• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

133 Educators providing Carving courses delivered Live Online

Gold Leaf Services

gold leaf services

London

A Family Run Company Established in 1973 Serving The Gilding And Decorative Industries Ken Rees - Founder of Gold Leaf Supplies Ken Rees Founder In 2023 we will be celebrating our 50th year in business. Phew! Over the years, we have built a reputation for supplying high-quality products with an equally high level of service. We are passionate about gilding and specialist decoration techniques and we love to hear about your projects. At Gold Leaf Supplies we pride ourselves on our innovative approach to servicing the gilding and decorative trades. We are always exploring ways of expanding our services and seeking new horizons through interesting and exciting product ranges. Sue Govani - Director of Gold Leaf Supplies Sue Govani Director Steve Rees - Director of Gold Leaf Supplies Steve Rees Director Company History Gold Leaf Supplies is a family business, which was established as Services Supply Company in 1973 by Mr Ken Rees who was a senior partner in the business. Although Ken retired in 2008, he still had an involvement in the Company until his peaceful passing in May 2018. Having worked in the Italian Marble business for many years, Ken initially set up the business to supply gold leaf and associated products to the stone trade. The main emphasis being on offering an exceptionally high level of service and personal contact. Since 1973, our client base has expanded and diversified considerably, and we have increased our product range accordingly to meet our clients’ needs. We now cater to a diversified range of National and International clients involved in gilding, signwriting, glass manufacture, bookbinding, furniture restoration and manufacture, framing, interiors, architectural decoration, specialist decorating and monumental carving to name but a few. You can view examples of the prestigious projects that we have supplied for in our client gallery As the emphasis of the business changed so did the Company trading name - to Gold Leaf Supplies. From 1st March 2008, we became a Limited Company - Services Supply Company Ltd T/A Gold Leaf Supplies. Although the product range has diversified, and the company has grown, the philosophy introduced in 1973 has remained the same - "We offer quality products at competitive prices and a continuing high level of service." The business remains within the family and Kens’ son, Steve Rees and daughter, Sue Govani joined the company in 1989 and 1991 respectively. Steve has a background in Business whilst Sue’s background is in Art and Design bringing different skills and ideas to the business. Both are Company Directors and very hands on with the day to day running of the business. Steve is mainly involved with the purchasing and logistics. He has a memory like a filing cabinet and a sound technical knowledge relating to gilding techniques. When he has any free time, you will find him on the ski slopes or out walking with his beloved dogs. Sue is more involved with the creative side of the business and enjoys the sales, marketing and client facing events. Passionate about artistic techniques and applications, Sue is usually found trying out the new product ranges in her spare time. She is learning to gild is spending a little more time being a hands on creative which she finds a very meditative process. We all have enormous respect for the art of gilding and its traditional values whilst at the same time recognise and are inspired by the many diverse and contemporary ways that gold and silver leaf is being used today. Our Team It is important to receive your raw materials on time and we appreciate the tight deadlines that most businesses work to, therefore for approved accounts, most of our products are despatched the day instructions are received and delivered on a next day delivery basis. Where large projects are involved, supplies can be scheduled on a phased delivery. One of our strengths is that we can and have often been called upon to supply large quantities at short notice. Our prime objective is not only to supply, but also to provide a full service to our clients and our team makes every effort to ensure this objective is achieved. We have knowledgeable staff who are always on hand to offer advice and we respond quickly to any enquiries that you may have. Please feel free to contact us at any time. Sue Jewell Accounts Manager Sue J has been with us for almost 15 years and has been instrumental in setting up all of our accounts and bookkeeping administration. Since October last year Sue decided to reduce her hours to work part time to fit around her grandchildren and has been working remotely since lockdown. Accounts practices come naturally to Sue and she is continuing to teach all the office staff her accounting methods. She is still very much involved with managing and overseeing the office systems and administration on a weekly basis remotely although she no longer has direct contact with clients. Niki Rathkey Accounts Administrator and Order Processing Niki has been with GLS for two years now and handles all our day-to-day accounts and order processing. It is a busy desk, but Niki is always on hand with a smile to answer any accounting queries that you may have. She is like a magpie when it comes to our shiny products and uses a lot of them in her stone painting and interior projects. She has also built up a sound knowledge about how our products work and will answer most queries related to this. Niki has a strong background of secretarial and administrative skills and has previously worked for a variety of Accounts practices. Isabel Barriga Brown Accounts Assistant and Order Processing Isabel is a new starter for GLS who joined us in October 2021 but has quickly become an indispensable member of the team. Together with Niki they are the accounts team that keep our day-to-day orders ticking over and our records straight! She is very creative and artistic and helps a lot with our social media ideas and creative projects. Again, Isabel loves trying out the projects in her own home and is also learning to gild. She’s our social secretary and makes sure we get together outside as well as inside of work. Adam Rees Technical and IT Adam has worked at Gold Leaf Supplies for around 10 years and during that time he has built up a very good technical knowledge about the products and their uses. He is happy to answer any technical questions that you may have. He is very patient and interested in the challenges that customers projects often present. He will always go out of his way to find a solution and is interested in testing new products and applications. Adam also has responsibility for the Website and all our internal IT requirements. Ralph Davies Warehouse Manager Ralph has been with GLS for over 8 years and takes care of all the goods inwards, stock control and order despatch. Ralph is meticulous and methodical which is a good thing in a busy warehouse. He runs a very tight and organised ship and is a real character! Nothing is ever too much trouble! He always goes the extra mile to make sure your orders are packed well and despatched on time. Fred Govani Warehouse Assistant Fred is Sue’s husband and since taking early retirement during lockdown he comes into the Company part time to help out in our busy warehouse. Due to his previous and extensive work experience he also has a valuable input into logistics and systems practices. Debbie Rees Colour sampling coordinator. Debbie is Steve’s wife who also runs an online homeware store called Elsie Boo Collections. She helps out at GLS by preparing all of our Gold leaf and other metallic materials shade cards that our clients find so useful to have in their workshops or to show their own customers to help them make colour decision choices. Debbie makes sure that we are all stocked up with these and also helps us keep on top of office filing.

