• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

72 Courses in Manchester delivered Live Online

Pilates - Mixed Ability - ONLINE

By For A Better You - Pilates & Pelvic Floor Health

Pilates is a great way to get your body moving, with low resistance body weight exercises it is suitable for any fitness level. If you work from home or are just wanted to improve yourself then look no further

Pilates - Mixed Ability - ONLINE
Delivered Online + more
£10

Zen Yoga, Thursdays 10am (ONLINE)

By Mark Westmoquette

Join Mark on Thursday mornings to move, explore, and wake up to your true nature. Mark's classes are all about re-connecting the body and mind in order to find a sense of health, integration, freedom and kindness. Most of the time his classes are based around the seasons, since the Chinese energy system is very connected to the time of year and changing seasons.

Zen Yoga, Thursdays 10am (ONLINE)
Delivered Online + more
£9

Guided Minds Meditation Programme.

5.0(1)

By The Northern College Of Clinical Hypnotherapy

🌿 Guided Minds: A 12-Month Meditation Journey Create calm, clarity & connection—one month at a time. Guided Minds is a year-long meditation programme designed to help you build a sustainable, enriching practice through monthly themes, supportive sessions, and practical tools for real life. Whether you're new to meditation or looking to deepen your experience, this programme will guide you with compassion and clarity. 🔁 Programme Format Weekly Live Sessions (Online & In-Person) Monthly Themes & Challenges Guided Meditations & Practices Supportive Community Access to Session Recordings Join monthly or commit to the full journey—the choice is yours. 🌟 Monthly Themes Overview July: Making Meditation a Healthy Habit Learn how to create a sustainable daily practice using breath, posture and science-backed techniques. ✔️ Relaxation response ✔️ Meditation for clarity & calm ✔️ Core practices: breath, posture, stillness ✔️ In-person Session 5: “Pulling It All Together” August: Meditation & Mindfulness Focus on the profound benefits of meditation: ✔️ Stress relief, heart health, immunity ✔️ Slowing ageing, boosting self-compassion ✔️ 3 Principles: Habituation, Wisdom, Openheartedness ✔️ Diamond Dedication Meditation September: Calming a Wandering Mind Tame your busy mind through simple, powerful practices. ✔️ Focused attention vs. mind-wandering ✔️ Thought loops & rumination ✔️ Colour, mantra & visualisation meditations ✔️ Mindfulness of thought October: Creating a Mindful Life Bring mindfulness into everyday moments. ✔️ Living in the now ✔️ Radical acceptance & surrender ✔️ Senses as anchors: sound, touch, breath ✔️ Showing up fully for life November: Meditation for Stress Relief Practical methods to manage stress & emotional overload. ✔️ Good vs. bad stress ✔️ The ego, fight/flight, and impermanence ✔️ Gratitude & visualisation ✔️ Overcoming obstacles to meditation December: Rest & Reflection Warm the heart and calm the mind before the holidays. ✔️ Body-based awareness ✔️ Reviewing your progress ✔️ Meditations for resilience ✔️ Peaceful practices for winter January: Meditation for Positive Emotions Start the year with joy, love, and purpose. ✔️ Heart-opening meditations ✔️ Gratitude & happiness ✔️ Intention-setting with optional cacao ceremony ✔️ Emotional healing & connection February: Meditation for Well-Being A holistic approach to health from the inside out. ✔️ Four foundations of mindfulness ✔️ Forgiveness (including Huna meditations) ✔️ Body-mind connection ✔️ Compassion and curiosity March: Deeper into Meditation Explore advanced techniques with renewed clarity. ✔️ Insight, wisdom, open-heartedness ✔️ Posture & Nine-Cycle Breathing ✔️ Concentration & mental clarity ✔️ Appreciation for life April: Meditation for Relaxation Recharge your nervous system with rest-focused meditations. ✔️ Body scan & breath awareness ✔️ Guided deep relaxation ✔️ Calming anxiety & overactivity ✔️ Rest as a radical act May: The Art of Living Live with intention and reverence. ✔️ Meditation on impermanence & emptiness ✔️ Self-love & emotional nourishment ✔️ Present moment awareness ✔️ Breath as a life companion June: Meditation on Inner Peace End the year rooted, spacious, and unshakable. ✔️ Letting go of resistance ✔️ Unflappability & mental resilience ✔️ Responsibility & self-awareness ✔️ Lasting inner calm and clarity 💷 Pricing Options Online sessions: £10 each In-person sessions: £15 each Join the Guided Minds Meditation Community for £28/month ✓ Includes all sessions (online & in-person) ✓ Unlimited access to recordings ✓ Bonus practices & group support 🌱 Ready to begin? Each month offers a new opportunity to reset, reflect and grow. Join any time, or commit to the full year and transform your relationship with your mind, body and life.

