• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

45 Courses delivered Live Online

Couples Therapy: Is Narcissism the problem?

By Human Givens College

Additional specialist online training for anyone working with couples or helping with relationship issues… Accredited CPD: 4 hours Length: 8.45am–1.00pm (GMT) Live training delivered online – Join Jennifer Broadley on Tuesday 9th July 24 for another jam-packed session live online via Zoom. You will have plenty of opportunities to ask questions. Simply book your place and we will send you email confirmation – your Zoom link will be sent the day before the event. BONUS RECORDING – the training is recorded, in case anyone experiences technical difficulties, so you will also get a recording for 2 weeks afterwards to maximise your learning. Can’t make this date, then please register your interest and we’ll let you know as soon as another date is available. This additional online training session gives us time to look in more depth at narcissism and what a relationship with a narcissist might look like In most cases, applying the skills and techniques learned in the Couples Therapy Online Masterclass is all that’s needed to help a couple move forward in their relationship. But sometimes additional knowledge is needed, as in the case of relationships where narcissism is a suspected factor, to help a therapist assess more quickly and meaningfully the relationship dynamic and specific challenges involved, thus allowing them to help the couple more effectively to find a constructive and compassionate way forward and out of their current difficulties. Why take this course The term ‘narcissist’ is often bandied about and narcissism is frequently covered in the media – but is this language over-used or misused? It’s great that awareness is being raised generally about narcissism and the impacts it can have on a relationship, but it’s important to be well informed. As a result of this increased awareness, more people are seeking information and answers to their own experiences, as well as about the causes of their own relationship difficulties and what they can do about them. As part of that process they may well seek some counselling or therapy so it’s important that, as therapists, our knowledge, skillset and stories are as up-to-date and relevant as possible to best serve our clients. If you already work with couples, in your private practice or employed role, and you want some more detailed insight into narcissism and how to spot it, as well as some of the additional relationship challenges it brings, this live online training is for you.. Jennifer gave a very informative response to my specific request for information relating to narcissismPAULINE, THERAPIST ATTENDING JENNIFER'S 'COUPLES THERAPY' COURSE What will you learn What is a narcissistic personality disorder (NPD) – and what are the criteria for clinical diagnosis What specific unkind or manipulative behaviours in relationships can be classed as narcissism – and when should we really not use that term Why the reports of narcissistic emotional abuse in relationships are significantly on the increase – and how (or whether) this parallels family, relationship and societal changes If it’s not narcissism, what else could be causing the dysfunctional relationship pattern? The truths and myths of the nature vs nurture debate in relation to NPD How to spot narcissism when both partners are in your therapy room How to spot NPD when only one partner is in your therapy room Why it’s usually the co-dependant partner, rather than the one with narcissistic personality traits, that instigates therapy How to support an abused partner to exit a narcissistic relationship – OR to remain in it if he/she won’t or can’t leave How to identify which needs are not being met for one or both partners of a couple – and strategies to quickly change that Tools and checklists to keep your clients emotionally and physically safe as you support a rise in their self-esteem, self-compassion and emotional needs being met more healthily The common language (media and social media) for NPD-related behaviours How to raise children (separately or together) when one parent has NPD – the critical Do’s and Don’ts Additional resources to steer your clients towards – plus recommended reading for you as a therapist And more… You will also have plenty of opportunities to ask questions and benefit from those asked by other people. Who is this course suitable for? Anyone who has previously attended our Couples masterclass 1-day workshop (live or in person). Anyone working with couples, perhaps as a relationship counsellor or through couples therapy, who would like a better understanding of narcissism and NPD, and ideas for helping couples deal with the challenges these bring. Please Note This course is not a substitute for therapy.

Couples Therapy: Is Narcissism the problem?
Delivered OnlineFlexible Dates
£110

Couples Therapy: Neurodiversity and relationships

By Human Givens College

Additional specialist training for those working with couples or helping with relationship issues… Accredited CPD: 4 hours Length: 8.45am–1.00pm (GMT) Fresh, engaging and very, very informative. I learnt things to use in my personal life as well as with the couples I work with Live training delivered online – Join Jennifer Broadley on Thursday 9th May 24 for another jam-packed session live online via Zoom. You will have plenty of opportunities to ask questions. Simply book your place and we will send you email confirmation – your Zoom link will be sent the day before the event. BONUS RECORDING – the training is recorded, in case anyone experiences technical difficulties, so you will also get a recording for 2 weeks afterwards to maximise your learning. Can’t make this date, then please register your interest and we’ll let you know as soon as another date is available. This additional training session gives us more time to look at how neurodiversity can impact relationships In most cases, applying the skills and techniques learned in the Couples Therapy Online Masterclass is all that’s needed to help a couple move forward in their relationship. Sometimes though, some extra focused knowledge of the challenges within specific types of relationship can help a therapist assess more quickly and meaningfully the relationship dynamic, allowing them to more effectively help the couple find a constructive and compassionate way forward. Why take this course Neurodiversity has been given significant media attention recently, which is all hugely positive. As a result though, more people are seeking out information and answers for their questions and personal experiences. As part of that process, they may well seek some counselling or therapy. It’s important then that, as therapists or counsellors, our knowledge, skillset, language and stories stay as up-to-date and relevant as possible to best serve our clients. In this session, we take time to clarify what’s most helpful and identify practical steps that can help. Jennifer's knowledge and experience shone through What will you learn Debunking the myths about neurodiversity – and replacing them instead with newer, more positive and inclusive research-based thinking The value (or not) of a diagnosis – and the possibility of mis-diagnosis The challenges when one or both partners are neurodiverse The most effective tools to support a re-steer back to respect and compatibility What to look out for with right- and left-brain-orientated neurodiversity How best to get mutual emotional needs met when two partners have different priorities, awareness and emotional expectations Having a neuro-divergent child – and how that can impact a relationship (positively and otherwise) Managing expectations – around the speed of change, and the consistency of more-respectful and kinder behaviours after therapy is complete Strategies that could work well with a neuro-divergent partner – and when might we have to get more creative A therapist’s next steps – when they suspect one or both of a couple is neurodivergent. And much more… You will also have the opportunity to ask Jennifer questions and benefit from the discussions resulting from those asked by others. Who is this course suitable for? Anyone working with couples, perhaps as a relationship counsellor or couples therapist, who would like further insights and ideas for helping couples when one or more is neurodivergent Anyone who has previously attended our Couples masterclass 1-day workshop (live or in person) If you already work with couples in your salaried work or private practice and you want to develop more insight into the different ways neurodivergence can impact couples specifically, and relationships generally, then this online training is for you. Please Note This course is not a substitute for therapy. This course has been independently accredited by the internationally recognised CPD Standards Office for 4 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.

