The workshop offers a gentle introduction to the practice of Shamanic Journeys. It is open to everyone interested to learn how to journey and explore the path of direct revelation. During the day, we will explore different ways to cultivate our innate capacity to journey and access direct guidance for our lives. Also, we will learn how to create a sacred space and how to connect with our guides and power animals.
For those who are working towards exam confidence Save Your Child’s Spot in the 11+ Maths foundations Winter Course Concerned about your child’s struggle with math concepts and word problems? Worried about them answering complex problems under time-pressure? Want them to be exposed to the type of exam style questions they'll need to master? Our engaging course doesn’t just teach numbers; Our Maths courses build confidence. This course is perfect for students in Year 5 preparing for their 11+ Exam in 2024. It is complimentary to our weekly term time small group 11+ maths classes We transform 11+ Maths exam prep from a challenge to an exciting adventure, helping your child become a resilient and prepared student. Mathematics can be a battleground for many students, especially when faced with word problems. We understand the fear of numbers, the confusion with multiplication tables, and the frustration of not being able to solve real-world math challenges. Key Details: Duration: 4 hours Official Lesson Start Date: February half term TBD Maths Focus Areas: Times Tables 8- 15, Word Problems, Fractions, Percentages and Decimals, Geometry + intro to algebra Group Size: 4 to 8 students For Just £117.00 *save 25% with our Small Business Saturday offer! What our families have to say:
Exhilarating and empowering dance classes based on neuroscience and designed specifically for individuals living with Parkinson's disease. These dynamic and fun-filled 8 week program aims to enhance physical mobility, mental well-being, and social interaction.
12 week nutrition transformation. One to one and group support via live webinars and at home preparation. Get your health goals back on track with this guided nutrition course.
For those who are looking to get top marks in the Maths 11+ exam Save Your Child’s Spot in the 11+ Maths Advanced Winter Course Tricky Algebra Confusing word problems Topics that really stretch your child Our engaging course doesn’t just teach numbers; Our Maths courses build confidence. This course is perfect for students in Year 5 students who are at "greater depth" and are preparing for their 11+ Exam in 2024. It is complementary to our weekly term-time small group 11+ maths classes We transform 11+ Maths exam prep from a challenge to an exciting adventure, helping your child become a resilient and prepared student. Mathematics can be a battleground for many students, especially when faced with word problems. We understand the fear of numbers, the confusion with multiplication tables, and the frustration of not being able to solve real-world math challenges. Key Details: Duration: 4 hours Official Lesson Start Date: TBD Feb Half term Maths Focus Areas: Algebra, advanced geometry, tricky word problems Group Size: 4 to 8 students For Just £117.00 *save 25% with our Small Business Saturday offer! What our families have to say:
Duration 3 Days 18 CPD hours This course is intended for This course is for Network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Overview At the completion of the course, you will be able to: Protect against Network Attacks and Enforcing Corporate Policies using the Firewall Policy. Blocking Threats with Intrusion Prevention. Introducing File-Based Threats. Preventing Attacks with SEP. Layered Security. Securing Windows Clients. Secure Mac Clients. Secure Linux Clients. Controlling Application and File Access. Restricting Device Access for Windows and Mac Clients. Hardening Clients with System Lockdown. Customizing Policies based on Location. Managing Security Exceptions. This course is designed for the network, IT security, and systems administration professionals in a Security Operations position who are tasked with configuring optimum security settings for endpoints protected by Symantec Endpoint Protection 14. Introduction Course environment Lab environment Introducing Network Threats Describing how Symantec Endpoint Protection protects each layer of the network stack Discovering the tools and methods used by attackers Describing the stages of an attack Protecting against Network Attacks and Enforcing Corporate Policies using the Firewall Policy Preventing network attacks Examining Firewall Policy elements Evaluating built-in rules Creating custom firewall rules Enforcing corporate security policy with firewall rules Blocking network attacks using protection and stealth settings Configuring advanced firewall feature Blocking Threats with Intrusion Prevention Introducing Intrusion Prevention technologies Configuring the Intrusion Prevention policy Managing custom signatures Monitoring Intrusion Prevention events Introducing File-Based