• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

21 Identity courses in Glasgow

NPORS Slinger Signaller Training

5.0(3)

By Vally Plant Training

Slinger Signaller Training The aim of the NPORS Slinger Signaller Training or Slinger Signaller Course is to provide both theoretical and practical training in the safe and efficient operation of slinging and moving loads using hand signals or radios Guided by the Lift Supervisor. On successful completion of the slinger and signaller course you will be issued with the NPORS Slinger Signaller trained identity card with or without the CSCS Logo or testing can be carried out on your site nationwide or at our training centre in Gloucestershire NPORS Slinger Signaller Test Book with Confidence at Vally Plant Training At Vally Plant Training, we guarantee unbeatable value with our Slinger And Signaller Test Price Match Promise. When you choose us, you can book with confidence, knowing that we will not be beaten on price. If you find a lower price for the same NPORS Slinger and Signaller Worker Test, we’ll match it—ensuring you receive top-quality training at the best possible rate. Click for our terms and conditions Your skills, our commitment—always at the best price. NPORS Slinger Signaller Experienced Worker Test .This test is for operators who have received some form of training in the past or alternatively has been operating as a Slinger Signaller for a period of time. If you are unsure if you qualify to go down the test route please contact us to discuss this in more detail. This test is held at our test centre in Gloucestershire or at your site nationwide. Discounts are available for multiple bookings Turn your Slinger Signaller red card to blue with our hassle free NVQ, for more information CLICK HERE Slinger Signaller Course Duration Novice: 2 days, maximum of 3 candidates Experienced Worker Test: 1 day test only, maximum of 6 candidates. Location: Tewkesbury Training Centre At Our Customers Site*: Our instructors travel throughout the UK to deliver the slinger signaller training *Mileage and accommodation charges may apply Certification NPORS Traditional card – lasts for 5 years and is mainly accepted with housebuilders, utilities, port and marine as proof of competence OR NPORS card with CSCS logo – accepted by all major building contractor’s. The initial card is the RED trained operator card which lasts for 2 years and can be upgraded to BLUE competent operator card further to completion of relevant NVQ. CSCS Health & Safety Test If you require the NPORS Slingers Red operator card with the CSCS logo on then you must have completed the operatives health and safety test within the last two years. In house certificates: suitable as proof of operator competence accepted for insurance and HSE compliance. Slinger Signaller Course Contents: A Slinger Signaller course typically covers a range of topics related to the safe operation of lifting equipment and the signalling procedures involved in crane and lifting operations. While specific course contents may vary depending on the training provider and the regulations of the region, here’s a general outline of what will be included: 1. Introduction to Lifting Operations: Overview of lifting equipment and machinery. Importance of safe lifting operations. Legal and regulatory requirements for lifting operations, LOLLER, PUWER and BS 7121. 2. Roles and Responsibilities of Slinger and Signaller: Duties of the slinger signaller. Understanding the roles of other personnel involved in lifting operations (crane operator, banksman, etc.). Importance of effective communication and coordination. 3. Health and Safety: Risk assessment and hazard identification. Personal protective equipment (PPE) requirements. Safe working practices around lifting equipment and machinery. 4. Lifting Equipment and Accessories: Types of lifting equipment (cranes, hoists, slings, etc.). Inspection and maintenance requirements for lifting gear. Proper selection and use of lifting accessories. 5. Signals and Communication: Standard hand signals for crane operations. Radio communication procedures between Crane Driver & The Slinger and Signaller. Clear and effective communication techniques. 6. Load Identification and Weight Estimation: Methods for identifying loads and determining their weights. Estimating centre of gravity and load stability. 7. Slinging Techniques: Types of slings and their applications. Correct methods for attaching and securing loads. Precautions for different types of loads (e.g., fragile, hazardous). 8. Lifting Operations Planning: Pre-lift checks and planning considerations. Site-specific factors affecting lifting operations (e.g., terrain, weather). Emergency procedures and contingency planning. 9. Practical Exercises and Demonstrations: Hands-on training with lifting equipment and machinery. Practice sessions for signalling and communication. Simulation of real-world lifting scenarios. 10. Assessment and Certification: Written tests to assess theoretical knowledge. Practical assessments of signalling and slinging skills. Certification upon successful completion of the course. It’s essential for the Slinger Signaller Course to provide a balance of theoretical knowledge and practical skills to ensure that participants can effectively carry out their duties as slinger signallers in various lifting operations. Additionally, the course should emphasise the importance of safety and adherence to regulations throughout all aspects of lifting operations. Slinger Signaller Training Available 7 days a week to suit your business requirements. VPT have a team of friendly and approachable instructors, who have a wealth of knowledge of the Slinger Signaller and the construction industry We have our own training centre conveniently located close to the M5 junction 9, In Tewkesbury. With its own purpose-built practical training area to simulate an actual working environment as a slinger signaller Our slinger and signaller training and test packages are priced to be competitive. Discounts are available for multiple bookings We can send a fully qualified NPORS slinger Tester to your site nationwide, to reduce the amount of time away from work Other courses: Master the operation of essential machinery with our Lift Supervision Training, Telehandler Training, Cat & Genny Training, Ride-On Road Roller, Scissor Lift, Abrasive Wheel Training, Lorry Loader Training and Telehandler Training. Elevate your skills for safer and more efficient operations in construction and maintenance projects. Enrol today to advance your career prospects in these industries. Location Advantage: NPORS Slinger Signaller Training Near Me For those looking for a “NPORS Slinger Signaller Training near me,” our widespread operations make it convenient for you to access Vally Plant Trainings top-quality training no matter where you are in the UK

