Who is this course for? Sketchup Artificial Intelligence Training Course. Mastering SketchUp Artificial Intelligence (AI) is essential for designers, offering automation, efficiency, and innovative solutions. It saves time, enhances visualizations, fosters collaboration, and future-proofs skills, ensuring a competitive edge in the design industry. Click here for more info: Website How to Book? 1-on-1 training. Customize your schedule from Mon to Sat from 9 am to 7 pm Call to book Duration: 16 hours. Method: In-person or Live Online Sketchup and (Artificial Intelligence) Stable Diffusion Rendering Course (16 hours) Module 1: Sketchup Fundamentals (2 hours) Sketchup software overview and interface navigation Introduction to basic drawing tools and fundamental geometry creation techniques Module 2: Texturing and Material Mastery (2 hours) Application of textures and customization of materials Exploration of texture mapping and comprehensive material libraries Module 3: Illumination and Shadows (2 hours) Comprehending lighting principles and strategic light placement Crafting realistic shadows and reflections Module 4: Advanced Modeling Techniques (3 hours) Creating intricate shapes and harnessing advanced modeling tools Efficiently managing groups, components, and modifiers Module 5: Stable Diffusion Rendering (2 hours) Initiating stable diffusion rendering Optimizing rendering settings for superior outcomes Module 6: Scene Composition and Camera Configuration (2 hours) Exploring composition principles and camera perspectives Scene management and creation of captivating walkthrough animations Module 7: Rendering Optimization Strategies (2 hours) Techniques for optimizing models to expedite rendering Application of render passes and post-processing methods Module 8: Real-World Projects and Portfolio Building (1 hour) Application of acquired skills in completing authentic projects Professional portfolio presentation techniques Optional: Stable Diffusion and Python Installation (Additional 10 hours) Module 1: Introduction to Stable Diffusion and Python Comprehensive understanding of Stable Diffusion and Python's significance Module 2: System Prerequisites Hardware and software requirements for successful installation Module 3: Python Installation Guide Step-by-step installation process for various operating systems Module 4: Configuring Python Environment Configuration of environment variables and package managers Module 5: Stable Diffusion Installation Downloading and installing the Stable Diffusion package Module 6: Setting Up the Development Environment Configuration of integrated development environments (IDEs) for Python and Stable Diffusion Module 7: Troubleshooting and Common Issues Identification and resolution of common installation errors Module 8: Best Practices and Recommendations Effective management of Python and Stable Diffusion installations Module 9: Practical Applications and Projects Hands-on exercises exemplifying the practical usage of Stable Diffusion and Python Module 10: Advanced Topics (Optional) Exploration of advanced features and techniques Stable Diffusion https://stablediffusionweb.com https://stable-diffusion-ui.github.io https://stability.ai/stable-diffusion Upon successful completion of the Sketchup and Stable Diffusion Rendering Course with a focus on AI image rendering, participants will achieve the following: 1. Mastery of AI Image Rendering: Attain expertise in employing AI-powered rendering techniques to produce realistic and top-quality visualizations. 2. Proficiency in Sketchup for 3D Modeling: Navigate the software adeptly, utilize drawing tools with proficiency, and craft intricate 3D models. 3. Enhanced Rendering Optimization: Implement AI-based rendering to enhance model visuals, resulting in faster rendering times and superior image quality. 4. Application of AI-driven Lighting and Shadows: Employ AI algorithms for precise lighting placement, shadows, and reflections, elevating the realism of renderings. 5. Development of a Professional Portfolio: Present AI-rendered projects within a polished professional portfolio, highlighting advanced image rendering capabilities. 1. Mastering Sketchup: Attain proficiency in Sketchup, a renowned and user-friendly 3D modeling software, equipping you with the skills needed to adeptly create and manipulate 3D models. 2. Advanced Rendering Expertise: Explore stable diffusion rendering, an avant-garde technique that simplifies the creation of realistic and high-quality renderings. Broaden your rendering capabilities, producing visually stunning representations of your designs. 