• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

282 ET courses in Edinburgh

BECOME A SPIRITUAL WARRIOR MENTOR

4.9(30)

By School of Shamanism

BECOME A SPIRITUAL WARRIOR MENTOR  A journey through Japanese shamanism and philosophy in 13 modules during 3 full week-ends, available online and in person, to become a Spiritual Warrior Mentor and learn practical shamanic practices to use in your sessions and group work.  This will require the completion of some case studies and homeworks.  It gives you the opportunity to add a job qualification to your holistic experience that can be used in individual sessions or group events. We are a globally certified IPHM training provider (International Practitioners of Holistic Medicine). MODULES 1) Loving your imperfection through Wabi Sabi: accept the impermanence of things and recognise the beauty of imperfection, learning to flow like a river. In this module you will learn not to attach yourself to a theory, to a knowledge, but learn how to become flexible in order to be powerful and solve any life problem. 2) Embrace your wish to change through Kaizen: Kaizen is an approach to creating continuous improvement based on the idea that small, ongoing positive changes can reap significant improvements compared to radical changes to achieve transformation. In this module you will learn how to master the art of creating habits. 3) Face life challenges and storm through Hanafubuki: through 'the cherry blossom storm' we have the magical moment when the sakuras begin to fall, creating a delicate blizzard of petals. This concept of ephemeral beauty is a metaphor for human life, rich and beautiful but also fragile and fleeting. In this module you will learn how to remain calm to make the best decisions. 4) Express your own emotions and welcome those of others through Omoiyari: Omoiyari is commonly translated to empathy, but it actually has a deeper meaning; it literally means to give your thoughts to others. In this module you will learn how to release your own emotions and develop empathy and compassion for others. 5) Repair your own soul wounds through Kintsugi: Kintsugi is the art of mending broken objects with gold, it is the art of treasuring your wounds by repairing them with the gold of pure aesthetic experience. The wounds of our lives are seen through the eyes of the soul,which receives and heals them with the gold of death,of rebirth and freedom. In this module you will learn to perform a rite of passage after which nothing will be the same as before. 6) Master the art of patience through Nintai: Nintai is the power of enduring without complaint, without looking for quick results. It means sticking to your path, trusting the process, to your beliefs. In this module you will learn to never give up, to wait for the right time for things to happen. 7) How gratitude changes you and your brain through Itadakimasu: this word means “I humbly receive” and relates to the traditional way of showing gratitude by elevating above one’s head the gift received. Through time, itadakimasu became the expression showing appreciation for the food received. In this module you will learn the benefits of gratitude on your mental health. 8) Learn to become grounded through Shinrin-Yoku: Immersion in nature has scientifically proven therapeutic effects: it can reduce stress hormone concentrations in the body, strengthen the immune system, regulate blood pressure and heart rate, and lower cholesterol. Shinrin-Yoku is an adventure of deep communion with nature. In this module you will learn how to ground yourself. 9) Develop the best version of you through Hanasaki: this is the blossom of a flower. You will use this word for blossoming the best version of yourself. No matter who you are, where you come from, what your path has been so far, in this module you will learn to aspire to a better version of yourself. 10) Less is more: learn to declutter and simplify your life through Danshari: There’s a new movement rising around the world. Perhaps you’ve heard of it: Danshari. It means “refusal, disposal and separation” You can simply translate it as cleaning or tidying up, but this word means more than this. In this module you will learn to abandon attachment to objects and make a better use of them. 11)Connect with your soul mission through Ikigai: ikigai is that thing that gives our existence a marvellous intensity, it is what gives meaning to life or, as the French would say, its raison d’etre. There is a fire inside us: it can burn with more force, it can weaken, but then it can come back stronger than ever. Ikigai cannot be a simple mental vision, as it is wider, deeper and absolute than the thinking mind. You can only live it, and only by living it can you know it. In this module you will learn the first steps to move nearer to your soul mission. 12)Accept your own shadows, feeling a part of the universe through Yugen: Beauty is Darkness. Shadows are what allow the visible to emerge. The whole world and ourselves are a constant duality: we wake up and go to bed, the sun rises and goes down, we feel on top of the world and we feel stressed, we move in and out, we feel active and we feel lazy and so on. It’s the natural flow of the universe, nothing lasts in the same status forever. In this module you will learn to keep this duality between inner light and darkness stable and to reach the perfect moment. 