• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

20753 Other courses

Supervision of supervision - online bi-monthly reflective group

5.0(2)

By Supervision Institute

bi-monthly online group for supervisors of counsellors, psychotherapists or coaches who want a reflective space to discuss your supervision practice with other supervisors

Supervision of supervision - online bi-monthly reflective group
Delivered OnlineFlexible Dates
Price on Enquiry

Workshop: Academic Language & Skills Module 5

By Scotland Study Centre (SSC)

Advanced Level workshop that introduces you to the basic Techniques of Academic English that will help you to: i)  Read and Write Academic tests more effectively, and ii)  give effective Academic Presentations. 

Workshop: Academic Language & Skills Module 5
Delivered OnlineFlexible Dates
£95

Shorinji Kempo - Windmill Hill

5.0(8)

By Bristol Shorinji Kempo Dojo

Shorinji Kempo is a Japanese martial art focused on self defence, a healthy mind, and a healthy body. You will learn some awesome kick-ass moves, while also getting fit, meeting new people, and having a lot of fun! The class contains both "hard" techniques (punches and kicks) and "soft" techniques (pins and throws). We also do meditation and philosophy, and a form of pressure point massage. Monday classes are usually taught by Sensei Nicki (4th Dan, she/her), who also teaches on Saturdays at our other location. Sensei Mike (5th Dan, he/him) usually teaches on Fridays at Totterdown. Shorinji Kempo is a Japanese martial art which focuses on three main benefits - healthy mind, healthy body, and self defence. Our classes will teach you self confidence and self defence skills. You'll have a lot of fun as part of our community, while also keeping fit.

