The principles of effective time management are applicable to all aspects of life. When successfully applied in a sales environment they can lead to improved performance, higher sales and increased customer satisfaction. All salespeople would benefit from learning the tools and techniques to introduce impactful time management to their working lives. We have developed this programme to be practical, fun and interactive. Participants will better understand how to increase the amount of time spent on high-value sales activities, be able to improve their self-motivation and ability to get more done, and be better able to plan, delegate and speed up routine tasks. This course will help participants: Learn key principles of managing sales priorities, meeting targets and getting 'everything' done! Learn proven techniques for structuring your day, week and normal routine Develop effective sales time management at the office and on the road Learn a seven-step process for setting goals and objectives in your work and personal life Understand how to make time for sales prospecting, designated call days Understand practical ways to improve your time management 1 Key principles of sales time management Course objectives and review of time log Essential principles of sales time management How do you use your time now? Reviewing your working day (from pre-course survey) Beliefs and feelings about time 2 Managing sales priorities and planning systems Managing priorities and planning systems Use organised persistence to plan your sales activity Planning your territory and prospecting activity How to use priority ratings not urgency to react to tasks 3 Dealing with distractions and communication skills Know your time 'bandits' and creating more positive habits to overcome them Making time by saying 'no' assertively and managing expectations Assertiveness techniques for handling colleagues and clients Making meetings worthwhile - preparation and planning 4 Sales goal setting and action planning Set clear, concise, and motivating sales goals and action plans How to set and use goal setting as way of managing your time and increasing results The principles of linking SMART objectives to action plans and daily activities 5 Creating results focus - every day, week, and month Batch sales tasks together, starting with emails Planning your day and week and protecting sales 'prime' time Apply the 80/20 to your sales contacts, clients, and prospects 6 Overcoming procrastination and structuring your day Understanding procrastination, what it is and how to recognise it in yourself and others How to stop procrastinating and start making progressing Build a power prospecting hour into every day Smart stuff to make more sales time: five automated tools Live the $64,000 dollar question
Duration 5 Days 30 CPD hours Overview Mining data Manipulating data Visualizing and reporting data Applying basic statistical methods Analyzing complex datasets while adhering to governance and quality standards throughout the entire data life cycle CompTIA Data+ is an early-career data analytics certification for professionals tasked with developing and promoting data-driven business decision-making. CompTIA Data+ gives you the confidence to bring data analysis to life. As the importance for data analytics grows, more job roles are required to set context and better communicate vital business intelligence. Collecting, analyzing, and reporting on data can drive priorities and lead business decision-making. 1 - Identifying Basic Concepts of Data Schemas Identify Relational and Non-Relational Databases Understand the Way We Use Tables, Primary Keys, and Normalization 2 - Understanding Different Data Systems Describe Types of Data Processing and Storage Systems Explain How Data Changes 3 - Understanding Types and Characteristics of Data Understand Types of Data Break Down the Field Data Types 4 - Comparing and Contrasting Different Data Structures, Formats, and Markup Languages Differentiate between Structured Data and Unstructured Data Recognize Different File Formats Understand the Different Code Languages Used for Data 5 - Explaining Data Integration and Collection Methods Understand the Processes of Extracting, Transforming, and Loading Data Explain API/Web Scraping and Other Collection Methods Collect and Use Public and Publicly-Available Data Use and Collect Survey Data 6 - Identifying Common Reasons for Cleansing and Profiling Data Learn to Profile Data Address Redundant, Duplicated, and Unnecessary Data Work with Missing Value Address Invalid Data Convert Data to Meet Specifications 7 - Executing Different Data Manipulation Techniques Manipulate Field Data and Create Variables Transpose and Append Data Query Data 8 - Explaining Common Techniques for Data Manipulation and Optimization Use Functions to Manipulate Data Use Common Techniques for Query Optimization 9 - Applying Descriptive Statistical Methods Use