• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

45 Courses in London delivered Live Online

M.D.D TELEPHONE SERVICE (SINGLES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

£100 per hour Talk about your relationship or marriage, Dating or married to a narcissist, finding Mr or Mrs Right, single life, loneliness, cheating, better dating skills and relationship issues with your girlfriend or boyfriend, dating or getting to know someone new. Whatever the relationship problem talk to an M.D.D relationship coach. Relationship advice for singles and couples (promotional rate) https://relationshipsmdd.com/product/m-d-d-telephone-service/

M.D.D TELEPHONE SERVICE (SINGLES)
Delivered in London or UK Wide or OnlineFlexible Dates
£100

1:1 Science-based Relationship and Dating Coaching FOR WOMEN

By Single To Couple Consulting

Are you tired of “rocky” relationships, bad dates or feeling lonely? Most of us have learned the hard way, the cost of getting a relationship wrong can be enormous. The rewards of getting it right are immeasurable! That is why, as a certified Relationship & Dating Coach, I help clients avoid the pitfalls and find lasting happiness. So, do you really want to do it right this time around? Take charge of your love lfie today and book a free confidential 30-minute introductory session.

1:1 Science-based Relationship and Dating Coaching FOR WOMEN
Delivered OnlineFlexible Dates
FREE

1:1 Science-based Relationship and Dating Coaching FOR MEN

By Single To Couple Consulting

Are you tired of “rocky” relationships, bad dates or feeling lonely? Most of us have learned the hard way, the cost of getting a relationship wrong can be enormous. The rewards of getting it right are immeasurable! That is why, as a certified Relationship & Dating Coach, I help clients avoid the pitfalls and find lasting happiness. So, do you really want to do it right this time around? Take charge of your love lfie today and book a free confidential 30-minute introductory session.

1:1 Science-based Relationship and Dating Coaching FOR MEN
Delivered OnlineFlexible Dates
FREE

55242 Microsoft Dynamics 365 Customization and Configuration

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for Information workers, IT Professionals and Developers. Students should have an existing working knowledge of either Microsoft Dynamics 365 or Microsoft Dynamics CRM. Overview Understand the features and tools that exist in Microsoft Dynamics 365 for Customizers Be aware of integrating complimenting Microsoft products such as SharePoint, Skpe for Business and Exchange Undertake and carry out the initial setup and configuration required in a Microsoft Dynamics 365 deployment Design and configure a comprehensive Security model using the inbuilt tools in Microsoft Dynamics 365 Customize the Dynamics 365 schema by creating custom Entities, Fields and Relationships Design custom Information Forms, Quick View Forms, Quick Create Forms and System Views Create System Charts, Dashboards and Interactive Experience Dashboards Create and manage Business Rules using the Business Rule Designer Plan, design and implement best practice Workflow, Business Process Flows and Custom Actions Be able to apply best practice methodology using Unmanaged and Managed Solutions to deploy Microsoft Dynamics 365 customizations and patches This course provides students with a detailed hands-on experience of setting up, customizing, configuring and maintaining the CRM components of Microsoft Dynamics 365. Attendees of this course will gain an in-depth understanding of the Dynamics 365 security model, learn how to customize the Dynamics 365 framework, create and maintain powerful workflows and business process flows and use solutions to package and deploy customizations across multiple Dynamics 365 environments. The course applies to both Business and Enterprise Editions of Dynamics 365 as well as Online and On-premise deployments. Introduction Getting familiar with the versions of Microsoft Dynamics CRM\365 Get acquainted with the Dynamics 365 framework Review the Dynamics 365 interfaces, devices and apps Understand the tools for Dynamics 365 customizers A brief overview of Solutions Understand the differences between Dynamics 365 organisations and environments Review further reading and resources Set up the lab environment - Acme Enterprises Event Management Solution Initial Setup and Configuration An introduction to Dynamics 365 online setup An introduction to Dynamics 365 on premise setup Review the System Settings area Understand how to configure Auto Save Settings Understand how to configure Format Settings Understand how to configure Email Settings Understand how to configure Skype Integration Understand how to configure SharePoint Integration Security Design and configure Business Units Configure Security Roles Manage Users and Teams Implement Access Teams Configure Hierarchy Security Creating and Managing Entities Introduction to the Dynamics 365 schema Review the different Entity Types Create new Custom Entities Managing Entity Ownership Managing Entity Properties Custom Entity Security Review Entities and Solutions Customizing Fields Introduction to Field Customization Understand the different Field Types Review Field Formats Create a new Field Review Fields and Solutions Implement a Calculated Field Configure Field Level Security Customizing Relationships and Mappings Introduction to Relationships Review the different Relationship Types Create a Relationship Review Relationships and Solutions Understand Relationship Behavior Implement a Hierarchy Relationship Configure Field Mappings Customizing Forms, Views and Visualizations The process to create a new Form Review the different Form types Using the Form Designer Customizing the Main, Quick View and Quick Create Forms Configure Form Security Review the different View types Customizing System Views Customizing System Charts and Dashboards Workflows, Business Process Flows and Custom Actions Introduction to Processes Workflow Business Process Flows Custom Actions Solution Management An introduction to Solution Management How to add and administer components in a Solution The differences between unmanaged and managed Solutions How to export and import a Solution How to set Managed Properties for a Solution What happens when you delete a Solution How to Clone a Solution Patch How to Clone a Solution

55242 Microsoft Dynamics 365 Customization and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry
1...345

Educators matching "relationship coaching"

