Anger Management 1 Day Training in Edinburgh
BECOME A SPIRITUAL WARRIOR MENTOR A journey through Japanese shamanism and philosophy in 13 modules during 3 full week-ends, available online and in person, to become a Spiritual Warrior Mentor and learn practical shamanic practices to use in your sessions and group work. This will require the completion of some case studies and homeworks. It gives you the opportunity to add a job qualification to your holistic experience that can be used in individual sessions or group events. We are a globally certified IPHM training provider (International Practitioners of Holistic Medicine). MODULES 1) Loving your imperfection through Wabi Sabi: accept the impermanence of things and recognise the beauty of imperfection, learning to flow like a river. In this module you will learn not to attach yourself to a theory, to a knowledge, but learn how to become flexible in order to be powerful and solve any life problem. 2) Embrace your wish to change through Kaizen: Kaizen is an approach to creating continuous improvement based on the idea that small, ongoing positive changes can reap significant improvements compared to radical changes to achieve transformation. In this module you will learn how to master the art of creating habits. 3) Face life challenges and storm through Hanafubuki: through 'the cherry blossom storm' we have the magical moment when the sakuras begin to fall, creating a delicate blizzard of petals. This concept of ephemeral beauty is a metaphor for human life, rich and beautiful but also fragile and fleeting. In this module you will learn how to remain calm to make the best decisions. 4) Express your own emotions and welcome those of others through Omoiyari: Omoiyari is commonly translated to empathy, but it actually has a deeper meaning; it literally means to give your thoughts to others. In this module you will learn how to release your own emotions and develop empathy and compassion for others. 5) Repair your own soul wounds through Kintsugi: Kintsugi is the art of mending broken objects with gold, it is the art of treasuring your wounds by repairing them with the gold of pure aesthetic experience. The wounds of our lives are seen through the eyes of the soul,which receives and heals them with the gold of death,of rebirth and freedom. In this module you will learn to perform a rite of passage after which nothing will be the same as before. 6) Master the art of patience through Nintai: Nintai is the power of enduring without complaint, without looking for quick results. It means sticking to your path, trusting the process, to your beliefs. In this module you will learn to never give up, to wait for the right time for things to happen. 7) How gratitude changes you and your brain through Itadakimasu: this word means “I humbly receive” and relates to the traditional way of showing gratitude by elevating above one’s head the gift received. Through time, itadakimasu became the expression showing appreciation for the food received. In this module you will learn the benefits of gratitude on your mental health. 8) Learn to become grounded through Shinrin-Yoku: Immersion in nature has scientifically proven therapeutic effects: it can reduce stress hormone concentrations in the body, strengthen the immune system, regulate blood pressure and heart rate, and lower cholesterol. Shinrin-Yoku is an adventure of deep communion with nature. In this module you will learn how to ground yourself. 9) Develop the best version of you through Hanasaki: this is the blossom of a flower. You will use this word for blossoming the best version of yourself. No matter who you are, where you come from, what your path has been so far, in this module you will learn to aspire to a better version of yourself. 10) Less is more: learn to declutter and simplify your life through Danshari: There’s a new movement rising around the world. Perhaps you’ve heard of it: Danshari. It means “refusal, disposal and separation” You can simply translate it as cleaning or tidying up, but this word means more than this. In this module you will learn to abandon attachment to objects and make a better use of them. 11)Connect with your soul mission through Ikigai: ikigai is that thing that gives our existence a marvellous intensity, it is what gives meaning to life or, as the French would say, its raison d’etre. There is a fire inside us: it can burn with more force, it can weaken, but then it can come back stronger than ever. Ikigai cannot be a simple mental vision, as it is wider, deeper and absolute than the thinking mind. You can only live it, and only by living it can you know it. In this module you will learn the first steps to move nearer to your soul mission. 12)Accept your own shadows, feeling a part of the universe through Yugen: Beauty is Darkness. Shadows are what allow the visible to emerge. The whole world and ourselves are a constant duality: we wake up and go to bed, the sun rises and goes down, we feel on top of the world and we feel stressed, we move in and out, we feel active and we feel lazy and so on. It’s the natural flow of the universe, nothing lasts in the same status forever. In this module you will learn to keep this duality between inner light and darkness stable and to reach the perfect moment. 