• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

32820 Courses

Symantec Client Management Suite 7.6 - Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for IT administrators who will be maintaining and installing software, taking inventory of computers, distributing software updates to computers or remotely managing computers. Overview Upon completion of this course, students will be able to: Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Gather hardware, software and operating system inventory from managed computers. Maintain a software catalog containing software components. Deliver software to managed computers. Meter software on managed computers. Distribute software updates to managed computers. Remotely manage computers. Analyze gathered data using predefined reports. This hands-on course teaches students the underlying components and concepts of the Symantec Management Platform along with the Symantec Management Console that is used by CMS to perform its management functions. Introduction Course overview The classroom lab environment Understanding the Symantec Client Management Suite Symantec Client Management Suite demonstration Learning about the Symantec Client Management Suite Symantec Management Platform components used by CMS Symantec Management Platform concepts used by CMS How the platform and CMS work The Symantec Management Console Accessing the Symantec Management Console Getting to know the Symantec Management Console Getting to know the enhanced console views Symantec Management Platform Basics Importing computer resources from Active Directory Discover computer resources using Network Discovery Grouping resources Applying CMS policies to resource targets Deploying the Symantec Management Agent Installing the Symantec Management Agent - push method Installing the Symantec Management Agent - pull method Installing solution plug-ins for the Symantec Management Agent Working with the Symantec Management Agent GUI Working with the Symantec Management Agent health settings Gathering Inventory from Managed Computers Introducing Inventory Solution Creating and configuring inventory policies Using inventory tasks Other Inventory Solution capabilities Introducing inventory reports Managing the Software Catalog Preparing the Software Management Framework to support the Software Catalog Populating the Software Catalog with software components Working with software component resources Creating and configuring software products Delivering Software to Managed Computers Choosing a method to deliver software Understanding the software blade of the enhanced console view Managing software deliveries with tasks Installing software using a managed software delivery policy Introducing software management reports Managing Software with Application Metering Understanding Application Metering Tracking software usage on managed computers Metering software with Application Metering policies Application metering reports Managing Organizational Views and Organizational Groups Learning about organizational views and groups Creating custom organizational views and group Managing organizational views and groups Managing Resource Filters and Resource Targets More about resource filters Managing and working with existing filters Creating and modifying filters More about resource targets Working with targets Managing Software Updates on Windows Computers Introducing Patch Management Solution for Windows Preparing your environment for Patch Management Distributing software updates Patch Management Solution reports Managing Virtualized Software Introducing Symantec Workspace Virtualization Installing the Symantec Workspace Virtualization agent Using CMS to deliver virtualized software Remotely Managing Computers Introducing Symantec Remote Access Connector Overview or Real-Time System Manger Remote management reports Managing Policies Getting to know policies Understanding user-based policies Understanding maintenance windows Configuring automation policies Managing shared schedules Managing Jobs and Tasks Overview of task management Creating and scheduling tasks and jobs Overview of Deployment Solution Introducing Deployment Solution Configuring Deployment Solution Creating and managing deployment jobs and tasks Deployment Solution imaging Reporting Introducing reports Using and creating standard reports Configuring and using IT Analytics Solution Site Management Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services Security Learning about security Managing user accounts, security roles, and privileges Managing permissions Additional course details: Nexus Humans Symantec Client Management Suite 7.6 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Client Management Suite 7.6 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Client Management Suite 7.6 - Administration
Delivered OnlineFlexible Dates
Price on Enquiry