Show all 5
CRR UK

crr uk

Organisation and Relationship Systems Coaching (ORSC™) is an innovative and powerful coaching model based on Relationship Systems Intelligence (RSI™). A ‘relationship system’ is any interdependent group of people, sharing a common identity or function. We are all part of many different systems. In our organisations, our teams, our families, our intimate relationships and the wider society. Everything is interconnected. If something changes in one area of a system, it will have effects in places that often we won’t expect. ORSC is a methodology that combines ‘systems thinking’ with coaching. By becoming an ORSC practitioner, you will become aware of your own impact on the bigger picture and be able to consciously design your relationships. You will learn an invaluable set of tools to coach others to do the same. The Five Modules of ORSC All ORSC journeys begin with either the Fundamentals or ORS@Work module. Both introductory courses are based on the same set of skills and principles. Fundamentals is geared more toward personal coaching, therapy, or social work applications. ORS@Work is designed specifically with HR, OD, LD, business coaching or consulting in mind. Fundamentals or ORS@Work— teaches five key ORSC tools, including how to coach the Third Entity. Intelligence— provides a robust toolkit for increasing emotional resilience in the face of change. Geography — explores how to recognise and nurture the structures of relationships. Path — explores how to create a shared vision and a strategic plan for achieving it. Systems Integration— brings all the pieces together and provides a learning space to hone skills to work towards mastery. The subsequent four courses in the series must be studied in sequential order, as content layers and builds with each module. On completion of the five modules, students may choose to pursue ORSC certification. Whatever work we do, we are always in relationship. Through ORSC training we learn the concepts, skills and tools to be more effective with others. A ‘relationship system’ is any interdependent group of people, sharing a common identity or function. Psychologists might refer to a ‘collective consciousness’. Business consultants might talk about a ‘corporate culture’. Therapists would likely address ‘family dynamics’. All are ways of referring to what we call the Third Entity.

Creative Arts Mentoring

creative arts mentoring

London

Artist Mentor enables contemporary artists and creative professionals to make significant changes in their work and lives. We have mentored and coached hundreds of creative clients from across the globe to improve their work, lives, businesses, and their careers. We love helping creative people be more successful. Take your moonshot! Ceri hand talks about the services that Artist Mentor provides, and how, with the right kind of tailored coaching, you can achieve creative, professional and personal goals that may have previously eluded you. [The video will open in a pop-up window] Whether you want to make better work, attract more studio visits, exhibitions, build your network, create a more compelling website, make more income, or get that new job, we can help you shine. Together we take stock of your work and creative journey to date, clarify your strengths, purpose, and opportunities, and define the steps you need to take to achieve your goals. We work with individuals over an agreed period, as a challenging, critical friend, providing accountability to ensure lasting transformation. We plan with you how to integrate what you’ve learned within your everyday life and schedule, ensuring you continue to thrive. We provide one-to-one and group sessions, providing learning and skill sharing opportunities through expert led classes, resources and free community events and resources. We also have a network of Associate Mentors we provide regular work to - a diverse mix of experienced artists, curators, educators and gallerists, enabling us to respond to increased demand and support a growing range of client and sector needs. All sessions are confidential and your Artist Mentor mentor or coach will be a committed, trusted critical friend. Why get a Mentor or Coach? If you’re a creative, chances are you’re an introvert, deep thinker and highly sensitive - great qualities for realising innovative work! Unfortunately, we know that a high percentage of creative people can often feel isolated, rejected, and suffer from self-doubt, negative self-talk, or imposter syndrome. Old stories may weigh heavily and inhibit your growth, or you get stuck in a fear of failure loop or suffer from self-destructive habits. It might be that you simply can’t see the wood from the trees and have lost sight of your priorities or strengths. Having a trusted champion, committed to helping you flourish, helps you identify and make the changes necessary to reach your goals. A mentor or coach believes in you, recognises your special sauce, identifies opportunities, new tools, and growth potential with you, setting you challenges or targets to help you take the appropriate steps. What's the difference between Mentoring and Coaching? Mentoring A Mentor can serve as a critical sounding board at critical points throughout your creative career, providing an insider's perspective and guidance you may not be able to get from other sources. The role of a mentor is to listen, learn, and advise and is usually a longer-term relationship. A mentor can help you excel in your practice and career, and become the best version of yourself, helping you achieve your goals, introducing you to new ways of thinking, challenging your limiting assumptions, signposting, and offering critical feedback. A mentor will often draw on their personal experiences and expertise to help advise and encourage dialogue with their mentee. This could be in the form of sharing a story, tools, resources, or lessons learned from a challenge they overcame in their career. This kind of personal dialogue is encouraged in a mentoring relationship. Coaching A Coach encourages self-discovery and growth to secure lasting change. Together we assess your current situation and challenges, identify limiting beliefs, interrogate, and address perceived obstacles. We create a safe thinking environment, ask incisive questions and devise a custom plan of action designed to help you achieve specific outcomes. We nurture creative strategies based on what fits best with your goals, personality and vision and foster accountability to increase productivity. Coaching partnerships are usually more short term than mentoring relationships, as they are usually objective driven and more structured. Someone may seek out a coach to help them develop a specific skill or work through a particular limiting belief. The coaching could well end once that skill or objective had been acquired. A coach can help increase your self-awareness: identifying areas for improvement, and challenging assumptions that may be preventing you achieve your goals. Coaching is often used for the development of leadership skills, where they may train you in the art of questioning to equip you to manage others better or identifying limiting beliefs in yourself. The relationship between a client and their coach is a collaborative creative partnership.