• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

302 Computing courses in Ferryhill

Essential Cloud Technologies

5.0(3)

By Systems & Network Training

CLOUD TECHNOLOGIES TRAINING COURSE DESCRIPTION This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . WHAT WILL YOU LEARN * Contrast and compare AWS, GCP and Azure. * Explain the different cloud services, models and characteristics. * Explain cloud virtualization components and options. * Explain cloud security options. * Describe cloud automation, orchestration, monitoring and performance options. CLOUD TECHNOLOGIES TRAINING COURSE DETAILS * Who will benefit: Anyone working with or looking to work with cloud technologies. * Prerequisites: None. * Duration 2 days CLOUD TECHNOLOGIES TRAINING COURSE CONTENTS * What is the cloud? The Internet Cloud computing Benefits Disadvantages * Cloud services IaaS, PaaS, SaaS, others. * Cloud service providers AWS, GCP Microsoft Azure, others * Cloud architectures Private, public, hybrid others Cloud based delivery * The cloud and virtualization Virtual Machines, networks, storage, deployment. * Accessing the Virtual Machine * Secure cloud environments Security considerations. Data privacy considerations * Automation and orchestration * Monitoring and performance Performance Cost issues Cost containment

Essential Cloud Technologies
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1497

Cloud deployment

5.0(3)

By Systems & Network Training

CLOUD DEPLOYMENT TRAINING COURSE DESCRIPTION This course covers the important topics every cloud professional needs, including, configuration and deployment, security, maintenance, management, and troubleshooting. It covers all aspects of cloud computing infrastructure and administration, with a practical focus on real-world skills. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. Deploy and implement cloud solutions, manage the infrastructure, and monitor performance. You will also be able to install, configure, and manage virtual machines. WHAT WILL YOU LEARN * Cloud services, models, and characteristics. * Virtualization components, installation, and configuration. * Infrastructure configurations and optimization. * Resource management and specific allocations. * IT security concepts, tools, and best practices. * Recovery, availability and continuity in the cloud. CLOUD DEPLOYMENT TRAINING COURSE DETAILS * Who will benefit: IT professionals looking to deploy and implement cloud solutions, manage the infrastructure, and monitor performance, Install, configure, and manage virtual machines. * Prerequisites: Introduction to virtualization. * Duration 5 days CLOUD DEPLOYMENT TRAINING COURSE CONTENTS Preparing to Deploy Cloud Solutions Deploying a Pilot Project Testing Pilot Project Deployments Designing a Secure and Compliant Cloud Infrastructure Designing and Implementing a Secure Cloud Environment Planning Identity and Access Management for Cloud Deployments Determining CPU and Memory Sizing for Cloud Deployments Determining Storage Requirements for Cloud Deployments Analysing Workload Characteristics to Ensure Successful Migration Maintaining Cloud Systems Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures Analysing Cloud Systems for Performance Analysing Cloud Systems for Anomalies and Growth Forecasting Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues Troubleshooting Connectivity Issues Troubleshooting Security Issues

Cloud deployment
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

NETWORK FORENSICS TRAINING COURSE DESCRIPTION This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. WHAT WILL YOU LEARN * Recognise network forensic data sources. * Perform network forensics using: Wireshark NetFlow Log analysis * Describe issues such as encryption. NETWORK FORENSICS TRAINING COURSE DETAILS * Who will benefit: Technical network and/or security staff. * Prerequisites: TCP/IP foundation for engineers. * Duration 3 days NETWORK FORENSICS TRAINING COURSE CONTENTS * What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. * Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. * Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. * Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. * Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. * Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. * The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. * Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. * Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Complete VBA programming

5.0(3)