JNCIA Practicum and Exam Preparation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification. Overview The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to: Identify the concepts and functionality of various fundamental elements of networking Identify the concepts, benefits and functionality of the core elements of the Junos OS Identify the concepts, operation and functionality of the Junos user interfaces Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios This intense, two-day program is designed to prepare attendees who have previously taken the Introduction to the Junos Operating System (IJOS) course for taking the certification exam while simultaneously gaining insight into real-world applications Session 1: Practice Labs Guided practice labs to reintroduce the lab environment Session 2: Real-World Scenario Labs Labs that emulate real-world application of JNCIA-level knowledge, configurations, operations, and functionality. These labs will challenge students to complete scenario-based problems to accomplish specific network goals. Session 3: Networking Fundamentals Collision domains and broadcast domains Function of routers and switches Optical network fundamentals ? SONET/SDH, OTN Ethernet networks Layer 2 addressing, including address resolution IPv4 and IPv6 fundamentals Layer 3 / IP addressing, including subnet masks Subnetting and supernetting Decimal to binary conversion Longest match routing Connection-oriented vs. connectionless protocols Session 4: Junos OS Fundamentals Junos device portfolio ? product families, general functionality Software architecture Control and forwarding planes Routing Engine and Packet Forwarding Engine Protocol daemons Transit traffic processing Exception traffic Session 5: User Interfaces CLI functionality CLI modes CLI navigation CLI Help Filtering output Active vs. candidate configuration Reverting to previous configurations Modifying, managing, and saving configuration files Viewing, comparing, and loading configuration files J-Web ? core/common functionality Session 6: Junos Configuration Basics Initial configuration User accounts Login classes User authentication methods Interface types and properties Configuration groups Additional initial configuration elements ? NTP, SNMP, syslog, etc. Configuration archival Logging and tracing Rescue configuration Session 7: Operational Monitoring and Maintenance Show commands Monitor commands Interface statistics and errors Network tools ? ping, traceroute, telnet, SSH, etc. Real-time performance monitoring (RPM) Junos OS installation Software upgrades Powering on and shutting down Junos devices Root password recovery Session 8: Routing Fundamentals Packet forwarding concepts Routing tables Routing vs. forwarding tables Route preference Routing instances Static routing Advantages of / use cases for dynamic routing protocols Session 9: Routing Policy and Firewall Filters Default routing policies Import and export policies Routing policy flow Effect of policies on routes and routing tables Policy structure and terms Policy match criteria, match types, and actions Firewall filter concepts Firewall filter concepts Filter match criteria and actions Effect of filters on packets Unicast reverse-path-forwarding (RPF) Session 10: JNCIA-JUNOS Certification Exam The exam voucher is included in the price of the course DWWTC is a certified PearsonVUE Testing Center' Additional course details: Nexus Humans JNCIA Practicum and Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JNCIA Practicum and Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

JNCIA Practicum and Exam Preparation
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Design [v7.0]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Experienced system integrators and consultants responsible for designing and deploying vSphere environments Overview By the end of the course, you should be able to meet the following objectives: Identify the business objectives for the vSphere environment Identify business requirements, constraints, assumptions, and risks for all layers in the vSphere environment Apply a framework to a design Analyze design choices and best-practice recommendations Create a design that ensures availability, manageability, performance, recoverability, and security Design the core management infrastructure for an enterprise Design the virtual data center for an enterprise Design the compute infrastructure for an enterprise Design the storage and networking infrastructures for an enterprise Design virtual machines to run applications in a vSphere infrastructure Design security, manageability, and recoverability features for an enterprise This three-day training course equips you with the knowledge, skills, and abilities to design a VMware vSphere© 7 virtual infrastructure. You follow a proven approach to design a virtualization solution that ensures availability, manageability, performance, recoverability, and security, and that uses VMware best practices. This course discusses the benefits and risks of available design alternatives and provides information to support making sound design decisions. Given a case study, you practice your design skills by working with peers on a design project Course Introduction Introductions and course logistics Course objectives Infrastructure Assessment Follow a proven process to design a virtualization solution Define customer business objectives Gather and analyze business and application requirements Document design requirements, constraints, assumptions, and risks Use a systematic method to evaluate and document design decisions Create a conceptual design Core Management Infrastructure Determine the number of VMware vCenter© Server ApplianceTM instances to include in a design Choose the appropriate single sign-on identity source Choose the time synchronization method Choose methods to collect log files and VMware ESXi? core dumps Design a vCenter Server deployment topology that is appropriate for the size and requirements of the data center Virtual Data Center Infrastructure Calculate total compute capacity requirements for a virtual data center Create a virtual data center cluster design that meets business and workload requirements Evaluate in the virtual data center the use of several management services, such as VMware vSphere© High Availability and VMware vSphere© Distributed Resource Scheduler? Evaluate the use of resource pools in the virtual data center design Compute Infrastructure Create a compute infrastructure design that includes the appropriate ESXi boot, installation, and configuration options Choose the ESXi host hardware for the compute infrastructure Storage Infrastructure Calculate storage capacity and performance requirements for a design Evaluate the use of different storage platforms and storage management solutions Design a storage platform infrastructure and storage management architecture that meets the needs of the vSphere environment Network Infrastructure Evaluate the use of different network component and network management solutions Design a network component architecture that includes information about network segmentation and virtual switch types Design a network management architecture that meets the needs of the vSphere environment Virtual Machine Design Make virtual machine design decisions, including decisions about resources Design virtual machines that meet the needs of the applications in the vSphere environment and follow VMware best practices Infrastructure Security Make security design decisions for various layers in the vSphere environment Design a security strategy that meets the needs of the vSphere environment and follows VMware best practices Infrastructure Manageability Make infrastructure manageability design decisions that adhere to business requirements Design an infrastructure manageability strategy that meets the needs of the vSphere environment and follows VMware best practices Infrastructure Recoverability Make infrastructure recoverability design decisions that adhere to business requirements Design an infrastructure recoverability strategy that meets the needs of the vSphere environment and follows VMware best practices Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Design [v7.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Design [v7.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere: Design [v7.0]
Delivered OnlineFlexible Dates
Price on Enquiry

