• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

302 Computing courses in Tiptree

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Essential Cloud Technologies

5.0(3)

By Systems & Network Training

CLOUD TECHNOLOGIES TRAINING COURSE DESCRIPTION This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . WHAT WILL YOU LEARN * Contrast and compare AWS, GCP and Azure. * Explain the different cloud services, models and characteristics. * Explain cloud virtualization components and options. * Explain cloud security options. * Describe cloud automation, orchestration, monitoring and performance options. CLOUD TECHNOLOGIES TRAINING COURSE DETAILS * Who will benefit: Anyone working with or looking to work with cloud technologies. * Prerequisites: None. * Duration 2 days CLOUD TECHNOLOGIES TRAINING COURSE CONTENTS * What is the cloud? The Internet Cloud computing Benefits Disadvantages * Cloud services IaaS, PaaS, SaaS, others. * Cloud service providers AWS, GCP Microsoft Azure, others * Cloud architectures Private, public, hybrid others Cloud based delivery * The cloud and virtualization Virtual Machines, networks, storage, deployment. * Accessing the Virtual Machine * Secure cloud environments Security considerations. Data privacy considerations * Automation and orchestration * Monitoring and performance Performance Cost issues Cost containment

Essential Cloud Technologies
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1497

Cloud deployment

5.0(3)

By Systems & Network Training

CLOUD DEPLOYMENT TRAINING COURSE DESCRIPTION This course covers the important topics every cloud professional needs, including, configuration and deployment, security, maintenance, management, and troubleshooting. It covers all aspects of cloud computing infrastructure and administration, with a practical focus on real-world skills. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. Deploy and implement cloud solutions, manage the infrastructure, and monitor performance. You will also be able to install, configure, and manage virtual machines. WHAT WILL YOU LEARN * Cloud services, models, and characteristics. * Virtualization components, installation, and configuration. * Infrastructure configurations and optimization. * Resource management and specific allocations. * IT security concepts, tools, and best practices. * Recovery, availability and continuity in the cloud. CLOUD DEPLOYMENT TRAINING COURSE DETAILS * Who will benefit: IT professionals looking to deploy and implement cloud solutions, manage the infrastructure, and monitor performance, Install, configure, and manage virtual machines. * Prerequisites: Introduction to virtualization. * Duration 5 days CLOUD DEPLOYMENT TRAINING COURSE CONTENTS Preparing to Deploy Cloud Solutions Deploying a Pilot Project Testing Pilot Project Deployments Designing a Secure and Compliant Cloud Infrastructure Designing and Implementing a Secure Cloud Environment Planning Identity and Access Management for Cloud Deployments Determining CPU and Memory Sizing for Cloud Deployments Determining Storage Requirements for Cloud Deployments Analysing Workload Characteristics to Ensure Successful Migration Maintaining Cloud Systems Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures Analysing Cloud Systems for Performance Analysing Cloud Systems for Anomalies and Growth Forecasting Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues Troubleshooting Connectivity Issues Troubleshooting Security Issues

Cloud deployment
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

NETWORK FORENSICS TRAINING COURSE DESCRIPTION This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. WHAT WILL YOU LEARN * Recognise network forensic data sources. * Perform network forensics using: Wireshark NetFlow Log analysis * Describe issues such as encryption. NETWORK FORENSICS TRAINING COURSE DETAILS * Who will benefit: Technical network and/or security staff. * Prerequisites: TCP/IP foundation for engineers. * Duration 3 days NETWORK FORENSICS TRAINING COURSE CONTENTS * What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. * Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. * Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. * Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. * Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. * Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. * The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. * Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. * Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Complete VBA programming

5.0(3)