Couples Therapy: Neurodiversity and relationships
Delivered OnlineFlexible Dates
£110

M.D.D STUDENTS MEMBERSHIP (STUDENTS)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

2 Articles per month Free 15 min relationship coaching per month Access to exclusive M.D.D events, group coaching and 10% off selected products https://relationshipsmdd.com/product/m-d-d-students-membership/

M.D.D STUDENTS MEMBERSHIP (STUDENTS)
Delivered in London or UK Wide or OnlineFlexible Dates
£26.99

55242 Microsoft Dynamics 365 Customization and Configuration

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for Information workers, IT Professionals and Developers. Students should have an existing working knowledge of either Microsoft Dynamics 365 or Microsoft Dynamics CRM. Overview Understand the features and tools that exist in Microsoft Dynamics 365 for Customizers Be aware of integrating complimenting Microsoft products such as SharePoint, Skpe for Business and Exchange Undertake and carry out the initial setup and configuration required in a Microsoft Dynamics 365 deployment Design and configure a comprehensive Security model using the inbuilt tools in Microsoft Dynamics 365 Customize the Dynamics 365 schema by creating custom Entities, Fields and Relationships Design custom Information Forms, Quick View Forms, Quick Create Forms and System Views Create System Charts, Dashboards and Interactive Experience Dashboards Create and manage Business Rules using the Business Rule Designer Plan, design and implement best practice Workflow, Business Process Flows and Custom Actions Be able to apply best practice methodology using Unmanaged and Managed Solutions to deploy Microsoft Dynamics 365 customizations and patches This course provides students with a detailed hands-on experience of setting up, customizing, configuring and maintaining the CRM components of Microsoft Dynamics 365. Attendees of this course will gain an in-depth understanding of the Dynamics 365 security model, learn how to customize the Dynamics 365 framework, create and maintain powerful workflows and business process flows and use solutions to package and deploy customizations across multiple Dynamics 365 environments. The course applies to both Business and Enterprise Editions of Dynamics 365 as well as Online and On-premise deployments. Introduction Getting familiar with the versions of Microsoft Dynamics CRM\365 Get acquainted with the Dynamics 365 framework Review the Dynamics 365 interfaces, devices and apps Understand the tools for Dynamics 365 customizers A brief overview of Solutions Understand the differences between Dynamics 365 organisations and environments Review further reading and resources Set up the lab environment - Acme Enterprises Event Management Solution Initial Setup and Configuration An introduction to Dynamics 365 online setup An introduction to Dynamics 365 on premise setup Review the System Settings area Understand how to configure Auto Save Settings Understand how to configure Format Settings Understand how to configure Email Settings Understand how to configure Skype Integration Understand how to configure SharePoint Integration Security Design and configure Business Units Configure Security Roles Manage Users and Teams Implement Access Teams Configure Hierarchy Security Creating and Managing Entities Introduction to the Dynamics 365 schema Review the different Entity Types Create new Custom Entities Managing Entity Ownership Managing Entity Properties Custom Entity Security Review Entities and Solutions Customizing Fields Introduction to Field Customization Understand the different Field Types Review Field Formats Create a new Field Review Fields and Solutions Implement a Calculated Field Configure Field Level Security Customizing Relationships and Mappings Introduction to Relationships Review the different Relationship Types Create a Relationship Review Relationships and Solutions Understand Relationship Behavior Implement a Hierarchy Relationship Configure Field Mappings Customizing Forms, Views and Visualizations The process to create a new Form Review the different Form types Using the Form Designer Customizing the Main, Quick View and Quick Create Forms Configure Form Security Review the different View types Customizing System Views Customizing System Charts and Dashboards Workflows, Business Process Flows and Custom Actions Introduction to Processes Workflow Business Process Flows Custom Actions Solution Management An introduction to Solution Management How to add and administer components in a Solution The differences between unmanaged and managed Solutions How to export and import a Solution How to set Managed Properties for a Solution What happens when you delete a Solution How to Clone a Solution Patch How to Clone a Solution

55242 Microsoft Dynamics 365 Customization and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry
1...345

Educators matching "relationship coach"

Show all 29