• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

586 Courses delivered Online

Dinaledi - Fingerstyle for Africa

5.0(3)

By Tony Cox Online School of Acoustic Guitar

Learn how to play Tony Cox's stunning fingerstyle guitar tunes contained within his 2019 published book, Fingerstyle for Africa.

Dinaledi - Fingerstyle for Africa
Delivered Online On Demand39 minutes
£12

Anthill Rag - Fingerstyle for Africa

5.0(3)

By Tony Cox Online School of Acoustic Guitar

Learn how to play Tony Cox's stunning fingerstyle guitar tunes contained within his 2019 published book, Fingerstyle for Africa.

Anthill Rag - Fingerstyle for Africa
Delivered Online On Demand33 minutes
£12

Level 2 Award in Depression Counselling

By Compliance Central

Feeling lost in the shadows of depression? Want to become a guiding light for others struggling in its grip? This Level 2 Award in Depression Counselling equips you with the knowledge and understanding of navigating the complexities of this prevalent mental health issue. More than just theoretical concepts, this Depression Counselling course empowers you to explore the depths of depression, its causes, and the tools to help individuals emerge stronger. Delve deep into the intricate dynamics of Depression Counselling as you navigate through comprehensive modules designed to equip you with the necessary tools to understand, confront, and conquer depression. Discover invaluable insights into the complexities of the human mind and emotions, as you learn to navigate through the labyrinth of depression with confidence and empathy. Through our meticulously crafted curriculum of Depression Counselling course, immerse yourself in the art and science of Depression Counselling, honing your skills to become a beacon of hope and support for those in need. Join us on this transformative journey with Depression Counselling course, where every lesson brings you closer to becoming a proficient and compassionate Depression Counsellor. Level 2 Award in Depression Counselling Course Learning Outcomes: Gain a thorough understanding of depression and its various manifestations. Develop empathy and communication skills essential for effective counselling. Explore evidence-based strategies for helping individuals overcome depression. Learn to create personalized treatment plans tailored to each client's needs. Understand the ethical considerations and boundaries in depression counselling. Enhance your ability to provide ongoing support and monitor progress in clients. Level 2 Award in Depression Counselling Introduction Understanding Depression Beating Depression Final Thoughts & Advice Certificate of Achievement Endorsed Certificate of Achievement from the Quality Licence Scheme Learners will be able to achieve an endorsed certificate after completing the Depression Counsellingcourse as proof of their achievement. You can order the endorsed certificate for Free to be delivered to your home by post. For international students, there is an additional postage charge of £10. Endorsement The Quality Licence Scheme (QLS) has endorsed this Depression Counselling course for its high-quality, non-regulated provision and training programmes. The QLS is a UK-based organisation that sets standards for non-regulated training and learning. This endorsement means that the Depression Counselling course has been reviewed and approved by the QLS and meets the highest quality standards. Who is this course for? Level 2 Award in Depression Counselling The Level 2 Award in Depression Counselling is designed for individuals seeking to enhance their skills and knowledge in the dynamic field of Depression Counselling, like - Depression Counsellor Mental Health Support Worker Crisis Intervention Specialist Community Outreach Coordinator Behavioural Health Technician Case Manager Requirements Level 2 Award in Depression Counselling To enrol in this Level 2 Award in Depression Counselling course, all you need is a basic understanding of the English Language and an internet connection. Career path Level 2 Award in Depression Counselling Mental Health Support Worker Counselling Assistant Mental Health Advocate Case Manager (Mental Health Services) Community Support Worker (Mental Health) Crisis Intervention Worker Certificates CPD Accredited PDF Certificate Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included CPD Accredited Hard Copy Certificate Hard copy certificate - £9.99 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Level 2 Award in Depression Counselling
Delivered Online On Demand1 hour
£100

