• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

95 Courses in Edinburgh

Art + Wine Evening

5.0(5)

By The Arienas Collective

Art & Wine Painting Evening with Edinburgh artist Suzanne Kemplay at The Arienas Collective in Edinburgh's historic New Town city centre.

Art + Wine Evening
Delivered In-Person in Edinburgh + more
£36 to £45

30th November 10-11 am FREE INTUITIVE PAINTING

5.0(42)

By Art and Spirituality CIC

You Are Invited to Join Us for Fair Saturday Edinburgh! We are excited to announce that Art and Spirituality CIC will be hosting a special “Wellness and Creativity Day” on Saturday, 30th November, as part of the Fair Saturday Edinburgh movement. This global initiative celebrates the transformative power of arts and culture and promotes positive change in our communities. We believe that everyone should have the opportunity to explore their creativity and enhance their well-being through art and mindfulness. By joining our events, you’ll not only enjoy a day of creativity and relaxation, but you’ll also contribute to building a stronger, more connected community. To join our FREE EVENTS, no prior experience is necessary—just sign up and bring your enthusiasm! *10-11am Intuitive HeART Painting This class combines the principles of intuitive painting with a focus on the heart, allowing you to tap into your inner creativity and feelings without the pressure of technique or perfection. You will engage in a meditative approach to painting, using colours, shapes, and textures to express your thoughts and emotions freely. Embrace the joy of creation and discover the heart of your art! By attending this class you release the teacher, Giada Gaslini and Art and Spirituality Cic, from any liability arising out of any personal injuries, emotional or physical release, death, expectations of results, theft in the venue or damages that may happen to people and objects while attending.

30th November 10-11 am FREE INTUITIVE PAINTING
Delivered In-Person in Edinburgh
FREE

30th November 12-1pm FREE MEDITATION FOR BUSY PEOPLE

5.0(42)

By Art and Spirituality CIC

You Are Invited to Join Us for Fair Saturday Edinburgh! We are excited to announce that Art and Spirituality CIC will be hosting a special “Wellness and Creativity Day” on Saturday, 30th November, as part of the Fair Saturday Edinburgh movement. This global initiative celebrates the transformative power of arts and culture and promotes positive change in our communities. We believe that everyone should have the opportunity to explore their creativity and enhance their well-being through art and mindfulness. By joining our events, you’ll not only enjoy a day of creativity and relaxation, but you’ll also contribute to building a stronger, more connected community. To join our FREE EVENTS, no prior experience is necessary—just sign up and bring your enthusiasm! *12-1pm Meditation for busy people We all recognize the challenges of a hectic lifestyle and offer practical techniques to help you find calm amidst the chaos. This session is tailored for those with tight schedules, providing quick and effective meditation practices that can be easily integrated into your daily routine. You will learn simple breathing exercises and mindfulness techniques designed to reduce stress, enhance focus, and promote mental clarity, all in a short time frame. Whether you have just a few minutes to spare or are looking for ways to create more balance in your life, this class will empower you to cultivate a sense of peace and well-being, no matter how busy you are. By attending this class you release the teacher, Giada Gaslini and Art and Spirituality Cic, from any liability arising out of any personal injuries, emotional or physical release, death, expectations of results, theft in the venue or damages that may happen to people and objects while attending.

30th November 12-1pm  FREE MEDITATION FOR BUSY PEOPLE
Delivered In-Person in Edinburgh
FREE

30th November 1.30-2.30pm FREE GENTLE YOGA

5.0(42)

By Art and Spirituality CIC

You Are Invited to Join Us for Fair Saturday Edinburgh! We are excited to announce that Art and Spirituality CIC will be hosting a special “Wellness and Creativity Day” on Saturday, 30th November, as part of the Fair Saturday Edinburgh movement. This global initiative celebrates the transformative power of arts and culture and promotes positive change in our communities. We believe that everyone should have the opportunity to explore their creativity and enhance their well-being through art and mindfulness. By joining our events, you’ll not only enjoy a day of creativity and relaxation, but you’ll also contribute to building a stronger, more connected community. To join our FREE EVENTS, no prior experience is necessary—just sign up and bring your enthusiasm! *1.30-2.30pm Gentle Yoga Designed to promote relaxation and mindfulness through a slower-paced practice. This class run by Kirstine Henderson focuses on gentle stretching and exercises, making it accessible for all ages and fitness levels. You will experience calming poses that enhance flexibility, balance, and overall well-being. Whether you are new to yoga or looking for a soothing way to unwind, this class offers a supportive environment to help you connect with your body and mind. By attending this class you release the teacher, Giada Gaslini and Art and Spirituality Cic, from any liability arising out of any personal injuries, emotional or physical release, death, expectations of results, theft in the venue or damages that may happen to people and objects while attending.