NPORS Slinger Signaller Training
Delivered In-Person in Tewkesbury or UK WideFlexible Dates
Price on Enquiry

Online Options

Show all 667

Getting your organisation’s news and stories into the media

5.0(1)

By Let’s Do Business Group

Are you ready to amplify your organisation’s voice and make headlines? Join us for an engaging 90-minute webinar designed specifically for VCSE organisations looking to attract media attention and make their stories resonate.

Getting your organisation’s news and stories into the media
Delivered Online
FREE

Beginner's Guide to Video Editing (Interactive Workshop)

5.0(3)

By Clockwork Eye Video

This video editing workshop equips you with the essential skills to create professional-looking videos for your business, even if you've never edited before.

Beginner's Guide to Video Editing (Interactive Workshop)
Delivered Online + more
£250

Understanding and Developing a Marketing Strategy for the VCSE Sector

5.0(1)

By Let’s Do Business Group

An area that many small and new businesses struggle with is developing and defining their approach to marketing. Creating a marketing strategy document is something every business owner should do before you start marketing your business.

Understanding and Developing a Marketing Strategy for the VCSE Sector
Delivered Online
FREE

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered OnlineFlexible Dates
£2,380

Exam MS-100 Microsoft 365 Identity and Services Course

By Packt

This course will help you pass the Microsoft 365 Identity and Services (Exam MS-100) certification and demonstrate a detailed understanding of evaluating, planning, migrating, deploying, and managing Microsoft 365 services.

Exam MS-100 Microsoft 365 Identity and Services Course
Delivered Online On Demand7 hours 3 minutes
£93.99

Identity Theft Prevention Course

3.5(2)

By Elearncollege

Description Identity Theft Prevention Diploma Identity theft is a fraudulent practice of using someone else's name or personal information to obtain money or goods in that person's name. Anyone is a potential target of identity theft and that includes even children. Even celebrities like Robert De Niro and Oprah Winfrey have been victims of identity theft. Most identity theft can be prevented by taking precautions like protecting and safeguarding your personal information to make yourself a hard target. In the era of the internet, information of all kinds is available at a click of a button. Personal information is being shared through emails and social networking sites making everyone who doesn't practice discretion a soft target. Identity Theft Prevention Diploma aims to spread awareness among people on what identity theft is and how identity thieves obtain the personal information of others. By providing insights into the working of identity thieves, Identity Theft Prevention Diploma tries to educate you regarding the prevention methods to be followed so that you do not fall prey to scams or fraudulent practices of identity thieves. What You Will Learn 1: Understanding Identity Theft 2: Anti-Identity Theft Precautions and Guidelines 3: Recognizing Common Signs of Identity Theft 4: Looking Into Financial Statements 5: Keeping Tabs on Sensitive Information 6: Watching What You Discard 7: Practicing Discretion in Public Places 8: Becoming Familiar with the Methods of Identity Thieves 9: Buying Online and Some Common Online Threats 10: Staying Safe from Online Threats Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Identity Theft Prevention Course
Delivered Online On Demand9 days
£99

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

By Packt

This course will help you qualify for the Microsoft SC 900 exam, and this certification is targeted at those looking to familiarize themselves with the fundamentals of security, compliance, and identity across cloud-based and related Microsoft services.