Measures of Central Tendency Use Measures of Dispersion Use Frequency and Percentages 10 - Describing Key Analysis Techniques Get Started with Analysis Recognize Types of Analysis 11 - Understanding the Use of Different Statistical Methods Understand the Importance of Statistical Tests Break Down the Hypothesis Test Understand Tests and Methods to Determine Relationships Between Variables 12 - Using the Appropriate Type of Visualization Use Basic Visuals Build Advanced Visuals Build Maps with Geographical Data Use Visuals to Tell a Story 13 - Expressing Business Requirements in a Report Format Consider Audience Needs When Developing a Report Describe Data Source Considerations For Reporting Describe Considerations for Delivering Reports and Dashboards Develop Reports or Dashboards Understand Ways to Sort and Filter Data 14 - Designing Components for Reports and Dashboards Design Elements for Reports and Dashboards Utilize Standard Elements Creating a Narrative and Other Written Elements Understand Deployment Considerations 15 - Understand Deployment Considerations Understand How Updates and Timing Affect Reporting Differentiate Between Types of Reports 16 - Summarizing the Importance of Data Governance Define Data Governance Understand Access Requirements and Policies Understand Security Requirements Understand Entity Relationship Requirements 17 - Applying Quality Control to Data Describe Characteristics, Rules, and Metrics of Data Quality Identify Reasons to Quality Check Data and Methods of Data Validation 18 - Explaining Master Data Management Concepts Explain the Basics of Master Data Management Describe Master Data Management Processes Additional course details: Nexus Humans CompTIA Data Plus (DA0-001) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Data Plus (DA0-001) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Discover how to harness the potential of sustainability for your business in our exclusive online masterclass starting on 23 Nov 2023! Unlock the Power of Sustainability for your Business! Join our 90-Minute online masterclass. 🚀 Embrace Sustainability with Confidence 🚀 For many businesses, tackling sustainability can be daunting because of perceived extra costs, confusing terminology, and a lack of clear guidance on how to take meaningful action. This 90-minute masterclass is designed to demystify sustainability, providing you with the knowledge and tools you need to navigate this critical landscape. In insightful and exclusive masterclass, you'll learn: ✅ Key pillars for the foundation of Sustainability and relevance to your business ✅ How Sustainability can aligns with your business priorities ✅ Transitioning from Talk to Action: Practical Steps ✅ Dispelling Myths and Clarifying Confusing Terms ✅ Role of Sustainability Audits to improve your business journey ✅ Real-life success: Learn how businesses can thrive through sustainability ✅ Sustainability for business growth and enhanced competitiveness 📌 Reserve your spot today and take the next step toward a more prosperous business! Tags Online Events Things To Do Online Online Classes Online Business Classes #business #sustainability #webinar #thingstodo #masterclass #netzerocarbon #socialvalue #online_event #professional_development #sustainable_business
Duration 1 Days 6 CPD hours Time management training most often begins with setting goals. These goals are recorded and may be broken down into a project, an action plan, or a simple task list. Activities are then rated based on urgency and importance, priorities assigned, and deadlines set. This process results in a plan with a task list or calendar of activities. Routine and recurring tasks are often given less focus to free time to work on tasks that contribute to important goals. This entire process is supported by a skill set that should include personal motivation, delegation skills, organization tools, and crisis management. 1 - Getting Started Icebreaker Housekeeping Items The Parking Lot Workshop Objectives 2 - Setting SMART Goals The Three P?s The SMART Way Prioritizing Your Goals Visualization 3 - Prioritizing Your Time The 80/20 Rule The Urgent/Important Matrix Being Assertive 4 - Planning Wisely Creating Your Productivity Journal Maximizing the Power of Your Productivity Journal The Glass Jar: Rocks, Pebbles, Sand, and Water Chunk, Block, and Tackle Ready, Fire, Aim! 5 - Tackling Procrastination Why We Procrastinate Nine Ways to Overcome Procrastination Eat That Frog! 6 - Crisis Management When the Storm Hits Creating a Plan Executing the Plan Lessons Learned 7 - Organizing Your Workspace De-Clutter Managing Workflow Dealing with E-mail Using Calendars 8 - Delegating Made Easy When to Delegate To Whom Should You Delegate? How Should You Delegate? Keeping Control The Importance of Full Acceptance 9 - Setting a Ritual What is a Ritual? Ritualizing Sleep, Meals, and Exercise Example Rituals Using Rituals to Maximize Time 10 - Meeting Management Deciding if a Meeting is Necessary Using the PAT Approach Building the Agenda Keeping Things on Track Making Sure the Meeting Was Worthwhile 11 - Alternatives to Meetings Instant Messaging and Chat Rooms Teleconferencing E-mail Lists and Online Groups Collaboration Applications 12 - Wrapping Up Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations Additional course details: Nexus Humans Time Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Time Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Inclusion Facilitation (IF) is an approach to enhancing the inclusion, in a mainstream community of any child or young person who is experiencing difficulties in the world because of disability, personal crisis or because of their challenging behaviour towards others. The IF approach works by mobilising the young person’s natural supports to provide support and engage with the person in difficulty. Inclusion Facilitation is designed to create a better life for an individual by the provision of an intense input designed to being about social change. This usually entails a series of visits focused on getting the person out and about to increase confidence, social skills and presence in their local community and to pursue goals and dreams. Uniquely, the work is carried out under the close clinical supervision of a practicing psychologist. What is Inclusion Facilitation Work? ‘We do whatever it takes!’ Usually a Person Centred Planning event would be carried out using the PATHor MAP process – majoring on dreams and goal setting leading to precise action planning. An experienced psychologist alongside the inclusion facilitator would carry out a PATH. A large graphic will be one of the outcomes of the meetings this is a great visual record and a shared memory of the event. This will also inform the priorities for the inclusion facilitation work Optionally following the PATH event a ‘scoping report’ is created outlining what Inclusion Facilitation could offer and highlighting what dreams and goals the individual has. The PATH is also provides a good opportunity for the Facilitator to meet the focus person in a comfortable positive environment. 12 weekly visits from the Inclusion Facilitator followed by 5 monthly visits is our preferred model but we can be flexible with the delivery of this input. This is just a guideline, however we have received good results using this time frame. After this intensive input the Inclusion Facilitator will hand over to the existing family, carers and PA team to carry on where he or she has left off. This transition time is planned from the outset. An experienced psychologist is there to support the facilitator at all times and will guide all work done by the inclusion facilitator. Is this just Support work? No! This is proactive engagement – doing whatever is required. We are not just passively or reactively providing what is asked for – we are actively pursuing a good life for the individual. Our work is built on careful research around a person’s interests and what opportunities exist locally. We carry out community mapping. We actively work to tackle an individual’s own resistance and reluctance to engage more socially. We actively engage with people in social settings that the individual attends to build bridges and connections – we are bridge builders. We build circles around a person. We create the conditions in which friendships can flourish. We have direct psychological supervision and support throughout. This work is short term and intense. Enjoy participating in a multimedia workshop that will challenge, entertain and reach for your emotions. Learning Objectives 1.To be able to understand the values and wider context of inclusion. 2.To be able to set up and run an ‘Inclusion Facilitation project to improve the life chances and connections of a child or young person. 3.To understand and be able to maximise the power of the peer group in supporting relationships, achievement and behaviour. Course Content The course answers the questions: What do you do with the child who is isolated by their aggression and anger, through being different, disabled or new to the school or community? Practically how do we go about including high profile children or young people? How can we help some children be friends? We will cover: Inclusion values underpinning this work The Intentional Building of Relationships –‘Inclusion Facilitation’ work as an example Not doing it alone – The Importance of Teams in developing inclusive practice Practical setting up and running of IF work Lessons learned Stories of IF work
A practical programme for HR professionals who are keen to develop a coaching style of interaction either within their teams and/or with business stakeholders. Develop skills in taking a more engaging, non-directive approach to supporting your business and to encouraging a coaching style of communication in your organisation.