By Systems & Network Training

COMPLETE VBA PROGRAMMING TRAINING COURSE DESCRIPTION This course helps you extend the capabilities of the entire Office suite using Visual Basic for Applications (VBA). Even if you have no programming experience, you'll be automating routine computing processes quickly using the simple, yet powerful VBA programming language. We start at the beginning to get you acquainted with VBA so you can start recording macros right away. You'll then build upon that foundation to utilize the full capabilities of the language in Word, Excel, Outlook, and PowerPoint. WHAT WILL YOU LEARN * Record, write and run macros. * Work with VBA Editor. * Use the huge library of built-in functions. * Create simple dialog boxes and complex forms. * Customize Word, Excel, PowerPoint, Outlook, and Access. * Program the Office 2016 ribbon. COMPLETE VBA PROGRAMMING TRAINING COURSE DETAILS * Who will benefit: Anyone looking to extend the capabilities of the entire Office suite using VBA. * Prerequisites: None. * Duration 5 days COMPLETE VBA PROGRAMMING TRAINING COURSE CONTENTS * Macros and getting started in VBA VBA syntax, variables, constants, and enumerations, array variables, finding objects, methods, and properties. * Working with VBA 1 VBA syntax, variables, constants, and enumerations, array variables, finding objects, methods, and properties. * Decisions, loops and functions Built-in functions, creating your own functions, making decisions in your code, using loops to repeat actions. * Using message boxes, input boxes, and dialog boxes Getting user input with message boxes and input boxes, creating simple custom dialog boxes, creating complex forms. * Creating effective code Building modular code and using classes, debugging your code and handling errors, building well-behaved code, exploring VBA's security features. * Programming the Office applications The Word object model and key objects, working with widely used objects in Word, the Excel object model and key objects, working with widely used objects in Excel, the PowerPoint object, model and key objects, working with shapes and running slide shows, the Outlook object model and key objects, working with events in Outlook, the Access object model and key objects, manipulating the data in an Access database via VBA, accessing one application from another application, programming the Office 2016 ribbon.

Complete VBA programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE DESCRIPTION This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. WHAT WILL YOU LEARN * Manage Virtual Machines. * Manage containers. * Manage HA clusters. * Manage HA cluster storage. UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE DETAILS * Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. * Prerequisites: Linux network administration 2 (LPIC-2) * Duration 5 days UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE CONTENTS * VIRTUALIZATION * Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. * Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. * KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. * Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. * Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. * Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. * Containers Containers versus VMs, Docker, Kubernetes. * Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. * Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). * HIGH AVAILABILITY CLUSTER STORAGE * DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. * Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Linux virtualization and High Availability

5.0(3)

By Systems & Network Training

LINUX VIRTUALIZATION AND HA TRAINING COURSE DESCRIPTION The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. WHAT WILL YOU LEARN * Manage Virtual Machines. * Manage containers. * Manage HA clusters. * Manage HA cluster storage. LINUX VIRTUALIZATION AND HA TRAINING COURSE DETAILS * Who will benefit: Linux professionals working with virtualization and/or High availability. * Prerequisites: Linux network administration 2 (LPIC-2) * Duration 5 days LINUX VIRTUALIZATION AND HA TRAINING COURSE CONTENTS * VIRTUALIZATION * Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. * Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. * KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. * Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. * Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. * Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. * Containers Containers versus VMs, Docker, Kubernetes. * Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. * Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). * HIGH AVAILABILITY CLUSTER STORAGE * DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. * Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Linux virtualization and High Availability
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Securing Kubernetes and Containers

5.0(3)

By Systems & Network Training

SECURING KUBERNETES TRAINING COURSE DESCRIPTION This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. WHAT WILL YOU LEARN * Harden Kubernetes systems and clusters. * Harden containers. * Configure and use Kubernetes audit logs. SECURING KUBERNETES TRAINING COURSE DETAILS * Who will benefit: Technical staff working with Kubernetes * Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers * Duration 2 days SECURING KUBERNETES TRAINING COURSE CONTENTS This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise MODULE 1: USER AND AUTHORIZATION MANAGEMENT * Users and service accounts in Kubernetes * Authenticating users * Managing authorizations with RBAC MODULE 2: SUPPLY CHAIN SECURITY * Vulnerabilit checking for images * Image validation in Kubernetes * Reducing image footprint * Secure image registries MODULE 3: VALIDATING CLUSTER SETUP AND PENETRATION TESTING * Use CIS benchmark to review the security configuration of Kubernetes components. * Modify the cluster components' configuration to match the CIS Benchmark. * Penetration testing Kubernetes for known vulnerabilities. MODULE 4: SYSTEM HARDENING * Use kernel hardening tools * Setup appropriate OS level security domains * Container runtime sandboxes * Limit network access MODULE 5: MONITORING AND LOGGING * Configure Kubernetes audit logs * Configure Audit Policies * Monitor applications behaviour with Falco

Securing Kubernetes and Containers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Internet of Things demystified

5.0(3)