Guided Minds Meditation Programme.
Delivered in Harrogate + 1 more or Online + more
£10 to £15

ADVANCED PRESENTATION SKILLS

5.0(4)

By Improving Communications Uk

Improving Communications UK offers an Advanced Presentation Skills course designed to enhance public speaking abilities and improve the use of presentation software. This course provides delegates with the opportunity to refine their skills in a supportive environment. As delegates deliver their presentations, they are coached on key areas such as body language, posture, word choice, confidence, eye contact, volume, and reducing verbal tics and filler words. This comprehensive approach ensures that delegates can effectively engage their audience and convey their message with clarity and confidence. The course also focuses on enhancing content and visual aids, typically using software like PowerPoint. Delegates learn how to: Clearly state their purpose Reduce text on slides Create user-friendly messages Select impactful graphics to support their message By the end of the course, delegates will be able to deliver organised and engaging presentations that motivate audiences, craft streamlined messages, enhance their stage presence, and convince listeners with compelling evidence in speech and visuals. This course is ideal for those seeking to improve their presentation skills and make a lasting impact. The Advanced Presentation Skills course is a 4-hour interactive virtual class for up to six delegates. Upon registration, delegates will receive online login instructions prior to the class date. This format allows for a personal and interactive learning experience from the comfort of one's own home.

ADVANCED PRESENTATION SKILLS
Delivered Online
£785

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

Finding your Balance - Yoga for postural awareness - A six week online course.

By Healing With Yoga

Find ease in your posture and your natural balance on this 6 week online Yoga course with Pippa Graham. This is an experiential course that will bring awareness to the key postural structures in your body and integrate a new understanding of alignment and sensation.

Finding your Balance -  Yoga for postural awareness - A six week online course.
Delivered OnlineJoin Waitlist
£76