13)Accept the impermanence of life through mono no aware: ‘this is the deep feeling or pathos of things, the powerful emotions that objects can evoke or instil in us. It is often associated with a poignant feeling of transience, a beautiful sadness in the passing of lives and objects, like the glorious colour of autumn leaves as they are about to fall. In this module you will learn how to let go of our attachments to transient things. Through this certified course you will learn these for yourself and to help others in their transformation if you are an holistic therapist: ● to become grounded and calm ● to create fundamental daily habits ● to have the right approach to solve any life challenge and storm ● how to flow with life ● to express your emotions and develop compassion ● to repair your own wounds ● to practise patience and gratitude ● to become a better version of yourself ● to be nearer to meet your soul mission You can choose: Online (either live or receiving the recordings) or at the Art and Spirituality Centre 6-8 Alexander Drive EH11 2RH Edinburgh First week-end 22nd-23rd February 2025 10am-5pm each day Modules 1,2,3,4 Second week-end 15th-16th March 2025 10am-5pm each day Modules 5,6,7,8,9 Third week-end 14th-15th June 2025 10am-5pm each day Modules 10,11,12,13 If you are not available to attend, you can catch up with the recordings and do your homeworks in order to qualify. You an also attend one or two week-ends only but you will not qualify If you are not available to attend, you can catch up with the recordings and do your homeworks in order to qualify. You an also attend one or two week-ends only but you will not qualify Cost The full course with qualification: £450 Option A) Pay the whole course in full with £50 discount, so just £400 and get a free 1-1 session with me (online or in person) of the value of £100 Option B) Pay a Deposit £150 to secure your place, £150 1st March and £150 1st June 2025 Option C) Join individal week-ends with no qualification £150 each Disclaimer By booking any event or 1-1 session -online or any other venues – with us, you release Giada Gaslini, Invisible Caims/School of Shamanism, Art and Spirituality and any business partners working with for the event from any liability arising out of any personal injuries, emotional or physical release, death, expectations of results, theft in the venue or damages that may happen to people and objects while attending. We recommend that you consult your GP regarding the suitability of undertaking an exercise programme, if the class you are booking includes it like with yoga or similar, and following all the safety instructions required before beginning to exercise. When participating in an exercise, there is the possibility of sustaining a physical injury. If you engage in this exercise programme, you agree that you do so at your own risk, are voluntarily participating in these activities and assume all risk of injury to yourself. You acknowledge that coaching, shamanic healing and counselling are not to be used as a substitute for psychotherapy, psychoanalysis, mental health care, or other professional advice by legal, medical or other professionals. Our sessions are aimed at inner research, problem solving and personal growth, they do not replace the work of doctors and psychotherapists because they do not consider, treat or aim to solve pathologies and symptoms that are strictly medical. All contracts subject to and governed by the law according to my current insurance. Added element of the disclaimer If the class happens in any venue and you are causing any damage to the property, you are taking responsibility of your actions. It is down to the individual to take personal responsibility when participating in physical activity and when entering a space that is used and shared by other parties. Giada Gaslini does not take any responsibility about possible risks that may arise but can only advise and enforce guidelines and legal requirements as defined by the Scottish Government and local authorities. Giada's Journey Creative explorer of the human well-being with twenty years’ experience running events, workshops and retreats. Co-author of a non-profit book with other 33 Italian women about their stories in different countries. She has been learning to heal herself supportinga Holistic connection between mind, body and spirit. She has been studying and practicing Buddhist teachings, meditation and the Five Tibetan Rites Yoga in Nepal, India and Italy. Approached the imaginal world and dreams with the psychologist Elio Occhipinti and a regressive hypnosis journey with the vision of the psychiatrist Brian Weiss. Her studies and practice have helped her become: Shamanic Practitioner and Teacher with the two years formal training at Anam Cara and one year in Wales Shamanic and Integral Yoga Teacher, Ikigai Coach,Forest Therapy Guide qualified with Selene Calloni Williams at the Imaginal Academy and part of the Italian-Swiss Association for Counselling and Coaching, Aiscon. Professional Esoteric Numerologist graduated at The Connaissance School of Numerology Corporate Mental Health Coach achieved with WeFocus Founder of Drink In Art exhibitions of local artists in private flats Founder of Invisible Caims creative and spiritual workshops, classes and therapies Founder of the Art and Spirituality Centre centre for creativity and well-being in Edinburgh