SC-900: Microsoft Security, Compliance, and Identity Fundamentals
Delivered Online On Demand7 hours 7 minutes
£26.99

Identity Theft Protection

By Compete High

Discover the Ultimate Shield: Identity Theft Protection Course Protecting your identity is more critical now than ever before. 🛡️ Identity theft continues to plague individuals and businesses worldwide, costing billions annually. But fear not! Introducing our comprehensive Identity Theft Protection Course, your ultimate defense against cyber threats and fraudulent activities. 🚀 Why Choose Our Course? In today's digital age, personal information is vulnerable to sophisticated cybercriminals lurking in the shadows of the internet. Our course arms you with the knowledge and tools necessary to safeguard your identity and financial assets against malicious attacks. Here's what sets us apart: 1. Expert Guidance: Learn from industry experts with years of experience in cybersecurity and identity protection. Our instructors are dedicated to empowering you with actionable insights and strategies. 2. Comprehensive Curriculum: Dive into a well-rounded curriculum designed to cover various aspects of identity theft, including common tactics used by hackers, phishing schemes, data breaches, and best practices for prevention and response. 3. Practical Skills: Gain hands-on experience through real-world scenarios and case studies. Develop practical skills to identify potential threats, secure your personal information, and mitigate risks effectively. 4. Stay Updated: In the ever-evolving landscape of cybersecurity, staying informed is key. Our course equips you with the latest trends, technologies, and best practices to stay ahead of emerging threats. 5. Interactive Learning: Engage in interactive learning experiences, including quizzes, assignments, and discussions. Connect with peers, share insights, and collaborate to enhance your understanding of identity theft protection. 💡 Benefits of Taking Our Course Enrolling in our Identity Theft Protection Course offers a myriad of benefits: 1. Peace of Mind: Safeguard your identity and financial well-being with proactive measures against identity theft and fraud. 2. Empowerment: Take control of your digital footprint and learn how to navigate the online world safely and securely. 3. Financial Security: Prevent potential financial losses and damages resulting from identity theft, unauthorized transactions, and fraudulent activities. 4. Enhanced Awareness: Develop a keen awareness of common scams, phishing attempts, and fraudulent practices prevalent in today's digital landscape. 5. Career Advancement: Gain valuable skills and knowledge highly sought after in various industries, including cybersecurity, finance, law enforcement, and consumer protection. 🎯 Who is This For? Our Identity Theft Protection Course is tailored for individuals and professionals seeking to safeguard their identities and mitigate cyber risks, including: Consumers: Protect yourself and your family from identity theft and online fraud. Business Owners: Safeguard sensitive customer data and maintain trust and credibility with your clientele. Finance Professionals: Enhance your understanding of fraud prevention and risk management in financial transactions. Legal Professionals: Stay informed about legal frameworks and regulations pertaining to identity theft and consumer protection. Cybersecurity Enthusiasts: Deepen your knowledge of cybersecurity principles and best practices for identity protection. 🚀 Career Path Upon completing our Identity Theft Protection Course, you'll unlock a multitude of opportunities for career advancement and professional growth, including: Identity Theft Specialist: Become a certified identity theft specialist equipped to assist individuals and organizations in preventing and resolving identity theft incidents. Cybersecurity Analyst: Leverage your expertise in identity theft protection to pursue a career as a cybersecurity analyst, tasked with identifying vulnerabilities and implementing security measures to safeguard digital assets. Consumer Advocate: Advocate for consumer rights and protection by educating the public about identity theft risks and promoting awareness campaigns. Financial Consultant: Offer personalized financial advice and guidance to clients on protecting their assets and mitigating risks associated with identity theft and fraud. 🌟 Frequently Asked Questions (FAQs) Q: Is this course suitable for beginners in cybersecurity? A: Absolutely! Our course is designed to accommodate learners of all levels, from beginners to seasoned professionals. We provide comprehensive explanations and practical examples to ensure everyone can grasp the concepts effectively. Q: How long does it take to complete the course? A: The duration of the course may vary depending on your learning pace and schedule. On average, most students complete the course within a few weeks by dedicating a few hours each week to study and practice. Q: Are there any prerequisites for enrolling in the course? A: There are no specific prerequisites for enrolling in our Identity Theft Protection Course. However, a basic understanding of cybersecurity fundamentals and familiarity with online security practices would be beneficial. Q: Will I receive a certificate upon completion of the course? A: Yes, upon successful completion of the course requirements, you will receive a certificate of completion, affirming your proficiency in identity theft protection principles and best practices. 🛡️ Enroll Today and Protect Your Identity! Don't wait until it's too late. Take proactive steps to safeguard your identity and financial well-being with our Identity Theft Protection Course. Join us on this empowering journey towards a safer and more secure digital future. Enroll today and take control of your online presence! Course Curriculum Curriculum Curriculum 00:00 Module 1 What Is Identity Theft What Is Identity Theft 00:00 Module 2 Is Identity Theft difficult Is Identity Theft difficult 00:00 Module 3 Methods of Identity Theft Methods of Identity Theft 00:00 Module 4 Additional Identity Theft Methods Additional Identity Theft Methods 00:00 Module 5 Preventing Identity Theft Preventing Identity Theft 00:00 Module 6 Preventing Measures Preventing Measures 00:00 Module 7 What to Do When Identity Theft Occurs What to Do When Identity Theft Occurs 00:00 Module 8 Card Liability Card Liability 00:00 Module 9 Responsibility and Agreements Responsibility and Agreements 00:00