This is an opportunity to benchmark your current and future safety and health vision and priorities in line with global models of safety, and to benefit from good practice gathered from leading organisations from around the world. Through lively discussion, debate and exercises, including benchmarking, gap analysis and case studies, leaders attending this programme deepen their understanding of how to use their skills to drive their organisation to the next level in its safety and health performance. The programme is designed to help leaders:
About this Virtual Instructor Led Training (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course highlights the impact of the introduction of renewable energy, digital technologies and new operational flexibility solutions in the electricity trading market. These advancements facilitate unique opportunities and challenges for cross border trading of electricity. Most countries in Asia, have designed their own portfolio of climate actions with an accelerated penetration of renewable energy (or by importing renewable energy into their local grids). These changes are taking place at unprecedented speed and add further complexity to the operation of electricity trading markets, while presenting new opportunities. The Asian market, can tap into its vast potential of solar, wind and geothermal energy sources. A global, unified vision is emerging to support each of countries' energy needs and decarbonization goals. This VILT course will highlight priorities of each country to achieve its energy goals. The main operational flexibilities of each type of renewable resource are discussed in detail. The course also discusses the main components of Power Purchase Agreements and advancements in digitalization and how digital technologies can influence the energy market and cross border electricity trading. Key Takeaways: New Energy Market Design Cross Border Trading PPAs Mechanisms and Examples of PPAs The Increased Penetration of Renewable Resources in the Power Systems and How It Stimulates Cross Border Trading How Digital Innovation Drives Energy Markets and Cross Border Trading Training Objectives Upon completion of this VILT course, participants will be able to: Be familiar with the global vision of One Sun, One World, One Grid Understand the major trends reshaping the energy markets Learn how innovative digital technologies change the energy markets Understand why sustainable energy markets require a tighter coordination between transmission and distribution system operators Engage with each other to design the energy market of the future Target Audience This VILT course will benefit policy makers and regulators from energy agencies, transmission companies and utilities as well as power system engineers and power system operators from control centre and ISO. Training Methods The VILT will be delivered online in 3 half-day sessions comprising 4 hours per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). Trainer Your expert course leader is a Utility Executive with extensive global experience in power system operation and planning, energy markets, enterprise risk and regulatory oversight. She consults on energy markets integrating renewable resources from planning to operation. She led complex projects in operations and conducted long term planning studies to support planning and operational reliability standards. Specializing in Smart Grids, Operational flexibilities, Renewable generation, Reliability, Financial Engineering, Energy Markets and Power System Integration, she was recently engaged by the Inter-American Development Bank/MHI in Guyana. She was the Operations Expert in the regulatory assessment in Oman. She is a registered member of the Professional Engineers of Ontario, Canada. She is also a contributing member to the IEEE Standards Association, WG Blockchain P2418.5. With over 25 years with Ontario Power Generation (Revenue $1.2 Billion CAD, I/S 16 GW), she served as Canadian representative in CIGRE, committee member in NSERC (Natural Sciences and Engineering Research Council of Canada), and Senior Member IEEE and Elsevier since the 90ties. Our key expert chaired international conferences, lectured on several continents, published a book on Reliability and Security of Nuclear Power Plants, contributed to IEEE and PMAPS and published in the Ontario Journal for Public Policy, Canada. She delivered seminars organized by the Power Engineering Society, IEEE plus seminars to power companies worldwide, including Oman, Thailand, Saudi Arabia, Malaysia, Indonesia, Portugal, South Africa, Japan, Romania, and Guyana. Our Key expert delivered over 60 specialized seminars to executives and engineers from Canada, Europe, South and North America, Middle East, South East Asia and Japan. Few examples are: Modern Power System in Digital Utilities - The Energy Commission, Malaysia and utilities in the Middle East, GCCIA, June 2020 Assessment of OETC Control Centre, Oman, December 2019 Demand Side management, Load Forecasting in a Smart Grid, Oman, 2019 Renewable Resources in a Smart Grid (Malaysia, Thailand, Indonesia, GCCIA, Saudi Arabia) The Modern Power System: Impact of the Power Electronics on the Power System The Digital Utility, AI and Blockchain Smart Grid