Networking Microsoft Systems course description A hands-on course covering the network aspects of Microsoft systems. The course progresses from basic TCP/IP tools and configuration settings through to advanced security considerations finishing with an overview of Exchange and IIS. Hands on sessions are based on a choice of Windows Server 2003 or Windows 2000 server and Windows XP or Windows 2000 professional. Customised versions with other Microsoft platforms are also available. What will you learn Design networks with consideration for Microsoft issues such as logons. Design, configure and troubleshoot TCP/IP, DNS, WINS and DHCP. Configure security features such as PKI and IPSec. Describe the Windows TCP/IP implementation details. Networking Microsoft Systems course details Who will benefit: Anyone working with Microsoft systems. Prerequisites: TCP/IP foundation for engineers Supporting Windows ( XP or 2000 or 2003) Duration 5 days Networking Microsoft Systems course contents Configuring network cards PnP, resources, Ethernet cards, wireless cards, dial up networking, other cards, Ethernet settings, layer 2 QoS. Configuring and supporting IP Basic IP settings, advanced IP settings, advanced TCP settings, DrTCP and registry settings, security DHCP DHCP server, authorising the DHCP service, DHCP client, DHCP relays, Address pools, options, lease duration's, Integrating with DNS. Microsoft networking overview Workgroups and domains, Domain controllers, the logon process in a network, the role of Active Directory, synchronisation, protocol stacks and bindings. Accessing file and print resources Shared folders, permissions, network printers, browsing, NetBIOS, SMB. WINS Servers, clients, Client registration, renewing and releasing of names. NetBIOS node types. DNS1 Overview, Primary and secondary servers, DDNS, zones, resource records. The browser service Master, backup and other browser roles, elections, announcements, recovery from failure, Inter subnet browsing. TCP/IP implementation details Dead gateway detection, Multi homing, multicasting, MTU path discovery, registry settings, QOS and RSVP, Windows as a router, performance implications of Microsoft services. Internet Access Options, NAT, Firewall capabilities and Proxy server, Internet Authentication Service. Remote Access Installing, RAS servers. RAS process, protocols Security: PKI PPTP, L2TP, What is IPSec, configuring IPSec. Security: VPNs PPTP, L2TP, What is IPSec, configuring IPSec. Other Microsoft networking services & tools Netmeeting, instant messaging, white boarding, document collaboration, video conferencing Microsoft Exchange, IIS, Directory replication, SNMP, Net Monitor, integration with other platforms.
Complete Python training course description Python is an agile, robust, expressive, fully objectoriented, extensible, and scalable programming language. It combines the power of compiled languages with the simplicity and rapid development of scripting languages. This course covers Python from the very basics of 'hello world!' through to object oriented programming and advanced topics such as multi threading. Hands on follows all the major sections in order to reinforce the theory. What will you learn Read Python programs. Write Python programs. Debug Python programs. Use Python's objects and memory model as well as its OOP features. Complete Python programming training course details Who will benefit: Anyone wishing to learn Python. Prerequisites: None. Duration 5 days Complete Python programming training course contents Welcome to Python: What is Python? Origins, features. Downloading and installing Python, Python manuals, comparing Python, other implementations. Getting started: Program output, the print statement, "hello world!", Program input, raw_input(), comments, operators, variables and assignment, numbers, strings, lists and tuples, dictionaries, indentation, if statement, while Loop, for loop. range(), list comprehensions. Files, open() and file() built-in functions. Errors and exceptions. Functions, Classes, Modules, useful functions. Python basics: Statements and syntax, variable assignment, identifiers, basic style guidelines, memory management, First Python programs, Related modules/developer tools. Python Objects: Other built-in types, Internal Types, Standard type operators, Standard type built-in functions, Categorizing standard types, Unsupported types. Numbers: Integers, Double precision floating point numbers, Complex numbers, Operators, Built-in and factory functions, Other numeric types. Sequences: strings, lists, and tuples: Sequences, Strings, Strings and operators, String-only operators, Built-in functions, String built-in methods, Special features of strings, Unicode, Summary of string highlights, Lists, Operators, Built-in functions, List type built-in methods, Special features of lists, Tuples, Tuple operators and built-in functions, Tuples special features, Copying Python objects and shallow and deep copies. Mapping and set types: Mapping Type: dictionaries and operators, Mapping type built-in and factory functions, Mapping type built-in methods, Dictionary keys, Set types, Set type operators, Built-in functions, Set type built-in methods. Conditionals and loops: If, else and elif statements, Conditional expressions, while, for, break, continue