NADIS Online flock and herd health planning tool - Join us on our weekly zoom demonstration.

By NADIS Animal Health Skills

See how the NADIS parasite and vaccination planners can help you deliver the Animal Health and Welfare Pathway for flocks and herds under your care

NADIS Online flock and herd health planning tool - Join us on our weekly zoom demonstration.
Delivered OnlineJoin Waitlist
FREE

SWSA v3.0-Securing the Web with Cisco Web Security Appliance

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SWSA v3.0-Securing the Web with Cisco Web Security Appliance
Delivered OnlineFlexible Dates
Price on Enquiry

Pop singing courses

By LondonSinging

Fans of Taylor Swift, Lady Gaga or Michael Jackson will be pleased to attend our fantastic pop singing courses offered in a relaxed and non-judgmental environment. Sing your favourite songs while improving your vocal abilities immensely. Open to adults from beginners to advanced.

Pop singing courses
Delivered in London or OnlineFlexible Dates
Price on Enquiry

Blues singing courses

By LondonSinging

Enjoy our outstanding blues singing courses for adults and develop the blues growl used by Bessie Smith, Big Bill Broonzy or Little Richard. Discover amazing vocal techniques that will make your blues feel authentic and enhance your vocal abilities under the tutoring of experts.

Blues singing courses
Delivered in London or OnlineFlexible Dates
Price on Enquiry

Project Advanced Planning and Control

By Underscore Group

Look at some of the more advanced planning features available in Project. Course overview Duration: 1 day (6.5 hours) Our Project – Advanced Planning and Control course looks at advanced planning and resourcing techniques in Microsoft Project and how to customise your schedule to give better visibility and flexibility. The course is designed for experienced users of Project who have attended our Project Planning and Control introduction course or have equivalent knowledge. You must be confident using Project to build and resource schedules and create task dependencies. Objectives  By the end of the course you will be able to: Work with different types of task Amend resource load on a task Work with multiple resource rates Create custom tables Add custom fields Create calculated fields Add drop down lists in fields Filter and extract information Create new views Export information Content Advanced planning techniques Splitting tasks Task types Spreading work across activities Advanced resourcing techniques Resource types Assignment views Effective dates Work contours Overtime work Using multiple resource rates Creating custom tables Customising tables Adding fields Creating custom fields Adding text, number, date and time fields Using flag fields Defining pick lists Renaming custom fields Creating calculated fields Creating formulas Using graphical indicators Uploading and tracking progress Completing work Completing work per resource Updating tasks Updating the project Working with the status date Rescheduling work Viewing baseline against schedule Project overview statistics Working with filters Building standard filters Building interactive filters Task and resource filters Using highlight filters Creating custom views Creating customised views Customising text styles Using grouping techniques Exporting information Exporting to Excel

Project Advanced Planning and Control
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