CertNexus Certified CyberSec First Responder (CFR-410)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners preparing for or who currently perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. It is ideal for those roles within federal contracting companies and private sector firms whose mission or strategic objectives require the execution of Defensive Cyber Operations (DCO) or DoD Information Network (DoDIN) operation and incident handling. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. Overview In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform. You will: Assess cybersecurity risks to the organization. Analyze the threat landscape. Analyze various reconnaissance threats to computing and network environments. Analyze various attacks on computing and network environments. Analyze various post-attack techniques. Assess the organization's security posture through auditing, vulnerability management, and penetration testing. Collect cybersecurity intelligence from various network-based and host-based sources. Analyze log data to reveal evidence of threats and incidents. Perform active asset and network analysis to detect incidents. Respond to cybersecurity incidents using containment, mitigation, and recovery tactics. Investigate cybersecurity incidents using forensic analysis techniques. This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's National Cyber Incident Response Plan (NCIRP), and Presidential Policy Directive (PPD)-41 on Cyber Incident Coordination. It is ideal for candidates who have been tasked with the responsibility of monitoring and detecting security incidents in information systems and networks, and for executing standardized responses to such incidents. The course introduces tools, tactics, and procedures to manage cybersecurity risks, defend cybersecurity assets, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and remediate and report incidents as they occur. This course provides a comprehensive methodology for individuals responsible for defending the cybersecurity of their organization. This course is designed to assist students in preparing for the CertNexus CyberSec First Responder (Exam CFR-410) certification examination. What you learn and practice in this course can be a significant part of your preparation. In addition, this course and subsequent certification (CFR-410) meet all requirements for personnel requiring DoD directive 8570.01-M position certification baselines: CSSP Analyst CSSP Infrastructure Support CSSP Incident Responder CSSP Auditor The course and certification also meet all criteria for the following Cybersecurity Maturity Model Certification (CMMC) domains: Incident Response (IR) Audit and Accountability (AU) Risk Management (RM) Lesson 1: Assessing Cybersecurity Risk Topic A: Identify the Importance of Risk Management Topic B: Assess Risk Topic C: Mitigate Risk Topic D: Integrate Documentation into Risk Management Lesson 2: Analyzing the Threat Landscape Topic A: Classify Threats Topic B: Analyze Trends Affecting Security Posture Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments Topic A: Implement Threat Modeling Topic B: Assess the Impact of Reconnaissance Topic C: Assess the Impact of Social Engineering Lesson 4: Analyzing Attacks on Computing and Network Environments Topic A: Assess the Impact of System Hacking Attacks Topic B: Assess the Impact of Web-Based Attacks Topic C: Assess the Impact of Malware Topic D: Assess the Impact of Hijacking and Impersonation Attacks Topic E: Assess the Impact of DoS Incidents Topic F: Assess the Impact of Threats to Mobile Security Topic G: Assess the Impact of Threats to Cloud Security Lesson 5: Analyzing Post-Attack Techniques Topic A: Assess Command and Control Techniques Topic B: Assess Persistence Techniques Topic C: Assess Lateral Movement and Pivoting Techniques Topic D: Assess Data Exfiltration Techniques Topic E: Assess Anti-Forensics Techniques Lesson 6: Assessing the Organization's Security Posture Topic A: Implement Cybersecurity Auditing Topic B: Implement a Vulnerability Management Plan Topic C: Assess Vulnerabilities Topic D: Conduct Penetration Testing Lesson 7: Collecting Cybersecurity Intelligence Topic A: Deploy a Security Intelligence Collection and Analysis Platform Topic B: Collect Data from Network-Based Intelligence Sources Topic C: Collect Data from Host-Based Intelligence Sources Lesson 8: Analyzing Log Data Topic A: Use Common Tools to Analyze Logs Topic B: Use SIEM Tools for Analysis Lesson 9: Performing Active Asset and Network Analysis Topic A: Analyze Incidents with Windows-Based Tools Topic B: Analyze Incidents with Linux-Based Tools Topic C: Analyze Indicators of Compromise Lesson 10: Responding to Cybersecurity Incidents Topic A: Deploy an Incident Handling and Response Architecture Topic B: Mitigate Incidents Topic C: Hand Over Incident Information to a Forensic Investigation Lesson 11: Investigating Cybersecurity Incidents Topic A: Apply a Forensic Investigation Plan Topic B: Securely Collect and Analyze Electronic Evidence Topic C: Follow Up on the Results of an Investigation Additional course details: Nexus Humans CertNexus Certified CyberSec First Responder (CFR-410) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified CyberSec First Responder (CFR-410) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified CyberSec First Responder (CFR-410)
Delivered OnlineFlexible Dates
£3,495

Pilates (All levels)

5.0(8)

By Cowan Pilates

45 minute Pilates mat class suitable for those with some previous experience of Pilates, delivered on Zoom. Classes are designed to improve posture and build dynamic strength whilst developing our awareness by focusing on how we are moving. They are gentle yet challenging, focusing on moving efficiently and pain-free. Classes run as blocks for continuity and progression.

Pilates (All levels)
Delivered OnlineFlexible Dates
£52

NCSP ISO 27001 Specialist

By IIL Europe Ltd

The NCSP® ISO 27001 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the ISO 27001 controls in the context of a NIST Cybersecurity Framework program.This course looks at the impact of adapting a principled approach to an enterprise risk management framework to better support cybersecurity decisions within the context of the selected informative reference. It guides participants on the best approach to adapt, implement, and operate (AIO) a comprehensive cybersecurity program that integrates into existing organizational capabilities and incorporates the selected Informative Reference. NCSP® ISO 27001 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the perspective of the selected cybersecurity informative reference. The overall approach places these activities into systems thinking context by introducing the Service Value Management System composed of three aspects, governance, assurance, and the Z-X Model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ presented in the NCSP Practitioner. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.