3. Practical Industry Applications: Cultivate practical skills relevant to diverse industries, encompassing architecture, interior design, product development, and visualization. Elevate your professional portfolio with captivating renderings that showcase your design prowess. 4. Interactive Learning: Participate in hands-on exercises and projects that promote active learning and the practical application of concepts. Benefit from personalized feedback and expert guidance, ensuring your continuous progress throughout the course. 5. Career Advancement: Elevate your career prospects by adding valuable skills to your toolkit. Proficiency in crafting detailed 3D models and impressive renderings through stable diffusion techniques opens doors to diverse job opportunities within the design and visualization sector. 6. Flexibility and Convenience: Access course materials online and learn at your own pace. Enjoy the flexibility of tailoring the coursework to your schedule, allowing you to harmonize your learning journey with other commitments. Course Advantages: Tailored Learning: Enjoy personalized 1-on-1 sessions, accommodating your schedule from Monday to Saturday, 9 am to 7 pm. Mastery of Sketchup: Develop proficiency in the widely-used and user-friendly 3D modeling software, enabling efficient creation and manipulation of 3D models. Advanced Rendering Proficiency: Acquire expertise in stable diffusion rendering for producing realistic, high-quality renderings that enhance the visual appeal of your designs. Practical Applicability: Develop practical skills applicable across diverse domains, including architecture, interior design, product development, and visualization, enriching your professional portfolio. Interactive Practical Experience: Engage in hands-on exercises with personalized guidance from seasoned instructors, ensuring consistent progress in your skillset. Career Progression: Boost your career opportunities by gaining valuable skills in 3D modeling and generating impressive renderings through stable diffusion techniques. Comprehensive Support: Benefit from free portfolio reviews, mock interviews, and career advice, providing additional resources to enhance your professional journey.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for Sales Representatives (SR), Sales Managers and End-users who have an interest in the Sales components of Dynamics 365. Students should have an existing working knowledge of either Microsoft Dynamics 365 or Microsoft Dynamics CRM. As a minimum, students should attend the prerequisite course Introduction to Microsoft Dynamics 365 Overview Understand the features and tools that exist in Microsoft Dynamics 365 for SR?s and Sales Managers. Be familiar with the stages of the Sales Order. Process in Microsoft Dynamics 365. Understand the fundamentals of Lead and Opportunity Management. Be able to track, manage, qualify Leads and convert to Opportunities and related customer records in Microsoft Dynamics 365. Know how to disqualify and cancel Leads, and convert Activity records to Leads and Opportunities. Understand how to collaborate on Opportunities with other SR?s and close Opportunity records as Won and Lost. Be able to track Competitors and Stakeholders. Understand how to view Resolution Activities. Add Products and Write-In Products to Opportunities. Build and maintain a repository of Products, Product Bundles and Product Families in the Product Catalog. Configure Unit Groups, Price Lists and Discount Lists. Work with Product Properties and view a Product Hierarchy. Create Quotes and add Products. Work with the Sales Order Process to convert Quotes to Orders and Invoices. Fulfill Orders and manage Invoice payments. Explore the Sales Reports and create a custom Sales Report using the Reporting Wizard in Microsoft Dynamics 365. Understand the significance of Sales Goal Management and Metrics in Microsoft Dynamics 365. Explore the Sales Charts and Dashboards and create a custom Sales Dashboard in Microsoft Dynamics 365. This course provides students with a detailed hands-on experience of the Salesfeatures and components of Microsoft Dynamics 365. Introduction Sales Order Process Scenarios An Introduction to Sales in Dynamics 365 The Dynamics 365 Platform Dynamics 365 Sales Fundamentals Security Considerations Where to get Help Further Reading and Resources Lead Management The Lead Management Process Working with Lead Records Working with the Lead Form Lead Assignment Leads and Activities Qualifying a Lead Disqualifying a Lead Opportunities Management Introduction to Opportunities The Opportunity Views The Opportunity Form Opportunity Sales Process Closing an Opportunity Resolution Activities Products Introduction to the Product Catalog Adding Products Configuring Unit Groups Price Lists and Price List Items Quotes, Orders and Invoices Introduction to Order Processing Adding Products to an Opportunity Working with Quotes Working with Orders Working with Invoices Sales Analysis Introduction to Sales Analysis in Dynamics 365 The Sales Reports The Reporting Wizard Working with Sales Charts Working with Sales Dashboards Working with Sales Goals and Metrics