Identity Theft Protection
Delivered Online On Demand9 hours
£25

55344 Identity with Windows Server

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server. This would typically include: ?AD DS administrators who are looking to train in identity and access technologies with Windows Server 2016, Windows Server 2019 or Windows Server 2022. ?System or infrastructure administrators with general AD DS experience and knowledge who are looking to cross-train in core and advanced identity and access technologies in Windows Server 2016, Windows Server 2019 or Windows Server 2022. Overview Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement and administer Active Directory Rights Management Services (AD RMS). Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement synchronization between AD DS and Azure AD. Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. Monitor, troubleshoot, and establish business continuity for AD DS services. This five-day instructor-led course teaches IT professionals how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory - related issues with Windows Server. Additionally, this course teaches students how to deploy other Active Directory server roles, such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS). Although this course and the associated labs are written for Windows Server 2022, the skills taught will also be backwards compatible for Server 2016 and Server 2019. The course and labs also focus on how to administer Windows Server using not only the traditional tools such as PowerShell and Server manager, but also Windows Admin Center. Prerequisites Some exposure to and experience with Active Directory concepts and technologies in Windows Server. Experience working with and configuring Windows Server. Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding basic server virtualization concepts. 1 - Installing and configuring domain controllers Overview of AD DS Overview of AD DS domain controllers Deploying a domain controller 2 - Managing objects in AD DS Managing user accounts Managing groups in AD DS Managing computer objects in AD DS Using Windows PowerShell for AD DS administration Implementing and managing OUs 3 - Advanced AD DS infrastructure management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts 4 - Implementing and administering AD DS sites and replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication 5 - Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs 6 - Managing user settings with Group Policy Implementing administrative templates Configuring Folder Redirection, software installation, and scripts Configuring Group Policy preferences 7 - Securing Active Directory Domain Services Securing domain controllers Implementing account security Implementing audit authentication Configuring managed service accounts 8 - Deploying and managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs 9 - Deploying and managing certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards 10 - Implementing and administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Web Application Proxy Overview 11 - Implementing and administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection 12 - Implementing AD DS synchronization with Microsoft Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization 13 - Monitoring, managing, and recovering AD DS Monitoring AD DS Managing the Active Directory database Active Directory backup and recovery options for AD DS and other identity and access solutions

55344 Identity with Windows Server
Delivered OnlineFlexible Dates
£2,975

Why Identity Matters

5.0(1)

By Enspark

There is perhaps more identity-related conflict than ever before, and it is becoming increasingly more public. These conflicts can create polarization in all areas of life, including the workplace, where it can lead to harmful consequences for an entire organization. And yet, instituting change on an organizational level is sometimes a challenge. This video is a great resource for helping team members understand the importance of cultural awareness and respecting the identity of others. It is a great compliment to any D&I training. Length: 2:48 Learning Objectives Analyze and identify various identity dimensions, including age, geography, gender, race, religion, social class, nationality, sexual identity, worldviews, ideologies, belief systems, core values, and narratives.;Recognize the multifaceted nature of identity-based conflicts and their impact on society, including incivility, inequality, and polarization.;Develop a heightened level of identity intelligence, enabling more self-awareness, strategic thinking, and confidence in interpersonal and professional interactions.;Explore the evolving rules and boundaries of identity-related discussions and conflicts in contemporary society.