Understanding Microservices | A Technical Overview (TT7050)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This overview-level course is ideally suited for professionals seeking an introduction to microservices architecture and its application within a business context. Ideal attendee roles include software developers, system architects, technical managers, and IT professionals who are part of teams transitioning to a microservices approach. It's also an excellent starting point for non-technical roles such as product owners or business analysts who work closely with technical teams and want to better understand and become conversant in the language and principles of microservices. Overview This course combines engaging instructor-led presentations and useful demonstrations with engaging group activities. Throughout the course you'll explore: Understand the Basics of Microservices: Get to know the fundamental principles and characteristics of microservices and how they revolutionize traditional software development approaches. Explore the Design of Microservices: Gain an overview of how microservices are designed based on business requirements and what makes them unique in the software architecture world. Overview of Managing and Scaling Microservices: Get an introduction to how microservices are managed and scaled independently, and understand the significance of these features in your business operations. Familiarize with the Microservices Ecosystem: Learn about the typical patterns, best practices, and common pitfalls in the microservices world, setting a foundation for future learning and implementation. Introduction to Microservices in a Business Context: Acquire a basic understanding of how microservices can be aligned with specific business capabilities, and get a glimpse into how they can coexist with legacy systems in a business setting. Microservices have rapidly emerged as a popular architectural style, breaking down applications into small, independent services that can be developed, deployed, and scaled individually. Microservices offer a robust method to address a variety of projects, such as e-commerce platforms and content management systems, enhancing scalability and boosting productivity. This technology, when employed correctly, can greatly increase software delivery speed and system resilience, making it a crucial skill set for modern technology professionals.Understanding Microservices - A Technical Overview is a one-day course ideally suited for technical professionals seeking an introduction to microservices architecture and its application within a business context. Under the guidance of an industry expert, this engaging class combines lecture-style learning with lively demonstrations, case study review and group discussions.Throughout the course you?ll explore the principles and characteristics that define microservices, how to identify suitable projects for a microservices approach, the factors to consider when designing them, and the strategies to effectively manage and scale them within complex systems. You?ll also learn about the best practices, patterns, and anti-patterns, arming you with the knowledge to make the right architectural choices. This course also explores the real-world implementation of microservices in a business enterprise. We'll discuss how to align the application of microservices with your organization's specific business capabilities, and offer strategies for smoothly integrating this technology within existing legacy systems. Introduction to Microservices Understand what microservices are and their role in modern software development. Introduction to Microservices: what they are and why they matter. Monolithic vs Microservices: highlighting the shift and benefits. Key principles and characteristics of microservices. Identifying suitable applications for microservices transformation. Demo: Analyzing a sample application and identifying potential microservices Architecting and Managing Microservices Learn the basic strategies for scaling and managing microservices. Scaling Microservices: from a single service to hundreds. Key components of a microservices architecture. Introduction to resilience patterns: Circuit-Breakers and Bulkheads. Load management and provisioning in a microservices setup. Understanding the role of cloud services in microservices. Optional Demo: Illustrating how a microservice-based application scales in real-time Designing Microservices Learn the key aspects to consider when designing microservices. Defining microservice boundaries: Deciding the scope of a microservice. Communication patterns in microservices. Understanding Microservice endpoints. Exploring data stores and transaction boundaries in microservices. Overcoming challenges in Microservices design. Demo: Designing microservices for a hypothetical business requirement Implementing Microservices in a Business Enterprise Understand the process and considerations for implementing microservices in an enterprise context. Assessing enterprise readiness for microservices. Building the business case for microservices: strategic advantages and potential challenges. Aligning microservices with business capabilities. Organizational changes: Team structures and processes for microservices. Dealing with Legacy Systems: Strategies for microservices integration. Demo: Exploring a case study of successful microservices implementation in a business enterprise The Microservices Ecosystem Understand the key tools and best practices in the Microservices ecosystem. Understanding the typical Microservices Stack. Monitoring and Logging in Microservices. Introduction to Docker: Containerization of Microservices. Deployment strategies in a Microservices setup. Introduction to Orchestration in Microservices Demo: Containerizing and deploying a simple microservice Microservices Deployment Strategies Understand various ways to safely introduce changes in a microservices environment. The concept of Blue-Green Deployment: changing services without downtime. Canary Releases and Feature Toggles: slowly rolling out changes to users. Database changes in a microservices environment: keeping data consistent. Demo: Examining various deployment strategies Microservices Best Practices and DevOps Learn key strategies to ensure a smooth operation of your microservices setup. The DevOps culture in Microservices: collaboration for efficiency. Defining a Minimum Viable Product in a Microservices setup: building small, delivering fast. Dealing with data in a distributed setup: managing Data Islands. The importance of Continuous Integration/Continuous Delivery in a microservices setup. Governance: Keeping track of your services and their consumers. Demo: Visualizing a simple continuous delivery pipeline Microservices Patterns and Anti-Patterns Learn about common do's and don'ts when working with microservices. Understanding patterns that help with efficient microservices operation. Recognizing and avoiding anti-patterns that can hinder performance. Dealing with common challenges: dependencies between services, managing service boundaries. Demo: Examples of real-world patterns and anti-patterns Simple Overview of OAuth and OpenID for Microservices Introduction to OAuth and OpenID: What they are and why they matter in Microservices. The role of tokens in OAuth 2.0: How they help in securing communications. A simplified look at OpenID Connect: Linking identities across services. Demo