By Systems & Network Training

COMPLETE VBA PROGRAMMING TRAINING COURSE DESCRIPTION This course helps you extend the capabilities of the entire Office suite using Visual Basic for Applications (VBA). Even if you have no programming experience, you'll be automating routine computing processes quickly using the simple, yet powerful VBA programming language. We start at the beginning to get you acquainted with VBA so you can start recording macros right away. You'll then build upon that foundation to utilize the full capabilities of the language in Word, Excel, Outlook, and PowerPoint. WHAT WILL YOU LEARN * Record, write and run macros. * Work with VBA Editor. * Use the huge library of built-in functions. * Create simple dialog boxes and complex forms. * Customize Word, Excel, PowerPoint, Outlook, and Access. * Program the Office 2016 ribbon. COMPLETE VBA PROGRAMMING TRAINING COURSE DETAILS * Who will benefit: Anyone looking to extend the capabilities of the entire Office suite using VBA. * Prerequisites: None. * Duration 5 days COMPLETE VBA PROGRAMMING TRAINING COURSE CONTENTS * Macros and getting started in VBA VBA syntax, variables, constants, and enumerations, array variables, finding objects, methods, and properties. * Working with VBA 1 VBA syntax, variables, constants, and enumerations, array variables, finding objects, methods, and properties. * Decisions, loops and functions Built-in functions, creating your own functions, making decisions in your code, using loops to repeat actions. * Using message boxes, input boxes, and dialog boxes Getting user input with message boxes and input boxes, creating simple custom dialog boxes, creating complex forms. * Creating effective code Building modular code and using classes, debugging your code and handling errors, building well-behaved code, exploring VBA's security features. * Programming the Office applications The Word object model and key objects, working with widely used objects in Word, the Excel object model and key objects, working with widely used objects in Excel, the PowerPoint object, model and key objects, working with shapes and running slide shows, the Outlook object model and key objects, working with events in Outlook, the Access object model and key objects, manipulating the data in an Access database via VBA, accessing one application from another application, programming the Office 2016 ribbon.

Complete VBA programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE DESCRIPTION This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. WHAT WILL YOU LEARN * Manage Virtual Machines. * Manage containers. * Manage HA clusters. * Manage HA cluster storage. UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE DETAILS * Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. * Prerequisites: Linux network administration 2 (LPIC-2) * Duration 5 days UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE CONTENTS * VIRTUALIZATION * Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. * Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. * KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. * Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. * Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. * Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. * Containers Containers versus VMs, Docker, Kubernetes. * Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. * Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). * HIGH AVAILABILITY CLUSTER STORAGE * DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. * Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Linux virtualization and High Availability

5.0(3)

By Systems & Network Training

LINUX VIRTUALIZATION AND HA TRAINING COURSE DESCRIPTION The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. WHAT WILL YOU LEARN * Manage Virtual Machines. * Manage containers. * Manage HA clusters. * Manage HA cluster storage. LINUX VIRTUALIZATION AND HA TRAINING COURSE DETAILS * Who will benefit: Linux professionals working with virtualization and/or High availability. * Prerequisites: Linux network administration 2 (LPIC-2) * Duration 5 days LINUX VIRTUALIZATION AND HA TRAINING COURSE CONTENTS * VIRTUALIZATION * Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. * Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. * KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. * Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. * Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. * Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. * Containers Containers versus VMs, Docker, Kubernetes. * Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. * Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). * HIGH AVAILABILITY CLUSTER STORAGE * DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. * Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Linux virtualization and High Availability
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Securing Kubernetes and Containers

5.0(3)

By Systems & Network Training

SECURING KUBERNETES TRAINING COURSE DESCRIPTION This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. WHAT WILL YOU LEARN * Harden Kubernetes systems and clusters. * Harden containers. * Configure and use Kubernetes audit logs. SECURING KUBERNETES TRAINING COURSE DETAILS * Who will benefit: Technical staff working with Kubernetes * Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers * Duration 2 days SECURING KUBERNETES TRAINING COURSE CONTENTS This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise MODULE 1: USER AND AUTHORIZATION MANAGEMENT * Users and service accounts in Kubernetes * Authenticating users * Managing authorizations with RBAC MODULE 2: SUPPLY CHAIN SECURITY * Vulnerabilit checking for images * Image validation in Kubernetes * Reducing image footprint * Secure image registries MODULE 3: VALIDATING CLUSTER SETUP AND PENETRATION TESTING * Use CIS benchmark to review the security configuration of Kubernetes components. * Modify the cluster components' configuration to match the CIS Benchmark. * Penetration testing Kubernetes for known vulnerabilities. MODULE 4: SYSTEM HARDENING * Use kernel hardening tools * Setup appropriate OS level security domains * Container runtime sandboxes * Limit network access MODULE 5: MONITORING AND LOGGING * Configure Kubernetes audit logs * Configure Audit Policies * Monitor applications behaviour with Falco