13)Accept the impermanence of life through mono no aware: ‘this is the deep feeling or pathos of things, the powerful emotions that objects can evoke or instil in us. It is often associated with a poignant feeling of transience, a beautiful sadness in the passing of lives and objects, like the glorious colour of autumn leaves as they are about to fall. In this module you will learn how to let go of our attachments to transient things. Through this certified course you will learn these for yourself and to help others in their transformation if you are an holistic therapist: ● to become grounded and calm ● to create fundamental daily habits ● to have the right approach to solve any life challenge and storm ● how to flow with life ● to express your emotions and develop compassion ● to repair your own wounds ● to practise patience and gratitude ● to become a better version of yourself ● to be nearer to meet your soul mission You can choose: Online (either live or receiving the recordings)  or at the Art and Spirituality Centre 6-8 Alexander Drive EH11 2RH Edinburgh First week-end 22nd-23rd February 2025 10am-5pm each day Modules 1,2,3,4 Second week-end 15th-16th March 2025 10am-5pm each day Modules 5,6,7,8,9 Third week-end 14th-15th June 2025 10am-5pm each day Modules 10,11,12,13 If you are not available to attend, you can catch up with the recordings and do your homeworks in order to qualify.  You an also attend one or two week-ends only but you will not qualify If you are not available to attend, you can catch up with the recordings and do your homeworks in order to qualify.  You an also attend one or two week-ends only but you will not qualify Cost The full course with qualification: £450 Option A) Pay the whole course in full with £50 discount, so just £400 and get a free 1-1 session with me (online or in person) of the value of £100 Option B) Pay a Deposit £150 to secure your place, £150 1st March and £150 1st June 2025 Option C) Join individal week-ends with no qualification £150 each Disclaimer  By booking any event or 1-1 session -online or any other venues – with us, you release Giada Gaslini, Invisible Caims/School of Shamanism, Art and Spirituality and any business partners working with for the event from any liability arising out of any personal injuries, emotional or physical release, death, expectations of results, theft in the venue or damages that may happen to people and objects while attending. We recommend that you consult your GP regarding the suitability of undertaking an exercise programme, if the class you are booking includes it like with yoga or similar, and following all the safety instructions required before beginning to exercise. When participating in an exercise, there is the possibility of sustaining a physical injury. If you engage in this exercise programme, you agree that you do so at your own risk, are voluntarily participating in these activities and assume all risk of injury to yourself. You acknowledge that coaching, shamanic healing and counselling are not to be used as a substitute for psychotherapy, psychoanalysis, mental health care, or other professional advice by legal, medical or other professionals. Our sessions are aimed at inner research, problem solving and personal growth, they do not replace the work of doctors and psychotherapists because they do not consider, treat or aim to solve pathologies and symptoms that are strictly medical. All contracts subject to and governed by the law according to my current insurance.   Added element of the disclaimer If the class happens in any venue and you are causing any damage to the property, you are taking responsibility of your actions. It is down to the individual to take personal responsibility when participating in physical activity and when entering a space that is used and shared by other parties. Giada Gaslini does not take any responsibility about possible risks that may arise but can only advise and enforce guidelines and legal requirements as defined by the Scottish Government and local authorities.  Giada's Journey Creative explorer of the human well-being with twenty years’ experience running events, workshops and retreats. Co-author of a non-profit book with other 33 Italian women about their stories in different countries. She has been learning to heal herself supportinga Holistic connection between mind, body and spirit. She has been studying and practicing Buddhist teachings, meditation and the Five Tibetan Rites Yoga in Nepal, India and Italy. Approached the imaginal world and dreams with the psychologist Elio Occhipinti and a regressive hypnosis journey with the vision of the psychiatrist Brian Weiss.  Her studies and practice have helped her become: Shamanic Practitioner and Teacher with the two years formal training at Anam Cara and one year in Wales Shamanic and Integral Yoga Teacher, Ikigai Coach,Forest Therapy Guide qualified with Selene Calloni Williams at the Imaginal Academy and part of the Italian-Swiss Association for Counselling and Coaching, Aiscon.  Professional Esoteric Numerologist graduated at The Connaissance School of Numerology Corporate Mental Health Coach achieved with WeFocus Founder of Drink In Art exhibitions of local artists in private flats Founder of Invisible Caims creative and spiritual workshops, classes and therapies Founder of the Art and Spirituality Centre centre for creativity and well-being in Edinburgh