Understanding Microservices | A Technical Overview  (TT7050)
Delivered OnlineFlexible Dates
Price on Enquiry

Parent Handling Skills for Admin Staff Members

5.0(5)

By TEFL Wonderland - Brilliant Minds

Parent Handling Skills for Admin Staff Members

Parent Handling Skills for Admin Staff Members
Delivered Online On Demand
£38

Juniper Networks Design Fundamentals (JNDF)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is targeted for Juniper Networks system engineers, partner sales engineers (including Champions), and services partners who are interested in learning network design introductory concepts. However, the course is also applicable to a general audience of Juniper customers with a desire to learn more about network design. Overview Provide an overview of network design needs and common business requirements.Describe key product groups related to campus, WAN, data center, and security architectures.Analyze and interpret common RFP requirements.Scope a network design by gathering data and working with key stakeholders.Describe ways of processing customer data and design requests.Identify boundaries and scope for the design proposal.List some considerations when creating a design proposal.Provide an overview of network security design principles and common vulnerabilities.List high-level design considerations and best practices for securing the network.List the components of the campus network design.Describe best practices and design considerations for the campus.Describe architectural design options for the campus.List the components of the WAN.Describe best practices and design considerations for the WAN.Describe design options for the WAN.List the components of the data center design.Describe best practices and design considerations for the data center.Describe architectural design options for the data center.Define business continuity and its importance in a network design.Describe high availability design considerations and best practices.Provide an overview of high availability offerings and solutions.Describe Class of Service design considerations.Provide an overview of environmental considerations in network design.List design considerations and best practices for managing the network.Provide an overview of Juniper Networks and third party options for network management.List design considerations and best practices for network automation.Provide an overview of automation tools.Explain the foundational topics that have been taught throughout the course.Create a network design proposal that satisfies customer requirements and business needs.Provide an overview of the steps involved in migrating a network.Describe best practices used in network migration.List the various campus network topographies.Describe sample design options for the campus. This three-day course is designed to cover best practices, theory, and design principles for overall network design and will serve as the prerequisite course for other design subject areas ƒ?? data center, security, and WAN. Course IntroductionNetwork Design Fundamentals A Need for Design Knowledge is King A Proposed Design Methodology A Reference Network Understanding Customer Requirements RFP Requirements Scoping the Design Project Analyzing the Data Lab: Understanding Customer Requirements Organizing the Data Processing the Data and Requests Understanding Boundaries and Scope Design Proposal Considerations Securing the Network Why Secure the Network? Security Design Considerations Creating the Design Campus The Campus Network: An Overview Best Practices and Considerations Architectural Design Options Lab: Creating the Design Campus Creating the Design Wide Area Network The WAN: An Overview Best Practices and Considerations WAN Design Examples Lab: Creating the Design WAN Creating the Design Data Center The Data Center: An Overview Best Practices and Considerations Data Center Design Examples Lab: Creating the Design Data Center Business Continuity & Network Enhancements Business Continuity Planning High Availability Design Considerations and Best Practices Offerings and Solutions CoS and Traffic Engineering Considerations Environmental Design Network Management Designing for Network Management Automation Designing for Network Automation Lab: Enhancing the Design Putting Network Design Into Practice Network Design Recap Responding to the RFP Final Lab Introduction Lab: Putting Network Design into Practice

Juniper Networks Design Fundamentals (JNDF)
Delivered OnlineFlexible Dates
Price on Enquiry

