• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7969 FEEL courses

Mindful Painting Classes Putney

By Artanda

Mindful Painting Classes in Putney. Mindful Art School Putney. Reconnect with your Creativity, Feel Confident Painting anything, anywhere are experience the peace of painting!

Mindful Painting Classes Putney
Delivered In-PersonFlexible Dates
£20 to £25

Stained Glass Flower Cutting for Mosaic - 1 Day

By Sue Smith Glass

Stained Glass Flower Cutting For Mosaic Workshop. Beginners and Intermediates. Learn to cut and shape flowers in stained glass for glass mosaic.

Stained Glass Flower Cutting for Mosaic - 1 Day
Delivered In-PersonFlexible Dates
£90

AutoCAD 3D modeling course

By Real Animation Works

Autocad face to face training customised and bespoke.

AutoCAD 3D modeling course
Delivered in London or OnlineFlexible Dates
£650

CRYSTAL GRID FREQUENCY ACTIVATION

By Mystic Sisters

Barbra May (Mystic Sisters) elevates your energetic frequency by anchoring you into a crystal grid and by crystalline vibrations.

CRYSTAL GRID FREQUENCY ACTIVATION
Delivered In-PersonFlexible Dates
£35

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

4 in 1 Nail Tech (GTi Manicure, Gel Polish, Acrylic Nails & Pedicure

By The Beauty Click Academy

The manicure offers the technician a whole range of options to suit nearly every client. This course will teach you everything you need to know about offering a professional manicure and includes a practical training session & assessment. Gel Polish treatments are an increasingly popular treatment within the professional beauty industry. Gel Polish is applied to the client’s nail and then cured using an LED or UV lamp to create a longer lasting nail treatment (up to 3 weeks) than a standard manicure. The GTi Gel Polish course covers how to complete gel polish application and demonstrates the correct removal techniques. The course also covers reception and consultation, contra-indications to treatment and aftercare advice. The GTi Tips with Acrylic Overlay course will teach you how to apply the Acrylic System (Liquid and Powder) in conjunction with nail tips. The course covers how to complete the application and demonstrates the correct removal techniques. It also covers reception and consultation, contra-indications to treatment and aftercare advice. Pedicures are a fantastic way to get new clients into the salon. It is a treatment that is often given as a treat or is booked to make tired toes look respectable. Once a client has been made to look and feel better, they are much more inclined to repeat the process, and you will hopefully have gained a customer for life. Upon course completion you will gain 4 recognised & insurable qualifications.  Includes: 4 Hard copy take home training manuals. Duration – Fast track three-day practical classroom-based training plus online theory work. Theory work to be completed in your own time via The Guild student portal before your practical course date. Practical day – 10am-6pm & 10.30-5.30pm & 10am – 5pm. It is advisable that students arrive 15 mins early to ensure a prompt start. In a lot of cases the practical training can be finished earlier than expected depending on how many students there are, and the time taken on practical work. Widely recognisable and insurable qualification, allowing you to deliver this treatment on the paying general public. Class size - Maximum 8 students in a class  Optional Add on’s – You may wish to add on one or more of the following take home kits to your course booking: The Edge Manicure & Pedicure tool kit inc manicure bowl £70 Kaeso Manicure & Pedicure Products £40 The Edge gelover soak off nail kit £65 The Edge gelover soak off nail kit inc UV lamp £87.50 The edge ultra low odour acrylic liquid & powder kit £71.99

4 in 1 Nail Tech (GTi Manicure, Gel Polish, Acrylic Nails & Pedicure
Delivered In-PersonFlexible Dates
£429

Effective Interpersonal Communication for Business Professionals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The typical students of this course will be business professionals who want to enhance their communication skills to interact more effectively with superiors, colleagues, team members, customers, and vendors, and ultimately improve their overall job performance. Overview Interact productively with others in the workplace on a day-to-day basis. Build positive relationships with diverse individuals. Consider organizational communication systems. Communicate with peers. Communicate with supervisors. Communicate with external people. Communicate during conflict and change. To be successful in the workplace, you must be able to effectively communicate and cooperate with coworkers and external people. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. Prerequisites To ensure your success in this course, you should have some level of work experience in any of a variety of organizational settings. 1. Interacting with Others Topic A- Understand the Communication Process Topic B- Apply Core Communication Skills Topic C- Observe Nonverbal Communication 2. Building Positive Relationships Topic A- Create Connection Topic B- Adapt Appropriately to Different Communication Styles Topic C- Accommodate Diversity 3. Considering Organizational Communication Systems Topic A- Analyze Organizational Culture Topic B- Ensure Communication Flows Effectively 4. Communicating with Peers Topic A- Interact Effectively with Peers Topic B- Work Productively in a Group Topic C- Engage in Productive Meetings Topic D- Lead a Team 5. Communicating with Supervisors Topic A- Communicate with Different Supervisor Styles Topic B- Discuss Important Topics with Your Supervisor 6. Communicating with External People Topic A- Interact Effectively with Customers Topic B- Work Productively with Vendors 7. Communicating During Conflict and Change Topic A- Communicate Through Conflict Topic B- Communicate Through Change Additional course details: Nexus Humans Effective Interpersonal Communication for Business Professionals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Effective Interpersonal Communication for Business Professionals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Effective Interpersonal Communication for Business Professionals
Delivered OnlineFlexible Dates
£435

Essentials Of Sepsis Recognition & Escalation For Care & Support Staff

By NR Medical Training

To better equip care organisations and their amazing, hardworking staff in this fight, we offer the Essentials of Sepsis Recognition & Escalation For Care & Support Staff course. This face to face training course delivered by experienced healthcare professionals arms care and support staff with the necessary knowledge, skills and confidence to identify individuals at risk of sepsis, recognise its early signs, and escalate care effectively when they suspect sepsis. With our CQC compliant course, you'll be better prepared to help those at risk. Learners will receive an NR Medical Training/UK Sepsis Trust certificate which is valid for 1 year and a summary of elements covered throughout the course.

Essentials Of Sepsis Recognition & Escalation For Care & Support Staff
Delivered In-Person in Bury St Edmunds + 1 more or UK WideFlexible Dates
£350

Learning Centre Support Specialist

5.0(3)

By Lapd Solutions Ltd

Learning Centre Support Specialist, Learning Support Assistant,

Learning Centre Support Specialist
Delivered in Birmingham + 1 more or UK Wide or OnlineFlexible Dates
£1,250 to £1,500

Working Safely-IIRSM & CPD Approved

By BAB Business Group

Working safely is in the interest and concern of all staff, both employers and employees. Health and safety is one of the few areas where the law places specific duties specifically on employees so a knowledge of where this applies and how to ensure that it is adhered to is vital to protect individuals and businesses. Most workers feel that accidents are something that only happens to other people. The reality is that too many workers are coming to harm by not observing Health and Safety laws and not working to safe systems of work - the physical, mental and financial burden of these accidents can have a huge impact on themselves, their families and their colleagues. The course covers a wide range of topics including fire safety, asbestos awareness, working at height, COSHH, PPE and electricity. It also covers methods for improving safety performance and methods of protecting the environment.

Working Safely-IIRSM & CPD Approved
Delivered Online On Demand
£30