and Reliability of Distribution Systems, Cyme, Montreal, Canada Economic Dispatch in the context of an Energy Market (TNB, Sarawak Energy, Malaysia) Energy Markets, Risk Assessment and Financial Management, PES, IEEE: Chicago, San Francisco, New York, Portugal, South Africa, Japan. Provided training at CEO and CRO level. Enterprise Risk methodology, EDP, Portugal Energy Markets: Saudi Electricity Company, Tenaga National Berhad, Malaysia Reliability Centre Maintenance (South East Asia, Saudi Electricity Company, KSA) EUSN, ENERGY & UTILITIES SECTOR NETWORK, Government of Canada, 2016 Connected+, IOT, Toronto, Canada September 2016 and 2015 Smart Grid, Smart Home HomeConnect, Toronto, Canada November 2014 Wind Power: a Cautionary Tale, Ontario Centre for Public Policy, 2010 POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Person centred rehabilitation is designed to create a better life for an individual by the provision of an intense input designed to being about social change. This usually entails a series of visits focused on getting the person out and about to increase confidence, social skills and presence in their local community and to pursue goals and dreams. Usually, the work is carried out under the close clinical supervision of a practicing psychologist. Course Category Inclusion Person Centred Planning Visioning and Problem Solving Peer Support Description Person Centred Rehabilitation Person centred rehabilitation is designed to create a better life for an individual by the provision of an intense input designed to being about social change. This usually entails a series of visits focused on getting the person out and about to increase confidence, social skills and presence in their local community and to pursue goals and dreams. Usually, the work is carried out under the close clinical supervision of a practicing psychologist. PERSON CENTRED PLANNING A Person Centred Planning event would be carried out using the PATH or MAP process – majoring on dreams and goal setting leading to precise action planning. Facilitators would carry out the PATH or other person centred process. A large graphic will be one of the outcomes of the meetings this is a great visual record and a shared memory of the event. This will also inform the priorities for the later follow up inclusion facilitation work. Following the PATH event a ‘scoping report’ is created outlining what Inclusion Facilitation could offer and highlighting what dreams and goals the individual has. INCLUSION FACILITATION The PATH is also provides a good opportunity for the Facilitator to meet the focus person in a comfortable positive environment. Agreed visits from the Inclusion Facilitator are then carried out over a 3 month period. After this intensive input the Inclusion Facilitator will hand over to the existing family, carers and PA team to carry on where he or she has left off. This transition time is planned from the outset. An experienced psychologist needs to be there to support the facilitator at all times and will guide all work done by the inclusion facilitator. Is this just Support work? No! This is proactive engagement – doing whatever is required. This is not passively or reactively providing what is asked for – we are actively pursuing a good life for the individual. The work is built on careful research around a person’s interests and what opportunities exist locally There is community mapping There is work to tackle an individual’s own resistance and reluctance to engage more socially There is a need to engage with people in social settings that the individual attends to build bridges and connections – we are bridge builders You will need to build circles around a person There is a need to create the conditions in which friendships can flourish There is a need for direct psychological supervision and support throughout This work is short term and intense. The facilitator’s main aims will vary depending on the dreams and goals of the focus person. The basic aim of the inclusion facilitator is to better the focus person’s quality of life. Learning Objectives 1 To create a better life for the Individual. 2 Give Individual and family a clear vision of a good life and to support first steps towards this 3 To maximise individuals inclusion and connection with the wider community. 4 To help with friendship, social connection and education 5 To increase confidence, social skills and presence in their local community and to pursue goals and dreams. Who Is It For? Anyone who is involved in the rehabilitation of children or adults who have become disabled through accident or trauma and who is committed to helping them get their life back on track. Course Content Understanding ordinary needs – the dimensions of social inclusion Pursuing the dreams and goals of the individual Improving social skills Community Mapping Being comfortable in social environments Developing conversational skills Having a positive mindset Staying physically active Building relationships Help in meeting new people Create natural circles of support Creating a community circle Having positive body language Employment of support staff Pursuing personal interests If you like this you will almost certainly enjoy: Person Centred Planning using PATH and MAPs