Duration 3 Days 18 CPD hours This course is intended for This course is designed for system administrators and implementors interested in learning IBM Security Verify Access. Overview Describe IBM Security Verify Access product and its key features Discuss the architecture and deployment process Configure IBM Security Verify Access users, groups, and domains Introduce concepts of a reverse proxy and how it fits in your web-based infrastructure Describe protected object space and the policy access control model Explain how to set up reverse proxy junctions to handle web requests Discuss and configure authentication mechanisms that are supported by Verify Access Explain and set up logging, auditing, and tracing for Verify Access components IBM Security Verify Access helps you simplify your users' access while more securely adopting web, mobile, IoT, and cloud technologies. It can be deployed on premises, in a virtual or hardware appliance, or containerized with Docker. Verify Access also directly connects with Verify SaaS for a modernized, hybrid IAM approach to enable your organization's migration to identity as a service (IDaaS) at a comfortable pace. Using the skills taught in this course, you learn how to run Verify Access via Docker, configure authentication and authorization mechanisms, implement policy access control, and set up reverse proxy junctions to process web requests. Hands-on exercises reinforce the skills learned. Unit 1 Introduction to IBM Security Verify Access Unit 2 Architecture and deployment Unit 3 Managing users, groups, and domains Unit 4 Reverse Proxy (WebSEAL) concepts Unit 5 Managing access control Unit 6 Configuring junctions for back-end resources Unit 7 Authentication framework and methods Unit 8 Logging, auditing, and tracing Additional course details: Nexus Humans TW108G IBM Security Verify Access Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TW108G IBM Security Verify Access Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Install, Configure, and Implement Cisco Emergency Responder (Cisco ER). Configure CUCM for CER Configure Emergency Response Locations (ERLs) Configure Emergency Location Identification Numbers (ELINs) Configure PSAP calls and PSAP CallBack Configure Users and onsite Security Management This is a 2-day hands-on course, where students will Install, Deploy, and Configure Cisco Emergency Responder (Cisco ER) 12.5. Student will also integrate emergency communication system with Cisco Unified Communications Manager. Students will learn how Cisco ER automatically notifies and routes calls to the local public safety answering point (PSAP) operator. Students will configure emergency response locations (ERLs) and emergency location identification numbers (ELINs) in CER to properly route enhanced 911 (E911) calls. You will also examine CER disaster recovery and user management. Cisco Emergency Responder Overview PSAP/ Emergency Calling Overview National Emergency Number Association Legislation and Regulation Service Provider ALI Automatic Number Identification (ANI) Automatic Location Identification (ALI) NENA Emergency Response Location NENA Guidelines for ERLs NENA Emergency Location Identification Number (ELIN) E911 Preparation Cisco Emergency Call Handler Cisco Emergency Responder 11.x Enhancements License Management Emergency Responder Redundancy Clustering CER over the WAN Integration with UC Manager Intrado Architecture CER Wireless Features Overview Installing Cisco Emergency Responder Supported Hardware Platforms CER Virtual Server Requirements Deploy Cisco CER OVF/OVA Installation of CER CER CLI Interface Reset Application Administrator Password Add 2nd CER Server - Subscriber Upgrade VMware Tools on Cisco Emergency Responder Server CER Backup and Restore CER PLM Licensing Unified Communication Manager CER Configuration Cisco Unified Communications Manager Administrator Interfaces Cisco Unified Communications Manager Required Services for CER CUCM SNMP Settings Phone Partition and Calling Search Spaces Partitions for 911 Services CER CUCM Configuration for CTI Route Points and CTI Ports Configure CER Route Patterns for 911 and Security Personal Create Translation Patterns for ELINs Create Emergency Responder Cisco Unified