Threats Describing threat types Discovering how attackers disguise their malicious applications Describing threat vectors Describing Advanced Persistent Threats and a typical attack scenario Following security best practices to reduce risks Preventing Attacks with SEP Layered Security Virus and Spyware protection needs and solutions Describing how Symantec Endpoint Protection protects each layer of the network stack Examining file reputation scoring Describing how SEP protects against zero-day threats and threats downloaded through files and email Describing how endpoints are protected with the Intelligent Threat Cloud Service Describing how the emulator executes a file in a sandbox and the machine learning engine?s role and function Securing Windows Clients Platform and Virus and Spyware Protection policy overview Tailoring scans to meet an environment?s needs Ensuring real-time protection for clients Detecting and remediating risks in downloaded files Identifying zero-day and unknown threats Preventing email from downloading malware Configuring advanced options Monitoring virus and spyware activity Securing Mac Clients Touring the SEP for Mac client Securing Mac clients Monitoring Mac clients Securing Linux Clients Navigating the Linux client Tailoring Virus and Spyware settings for Linux clients Monitoring Linux clients Providing Granular Control with Host Integrity Ensuring client compliance with Host Integrity Configuring Host Integrity Troubleshooting Host Integrity Monitoring Host Integrity Controlling Application and File Access Describing Application Control and concepts Creating application rulesets to restrict how applications run Monitoring Application Control events Restricting Device Access for Windows and Mac Clients Describing Device Control features and concepts for Windows and Mac clients Enforcing access to hardware using Device Control Discovering hardware access policy violations with reports, logs, and notifications Hardening Clients with System Lockdown What is System Lockdown? Determining to use System Lockdown in Whitelist or Blacklist mode Creating whitelists for blacklists Protecting clients by testing and Implementing System Lockdown Customizing Policies based on Location Creating locations to ensure the appropriate level of security when logging on remotely Determining the criteria and order of assessment before assigning policies Assigning policies to locations Monitoring locations on the SEPM and SEP client Managing Security Exceptions Creating file and folder exceptions for different scan types Describing the automatic exclusion created during installation Managing Windows and Mac exclusions Monitoring security exceptions
Duration 2 Days 12 CPD hours This course is intended for This course assumes that you have successfully completed the Administering BIG-IP course, or equivalent, and have hands-on experience working in a production BIG-IP environment for several months. You should have a solid understanding of the environment in which the BIG-IP is deployed. This course is meant for BIG-IP administrators, network engineers, applications engineers, etc., who will be responsible for troubleshooting problems associated with their BIG-IP system. This course gives networking professionals hands-on knowledge of how to troubleshoot a BIG-IP system using a number of troubleshooting techniques as well as troubleshooting and system tools. This course includes lectures, labs, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Module 2: Reviewing Local Traffic Configuration Reviewing Nodes, Pools, and Virtual Servers Reviewing Address Translation Reviewing Routing Assumptions Reviewing Application Health Monitoring Reviewing Traffic Behavior Modification with Profiles Reviewing the TMOS Shell (TMSH) Reviewing Managing BIG-IP Configuration Data Reviewing High Availability (HA) Module 3: Troubleshooting Methodology Step-By-Step Process Step 1: State the Problem Step 2: Specify the Problem Step 3: Map the System Step 4: Develop Possible Causes Step 5: Test Theories Step 6: Iterate Until Root Cause Identified Documenting a Problem Putting Troubleshooting Steps to Use Module 4: Working with F5 Support Leveraging F5 Support Resources AskF5.com DevCentral iHealth Leveraging F5 Labs Working with F5 Technical Support Running End User Diagnostics (EUD) - Hardware Only New Platform Diagnostic Tools Always-On Management (AOM) Subsystem Requesting Return Materials Authorization F5?s Software Version Policy Managing the BIG-IP License for Upgrades Managing BIG-IP Disk Space Upgrading BIG-IP Software Module 5: Troubleshooting ? Bottom to Top Introducing Differences between BIG-IP and LINUX Tools Troubleshooting with Layer 1/Layer 2 Tools Troubleshooting with Layer 2/Layer 3 Tools Troubleshooting with Layer 3 Tools Troubleshooting with LINUX Tools Troubleshooting Memory and CPU Troubleshooting with watch Troubleshooting with Additional tmsh commands Module 6: Troubleshooting Tools tcpdump Wireshark ssldump Fiddler diff KDiff3 cURL Module 7: Using System Logs Configuring Logging Log Files Understanding BIG-IP Daemons Functions Triggering an iRule Deploying and Testing iRules Application Visibility and Reporting Module 8: Troubleshooting Lab Projects Network Configurations for Project Additional course details: Nexus Humans F5 Networks Troubleshooting BIG-IP training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the F5 Networks Troubleshooting BIG-IP course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Studio Health and Safety for Potters - an online course by Tim Thornton. This covers the risks of dust, fumes, toxic materials and more, and how to deal with them
Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for implementing, monitoring, and troubleshooting Juniper security components. Overview After successfully completing this course, you should be able to: Demonstrate understanding of concepts covered in the prerequisite Juniper Security courses. Describe the various forms of security supported by the Junos OS. Describe the Juniper Connected Security model. Describe Junos security handling at Layer 2 versus Layer 3. Implement next generation Layer 2 security features. Demonstrate understanding of Logical Systems (LSYS). Demonstrate understanding of Tenant Systems (TSYS). Implement virtual routing instances in a security setting. Describe and configure route sharing between routing instances using logical tunnel interfaces. Describe and discuss Juniper ATP and its function in the network. Describe and implement Juniper Connected Security with Policy Enforcer in a network. Describe firewall filters use on a security device. Implement firewall filters to route traffic. Explain how to troubleshoot zone problems. Describe the tools available to troubleshoot SRX Series devices. Describe and implement IPsec VPN in a hub-and-spoke model. Describe the PKI infrastructure. Implement certificates to build an ADVPN network. Describe using NAT, CoS and routing protocols over IPsec VPNs. Implement NAT and routing protocols over an IPsec VPN. Describe the logs and troubleshooting methodologies to fix IPsec VPNs. Implement working IPsec VPNs when given configuration that are broken. Describe Incident Reporting with Juniper ATP On-Prem device. Configure mitigation response to prevent spread of malware. Explain SecIntel uses and when to use them. Describe the systems that work with SecIntel. Describe and implement advanced NAT options on the SRX Series devices. Explain DNS doctoring and when to use it. Describe NAT troubleshooting logs and techniques. This four-day course, designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. Chapter 1: Course Introduction Course Introduction Chapter 2: Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 1: Implementing Layer 2 Security Chapter 3: Firewall Filters Using Firewall Filters to Troubleshoot Routing Instances Filter-Based Forwarding Lab 2: Implementing Firewall Filters Chapter 4: Troubleshooting Zones and Policies General Troubleshooting for Junos Devices Troubleshooting Tools Troubleshooting Zones and Policies Zone and Policy Case Studies Lab 3: Troubleshooting Zones and Policies Chapter 5: Hub-and-Spoke VPN Overview Configuration and Monitoring Lab 4: Implementing Hub-and-Spoke VPNs Chapter 6: Advanced NAT Configuring Persistent NAT Demonstrate DNS doctoring Configure IPv6 NAT operations Troubleshooting NAT Lab 5: Implementing Advanced NAT Features Chapter 7: Logical and Tenant Systems Overview Administrative Roles Differences Between LSYS and TSYS Configuring LSYS Configuring TSYS Lab 6: Implementing TSYS Chapter 8: PKI and ADVPNs PKI Overview PKI Configuration ADVPN Overview ADVPN Configuration and Monitoring Lab 7: Implementing ADVPNs Chapter 9: Advanced IPsec NAT with IPsec Class of Service with IPsec Best Practices Routing OSPF over VPNs Lab 8: Implementing Advanced IPsec Solutions Chapter 10: Troubleshooting IPsec IPsec Troubleshooting Overview Troubleshooting IKE Phase 1 and 2 IPsec Logging IPsec Case Studies Lab 9: Troubleshooting IPsec Chapter 11: Juniper Connected Security Security Models Enforcement on Every Network Device Chapter 12: SecIntel Security Feed Encrypted Traffic Analysis Use Cases for SecIntel Lab 10: Implementing SecIntel Chapter 13:Advanced Juniper ATP On-Prem Collectors Private Mode Incident Response Deployment Models Lab 11: Implementing Advanced ATP On-Prem Chapter 14: Automated Threat Mitigation Identify and Mitigate Malware Threats Automate Security Mitigation Lab 12: Identifying and Mitigation of Threats Additional course details: Nexus Humans AJSEC - Advanced Junos Security training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJSEC - Advanced Junos Security course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Who is this course for? SketchUp Basic Level Training Course. Click here for more info: Website Ideal for newcomers to 3D modeling, it suits students, hobbyists, and professionals. Gain a strong foundation in SketchUp, perfect for careers in architecture and interior design. Our flexible 1-on-1 sessions let you tailor your