BECOME A SPIRITUAL WARRIOR MENTOR
Delivered Online & In-Person in Edinburgh + more
£150 to £400

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Clanlands Photography Tour

By The Scottish Photography Experience

This new tour is 8 days and 7 nights touring the Scottish Highlands visiting the places covered in the book with a few bonus locations thrown in along the way

Clanlands Photography Tour
Delivered In-PersonFlexible Dates
£4,690

C40M03 - Safe Isolation of supplies (classroom)

5.0(1)

By Ember Compliance

It is a requirement within codes of practice e.g., BS 5839-1, and within legislation e.g., Health & Safety at Work Act 1974, that duties are placed upon employers and employees regarding health & safety and in particular electrical safety.

C40M03 - Safe Isolation of supplies (classroom)
Delivered In-Person in Broxburn + more
£99

Public Relations, Protocal, Etiquette and Managing VIPS

5.0(10)

By GBA Corporate

Overview The course helps you attain the skills in managing VIPs and Public Relations. It enables participants to discuss a large diversity of encounters, characters, everyday situations, conversations, and sometimes some rough events as well.  

Public Relations, Protocal, Etiquette and Managing VIPS
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Advanced Ethernet switching

5.0(3)

By Systems & Network Training

Advanced Ethernet switching training course description An advanced hands on switching course for those already familiar with the basics such as STP and VLANs. The course starts with advanced diagnostics and network monitoring moving onto switch protocols. A large part of the second day is spent implementing QoS and security such as 802.1x. What will you learn Troubleshoot switching. Explain how a number of switch protocols work, including: UDLD LLDP LACP DTP VTP/MVRP Design redundancy into switched networks. Implement QoS on switches. Harden switches. Advanced Ethernet switching training course details Who will benefit: Technical staff working with Ethernet switches. Prerequisites: None Duration 2 days Advanced Ethernet switching training course contents Switches Switch review, troubleshooting, diagnostics, L2 traceroute, UDLD, message logging, Wireshark, port mirroring, Hands on: Troubleshooting. Network management SNMP, SNMPv3, RMON, Netflow, Sflow. System logging. Hands on: Managing switches with SNMP. Syslogd. Switches and automatic configuration Auto-MDIX, LLDP, CDP, Link aggregation, LACP, Link state tracking, VLANS and tags, DTP. Hands on: Discovery, dynamic configuration. RSTP 802.1w, new port roles and states, new BPDUs, rapid convergence, topology changes, compatibility issues. L3 redundancy, VRRP, GLBP. Design issues. Hands on: RSTP, VRRP. VLANS: Registration protocols Why VTP? VTP modes, how VTP works, VTP pruning. GVRP, MVRP. Hands on: Dynamic VLANs STP variations and alternatives 802.1s (multiple spanning tree), regions, rings, L2MP, TRILL. Hands on: 802.1s Multicasting What is multicasting, Static configuration, IGMP snooping, CGMP, MVR. IPv6 MLD snooping. Hands on: Multicast through switches QoS Storm control, DSCP, 802.1Q, 802.1p, mapping, classification, policy, Ingress queues, Egress queues. Dropping frames, limiting bandwidth. Hands on: Voice through switches. More VLANS Native VLANs, Voice VLANs Security Static MAC addresses, AAA, RADIUS, Port based authentication, 802.1x, Guest VLANs, L2 attacks, SSH, HTTPS. Hands on: Hardening switches. Miscellaneous NTP, managing the MAC address table, managing system resources, SDN

Advanced Ethernet switching
Delivered in Internationally or OnlineFlexible Dates
£1,727

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Human Resource Management

5.0(10)

By GBA Corporate

Overview The course curriculum covers human resource planning; recruitment and selection; employee training and development; employee health and safety etc. Based on the fact that knowledge is the gateway to engagement, the 'HR Management course' is designed to build participants' awareness and knowledge of the major functions that make up a modern HR department. 

Human Resource Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Public Sector Asset Management

5.0(10)

By GBA Corporate

Overview This course is designed to support the governments, public sector, state-owned enterprises and other entities to strategically understand how to plan the asset management and worth of their physical assets like buildings, infrastructure, transportation etc. The course will also highlight how the public sector can improve asset performance, reduce costs and increase returns generated from the assets by using well-planned asset management tools and techniques.

Public Sector Asset Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626