• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

168 Courses in Edinburgh

Shamanic Healing Circle

4.9(30)

By School of Shamanism

Healing Circles are not the same as "women’s circles" or the gatherings that have become more common in recent times. In traditional shamanic cultures, healing took place within the entire tribe rather than just in one-on-one sessions. The community saw itself as a unified whole, where each person contributed to the well-being of others. When someone became unwell, it affected everyone, so the group shared the responsibility of restoring balance and health. In these communal healing sessions, a powerful collective energy would emerge, greatly amplifying the healing process for the person in need. This is what we aim to recreate during our weekend together: a strong, collective contribution where everyone plays a part in the healing of those in need. You will have the opportunity to: Receive healing Channel spirits and offer your support to others Trained practitioners will guide the healing process. At the start, I will provide a thorough introduction to shamanism and healing, so no prior experience is required—just an open heart filled with unconditional love. If joining online, please have a wooden stick and any other tools you feel connected to (such as feathers, stones, drums, rattles, sound instruments, crystals—whatever you wish to bring). If attending in person, feel free to bring any healing tools you like or come as you are, with nothing at all. Giada's Journey Creative explorer of the human well-being with twenty years’ experience running events, workshops and retreats. Co-author of a non-profit book with other 33 Italian women about their stories in different countries. She has been learning to heal herself supporting a Holistic connection between mind, body and spirit. She has been studying and practicing Buddhist teachings, meditation and the Five Tibetan Rites Yoga in Nepal, India and Italy. Approached the imaginal world and dreams with the psychologist Elio Occhipinti and a regressive hypnosis journey with the vision of the psychiatrist Brian Weiss.  Her studies and practice have helped her become: Shamanic Practitioner and Teacher with the two years formal training in Scotland and Teacher Training in Wales  Shamanic and Integral Yoga Teacher, Ikigai Coach, Forest Therapy Guide qualified with Selene Calloni Williams at the Imaginal Academy and part of the Italian-Swiss Association for Counselling and Coaching, Aiscon.  Professional Esoteric Numerologist graduated at The Connaissance School of Numerology Corporate Mental Health Coach achieved with WeFocus Founder of Drink In Art exhibitions of local artists in private flats Founder of School of Shamanism creative and spiritual workshops, classes and therapies Founder of the Art and Spirituality Centre centre for creativity and well-being in Edinburgh By attending to our classes, workshops and retreats you agree to our TERMS AND CONDITIONS Payment  Bookings are non-refundable.  Disclaimer  By booking a class or workshop or retreat or 1-1 session -online or any other venues – with us, you release Giada Gaslini, Invisible Caims/School of Shamanism and any business partners working with Invisible Caims from any liability arising out of any personal injuries, emotional or physical release, death, expectations of results, theft in the venue or damages that may happen to people and objects while attending. We recommend that you consult your GP regarding the suitability of undertaking an exercise programme, if the class you are booking includes it like with yoga or similar, and following all the safety instructions required before beginning to exercise. When participating in an exercise, there is the possibility of sustaining a physical injury. If you engage in this exercise programme, you agree that you do so at your own risk, are voluntarily participating in these activities and assume all risk of injury to yourself. You acknowledge that coaching, shamanic healing and counselling are not to be used as a substitute for psychotherapy, psychoanalysis, mental health care, or other professional advice by legal, medical or other professionals. Our sessions are aimed at inner research, problem solving and personal growth, they do not replace the work of doctors and psychotherapists because they do not consider, treat or aim to solve pathologies and symptoms that are strictly medical. All contracts subject to and governed by English Law and the exclusive jurisdiction of the Courts of England and Wales according to my current insurance.  

Shamanic Healing Circle
Delivered Online & In-Person in Edinburgh + more
£100

Are you an EDI Officer, HR Specialist, Leader or Manager? Or the nominated EDI champion for your team? Maybe you've been given the EDI portfolio on behalf of your Board or department? Or if you're aiming to make a difference via your diverse staff network or union, all change-makers are welcome!

EDI Changemakers Support Network
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
FREE

C&G 2396 Electrical Design Course

5.0(9)

By Optima Electrical Training

This Level 4 City and Guilds 2396-01 Design and Verification of Electrical Installations course has been designed to help develop the skills and up date the knowledge of the requirements to enable you to professionally design, erect and then verify an electrical installation. This course is aimed at those who will have responsibility for designing, supervising, installing and testing electrical installations. Further information can be found here: C&G 2396 Electrical Design Course — Optima Electrical Training (optima-ect.com)

C&G 2396 Electrical Design Course
Delivered In-Person in London + 2 more or UK WideFlexible Dates
£1,195

C&G 2391-52 Inspection & Testing

5.0(9)

By Optima Electrical Training

The course is designed to help improve your understanding of the legal requirements, the theoretical and practical principles for both the initial verification and certification of an electrical installation, further your knowledge and practical skills in the testing and inspection of a range of existing electrical installations, and help improve your understanding of the legal requirements, the theoretical and practical principles for the periodic inspect and testing and certification of an electrical installation.

C&G 2391-52 Inspection & Testing
Delivered In-Person in London + 2 more or UK WideFlexible Dates
£1,395

NVQ Level 3 in Electrical Installations

5.0(9)

By Optima Electrical Training

The NVQ Level 3 is designed to provide both new entrants and those seeking progression in their career, with the opportunity to develop the necessary skills to carry out job roles and responsibilities associated with the installation and maintenance of Electrotechnical systems. There are two options to complete the NVQ Level 3 in Electrical Installations, these are the C&G 2346 and C&G 2357. Successful completion of the NVQ and AM2 assessment will satisfy the entry criteria for JIB accredited electricians

NVQ Level 3 in Electrical Installations
Delivered In-Person in London + 2 more or UK WideFlexible Dates
£1,795 to £1,995

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

PAT Testing Course

5.0(9)

By Optima Electrical Training

The Portable Appliance Testing course or PAT testing course as it is more commonly known is one of our most popular courses as it does not require you to have any formal previous qualifications and once completed, will enable you to offer your services. In the commercial setting, the law places a responsibility on all employers to ensure that the electrical equipment to be used by their staff and the public, should be fit for purpose and safe for use. Hence, all portable appliances have to be regularly checked and maintained by a competent person.

PAT Testing Course
Delivered In-Person in London + 2 more or UK WideFlexible Dates
£395

C&G 2921-31 EV Charge Point Installer

5.0(9)

By Optima Electrical Training

This Level 4 City and Guilds 2396-01 Design and Verification of Electrical Installations course has been designed to help develop the skills and up date the knowledge of the requirements to enable you to professionally design, erect and then verify an electrical installation. This course is aimed at those who will have responsibility for designing, supervising, installing and testing electrical installations. Further information can be found here: C&G 2396 Electrical Design Course — Optima Electrical Training (optima-ect.com)

C&G 2921-31 EV Charge Point Installer
Delivered In-Person in London + 2 more or UK WideFlexible Dates
£435

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Securing Microsoft systems

5.0(3)

By Systems & Network Training

Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.

Securing Microsoft systems
Delivered in Internationally or OnlineFlexible Dates
£3,497
1...45678...17