Technology and innovation and its profound impact on financial operations

By FD Capital

Technology and innovation and its profound impact on financial operations Technology adoption indeed comes with risks, particularly around data security and privacy. As CFOs, we must ensure robust cybersecurity measures and adhere to strict data protection regulations. It requires ongoing investment in secure systems, staff training, and proactive monitoring to mitigate risks and protect sensitive financial information. Change management is also crucial. The adoption of new technologies requires proper planning, training, and cultural adjustments. As CFOs, we need to foster a culture that embraces innovation and continuous learning. Clear communication about the benefits and objectives of technology adoption is essential to gain buy-in and drive successful implementation. Fantastic insights! Now, let’s discuss the future. What emerging technologies do you foresee shaping the future of finance functions? One area that holds immense potential is blockchain technology. Its decentralised and transparent nature has the potential to streamline financial transactions, enhance auditability, and revolutionize supply chain finance. We’re closely monitoring blockchain’s development and exploring pilot projects to leverage its benefits. I agree, blockchain is a game-changer. Additionally, as the internet of things (IoT) expands, we anticipate new opportunities and challenges. CFOs will need to adapt to the influx of real-time data from interconnected devices, leveraging this information to optimize financial processes, enhance risk management, and improve operational efficiencies. Before we wrap up, any final thoughts or advice for our CFO audience? Embrace technology and view it as an opportunity rather than a threat. Invest in understanding the technological landscape and its implications for finance. Stay curious, adapt, and be open to change. Technology will continue to evolve, and as CFOs, we must evolve with it. Absolutely. Collaboration is key. Engage with IT teams, industry peers, and external experts to stay informed about the latest technological advancements. By fostering partnerships and sharing knowledge, we can collectively navigate the ever-changing technology landscape and drive innovation within our organisations. https://www.fdcapital.co.uk/podcast/technology-and-innovation-and-its-profound-impact-on-financial-operations/ Tags Online Events Things To Do Online Online Conferences Online Science & Tech Conferences #technology #innovation #financial #impact #operations

Technology and innovation and its profound impact on financial operations
Delivered OnlineFlexible Dates
FREE

MSc in Accounting and Finance (Advanced Entry)- Inclusive of Level 7 Pathway Diploma