NCSP ISO 27001 Specialist
Delivered OnlineFlexible Dates
£2,995

NCSP 800-171 Specialist

By IIL Europe Ltd

The NCSP® 800-171 Specialist accredited (APMG International), certified (NCSC/GCHQ-UK), and recognized (DHS-CISA-USA) certification course teaches Digital Business, Operational Stakeholders, Auditors, and Risk Practitioners a Fast-Track approach to adopting and adapting the 800-171 controls in the context of a NIST Cybersecurity Framework program. This course looks at the impact of adapting a principled approach to the enterprise risk management (ERM) framework to better support cybersecurity decisions, establishing the context for the selected informative reference (IR). It guides participants on the best approach to adapting, implementing, and operating (AIO) a comprehensive cybersecurity program that can be integrated into the existing organizational capabilities and incorporates the selected IR. NCSP® 800-171 Specialist introduces the integration of typical enterprise capabilities with cybersecurity from the selected cybersecurity IR perspective. The overall approach places these activities into a systems-thinking context by introducing the service value management system (SVMS), including governance, assurance, and the Z-X model. With this in place, the course presents the approach to adapt, implement, operate, and improve the organizational cybersecurity posture that builds on the application of the FastTrack™ concept presented in the NCSP Practitioner course. The NIST Cybersecurity Professional (NCSP®) program is the industry's first accredited certification training program that teaches organizations how to build a Digital Value Management Overlay System capable of leveraging the NIST Cybersecurity Framework to deliver the secure, digital business outcomes expected by executives, government regulators, and legal advisors.

NCSP 800-171 Specialist
Delivered OnlineFlexible Dates
£2,995
123...8

Educators matching "Posture"

Show all 5
Ben Malton Personal Training

ben malton personal training

5.0(12)

Manchester

Gym Personal Training Sessions Personal Training sessions take place at the Gym Group on Portland Street, in Manchester City Centre (M1 4EH), one of Manchester's largest and best equipped gyms. You'll find the gym across the road from the Britannia Hotel, around the corner from Piccadilly Gardens.  Online Personal Training Remote Online Personal Training is the perfect option for anyone anywhere in the world to get started with their health & fitness journey. You'll get access to a dedicated Personal Training app with tons of cool features. Alongside fully tailored workouts (with tutorial videos) you'll be able to manage your training, learn about healthy nutrition, tailored meal plans, recipe ideas, improve your physical, mental and emotional health and so much more. You'll get most of what you'd get in person, just remotely. Tailored Fitness Programmes Perhaps you are not looking for the regular coaching from a PT, but you do want a tailored fitness programme creating, specific to your goals and fitness level, that you know will work and get you guarenteed results. You'll get access to my Personal Training App for the duration of your programme, be be able to track and record your training, view exercise tutorial videos and so much more. This option is ideal for those that don't need the regular follow ups for accountability, although you'll always be able to contact me with any questions, help or support you need. Diet Plans Get a fully tailed 7 Day Meal Plan, created based on your fitness goals, which includes calculations of your macros (fats, carbs & protein) and calorie requirements. You'll be able to let me know what foods you feel must be in your diet, and what foods you want to avoid, and so much more. You'll also have the ability to swop out foods in your plan with others with a cool swop function within the app. Weekly nutrition coaching also included by email (optional). Holistic Health & Posture Review This will take place at the Gym Group Portland Street. If you are not already a member I will arrange for free guest pass entry into the gym for your review. I'll be able to score you on a number of different health areas, including what you eat, when you eat, digestive health, stress, detoxification, fungus & parasites and more. I'll then take a detailed look into your posture, including measuring the angles of your spine, and assessing your bodies ability to move, identifying muscular dysfunctions / imbalances, which me be causing you pain or discomfort, or which could negatively affect exercise performance or cause injury later down the line. I'll be able to tell you exactly which muscles are tight / weak or underconditioned. You'll learn a lot about your body and health. And I will give you some corrective exercises and stretches to help you fix any issues found. Please visit my website for more information about Personal Training in Manchester City Centre. Free Consultation Available