Why Identity Matters
Delivered Online On Demand5 minutes
£4.95

Educators matching "Identity"

Show all 3
Ki Aikido Scotland

ki aikido scotland

5.0(4)

Glasgow

The club has had a long and rich history. Consistently teaching to a high standard, many students have attained the rank of black belt, and gone on to teach Aikido themselves. Sensei Matt Tennant has studied aikido for over 50 years and continues to develop his art and his students. His aikido journey started in 1958 when aikido was still relatively new to the UK and he was one of the early students in Scotland, initially studying under Tom Weir. His main teacher for many years was Ken Williams during his years with the Aikikai and later with the Ki Federation. Sensei Tennant started the East Kilbride Aikido Club in 1967. In addition to training under Sensei Ken Williams, he attended regular courses from Sensei Noro and Sensei Chiba. When the Ki No Kenyukai was formed by Sensei Koichi Tohei, the club joined through the Ki Federation of Great Britain led by Sensei Ken Williams. Originally organised in 1967 as extra training time for the Hamilton Hill Aikido Club, the first Aikido dojo in Scotland, the East Kilbride club quickly grew in numbers and established an identity of its own. The club has had a number of influences throughout it’s development. Having been affiliated with the Aikikai of Great Britain, under Sensei Kazuo Chiba, and Ki No Kenyukai, under Koichi Tohei Sensei (through the Ki Federation of Great Britain), the instruction at the club represents a deep and wide understanding of the principles of Aikido and mind/body unification. In 1984 the club left the Ki Federation and therefore the Ki No Kenyukai. Since that time the club has remained unaffiliated with any governing Aikido organisation and continues to teach to a high standard the principles of SHIN SHIN TOITSU DO(unification of mind and body) and SHIN SHIN TOITSU AIKIDO (Aikido with mind and body unified) as taught by Sensei Koichi Tohei.

Scottish BPOC Writers Network

scottish bpoc writers network

Glasgow

Scottish BPOC Writers Network (SBWN) is an advocacy and professional development group for Scottish or Scotland-based writers and literary professionals who identify as BPOC (Black people, People of Colour).* Contact us Frequently Asked Questions Membership Membership is free and open to any BPOC* writer or literary professional who is Scottish and/or based in Scotland and participates in our online or venue-based events or spaces, or publishing or literary opportunities. Membership may be extended to BPOC writers or literary professionals based outwith Scotland on occasion. Commissioned artists will typically be from the BPOC and/or SBWN communities. SBWN may work with volunteers, partners and allies who identify as BPOC, or white, or another racial or ethnic identity. Some events or activities may be open to the general public or the wider literary community. We have adopted a Constitution. We operate a Safer Spaces Policy during all events, projects and initiatives. *Please see our Mission and Values page for who we are talking about when we say ‘Scottish BPOC writers.’ History Formerly known as Scottish BAME Writers Network (2018-2021), SBWN was co-founded in 2018 by Alycia Pirmohamed and Jay Gao, and aims to connect Scottish BPOC writers with the wider literary sector in Scotland and beyond. Weaving together collaborative literary partnerships, cross-arts co-creation and an intersectional approach to inclusive and participatory programming, SBWN is a sector change-maker, facilitating necessary conversations around inclusive programming in an effort to address and overcome systemic barriers. Professional development programming includes publishing and performance opportunities, workshops, masterclasses, curatorial roles, training and seminars, industry panels and partnerships, feedback and mentoring. Run by BPOC writers for BPOC writers, and informed by member surveys, consultation and feedback, SBWN uplifts, validates and provides safer spaces for marginalised voices, nurturing and promoting the current and next generation of Black and POC writers based in Scotland.