Shorinji Kempo - Windmill Hill
Delivered In-PersonFlexible Dates
£9 to £450

Instantly get that 'Dream Job' working in Spa, Salon or Cruise Ship and charging up to £50.00 per treatment. This is the perfect course for students starting out in 'Beauty Therapy'. You can choose to learn for 33 evenings or the 'Fast Track' of ONLY 5 Days plus coursework, case studies and homework. This course is accredited by the VTCT and recognised by the HABIA- Hair and Beauty regulated government standards. Professional Skincare & Facials This unit will allow a student to give a professional facial using a leading brand. It will prepare them for work in a salon/spa, allow them to identify different skin types and textures and provide a facial which is tailor-made to each client. Course Objectives To prepare students for certification in Professional Skincare & Facials, by covering the following: How to identify areas of improvement and apply the correct products Related anatomy and physiology Contraindications Health, safety and hygiene Consultation and record keeping Treatment planning Product knowledge Correct cleansing Spritz toning Controlled exfoliation Steam & extraction Different types of face mask Correct moisturisation Use of sun screen Mineral make up Manicures & Pedicures This unit will allow the student to perform a professional manicure and pedicure on a paying customer. It will prepare them for work in a salon/spa and allow them to identify potential nail conditions, to file and paint correctly and to apply luxury applications such as paraffin wax. Course Objectives To prepare students for certification in Manicures & Pedicures, by covering: Removal of nail polish Cuticle work Correct nail filing Nourishing and conditioning the nails and hands How to apply nail polish Arm and hand massage Correct washing and cleansing of the feet Exfoliation and removal of dead skin cells Correct nail filing Nourishing and conditioning the feet and toe nails Cuticle work How to apply nail polish Leg and foot massage Health & Safety Related anatomy & physiology (The hands and nails) Contra-indications After-care Extras not offered in other schools: Heated paraffin wax Hand and foot masks Deep exfoliation Heated hand mitts and booties Hot oil treatment Waxing This unit will prepare the student to provide a professional waxing service using warm and hot wax to specific areas of the body. They will learn about hair growth cycles, correct application of wax and removal. What To Expect From This Course This is an exciting and intensive course which will teach students how to perform strip waxing. Areas covered will include: Arms Legs Back Eyebrows Lip Chin and face An extra unit is now covered with hot wax application for the more safe removal of hair to the following area: Bikini Eyelash and Brow Tinting This unit will teach a student how to correctly identify the correct colour for tinting of eyebrow and eyelash and will allow them to improve the appearance of clients who may have pale or uneven hair growth. Client consultation Contra-indications and Contra-actions Related Anatomy & Physiology Patch Testing prior to treatment Health & Safety pre-requisites Tinting Eyelashes & Eyebrows Identifying the correct Colour for All Types of Skin Tone and Hair Colour Aftercare advice Cosmetic Make Up This unit will guide the student on how to perform a correct make-up application. They will be able to perform the correct application for day, evening and occasional. Client consultation Contra-indications and Contra-actions Related Anatomy & Physiology and Health and Safety Facial Examination and skin analysis Cleansing and preparing the Skin Skin Anatomy and facts Correct choice of Make Up Products Correction Techniques Day, Evening & Special Occasion Make Up How to identify Diiferent Face, eye and lip Shapes, Skin Types and skin tone Aftercare advice Mineral Make Up Our school works with the accredited mineral make-up Bella Pierre. Know for camouflage and health purposes, mineral make-up is one of the only make-ups that can be applied after a facial treatment. Health & Safety, Client Care Health and safety in salon and spa is an essential criteria which is necessary to ensure the safety of the student and the client. How to avoid cross-contamination First Aid Coshh Riddor Hygiene in the workplace Related Anatomy & Physiology The study and certification of Anatomy and Physiology is a pre-requisite required in order to legally carry out treatments as a working therapist. It allows a therapist to recognise how their treatment can effect and improve bodily functions. The course will cover the following: Cells and Tissues The Skeletal System The Integumentary System The Blood Lymph Systems The Muscular System Neurology The Digestive and Excretory Systems The Respiratory and Olfactory Systems The Endocrine and Reproductive Systems Arthrology Health and Safety Issues Salon Management Hygiene in the Workplace Certification Upon completing all units, assessments and criteria and receiving 85% achievement, an NVQ Level 2 Certificate will be issued Pre-Requisites This course is for a complete beginner and offers a full introduction into the beauty industry What You Need To Bring What you need to bring along to the course. Towels, creams, oils, lunch! What We Provide We provide - massage couches, safe and enjoyable place to learn. Purchasing a kit for this course We provide a fully operational kit for our students. Please enquire as to costs. Duration 1 day a week on Friday for 8 weeks, 9.30am – 4.30pm Evening course option: 1 evening per week 6pm – 9pm for 13 weeks -- OR -- Optional training tailor-made to suit your needs and requirements These courses are on going so you can join at any stage and integrate into existing classes. FAST TRACK AVAILABILITY ONE PLACE LEFT FOR: Sat 5th April to Tue 8th April and Tue 15th and Wed 16th April FURTHER FAST TRACK DATES AVAILABLE ON REQUEST. WE OFFER ONE TO ONE TRAINING TOO! (Subject to availability and a price supplement). Remember, we are different, there is NO other Academy like us. We set our dates around you. OUR MISSION STATEMENT: Here at The Angel Academy of Teaching and Training, we go that step further to help our students. We offer the opportunity for a student to attend a course as many times as they would like until they feel truly confident and they only ever have to pay ONCE! We also offer assistance and guidance throughout their course and unlike other Schools will assist student's in completion of their log book, assessments and portfolio. Don't Miss Out- BOOK NOW! Dates and Costs Please see below our list of upcoming courses. Click on the course for further information, request a call or email regarding the course or book now! We are quite flexible in terms of course dates so if you would like to organise a course around your timetable, please contact us! Course Days Dates Cost NVQ Level 2 In Beauty Therapy ** FAST TRACK OPTION ** 8 OPEN OPEN £1599 NVQ Level 2 In Beauty Therapy ** FAST TRACK ** 8 14/10/2023 21/10/2023 £1680 NVQ Level 2 In Beauty Therapy 'FAST TRACK' 8 7/11/2023 14/11/2023 £1680 NVQ Level 2 In Beauty Therapy ** FAST TRACK OPTION ** 8 12/12/2023 19/12/2023 £1680 NVQ Level 2 In Beauty Therapy ** FAST TRACK OPTION ** 8 20/01/2024 28/01/2024 £1680 NVQ Level 2 In Beauty Therapy ** FAST TRACK OPTION ** 8 16/02/2024 23/02/2024 £1680 NVQ Level 2 in Beauty Therapy ** FAST TRACK WEEKENDS OPTIONAL 8 3/03/2024 10/03/2024 £1680 NVQ Level 2 In Beauty Therapy ** FAST TRACK OPTION ** 8 14/04/2024 21/04/2024 £1680 NVQ Level 2 In Beauty Therapy ** FAST TRACK OPTION ** 1 11/05/2024 17/05/2024 £1680

Beauty NVQ Level 2
Delivered In-PersonFlexible Dates
£1,680

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

AZ-204T00 Developing Solutions for Microsoft Azure

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET

AZ-204T00 Developing Solutions for Microsoft Azure
Delivered OnlineFlexible Dates
£2,975

Workshop: Academic Language & Skills Module 4

By Scotland Study Centre (SSC)

Advanced Level workshop that introduces you to the basic Techniques of Academic English that will help you to: i)  Read and Write Academic tests more effectively, and ii)  give effective Academic Presentations. 

Workshop: Academic Language & Skills Module 4
Delivered OnlineFlexible Dates
£95

Workshop: Academic Language & Skills Module 3

By Scotland Study Centre (SSC)

Advanced Level workshop that introduces you to the basic Techniques of Academic English that will help you to: i)  Read and Write Academic tests more effectively, and ii)  give effective Academic Presentations. 

Workshop: Academic Language & Skills Module 3
Delivered OnlineFlexible Dates
£95

Workshop: Academic Language & Skills Module 2

By Scotland Study Centre (SSC)

Advanced Level workshop that introduces you to the basic Techniques of Academic English that will help you to: i)  Read and Write Academic tests more effectively, and ii)  give effective Academic Presentations. 

Workshop: Academic Language & Skills Module 2
Delivered OnlineFlexible Dates
£95

Workshop: Academic Language & Skills Module 1

By Scotland Study Centre (SSC)

Advanced Level workshop that introduces you to the basic Techniques of Academic English that will help you to: i)  Read and Write Academic tests more effectively, and ii)  give effective Academic Presentations. 

Workshop: Academic Language & Skills Module 1
Delivered OnlineFlexible Dates
£95