• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

169 Courses in Bristol

Are you an EDI Officer, HR Specialist, Leader or Manager? Or the nominated EDI champion for your team? Maybe you've been given the EDI portfolio on behalf of your Board or department? Or if you're aiming to make a difference via your diverse staff network or union, all change-makers are welcome!

EDI Changemakers Support Network
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
FREE

C&G 2396 Electrical Design Course

5.0(9)

By Optima Electrical Training

This Level 4 City and Guilds 2396-01 Design and Verification of Electrical Installations course has been designed to help develop the skills and up date the knowledge of the requirements to enable you to professionally design, erect and then verify an electrical installation. This course is aimed at those who will have responsibility for designing, supervising, installing and testing electrical installations. Further information can be found here: C&G 2396 Electrical Design Course — Optima Electrical Training (optima-ect.com)

C&G 2396 Electrical Design Course
Delivered In-Person in London + 2 more or UK WideFlexible Dates
£1,195

C&G 2391-52 Inspection & Testing

5.0(9)

By Optima Electrical Training

The course is designed to help improve your understanding of the legal requirements, the theoretical and practical principles for both the initial verification and certification of an electrical installation, further your knowledge and practical skills in the testing and inspection of a range of existing electrical installations, and help improve your understanding of the legal requirements, the theoretical and practical principles for the periodic inspect and testing and certification of an electrical installation.

C&G 2391-52 Inspection & Testing
Delivered In-Person in London + 2 more or UK WideFlexible Dates
£1,395

NVQ Level 3 in Electrical Installations

5.0(9)

By Optima Electrical Training

The NVQ Level 3 is designed to provide both new entrants and those seeking progression in their career, with the opportunity to develop the necessary skills to carry out job roles and responsibilities associated with the installation and maintenance of Electrotechnical systems. There are two options to complete the NVQ Level 3 in Electrical Installations, these are the C&G 2346 and C&G 2357. Successful completion of the NVQ and AM2 assessment will satisfy the entry criteria for JIB accredited electricians

NVQ Level 3 in Electrical Installations
Delivered In-Person in London + 2 more or UK WideFlexible Dates
£1,795 to £1,995

31st January Molly Jamieson #Agent121. Looking for: PICTURE BOOKS, MG, YA, ADULT FICTION

5.0(1)

By I Am In Print

LOOKING FOR: PICTURE BOOKS, MG, YA, ADULT FICTION Molly Jamieson has been working at United Agents Ltd since 2017, working across adult and children’s books, and before that she worked at Curtis Brown. She has recently started building her own client list which already includes million-copy selling authors and bestsellers. Molly has a particular interest in scifi and fantasy across both adult and children’s books. For a sense of her taste, she has recently read and enjoyed Sistersong by Lucy Holland, Gideon the Ninth by Tamsyn Muir, Uprooted by Naomi Novik, The Poppy War by R.F. Kuang, and Once Upon A Broken Heart by Stephanie Garber. She loves anything with high stakes, characters you would follow anywhere, big stories, expansive worldbuilding, breathless romance, and threads of adventure running throughout. She is also looking for commercial romantic fiction in all shapes and forms. She has a real soft spot for classic tropes, a great sense of humour, and anything with a clear pitch that makes you sit up and take notice, but in the end it all comes down to chemistry. In this area, she has recently read and loved The Hating Game by Sally Thorne, Book Lovers by Emily Henry, The Unhoneymooners by Christina Lauren, and The Love Hypothesis by Ali Hazelwood. She also represents children’s authors and illustrators in all genres, from picture books up to YA. In one single word document, Molly would like you to submit a covering letter, 1 page synopsis and the first three chapters or 5,000 words of your manuscript in a single word document, whichever is shorter. For picture books, please submit a covering letter and 2 picture books in a single document. Please send EITHER picture books OR another genre, not both in one submission. (In addition to the paid sessions, Molly is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 22 January 2025

31st January Molly Jamieson #Agent121. Looking for: PICTURE BOOKS, MG, YA, ADULT FICTION
Delivered Online + more
£72

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

PAT Testing Course

5.0(9)

By Optima Electrical Training

The Portable Appliance Testing course or PAT testing course as it is more commonly known is one of our most popular courses as it does not require you to have any formal previous qualifications and once completed, will enable you to offer your services. In the commercial setting, the law places a responsibility on all employers to ensure that the electrical equipment to be used by their staff and the public, should be fit for purpose and safe for use. Hence, all portable appliances have to be regularly checked and maintained by a competent person.

PAT Testing Course
Delivered In-Person in London + 2 more or UK WideFlexible Dates
£395

C&G 2921-31 EV Charge Point Installer

5.0(9)

By Optima Electrical Training

This Level 4 City and Guilds 2396-01 Design and Verification of Electrical Installations course has been designed to help develop the skills and up date the knowledge of the requirements to enable you to professionally design, erect and then verify an electrical installation. This course is aimed at those who will have responsibility for designing, supervising, installing and testing electrical installations. Further information can be found here: C&G 2396 Electrical Design Course — Optima Electrical Training (optima-ect.com)

C&G 2921-31 EV Charge Point Installer
Delivered In-Person in London + 2 more or UK WideFlexible Dates
£435

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Securing Microsoft systems

5.0(3)

By Systems & Network Training

Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.

Securing Microsoft systems
Delivered in Internationally or OnlineFlexible Dates
£3,497
1...45678...17