Courses matching "Carving"

Show all 3

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

How to help young people who self harm

By Human Givens College

– how to react, support and move forward Discover how you can best help a young person who self-harms – gain the insights and skills you need to approach this distressing subject respectfully and safely, a better understanding of what self-harm is, why young people self-harm, and much more… Date: Tues 14th May 2024 Accredited CPD Certificate: 3.5 hours Length: 3.5 hours (with breaks) Start time: 9.15am GMT (until 1.30pm) "This is one of the best self-harm trainings I’ve had, honestly..."EMILY LOVE, PRIMARY PREVENTION WORKER Live Online Webinar – Join Emily Gajewski – an expert in helping people overcome self-harm – for her live webinar on Tuesday 14th May 2024. All you need is a quiet place to watch, a computer or tablet and a strong internet signal, the rest is easy. Book your place and we’ll email you confirmation – you’ll receive your Zoom link the day before the event. RECORDING – the training is recorded in case anyone experiences technical difficulties – or you can’t attend on the day – so you will also get a recording for a limited time afterwards to maximise your learning. Want to attend but can’t make this date? Then please register your interest below – and we’ll email you when a new date is available. The aim of this live online training with Emily Gajewski, a highly experienced psychotherapist specialising in treating self-harm, is to give you a thorough, in-depth understanding of why young people self-harm and how to approach/react when helping someone in both the short and long term, including the essential skills most likely to effectively support the young person on their journey to find less harmful ways of coping – the webinar focuses on the most evidence-based knowledge and skills in this area. It will also help you find ways of calming yourself in moments of overwhelm to ensure that you can be as supportive and helpful as you’d like to be. Why you should attend With the ever changing, uncertain world we live in creating a vast amount of pressure on children – emotionally and physically – more children and teenagers are experiencing extremely stressful, distressing situations, with many looking for coping mechanisms to help them deal with their negative thoughts, feelings and emotions. Self harm (including self injury) is hugely on the increase and rates are higher than ever since Covid-19 and the long periods of isolation and uncertainty young people have experienced in ‘lock downs’. A survey of 61 secondary school children by charity Place2Be, shows self-harm reports increased by 77%, from 48 to 85, from August to September 2021. Finding the right words to approach self-harming can be difficult – this online webinar was created to help you (parents, carers, teachers) approach this topic with empathy and confidence. Discovering that a young person you are caring for is self harming can be an extremely stressful situation. When we are highly emotional, it can cause us to react in desperate ways, which are often not helpful or supportive to the young person, even if our intentions are totally well-meaning. “A really helpful, caring approach – it has clarified so much for me and I can now see a sensible way forward.”MARTIN, PARENT. This course is relevant to a range of self-harming behaviours including: self-injury cutting, ripping or carving skin burning skin punching or hitting themselves scratching or pinching (including dermatillomania) poisoning themselves with tablets or liquids (or similar) over-eating and under-eating (anorexia or bulimia) biting yourself (dermatophagia) inserting objects into your body overdosing, exercising excessively pulling your hair (trichotillomania) getting into fights where you know you will get hurt What you will learn What is self-harm? Why young people self-harm How common is self-harming How to approach the subject (building rapport, trust…) How to react if your child (or any young person) tells you they are self harming (what not to say and do) The distinction between self harm and a suicide attempt The addictive element to self harm How to help a young person break the addictive pattern Helping a child in the short- and long term The influence of social media and peers Keeping your child safe Looking after yourself (managing stress, anxiety and worry for the household) Finding professional help View booking details Who this training is suitable for Parents, other family members and/or carers of children and young people who are at risk of self harming or currently self harming. Anyone who works with young people and needs to know how best to help when someone discloses that they self-harm or who they suspect may be self-harming. Therapists and counsellors who want to gain a better understanding so they can support families with a member who self harms. Course Programme The ‘How to help young people who self harm’ live online webinar starts at 9.15am and runs until 1.30pm (GMT). 9.15am Join the Zoom meeting 9.30am Understanding self harm 10.45am Comfort break and discussion 10.55am How to approach self harm and be most helpful 12.00pm Comfort break and discussion 12.10pm Creating the optimal conditions for recovery 1.30pm Webinar ends This course has been independently accredited by the internationally recognised CPD Standards Office for 3.5 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.

How to help young people who self harm
Delivered OnlineFlexible Dates
£49

Carve a Wood Spirit

By Scarecrow Woodcrafts

Woodcarving courses

Carve a Wood Spirit
Delivered in person or OnlineFlexible Dates
£75 to £85