Communications Manager User Location Awareness Overview Configure Wireless Endpoint Tracking Feature on UCM 11.5 Cisco Emergency Responder (CER) Configuration Emergency Responder Interface E.164 Dial Plan Support Cisco Emergency Responder Groups Setup CER Groups CER Telephony Settings for CER Cisco CER License Manager Cisco CER Email Settings Cisco CER - Add Subscriber Onsite Security Alerts for Security Personnel Pager Alert Configuration Configure Emergency Response Location (ERL) Configure Emergency Location Identification Number (ELIN) ERL Migration Tool Configure SNMP Configure Phone Tracking Configure LAN Switch Tracking Configuring IP Subnet-based ERLs Configuring Manual Phone Tracking Emergency Responder User Management Manage Onsite Alerts, ERLs, and ALI Data User and Security Logins CER - Web Alerts CER - ERL Audit Trail Export PS-ALI Records ERL Debug Tool
Duration 5 Days 30 CPD hours This course is intended for Practiced Linux system administrators who currently manage Linux servers at the enterprise level - Skilled Linux system administrators who who want or are required to demonstrate competencies by earning the RHCSA This course is designed for experienced Linux System Administrators who want to harden their technical skill sets and become accredited with the RHCSA certification. Accessing the command line Log in to a Linux system and run simple commands using the shell. Managing Files from the command line Work with files from the bash shell prompt. Managing local Linux users and groups Manage Linux users and groups and administer local password policies. Controlling access to files with Linux file system permissions Set access permissions on files and interpret the security effects of different permission settings. Managing SELinux security Use SELinux to manage access to files and interpret and troubleshoot SELinux security effects. Monitoring and managing Linux processes Monitor and control processes running on the system. Installing and updating software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Controlling services and daemons Control and monitor network services and system daemons using systemd. Managing Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Analyzing and storing logs Locate and interpret relevant system log files for troubleshooting purposes. Managing storage and file systems Create and use disk partitions, logical volumes, file systems, and swap spaces. Scheduling system tasks Schedule recurring system tasks using cron and systemd timer units. Mounting network file systems Mount network file system (NFS) exports and server message block (SMB) shares from network file servers. Limiting network communication with firewalld Configure a basic local firewall. Additional course details: Nexus Humans Enterprise Linux System Admin Fast Track with Exam Prep training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Linux System Admin Fast Track with Exam Prep course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This workshop will provide participants with the insight and skills to be more effective business networkers, face-to-face and online. The approach taken is to build on the strengths people already have and their successes. It is easier to develop what you already have than to try and develop skills that do not come easily. Being yourself is the most effective tool for business networking and building relationships. This course will help those attending: Appreciate the importance of networking, and different forms of networking Understand the dynamics of communication that are specific to networking Become more confident and assured when 'working' a room Improve their influencing skills, especially with people who are experts and in positions of authority 'Sell' themselves and promote their company Identify and manage their profiles using online social networking sites Use effective follow-up to maintain active contacts and connections Select the correct networking groups, clubs and events Create their own personal network 1 The importance, and different types, of networking Personal objectives and introductions Test networking session Examples of the importance, purpose and format of various types of networking, and benefits you can expect 2 How to work a room - preparation and strategy Three things to know before you attend any event Non-verbal communication and art of rapport Breaking the ice - worked examples with practical demonstration 3 Communication dynamics in networking - the power of the listening networker Why it is better to listen than talk Effective questioning and active listening Creating a natural and engaging conversation, 1-2-1 and in a larger