By Systems & Network Training

INTERNET OF THINGS TRAINING COURSE DESCRIPTION A concise overview course covering The Internet of Things and the technologies involved. Particular emphasis is placed on the high level architecture of IoT and the benefits achievable. WHAT WILL YOU LEARN * Describe the structure of the IoT * List the technologies involved in IoT. * Explain how IoT works. INTERNET OF THINGS TRAINING COURSE DETAILS * Who will benefit: Non-technical staff working with IoT. * Prerequisites: None. * Duration 1 day INTERNET OF THINGS TRAINING COURSE CONTENTS * What is IoT The Internet, what is IoT? IoT and M2M, IoT technologies, IoT architecture. Wired and wireless communication. IoT applications; Smart houses, smart cities, smart cars, wearable, environment, other domain specific IoTs. * IoT architecture Physical objects, virtual objects, cloud computing, data capture, communications. Big data. * Components Hardware, sensors, actuators, chips, firmware, embedded systems. Open source platforms. Power options: Battery, solar, PoE. * IoT communication RF, ZigBee, Bluetooth, Bluetooth LE, RFID, WiFi, 802.11ah, mobile technologies. Wired. * Arduino (as an example) Microcontrollers, the platform, development, Arduino software, reading from sensors, I2C, SPI. Arduino and the Internet, HTTP, WiFi, GSM. The cloud and IoT: Pachube, nimbits, ThingSpeak * Security in IoT Authentication, Encryption, secure booting, firewalls.

Internet of Things demystified
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£967

Total NTP and PTP for engineers

5.0(3)

By Systems & Network Training

NTP AND PTP TRAINING COURSE DESCRIPTION This course looks at timing and synchronization as provided by NTP and PTP. Hands on sessions primarily involve using Wireshark to analyse the protocols. WHAT WILL YOU LEARN * Recognise the importance of timing and synchronisation. * Explain how NTP works. * Explain how PTP works. NTP AND PTP TRAINING COURSE DETAILS * Who will benefit: Anyone using NTP or PTP but particularly relevant for those in the broadcast industry. * Prerequisites: TCP/IP foundation for engineers * Duration 1 day NTP AND PTP TRAINING COURSE CONTENTS * Introduction Clock drift. Timing and synchronization. Importance in computing. Importance in broadcasting. * NTP NTP versions, v0 to v4. Architecture. The intersection algorithm. Accuracy. Clock strata, Stratum 0, 1, 2 and 3. Protocol modes. Hands on NTP configuration * More NTP NTP packet header. Timestamps. Variables in the header. Clock synchronization algorithm. SNTP. The Windows Time service. Hands on Wireshark and NTP analysis. * PTP PTP v2, IEEE 1588. Architecture. Accuracy. Synchronization with PTP. Offset and delay. Hands on Analysing PTP packet flows. * More PTP Ordinary clocks, boundary clocks, masters and grandmasters. PTP specific switch types. Hardware time stamping. SMPTE ST2059-2. PTP packet header. PTP domains. Best master clock algorithm. Hands on More Wireshark and PTP.

Total NTP and PTP for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£967

Credit Analysis

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- This training course will give participants a developed knowledge of credit analysis. Through a mix of lectures and interactive case studies, participants will be able to perform detailed credit analysis, including analysing market and environment, computing key financial ratios, interpreting cash flows and analysing financing needs. Key Topics * Financial needs and the business operating cycle * Review of financial statements * Financial ratio analysis * Corporate cash flow analysis * Cash flow projections for debt service * Key lending policy guidelines

Credit Analysis
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3779

Educators matching "Computing"

Show all 46
Industrial Technology Systems Ltd

industrial technology systems ltd

Middlesbrough

When I sat down to formulate the concept of the company, I had a specific target in mind. My vision was to create a genuine one-stop-shop for all forms of industrial computing and control. I had seen other companies attempt to achieve this and fail, so I was determined that my new company would be successful and able to offer a comprehensive range of services from 24/7 support through to full systems design, for Management Information systems – through a full range of Validation Services and in control systems from the smallest PLC to the largest DCS. I knew from my own experience that what was needed was a company that could deliver, had the right attitude and was flexible enough to respond, whatever the customers’ requirements. It had to make the customer the primary concern, and consistently offer the same level of quality and service on all projects, from small upgrades and support contracts to major capital investments. It was from these initial concepts that ITS was formed in 1991. In the years since then a great deal of hard work and effort has been invested by all the staff of ITS. When I look around the company today, I am proud that we have assembled what I consider to be a superb team of staff. Between them, they are capable of achieving everything initially envisaged. I am also encouraged by the fact that they are now driving the company forward, making it not just a place to work but the place to work. In recent years many people have told me that ITS is an organisation with large company ideas, and I regard this as a compliment. Whilst I realise that we must not lose sight of our roots, it seems right that we are aiming for the top, and our plans must reflect that. It is for this reason that ITS has created an infrastructure not just for today but for the coming years. It is our intention that ITS develops into a world class company and that we continue to improve and equip ourselves for the future. I am confident that ITS can benefit your business, and hope that by visiting this website you will find what you are looking for. If not, please call us. You have my word that we will do whatever it takes to help.

