction Vapor barrier Roofing Floor loading Raised flooring Suspended/drop ceiling Hanging load Seismic Building Security & Safety Security CCTV Staffing Bullet/ballistic proofing Lighting Safety - Signage Building and Room Access Security checkpoints Entry lobby Doors and windows Exit corridors Shipping and receiving areas Room/Area Design Requirements Administrative offices Security offce Operations centre Restroom and break room UPS/Battery rooms Generator and fuel storage area Computer room Electrical Utility power - Substation - Feed requirements - Self-generation HT/HV switch gear Generator and fuel supply LT/LV switch gear - ATS - Alternatives to ATS UPS and batteries PDU STS Grounding Surge protection EPO Central power monitoring Load banks Testing Equipment maintenance - Preventive maintenance - Facility training programs Mechanical Environmental design - Temperature and humidity requirements - Contamination - Sources - Clean air - Pressurisation - Radio sources - Vibration - Water ingress Water cooled systems - Heat rejection - Chilled water system - Condenser water? - Make up water Air cooled systems HVAC control systems Plumbing - Pipe routing Fire suppression Water leak detection Telecommunications Network topology Redundancy level design Media and connectors Cabling pathways Detailed cabling design considerations Administration and labeling Cable testing Data centre fabrics Exam: Certified TIA-942 Design Consultant Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified TIA-942 Design Consultant (CTDC)
Delivered OnlineFlexible Dates
£2,400

AI Frontiers 2025: THE FUTURE IS NOW!

By IIL Europe Ltd

Join us online on May 15, 2025 when IIL brings together experts from Google, IBM, Microsoft, BAE Systems, and many more to break down the future. Discussions, debates and presentations will cover making AI trustworthy, its many uses, what “AI Agents” are all about, and the exciting things to come! No matter where you stand with AI – just beginning, a true believer, a critical thinker, a forward-looking innovator, or a practical user – AI Frontiers 2025 guarantees valuable takeaways for you.

AI Frontiers 2025: THE FUTURE IS NOW!
Delivered OnlineFlexible Dates
£115

Blockchain Project Management Training

By NextGen Learning

Blockchain Project Management Training Course Overview This Blockchain Project Management Training course offers a comprehensive introduction to managing projects within the rapidly evolving blockchain and Web3 environments. It equips learners with essential knowledge of project and product management principles tailored specifically for blockchain technology. Participants will gain insights into the unique challenges and opportunities presented by Web3 projects, learning how to navigate this innovative landscape efficiently. By the end of the course, learners will be able to understand key concepts, develop management strategies, and prepare effectively for careers in the blockchain sector. This training is designed to enhance career prospects by providing relevant skills aligned with current industry demands. Course Description This course delves deeply into the fundamentals of project and product management in the context of blockchain technology and Web3. Topics include understanding the roles and responsibilities of a Web3 project manager, critical considerations when overseeing blockchain initiatives, and strategies for securing employment in the blockchain sector. Learners will explore how to manage complex, decentralised projects, balancing technical requirements with business objectives. The course delivers a structured learning experience that sharpens analytical and organisational abilities, helping participants become confident and competent in blockchain project environments. Delivered in clear UK English, this course prepares learners to contribute effectively within one of the most innovative and fast-growing industries today. Blockchain Project Management Training Curriculum Module 01: Introduction Module 02: Project / Product Management in Web Module 03: Important Things to Remember about being a Web3 PM Module 04: Getting a Job in Web3 Module 05: End Notes (See full curriculum) Who Is This Course For? Individuals seeking to understand blockchain project management fundamentals. Professionals aiming to develop a career in blockchain or Web3 project management. Beginners with an interest in blockchain technology and digital innovation. Project managers transitioning into emerging technologies and decentralised systems. Career Path Blockchain Project Manager Web3 Product Manager Digital Transformation Specialist Decentralised Application (dApp) Coordinator Blockchain Consultant

Blockchain Project Management Training
Delivered OnlineFlexible Dates
£7.99

Minute Taking Executive Training

By NextGen Learning

Minute Taking Executive Training Course Overview This Minute Taking Executive Training course equips learners with essential skills to accurately record, organise, and present meeting minutes with professionalism and clarity. Designed to enhance effectiveness in administrative and executive roles, the course covers key concepts including meeting preparation, understanding meeting structure, capturing decisions and actions, and mastering the responsibilities of a minute taker. Learners will gain confidence in their note-taking abilities and discover how to leverage technology to streamline the process. By the end of the course, participants will be capable of producing clear, concise, and well-structured minutes that support organisational efficiency and communication. Course Description This comprehensive training delves into the full scope of minute taking, starting with foundational knowledge on the importance and types of minutes. Learners explore how to prepare thoroughly before meetings and understand different meeting formats and protocols. The course covers how to accurately document discussions, decisions, and assigned actions, while also clarifying the specific duties and ethical considerations of a minute taker. Practical guidance on effective note-taking techniques and strategies for building confidence in minute-taking situations is included. Additionally, learners will examine how digital tools and technology can aid in capturing and distributing minutes efficiently. Throughout, the course emphasises professionalism and accuracy, ensuring participants develop skills that are highly valued across various industries. Minute Taking Executive Training Curriculum Module 01: Introduction to Minute Writing Module 02: Preparation for Minute Taking Module 03: The Meeting Structure Module 04: Minute Meeting, Decision and Action Module 05: Roles and Responsibility of Minute Taker Module 06: Tips for Minute Taking Module 07: Technology in Minute Taking Module 08: Building Confidence (See full curriculum) Who Is This Course For? Individuals seeking to enhance their minute-taking skills for professional settings. Professionals aiming to advance their administrative or executive support career. Beginners with an interest in administrative functions and effective communication. Office staff looking to improve meeting documentation accuracy and efficiency. Career Path Executive Assistant Administrative Officer Office Manager Project Coordinator Corporate Secretary Meeting Coordinator

Minute Taking Executive Training
Delivered OnlineFlexible Dates
£7.99