group 4 Assumptions when networking How to use the 'instant judgement' of others to your advantage What assumptions are you making? How to keep an open mind 5 Business networking etiquette Meeting and greeting at a business networking event - approaching complete strangers and introducing yourself Socialising: joining and leaving groups easily Making a good first impression in 30 seconds The use of status when networking 6 Making connections Asking for cards, contact details and referrals Gaining a follow-up commitment Some tips and tricks 7 Business networking rehearsals Practice sessions 8 Personal business networking online Overview of different types of networking sites - there is a lot more out there than just Facebook! Examples of creating an effective profile Using social networking effectively - case studies and application 'Advanced' applications - blogs, articles, twitter, feeds, etc. Online demonstration and examples 9 Building relationships - follow-up and follow-through Maintaining a good database Developing a contact strategy with different types and levels of contact How to analyse your contact base
Duration 2 Days 12 CPD hours This course is intended for Security architects System designers Network administrators Operations engineers Network managers, network or security technicians, and security engineers and managers responsible for web security Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco WSA Deploy proxy services Utilize authentication Describe decryption policies to control HTTPS traffic Understand differentiated traffic access policies and identification profiles Enforce acceptable use control settings Defend against malware Describe data security and data loss prevention Perform administration and troubleshooting The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco© Web Security Appliance (WSA), powered by Cisco Talos, to provide advanced protection for business email and control against web security threats. Through a combination of expert instruction and hands-on practice, you?ll learn how to deploy proxy services, use authentication, implement policies to control HTTPS traffic and access, implement use control settings and policies, use the solution?s anti-malware features, implement data security and data loss prevention, perform administration of Cisco WSA solution, and more. Describing Cisco WSA Technology Use Case Cisco WSA Solution Cisco WSA Features Cisco WSA Architecture Proxy Service Integrated Layer 4 Traffic Monitor Data Loss Prevention Cisco Cognitive Intelligence Management Tools Cisco Advanced Web Security Reporting (AWSR) and Third-Party Integration Cisco Content Security Management Appliance (SMA) Deploying Proxy Services Explicit Forward Mode vs. Transparent Mode Transparent Mode Traffic Redirection Web Cache Control Protocol Web Cache Communication Protocol (WCCP) Upstream and Downstream Flow Proxy Bypass Proxy Caching Proxy Auto-Config (PAC) Files FTP Proxy Socket Secure (SOCKS) Proxy Proxy Access Log and HTTP Headers Customizing Error Notifications with End User Notification (EUN) Pages Utilizing Authentication Authentication Protocols Authentication Realms Tracking User Credentials Explicit (Forward) and Transparent Proxy Mode Bypassing Authentication with Problematic Agents Reporting and Authentication Re-Authentication FTP Proxy Authentication Troubleshooting Joining Domains and Test Authentication Integration with Cisco Identity Services Engine (ISE) Creating Decryption Policies to Control HTTPS Traffic Transport Layer Security (TLS)/Secure Sockets Layer (SSL) Inspection Overview Certificate Overview Overview of HTTPS Decryption Policies Activating HTTPS Proxy Function Access Control List (ACL) Tags for HTTPS Inspection Access Log Examples Understanding Differentiated Traffic Access Policies and Identification Profiles Overview of Access Policies Access Policy Groups Overview of Identification Profiles Identification Profiles and Authentication Access Policy and Identification Profiles Processing Order Other Policy Types Access Log Examples ACL Decision Tags and Policy Groups Enforcing Time-Based and Traffic Volume Acceptable Use Policies, and End User Notifications Defending Against Malware Web Reputation Filters Anti-Malware Scanning Scanning Outbound Traffic Anti-Malware and Reputation in Policies File Reputation Filtering and File Analysis Cisco Advanced Malware Protection File Reputation and Analysis Features Integration with Cisco Cognitive Intelligence Enforcing Acceptable Use Control Settings Controlling Web Usage URL Filtering URL Category Solutions Dynamic Content Analysis Engine Web Application Visibility and Control Enforcing Media