Securing Kubernetes and Containers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Internet of Things demystified

5.0(3)

By Systems & Network Training

INTERNET OF THINGS TRAINING COURSE DESCRIPTION A concise overview course covering The Internet of Things and the technologies involved. Particular emphasis is placed on the high level architecture of IoT and the benefits achievable. WHAT WILL YOU LEARN * Describe the structure of the IoT * List the technologies involved in IoT. * Explain how IoT works. INTERNET OF THINGS TRAINING COURSE DETAILS * Who will benefit: Non-technical staff working with IoT. * Prerequisites: None. * Duration 1 day INTERNET OF THINGS TRAINING COURSE CONTENTS * What is IoT The Internet, what is IoT? IoT and M2M, IoT technologies, IoT architecture. Wired and wireless communication. IoT applications; Smart houses, smart cities, smart cars, wearable, environment, other domain specific IoTs. * IoT architecture Physical objects, virtual objects, cloud computing, data capture, communications. Big data. * Components Hardware, sensors, actuators, chips, firmware, embedded systems. Open source platforms. Power options: Battery, solar, PoE. * IoT communication RF, ZigBee, Bluetooth, Bluetooth LE, RFID, WiFi, 802.11ah, mobile technologies. Wired. * Arduino (as an example) Microcontrollers, the platform, development, Arduino software, reading from sensors, I2C, SPI. Arduino and the Internet, HTTP, WiFi, GSM. The cloud and IoT: Pachube, nimbits, ThingSpeak * Security in IoT Authentication, Encryption, secure booting, firewalls.

Internet of Things demystified
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£967

Total NTP and PTP for engineers

5.0(3)

By Systems & Network Training

NTP AND PTP TRAINING COURSE DESCRIPTION This course looks at timing and synchronization as provided by NTP and PTP. Hands on sessions primarily involve using Wireshark to analyse the protocols. WHAT WILL YOU LEARN * Recognise the importance of timing and synchronisation. * Explain how NTP works. * Explain how PTP works. NTP AND PTP TRAINING COURSE DETAILS * Who will benefit: Anyone using NTP or PTP but particularly relevant for those in the broadcast industry. * Prerequisites: TCP/IP foundation for engineers * Duration 1 day NTP AND PTP TRAINING COURSE CONTENTS * Introduction Clock drift. Timing and synchronization. Importance in computing. Importance in broadcasting. * NTP NTP versions, v0 to v4. Architecture. The intersection algorithm. Accuracy. Clock strata, Stratum 0, 1, 2 and 3. Protocol modes. Hands on NTP configuration * More NTP NTP packet header. Timestamps. Variables in the header. Clock synchronization algorithm. SNTP. The Windows Time service. Hands on Wireshark and NTP analysis. * PTP PTP v2, IEEE 1588. Architecture. Accuracy. Synchronization with PTP. Offset and delay. Hands on Analysing PTP packet flows. * More PTP Ordinary clocks, boundary clocks, masters and grandmasters. PTP specific switch types. Hardware time stamping. SMPTE ST2059-2. PTP packet header. PTP domains. Best master clock algorithm. Hands on More Wireshark and PTP.

Total NTP and PTP for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£967

Credit Analysis

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- This training course will give participants a developed knowledge of credit analysis. Through a mix of lectures and interactive case studies, participants will be able to perform detailed credit analysis, including analysing market and environment, computing key financial ratios, interpreting cash flows and analysing financing needs. Key Topics * Financial needs and the business operating cycle * Review of financial statements * Financial ratio analysis * Corporate cash flow analysis * Cash flow projections for debt service * Key lending policy guidelines

Credit Analysis
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3779

Educators matching "Computing"