learning schedule. Schedule sessions Monday to Saturday, 9 am to 7 pm. The 5-hour course adapts to your timeline, ensuring a personalized, supportive, and adaptable learning experience. Course Title: SketchUp Basic Course. Course Duration: 5 hours Understanding the Basics of SketchUp Introduction to SketchUp Navigating the SketchUp Environment Exploring Zoom, Pan, and Rotate Functions Familiarizing Yourself with the XYZ Axis Mastering SketchUp Tools Efficient Toolbar Selections Utilizing Templates for Projects Drawing with Precision Using the Pencil Tool Working with Fundamental Geometric Shapes Taking Accurate Measurements Advanced SketchUp Techniques Creating Circles and Arcs Harnessing Sticky Geometry Solutions Unveiling the Power of Tags (Formerly Layers) Streamlining Workflow with Keyboard Shortcuts Accurate Object Measurement within SketchUp Information Management and Database Usage Moving and Copying Objects Simple Array Techniques Mastering Rotational Manipulations Effortless Rotational Copying Fractional and Relative Scaling Component and Group Creation Constructing Components for Reusability Creating Efficient Groups Comparing the Advantages of Components and Groups Saving and Reusing Components Importing Components from Digital Repositories Advanced Modeling and Geometry Leveraging Push-Pull Operations Creating Complex Shapes with the Follow Me Tool Exploring Geometry Intersections Duplicating and Offsetting Faces, Edges, and Polygons Incorporating 2D Polygons into Your Drawings Skillful Use of the Paint Bucket Tool Materials and Textures Proficiency with the Materials Editor Applying High-Quality Textures Sourcing and Positioning Textures Graphics and Bitmap Considerations Crafting Scenes and Styles Generating and Customizing Scenes Managing Scenes and Styles Introduction to Animation and Presentation Animation Concepts Adding Dimensions to Your SketchUp Models Annotating Designs for Clarity Preparing Models for Printing Exporting Images and PDFs in 2D Formats This comprehensive SketchUp Fundamentals course will equip you with essential skills to create, modify, and present 3D models effectively. After completing our 5-hour SketchUp training, you'll achieve the following learning outcomes: Basic SketchUp Proficiency: Gain essential skills to navigate the SketchUp interface and utilize its core features effectively. Geometry Creation: Learn to create 2D and 3D geometric shapes, lines, and curves with precision. Rendering Concepts: Understand the fundamentals of rendering and how to apply basic rendering techniques to enhance your designs. Model Organization: Discover techniques for organizing and structuring your SketchUp models efficiently. Visualization Skills: Develop the ability to visualize and plan architectural and interior design concepts in 3D. Efficient Workflows: Acquire time-saving tips and tricks for streamlining your design workflow. Personal Projects: Apply your newfound skills to your personal design projects or professional endeavors. By the end of this short training, you'll have a solid foundation in SketchUp, allowing you to create and present basic 3D models and designs effectively. After SketchUp Training, You'll Acquire: Advanced 3D Modeling: Master the art of creating intricate 3D models, architectural designs, and detailed structures using SketchUp. Texture Mapping and Material Application: Learn to apply realistic textures and materials, enhancing the visual appeal of your 3D creations. Rendering Techniques: Explore rendering plugins like V-Ray or Twilight Render to create lifelike visualizations of your designs. Collaboration and Presentation: Develop skills to effectively collaborate with teams and present your ideas in professional and compelling ways. Project Visualization: Enhance your ability to transform conceptual ideas into visually stunning and detailed 3D representations. Job Opportunities: Architectural Designer: Create detailed architectural models for residential and commercial projects. Interior Designer: Design interior spaces, visualizing furniture placements, colors, and decor elements. Landscape Architect: Develop 3D landscape designs, showcasing outdoor spaces and environmental elements. 3D Modeler: Work in various industries, creating 3D models for animations, games, or simulations. Visualization Specialist: Provide visualization services to real estate agencies, design firms, or marketing companies, transforming ideas into compelling visuals. Why Choose Us? Tailored One-on-One Training: Exclusive coaching from skilled architects and designers, in-person or live online, Monday to Saturday. Customized Tutorials: Enhance your skills with tailored video tutorials to take home. Comprehensive Learning: Receive digital resources for thorough understanding and revision. Free Ongoing Support: Enjoy continuous assistance via phone or email, ensuring your success beyond the course. Flexible Syllabus: Adapted to your needs for focused learning. Official Certificate: Validate your expertise with our prestigious certification.