Bandwidth Limits Software as a Service (SaaS) Access Control Filtering Adult Content Data Security and Data Loss Prevention Data Security Cisco Data Security Solution Data Security Policy Definitions Data Security Logs Performing Administration and Troubleshooting Monitor the Cisco Web Security Appliance Cisco WSA Reports Monitoring System Activity Through Logs System Administration Tasks Troubleshooting Command Line Interface References Comparing Cisco WSA Models Comparing Cisco SMA Models Overview of Connect, Install, and Configure Deploying the Cisco Web Security Appliance Open Virtualization Format (OVF) Template Mapping Cisco Web Security Appliance Virtual Machine (VM) Ports to Correct Networks Connecting to the Cisco Web Security Virtual Appliance Enabling Layer 4 Traffic Monitor (L4TM) Accessing and Running the System Setup Wizard Reconnecting to the Cisco Web Security Appliance High Availability Overview Hardware Redundancy Introducing Common Address Redundancy Protocol (CARP) Configuring Failover Groups for High Availability Feature Comparison Across Traffic Redirection Options Architecture Scenarios When Deploying Cisco AnyConnect© Secure Mobility Additional course details: Nexus Humans SWSA v3.0-Securing the Web with Cisco Web Security Appliance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SWSA v3.0-Securing the Web with Cisco Web Security Appliance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Hysteria’s history, rooted in Greek myth, evolved into a Victorian belief of a “wandering uterus” leading to disturbing medical practices. We aim to explore the lived experiences on irregular perceptions of reality with an open mind. Each Saturday includes: a live dialogue between Prof. Ernesto Spinelli and an International Existential Therapist; a moment to share your thoughts and feelings with the teachers; and a final integration facilitated by Bárbara Godoy. This series of ten dialogues set out to explore the multifaceted dimentions and complexities associated with Existential Therapies. It attempts to engage with various interpretations of insanity through the lens of patients often painful, confounding, and deeply unsettling life experiences. Hysteria- between Prof. Ernesto Spinelli and Bárbara Godoy “In this talk, I will compare the Histerical patient to the ancient Greek myth of Persephone, the goddess who traversed the boundaries between the world of the living and the underworld. Just as Persephone’s cyclical descent and return mirrored the changing seasons, hysteria was seen as a condition where emotions and experiences defied easy classification. This notion of transgressing boundaries became a cornerstone of early psychoanalysis. In Victorian times, hysteria took a decidedly bizarre turn. Here, the culprit was believed to be a mobile womb, an organ capable of throwing into disorder and confusion. This “wandering womb” was blamed for a variety of ailments and behaviours, particularly any expression of female desire out-of-wedlock. In a truly disturbing reflection of these beliefs, legal rulings based on this theory emerged. In some cases, women diagnosed with hysteria could be forced to undergo a hysterectomy.” Bárbara Godoy. Bárbara Godoy M.A., Adv. Dip. Exi. Psy, UKCP accredited Psychotherapist and Supervisor, MBACP and SEA – Director of Therapy Harley Street. Bárbara’s academic experience in London since 2008 includes lecturing and researching on the theory and practice of Phenomenological Existential Therapy on Doctorate, MA and professional courses at the School of Psychotherapy and Counselling Psychology, Regent’s University and the New School of Psychotherapy and Counselling directed by Emmy van Deurzen. Bárbara has facilitated therapeutic Group Work internationally since 1997. The question about the meaning of Being-Woman was the topic of her thesis completed in 2005 and evolved into two main Women’s Groups: “Nine muses” and “Four Seasons” which she leads in addition to her individual private practice. Currently, as the clinical director of THS, Bárbara leads a team of over 20 professional practitioners in the area of Psychological services and Wellbeing consultancy. Bárbara is also the founder-director of THS’s Personal Development and CPD Programmes. Prof. Ernesto Spinelli was Chair of the Society for Existential Analysis between 1993 and 1999 and is a Life Member of the Society. His writings, lectures and seminars focus on the application of existential phenomenology to the arenas of therapy, supervision, psychology, and executive coaching. He is a Fellow of the British Psychological Society (BPS) as well as an APECS accredited executive coach and coaching supervisor. In 