and pass statements, else statement . . . take two, Iterators and iter(), List comprehensions, Generator expressions. Files and input/output: File objects, File built-in functions [open() and file()], File built-in methods and attributes, Standard files, Command-line arguments, File system, File execution, Persistent storage modules. Errors and exceptions: What are exceptions? Detecting and handling exceptions, Context management, Exceptions as strings, Raising exceptions, Assertions, Standard exceptions, Creating Exceptions, Why exceptions, Exceptions and the sys module. Functions: Calling, creating and passing functions, formal arguments, variable-length arguments, functional programming, Variable scope, recursion, generators. Modules: Modules and files, Namespaces, Importing modules, Module import features, Module built-in functions, Packages, Other features of modules. Object-Oriented Programming (OOP): Classes, Class attributes, Instances, Instance attributes, Binding and method invocation, Static methods and class methods, Composition, Sub-classing and derivation, Inheritance, Built-in functions for classes, and other objects, Customizing classes with special methods, Privacy, Delegation, Advanced features of new-style classes (Python 2.2+), Related modules and documentation. Execution environment: Callable and code Objects, Executable object statements and built-in functions, Executing other programs. 'Restricted' and 'Terminating' execution, operating system interface. Regular expressions: Special symbols and characters, REs and Python, Regular expressions example. Network programming: Sockets: communication endpoints, Network programming in Python, SocketServer module, Twisted framework introduction. Internet client programming: What are internet clients? Transferring files, Network news, E-mail. Multithreaded Programming: Threads and processes Python, threads, and the global interpreter lock, The thread and threading Modules. GUI programming: Tkinter and Python programming, Tkinter Examples, Brief tour of other GUIs. Web programming: Web surfing with Python: creating simple web clients, Advanced Web clients, CGI: helping web servers process client data, Building CGI applications, Using Unicode with CGI, Advanced CGI, Web (HTTP) Servers. Database programming: Python database application programmer's interface (DB-API), ORMs. Miscellaneous Extending Python by writing extensions, Web Services, programming MS Office with Win32 COM, Python and Java programming with Jython.
UNIX Virtualization and High Availability course description This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. UNIX Virtualization and High Availability course details Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days UNIX Virtualization and High Availability course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.
Linux virtualization and HA training course description The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. Linux virtualization and HA training course details Who will benefit: Linux professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days Linux virtualization and HA training course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.
Total H.248 training course description A course focusing purely on the H.248 protocol. Anyone working through the ITU standards documents can testify to the need of a training course to explain how H.248 really works. This course already assumes knowledge of other VoIP protocols and starts by positioning H.248 in relation to the other protocols. The course then looks at H.248 architectures and concepts before analysing H.248 messages and call flows. What will you learn Describe what H.248 is Recognise where H.248 fits in relation to other VoIP protocols. Explain how H.248 works. Analyse H.248 packets Total H.248 training course details Who will benefit: Technical staff working with H.248 Prerequisites: Voice Over IP. Duration 2 days Total H.248 training course contents What is H.248? Review of VoIP protocols: RTP, RTCP, SIP, SDP, H.323. The PSTN and SS7. Where H.248 fits into the picture. H.248 history. MGCP. The IETF. Megaco. ITU standards. H.248v1, v2, v3. H.248 architectures Media Gateways, Media Gateway Controllers, Gateway Control functions, Signalling Gateways. Reference architectures: IMS/TISPAN: IBCF, IWF, I-BGF, SPDF. MSF: S-SBG-NC, D-SBG-NC. GSMA: IPX Proxy. Softswitches. H.248 concepts The connection model, terminations, streams, contexts. Termination properties: descriptors, context properties. Events, signals, packages. H.248 messages Protocol stack, UDP, TCP. Message structure. Transactions, actions, commands. Requests, replies, acknowledgements. Sample message flows. Binary encoding, ASN syntax, Text encoding. H.248 commands Termination manipulation: Add, Subtract, Move, Modify. Event reporting: Notify. Management: AuditCapability, AuditValue, ServiceChange. H.248 Descriptors What are descriptors? Relationship with messages and commands. Basic descriptors, Descriptors composed of other descriptors. The 19 descriptors. Defaults. H.248 Transactions Groups of commands, transaction Ids, relationship with actions and commands. Requests and replies. H.248 wrap up What is a package? Basic packages. H.248 security. H.248 - SIP interoperation. H.248 interoperation with other protocols.