Communicators Training Associates Ltd

communicators training associates ltd

5.0(3)

Newton Aycliffe

Communicators Training Associates Limited is an independent training provider based in Newton Aycliffe, County Durham with training facilities on site. We also deliver at outreach centres in Spennymoor, Crook and Darlington. In addition to the programmes we support, we provide ‘drop in’ sessions and host ‘information days’ at all our locations and more recently have launched our ‘virtual learning platform’ to enable everyone to learn from home. We have built an excellent reputation for giving a quality support offer to those who come to our sessions using a mix of classroom based activities on both a one-to-one and group-based setting, coupled with high quality online learning to help learners gain qualifications improving their life chances through gaining personal skills, moving to further learning, taking up volunteering opportunities and securing employment. Our employed learners tell us that the skills they learn during their time with us helps them progress in their job role. With flexibility in mind Communicators hosts a virtual learning platform providing e-learning to those individuals who want to study from home or their workplace. The Company was set up by our Managing Director Isobel Currie in 1999, and the following year we secured a contract for supported online learning with Ufi/learndirect. Initially set up to accommodate ICT training needs for companies across the North East, we rapidly widened the scope and range of our programmes to include NVQs in Management, Advice and Guidance, Administration, Customer Service, and Cleaning,; at the same time we introduced accredited programmes in Maths, English, Work Skills, Personal and Social Skills and Customer Service. Over the last 18 months we have further expanded the offer to include CSCS (for construction) and a suite of Community Learning Programmes called ‘My Future Matters’ which have been devised to support those who are furthest away from employment to find appropriate and sustainable work. Isobel maintained a continuous relationship with learndirect up until July 2017, becoming one of the longest serving members of the then network and securing several major, national quality and performance achievement awards on a regular basis including ‘Learner Support Staff’; Working with Employers’, Moving Learners into Work’ and overall ‘Best Delivery Centre. An enduring theme throughout this time has been the support given to the local community, DWP and Job Centres, various local charities, many, many employers and Her Majesty’s Prison Service in Durham. Since the closure of learndirect, Communicators has gone on to secure new contracts to support the continuation of the service with System Group, Durham County Council and most recently was awarded a Prime Contract with Tees Valley Combined Authority. Isobel believes that the success of Communicators is based on the dedicated team of Tutors and Administrators who are trained to a high standard to support our learning provision. A high proportion started their journey with Communicators as volunteers, some are former learners and all have gone on to become very valued members of a thriving team. Everyone in the Team put our learners at the heart of the operation with the genuine and embedded aim to help every learner achieve their full potential - whether they are employed or unemployed. We believe that by living and breathing our Values, each and everyone of us look to make our Vision a reality. We have successfully retained the Matrix accreditation validating the quality of our Information, Advice and Guidance services since inception. During our recent re-assessment, learners interviewed commented on the willingness of staff to provide encouragement and support tailored to them as individuals. This support was felt to be delivered by approachable, non-judgmental staff who are committed to ensuring learners achieve their goals. The weekly Assessment Days and IAG provided throughout a stay with Communicators ensures they are very clear about their learning pathway and options. There were also numerous examples provided about the difference the support had made to them, particularly helping to overcome mental health problems and lack of confidence and self-esteem. Learners interviewed were very clear about what they could expect from Communicators, and were very complimentary about our company. Many of them shared their own stories of how we had made an impact on their lives, with some saying: ‘I don’t think I would still be around if I hadn’t come to Communicators.’ ‘They really do sit and listen to you’. ‘They spend lots of time getting to know you, it’s a relaxed atmosphere and I don’t want to go home at the end’. ‘You spend a lot of time talking about your goals and aspirations, they are always positive’ ‘They make you aware of the choices and guide you, I was adamant I wanted to do IT but when we sat and talked about Maths and English, I realised it would be easier if I got those qualifications first.’ ‘I can’t believe how far I’ve come in a short period of time.’ ‘I’ve got dyslexia and they have helped me understand what it is and how it affects me, I’m getting lots of support.’ ‘Lots of encouragement, you are accepted for who you are, made to feel straight away part of the group.’ ‘Whenever I’ve not understood or struggled, the tutors have been there to guide me through, without them I wouldn’t have progressed as well.’