2000, he was the Recipient of BPS Division of Counselling Psychology Award for Outstanding Contribution to the Profession. And in 2019, Ernesto received the BPS Award for Distinguished Contribution to Practice. His most recent book, Practising Existential Therapy: The Relational World 2nd edition (Sage, 2015) has been widely praised as a major contribution to the advancement of existential theory and practice. Living up to the existential dictum that life is absurd, Ernesto is also the author of an on-going series of Private Eye novels. Date and Time: Saturday 13 December from 2 pm to 3 pm – (UK time) Individual Dialogue Fee: £70 Venue: Online Zoom FULL PROGRAMME 2025: 25 January “Knots” with Prof. Ernesto Spinelli and Bárbara Godoy 22 February “Healing” with Dr. Michael Guy Thompson and Prof. Ernesto Spinelli 22 March “Difference” with Prof. Tod DuBose and Prof. Ernesto Spinelli 12 April “Polarisation” with Prof. Kirk Schneider and Prof. Ernesto Spinelli 3 May “Character” with Prof. Robert Romanyshyn and Prof. Ernesto Spinelli 21 June “Opening” with Dr. Yaqui Martinez and Prof. Ernesto Spinelli 19 July “Meaning” with Dr. Jan Resnick and Prof. Ernesto Spinelli 25 October “Invention” with Dr. Betty Cannon and Prof. Ernesto Spinelli 15 November “Hallucination” with Prof. Simon du Plock and Prof. Ernesto Spinelli 13 December “Hysteria” with Bárbara Godoy and Prof. Ernesto Spinelli Read the full programme here > Course Organised by:
Providing Guidance & Support for MHFAiders: giving reassurance they are not alone. Our MHFAider guidance & support forums are tailored to provide MHFAiders with the clarity they need to excel in their role. We believe it's important to offer a safe space for MHFAiders to discuss their role, while staying up to date with the latest best practices and information. Mental Health First-Aiders and Champions forum for open discussions, guidance, support, and focus topic learning with a registered Mental Health Nurse.
Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications.This course also is for individuals who are interested in taking Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Courses 20703-1A and 20703-2A, or equivalent knowledge and skills, are necessary to prepare for this exam. Overview After completing this course, students will be able to:Describe the features Configuration Manager and Intune include, and explain how you can use these features to manage PCs and mobile devices in an enterprise environment.Analyze data by using queries and reports.Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server.Deploy and manage the Configuration Manager client.Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering.Identify and configure the most appropriate method to distribute and manage content used for deployments.Distribute, deploy, and monitor applications for managed users and systems.Maintain software updates for PCs that Configuration Manager manages.Implement Endpoint Protection for managed PCs.Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices.Configure an operating-system deployment strategy by using Configuration Manager.Manage and maintain a Configuration Manager site. This course describes how to use Configuration Manager and its associated site systems to efficiently manage network resources. In this five-day course, you will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Additionally, this course, in conjunction with Microsoft Official Course 20703-2A, helps certification candidates prepare for Exam 70-703: Administering System Center Configuration Manager and Cloud Services Integration. Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site Lab : Exploring the Configuration Manager tools Searching in the Configuration Manager console Using Windows PowerShell with Configuration Manager Using Configuration Manager Service Manager to manage components Monitoring site and component status Reviewing log files by using the Configuration Manager Trace tool Explain how to use Configuration Manager to address the challenges of managing systems and users in today?s enterprise. Describe the Configuration Manager architecture. Describe the management tools that you use to perform administrative functions for Configuration Manager. Describe the tools that you use to monitor and troubleshoot a Configuration Manager site. Analyzing data using queries and reports Introduction to queries Configuring Microsoft SQL Server Reporting Services (SSRS) Lab : Creating and running queriesConfiguring boundaries and resource discovery Creating data queries Creating subselect queries Creating status message queries Lab : Configuring SSRS Configuring a reporting