30th November 1.30-2.30pm FREE GENTLE YOGA
Delivered In-Person in Edinburgh
FREE

CCNA training course description The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking What will you learn Install, configure, and operate a small to medium sized network Gain a foundation in the essentials of networking, security, and automation Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA training course details Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. Prerequisites: Introduction to Data communications & networking Duration 5 days CCNA training course content After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Center™, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.

CCNA
Delivered in Internationally or OnlineFlexible Dates
£2,797

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Definitive network virtualization

5.0(3)

By Systems & Network Training

Network virtualization training course description This course covers network virtualization. It has been designed to enable network engineers to recognise and handle the requirements of networking Virtual Machines. Both internal and external network virtualization is covered along with the technologies used to map overlay networks on to the physical infrastructure. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer implementations. What will you learn Evaluate network virtualization implementations and technologies. Connect Virtual Machines with virtual switches. Explain how overlay networks operate. Describe the technologies in overlay networks. Network virtualization training course details Who will benefit: Engineers networking virtual machines. Prerequisites: Introduction to virtualization. Duration 2 days Network virtualization training course contents Virtualization review Hypervisors, VMs, containers, migration issues, Data Centre network design. TOR and spine switches. VM IP addressing and MAC addresses. Hands on VM network configuration Network virtualization What is network virtualization, internal virtual networks, external virtual networks. Wireless network virtualization: spectrum, infrastructure, air interface. Implementations: Open vSwitch, NSX, Cisco, others. Hands on VM communication over the network. Single host network virtualization NICs, vNICs, resource allocation, vSwitches, tables, packet walks. vRouters. Hands on vSwitch configuration, MAC and ARP tables. Container networks Single host, network modes: Bridge, host, container, none. Hands on Docker networking. Multi host network virtualization Access control, path isolation, controllers, overlay networks. L2 extensions. NSX manager. OpenStack neutron. Packet walks. Distributed logical firewalls. Load balancing. Hands on Creating, configuring and using a distributed vSwitch. Mapping virtual to physical networks VXLAN, VTEP, VXLAN encapsulation, controllers, multicasts and VXLAN. VRF lite, GRE, MPLS VPN, 802.1x. Hands on VXLAN configuration. Orchestration vCenter, vagrant, OpenStack, Kubernetes, scheduling, service discovery, load balancing, plugins, CNI, Kubernetes architecture. Hands on Kubernetes networking. Summary Performance, NFV, automation. Monitoring in virtual networks.

Definitive network virtualization
Delivered in Internationally or OnlineFlexible Dates
£1,727

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

VMware: Install, Configure, Manage (v8)

5.0(3)

By Systems & Network Training

VMware training course description This five-day VMware course features intensive handson training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most VMware technologies in the software-defined data center. What will you learn Install and configure ESXi hosts. Deploy and configure vCenter. Create virtual networks using standard and distributed switches. Configure VMs, templates, clones, and snapshots. Manage virtual machine resource allocation. Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion. VMware training course details Who will benefit: Systems administrators and engineers. Prerequisites: Introduction to data communications & networking. Windows/Linux Administration. Duration 5 days VMware training course contents Course Introduction Introductions and course logistics. Course objectives vSphere and Virtualization Overview Explain basic virtualization concepts, Describe how vSphere fits in the software-defined data center and the cloud infrastructure, Recognize the user interfaces for accessing vSphere, Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs Installing and Configuring ESXi Install an ESXi host, Recognize ESXi user account best practices, Configure the ESXi host settings using the DCUI and VMware Host Client Deploying and Configuring vCenter Recognize ESXi hosts communication with vCenter, Deploy vCenter Server Appliance, Configure vCenter settings, Use the vSphere Client to add and manage license keys, Create and organize vCenter inventory objects, Recognize the rules for applying vCenter permissions, View vCenter logs and events Configuring vSphere Networking Configure and view standard switch configurations, Configure and view distributed switch configurations, Recognize the difference between standard switches and distributed switches, Explain how to set networking policies on standard and distributed switches Configuring vSphere Storage Recognize vSphere storage technologies, Identify types of vSphere datastores, Describe Fibre Channel components and addressing, Describe iSCSI components and addressing, Configure iSCSI storage on ESXi, Create and manage VMFS datastores, Configure and manage NFS datastores Deploying Virtual Machines Create and provision VMs, Explain the importance of VMware Tools, Identify the files that make up a VM Recognize the components of a VM, Navigate the vSphere, Client and examine VM settings and options, Modify VMs by dynamically increasing resources, Create VM templates and deploy VMs from them, Clone VMs, Create customization specifications for guest operating systems, Create local, published, and subscribed content libraries, Deploy VMs from content libraries, Manage multiple versions of VM templates in content libraries Managing Virtual Machines Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances, Migrate VMs using vSphere vMotion, Describe the role of Enhanced vMotion Compatibility in migrations, Migrate VMs using vSphere Storage vMotion, Take a snapshot of a VM, Manage, consolidate, and delete snapshots, Describe CPU and memory concepts in relation to a virtualized environment, Describe how VMs compete for resources Define CPU and memory shares, reservations, and limits Deploying and Configuring vSphere Clusters Create a vSphere cluster enabled for vSphere DRS and vSphere HA, View information about a vSphere cluster Explain how vSphere DRS determines VM placement on hosts in the cluster, Recognize use cases for vSphere DRS settings, Monitor a vSphere DRS cluster Describe how vSphere HA responds to various types of failures, Identify options for configuring network redundancy in a vSphere HA cluster, Recognize vSphere HA design considerations, Recognize the use cases for various vSphere HA settings, Configure a vSphere HA cluster, Recognize when to use vSphere Fault Tolerance Managing the vSphere Lifecycle Enable vSphere Lifecycle Manager in a vSphere cluster, Describe features of the vCenter Update Planner, Run vCenter upgrade prechecks and interoperability reports, Recognize features of vSphere Lifecycle Manager, Distinguish between managing hosts using baselines and managing hosts using images, Describe how to update hosts using baselines, Describe ESXi images, Validate ESXi host compliance against a cluster image and update ESXi hosts, Update ESXi hosts using vSphere Lifecycle Manager, Describe vSphere Lifecycle Manager automatic recommendations, Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware

VMware: Install, Configure, Manage (v8)
Delivered in Internationally or OnlineFlexible Dates
£3,687

Educators matching "host"

Show all 13
Gullane Golf Club

gullane golf club

4.9(43)

Gullane

As previous host venue for the ASI Scottish Open and Ladies Scottish Open , Gullane offers a championship course in the scenic and challenging Course No.1. Equally challenging is Course No.2, and, of course, there's Course No.3, full of character and charm. The choice is yours.... Bookings We look forward to welcoming you to the Club, to discuss your booking please contact our team by clicking here or telephone 01620 843 767. The Courses Golf has been played over the links at Gullane for more than 350 years. Today, Gullane Golf Club is one of Scotland's most prestigious member clubs, mixing the finest tradition with some of the most admired natural links land in the world. Gullane is blessed with superb turf and a climate that allows all year round golf. Visitors are welcome to play our championship courses which offer dramatic coastal views and a golfing challenge to savour. Laid out over prime seaside land, the three golf courses are simply known by number reflecting their age. We have 4 flyovers available to view. Click here to view a flyover of all the courses. More information on this can be found in the Courses section of the site. Gullane No. 1 (1884) has a long history of hosting national and international championship golf events, including the 2018 Aberdeen Standard Investments Scottish Open and Ladies Scottish Open, the Aberdeen Asset Management Scottish Open in 2015 as well as Local Final Qualifying for the Open Championship at neighbouring Muirfield. Gullane No. 2 (1898) was laid out by the legendary Willie Park Jr and has also been used for Open Championship Qualifying as well as the Seniors Open Amateur. Gullane No. 3 (1910) was also designed by Willie Park Jr. It may be the shortest of the three courses, but it provides a wonderful test based on shot-making skills rather than power. Gullane offers a unique range of golfing experiences for members and visitors alike, combining a major role in the history of golf in Scotland, great golfing conditions, and a truly spectacular environment. We look forward to welcoming you to Gullane.

Department Of Elearning

department of elearning

4.5(2)

Edinburgh

The Royal College of Surgeons of Edinburgh was founded in 1505 by Royal Charter granted from King James IV. From the discoveries of Simpson and Lister to modern day pioneers of medicine and dentistry who are developing simulation, VR, and robotics, the College has been a seat of learning and advancement for over 515 years. It is the oldest Surgical College in the world with just under 30,000 members in 100 countries, almost half of whom are overseas, touching every stage of the career path from medical student to consultant. We are a family of Surgeons, Dental Surgeons and members of the Surgical and Dental teams who put Patient Safety at the heart of everything they do. Our high quality education and examinations ensure that standards are upheld across all specialities and in all countries. With our interest in professional standards, the College’s primary role – and the main concern of our Fellows and Members – is to ensure the safety of our patients and provide them with the best possible care. We do this by championing the highest standards of surgical and dental practice; through our provision of courses and educational programmes, training, examinations, and Continuous Professional Development; our liaison with external medical bodies; and by influencing healthcare policy across the UK. We also support our professional family with a host of resources from our membership App, Library Services, Podcasts, Webinars, and our magazine, Surgeons News, to keep them up to date on the latest techniques, news, data, and insights in their field. College headquarters are in Edinburgh in our home at Surgeons Hall, the world famous category A listed building designed by William Henry Playfair in 1832. Our main Campus hosts a dedicated skills laboratory, the Surgeons' Hall Museums, College Library, function and meeting facilities, a 129 bedroom hotel, Ten Hill Place, and office space for over 210 staff. We also maintain a second site in Birmingham’s prestigious Colmore Row and a third International Office in Kuala Lumpur, Malaysia, to meet the needs of our growing international membership.