By School of Business and Technology London

Getting Started The MSc in Accounting and Finance is designed to help students become leaders in the financial sector.The programme aims to extend and enhance students' understanding and competence gained through professional qualifications. It seeks to develop their ability to think strategically about management and organisational change within accounting and finance. The programme suits AIA, ACA, ACCA, CIMA, ICAP, or CPA Australia graduates. It provides a means to support accounting practitioners & ongoing professional and personal development needs. Upon completing the programme, students are awarded the prestigious MSc in Accounting and Finance degree from the University of Buckingham. Additionally, students can attend the graduation ceremony held in the UK to celebrate their achievements and join fellow graduates in this momentous event. The programme comprises two phases; the first is the Level 7 Diploma in Accounting and Finance, awarded by OTHM and delivered by the School of Business and Technology London. The second phase is the MSc in Accounting and Finance (Advanced Entry), delivered by the London Graduate School and awarded by the University of Buckingham through distance learning. You will receive excellent support from academic team of London Graduate School, including your programme manager and your supervisor who will be with you every step of the way. About Awarding Body Buckingham is unique. It is the only independent University in the UK with a Royal Charter and probably the smallest, with around 2,700 students (approx 1,600 on campus). The University campus is well known for being one of the most attractive locations in the region. The Great Ouse River, home to much wildlife, winds through the heart of campus. Each student mixes with over 100 other different nationalities, so being at Buckingham is just like being in a mini global village. These contacts, acquaintances and friendships carry on long after life at Buckingham is over. Ranked Top 10 for Student Satisfaction Ranked Top 10 for Graduate Prospect Recognised by World Education Services (WES) OTHM Qualifications are approved and regulated by Ofqual (Office of Qualifications and Examinations Regulation) and recognised by Qualifications Wales. OTHM qualifications have achieved a reputation for maintaining significant skills in various job roles and industries like Business Studies, Leadership, Tourism and Hospitality Management, Health and Social Care, Information Technology, Accounting and Finance, Logistics and Supply Chain Management. OTHM serves the progression option with several UK universities that acknowledges the ability of learners after studying Level 3-7 qualifications to be considered for advanced entry into corresponding degree year/top-up and Master's/top-up programmes. Regulated by ofqual.gov.uk Recognised by World Education Services (WES) Assessment Assignments and Project No Examinations Entry Requirements A Bachelor's degree or an equivalent or higher qualification. A copy of a valid photo ID. A Statement of Purpose outlines your motivations for joining the course and your career aspirations in accounting and finance. An updated Curriculum Vitae (CV) that highlights at least two years of work experience at the graduate level in either a managerial or professional capacity. English Language Requirements A pass in English at A-level. A bachelor's degree that was studied and assessed in English. An IELTS overall score of 6.5, with a minimum of 6.0 in each component. A TOEFL score of 72 overall, with a minimum of 18 in reading, 17 in listening, 20 in speaking, and 17 in writing. This includes the TOEFL Home Edition. Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. Structure Phase 1 - OTHM Level 7 Diploma in Accounting and Finance Programme Structure The OTHM Level 7 Diploma in Accounting and Finance qualification consists of 6 mandatory units for a combined total of 120 credits, 1200 hours Total Qualification Time (TQT) and 600 Guided Learning Hours (GLH) for the completed qualification. Investment Analysis Unit Reference Number : R/615/3236 TQT : 200 Credit : 20 This unit aims to enhance learners' comprehension of investment theories and market equilibrium models. It encompasses tasks such as conducting bond valuations and assessing current investment performance. Upon successful completion, learners will possess the skills to critically analyze the impact of global developments on capital markets and make sound recommendations for future investments. Corporate Reporting Unit Reference Number : D/615/3241 TQT : 200 Credit : 20 This unit aims to develop learners' ability to prepare and interpret financial statements for various business organisations. Learners will be able to apply relevant accounting concepts and principles. The unit allows learners to enhance their quantitative and qualitative analytical skills by interpreting financial data.  Global Finance and Strategy Unit Reference Number : D/615/3238 TQT : 200 Credit : 20 This unit aims to cultivate learners' comprehension of the decisions that are crucial when venturing into global markets. Learners will grasp the significance of autonomy in resolving financial matters within specific timeframes for achieving business success. Strategic Financial Management Unit Reference Number : H/615/3242 TQT : 200 Credit : 20 This unit seeks to enhance learners' grasp of planning and overseeing the allocation of an organization's financial resources. They will appreciate the significance of achieving business objectives and optimizing shareholder returns. Additionally, learners will acquire practical knowledge in designing business strategies and crafting comprehensive business plans. Strategic Audit Unit Reference Number : Y/615/3240 TQT : 200 Credit : 20 The objective of this unit is to foster learners' comprehension of how managers can effectively formulate and implement business strategies. This encompasses thoroughly examining the strategic auditing process and its associated methodologies. Learners will learn to employ appropriate investigative techniques in favourable and challenging environments. Business Research Methods Unit Reference Number : T/508/0626 TQT : 200 Credit : 20 The objective of this unit is to cultivate learners' comprehension of research principles, which encompass crafting research proposals, conducting literature reviews, proper referencing, employing data collection techniques such as interviews and surveys, designing questionnaires, conducting statistical analysis using SPSS, handling qualitative data, and employing methods to draw meaningful conclusions from the analyzed data.   Phase 2 - MSc in Accounting and Finance (Advanced Entry) Programme Structure Research Methods Consultancy Project Report Delivery Methods The programme comprises two phases; the first is the Level 7 Diploma in Accounting and Finance, awarded by OTHM and delivered by the School of Business and Technology London. The School of Business and Technology London offers flexible learning methods, including online and blended learning, allowing students to choose the mode of study that suits their preferences and schedules. The programme is self-paced and facilitated through an advanced Learning Management System. Students can easily interact with tutors through the SBTL Support Desk Portal System for course material discussions, guidance, assistance, and assessment feedback on assignments. School of Business and Technology London provides exceptional support and infrastructure for online and blended learning. Students benefit from dedicated tutors who guide and support them throughout their learning journey, ensuring a high level of assistance. The second phase is the MSc in Accounting and Finance (Advanced Entry), delivered by the London Graduate School and awarded by the University of Buckingham through distance learning. You will receive excellent support from academic team of London Graduate School, including your programme manager and your supervisor who will be with you every step of the way. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.

MSc in Accounting and Finance (Advanced Entry)- Inclusive of Level 7 Pathway Diploma
Delivered OnlineFlexible Dates
Price on Enquiry