services point Creating a report by using Report Builder Create and configure data and status message queries. Configure and manage SSRS and the reporting services point. Preparing the management infrastructure to support PCs and mobile devices Configuring site boundaries and boundary groups Configuring resource discovery Configuring the Exchange Server Connector for mobile device management Configuring user and device collections Lab : Configuring boundaries and resource discovery Configuring boundaries, boundary groups, and fallback relationships Configuring Active Directory discovery methods Lab : Configuring user and device collections Creating a device collection Creating a user collection Configuring a maintenance window Configure boundaries and boundary groups. Configure resource discovery. Configure the Exchange Server connector mobile device management. Organize resources using device and user collections. Deploying and managing clients Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings in Configuration Manager Lab : Deploying the Microsoft System Center Configuration Manager client software Preparing the site for client installation Deploying the Configuration Manager client software by using client push installation Lab : Configuring and monitoring client status Configuring and monitoring client health status Lab : Managing client settings Configuring client settings Describe the requirements and considerations for installing the Configuration Manager client software. Deploy the Configuration Manager client software. Configure and monitor client status. Manage Configuration Manager client settings. Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence Lab : Configuring and managing inventory collection Configuring and managing hardware inventory Lab : Configuring software metering Configuring software metering Lab : Configuring and managing Asset Intelligence Preparing the site for Asset Intelligence Configuring Asset Intelligence Monitoring license agreements by using Asset Intelligence Viewing Asset Intelligence reports Describe inventory collection. Configure and collect hardware and software inventory. Manage inventory collection. Configure software metering. Configure Asset Intelligence. Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points Lab : Distributing and managing content for deployments Installing a new distribution point Managing content distribution Prepare the infrastructure for content management. Distribute and manage content on distribution points. Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying virtual applications by using System Center Configuration Manager (Optional) Deploying and managing Windows Store apps Lab : Creating and deploying applications Installing and configuring the Application Catalog roles Creating applications with requirements Deploying applications Lab : Managing application supersedence and removal Managing application supersedence Uninstalling the Excel Viewer application Lab : Deploying virtual applications by using Configuration Manager (Optional) Configuring support for App-V Deploying virtual applications Lab : Using Configuration Manager to deploy Windows Store apps Configuring support for sideloading Windows Store apps Configuring a Windows Store app Deploying Windows 10 apps to users Describe the application management features of Configuration Manager. Create applications. Deploy applications. Manage applications. Configure and deploy virtual applications. Configure and deploy Windows Store apps. Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Lab : Configuring the site for software updates Configuring and synchronizing the software update point Lab : Deploying and managing software updates Determining software update compliance Deploying software updates to clients Configuring automatic deployment rules Describe how the software updates feature integrates with Configuration Manager. Prepare the Configuration Manager site for software updates. Manage the evaluation and deployment of software updates. Configure automatic deployment rules. Monitor and troubleshoot software updates. Implementing Endpoint Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Lab : Implementing Microsoft System Center Endpoint Protection Configuring the System Center Endpoint Protection point and client settings Configuring and deploying Endpoint Protection policies Monitoring Endpoint Protection Configure Endpoint Protection to detect and remediate malware and security vulnerabilities. Configure, deploy, and manage Endpoint Protection policies. Managing compliance and secure data access Overview of Compliance Settings Configuring compliance sett