Show all 32
Pinta Education Limited

pinta education limited

Chelmsford

Our trainers are selected for their real world knowledge, combined with training know-how We study your industry before you join us We offer unbiased advice on the suitability of any course to your needs How we run our courses We have in-depth knowledge - so we do not rely on the slides as our sole source of information We have decades of experience - we share our knowledge with passion We set the pace to suit your needs at the time We love teaching - so we have fun in class There is no travel, so we offer after-class revision to those who need it Our feedback from delegates is routinely rated as 'Excellent' We provide plenty of exam practise to increase your confidence at exam time What we do after your course We stay in contact until exam day to assist with any technical or admin issues We study your feedback and the exam results to be sure that they reflect our expectations We contact you promptly should there be any issues that need to be dealt with We remove your data from the database unless you ask us to keep in touch Angelina Samaroo I teach the software testing course I graduated in Aeronautical Engineering I am a Chartered Engineer and a Fellow of the IET I tested the mission software for a fighter jet for 10 years I am a co-author of both the BCS books on software testing I have over 20 years experience as a trainer ISTQB – where testing qualifications went international. I have taught across the world iSQI – where innovation is nurtured. We are delighted to offer their qualifications too. David Batty I teach the programming courses I have been a programmer for nearly 40 years I am a qualified teacher with qualified teacher status I have been teaching programming and other computer related skills for 30 years. I am a trainer for various exam boards (computer science). I deliver 'Ask The Expert' webinars for the Oxford, Cambridge and RSA exam board I am currently writing software for

ActionCOACH Colchester

actioncoach colchester

Colchester

Business coaching services based in Colchester, Essex. ActionCOACH Colchester provides business growth services and support for businesses in Colchester, take action and grow your business today.He is an award-winning business and leadership performance coach, speaker and entrepreneur who educates and trains SME business owners and entrepreneurs to create businesses fit for the future. Sean is also author of number one best-selling book MillenniALL, a guidebook for the Millennial generation which won a Bronze Award for Best Business Book at the 2020 International Stevie Awards. Sean is an accredited Business and Leadership Coach who works with all kinds of business owners to develop their organisations, processes and ultimately take their business to the next level. Sean helps many business owners to achieve their goals, build profit and grow their business. Sean has spoken at a number of high-profile business events, including NatWest Business, The Business Show, Above and Beyond – The Thoughtful Leadership Conference, and ActionCOACH UK Conference. Alongside these events Sean also organises and manages his own business events, webinars and podcasts under the ‘Better Business’ banner. ‘The Better Business Podcast’ is produced by Sean and offers advice to business owners has starred the likes of Brad Sugars and Chris Taylor. Specialising in millennial entrepreneurship and business, Sean can provide bespoke training and advice with regards to recruiting and retaining the best millennial talent, as well as how to market and sell to the millennial generation. Sean also owns a magazine publishing business and a national franchise which means that the strategies and tactics he educates are being deployed by him and his team every single day.

Marconi Sailing Club

marconi sailing club

4.9(37)

Southminster

Marconi Sailing Club is open for anyone to join, subject to the normal formalities. The club site is a green field of some 10 acres, with ample boat storage space, parking and a wide launching ramp accessible at all states of tide. Our two storey club house boasts hot showers, a cosy bar, professionally catered galley, as well as the usual facilities you would expect to find at a sailing club. Sailing Waters The club sails in the wide tidal estuary of the River Blackwater, with launching and sailing possible at any state of the tide. The River is ideal for exploring the islands of Osea and Northey and trips can be made to Bradwell and Maldon. Beyond Bradwell the North Sea beckons our more intrepid sailors. Racing The club has a diverse sailing calendar which runs from mid March to the end of October. There are traditionally two races on a Sunday, one starting at 11am and the other at around 2pm. On Sundays there are separate starts for different fleets, usually two catamaran fleets and three dinghy fleets. During these times our support boats will be on the water manned by club volunteers . If you don’t want to race then feel free to explore the River Blackwater and cruise. There are number of other events planned throughout the year including Dinghy Cruises to destinations near and far, Friday night sailing and a Wednesday evening pursuit race along with a range of other events. Check out or sailing programme for more information. Classes Sailed Sailors at Marconi sail a range of classes including Tornado, F18, Sprint 15 and Spitfire Catamarans. For those with only one hull there are Solos, Toppers, Picos, Lasers, Larks, Wayfarers, Wanderers and many more. Cruiser Section Our cruiser section if almost full due to the excellent mooring and storage facilities available at reasonable prices. The club can only achieve this by the ‘Self Help’ philosophy that we engineer. Membership If you would like to know more about us or wish to join Marconi Sailing Club then send us an email to info@marconi-sc.org.uk or contact our Membership Secretary.