CMMC: Organizational Foundations v2.2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course provides an immersive learning experience for business and technical professionals who need a thorough understanding of the CMMC program. It does this by taking the point of view of a CMMC Certified Professional. Students might consider taking this course to learn more about the overall CMMC program, how DoD contractors are assessed, and how to help their organizations prepare for a CMMC Assessment. Overview In this course, you will learn about the CMMC Model, framework, context, and application within the DoD, as well as the expectations and requirements imposed upon organizations that do business with the DoD. You will: Identify the threats to the Defense Supply Chain and the established regulations and standards for managing the risk. Identify the sensitive information that needs to be protected within the Defense Supply Chain and how to manage it. Describe how the CMMC Model ensures compliance with federal acquisitions regulations. Identify responsibilities of the Certified CMMC Professional, including appropriate ethical behavior. Establish the Certification and Assessment scope boundaries for evaluating the systems that protect regulated information. Prepare the OSC for an Assessment by evaluating readiness. Use the CMMC Assessment Guides to determine and assess the Evidence for practices. Implement and evaluate practices required to meet CMMC Level 1. Identify the practices required to meet CMMC Level 2. Work through the CMMC Assessment process. The Cybersecurity Maturity Model Certification (CMMC), managed by The Cyber AB (formerly known as the CMMC Accreditation Body or the CMMC-AB), is a program through which an organization's cybersecurity program maturity is measured by their initial and ongoing compliance with applicable cybersecurity practices, as well as their integration of corresponding policies and plans into their overall business operations. Once rule-making has concluded and CMMC 2.0 has been implemented, all organizations providing products or services to the United States Department of Defense (DoD) must comply with the requirements of their applicable CMMC Level. This course provides a complete review of the key elements of this important program. Lesson 1: Managing Risk within the Defense Supply Chain Topic A: Identify Threats to the Defense Supply Chain Topic B: Identify Regulatory Responses against Threats Lesson 2: Handling Sensitive Information Topic A: Identify Sensitive Information Topic B: Manage the Sensitive Information Lesson 3: Ensuring Compliance through CMMC Topic A: Describe the CMMC Model Architecture Topic B: Define the CMMC Program and Its Ecosystem Topic C: Define Self-Assessments Lesson 4: Performing CCP Responsibilities Topic A: Identify Responsibilities of the CCP Topic B: Demonstrate Appropriate Ethics and Behavior Lesson 5: Scoping Certification and Assessment Boundaries Topic A: Use the CMMC Assessment Scope Documentation Topic B: Get Oriented to the OSC Environment Topic C: Determine How Sensitive Information Moves Topic D: Identify Systems in Scope Topic E: Limit Scope Lesson 6: Preparing the OSC Topic A: Foster a Mature Cybersecurity Culture Topic B: Evaluate Readiness Lesson 7: Determining and Assessing Evidence Topic A: Determine Evidence Topic B: Assess the Practices Using the CMMC Assessment Guides Lesson 8: Implementing and Evaluating Level 1 Topic A: Identify CMMC Level 1 Domains and Practices Topic B: Perform a CMMC Level 1 Gap Analysis Topic C: Assess CMMC Level 1 Practices Lesson 9: Identifying Level 2 Practices Topic A: Identify CMMC Level 2 Practices Lesson 10: Working through an Assessment Topic A: Identify Assessment Roles and Responsibilities Topic B: Plan and Prepare the Assessment Topic C: Conduct the Assessment Topic D: Report the Assessment Results Topic E: Conduct the CMMC POA&M Close-Out Assessment

CMMC: Organizational Foundations v2.2
Delivered OnlineFlexible Dates
Price on Enquiry

20703-1 Administering System Center Configuration Manager

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is for experienced information technology (IT) professionals, typically described as Enterprise Desktop Administrators (EDAs). These EDAs deploy, manage, and maintain PCs, devices, and applications across medium, large, and enterprise organizations. A significant portion of this audience uses, or intends to use, the latest release of Configuration Manager to manage and deploy PCs, devices, and applications. Overview After completing this course, students will be able to: •Analyze data by using queries and reports. •Prepare a management infrastructure, including configuring boundaries, boundary groups, and resource discovery, and integrating mobile-device management with Microsoft Exchange Server. •Deploy and manage the Configuration Manager client. •Configure, manage, and monitor hardware and software inventory, and use Asset Intelligence and software metering. •Identify and configure the most appropriate method to distribute and manage content used for deployments. •Distribute, deploy, and monitor applications for managed users and systems. •Maintain software updates for PCs that Configuration Manager manages. •Implement Endpoint Protection for managed PCs. •Manage configuration items, baselines, and profiles to assess and configure compliance settings and data access for users and devices. •Configure an operating-system deployment strategy by using Configuration Manager. •Manage and maintain a Configuration Manager site. In this course, students will learn day-to-day management tasks, including how to manage applications, client health, hardware and software inventory, operating system deployment, and software updates by using Configuration Manager. You also will learn how to optimize System Center Endpoint Protection, manage compliance, and create management queries and reports. Managing computers and mobile devices in the enterprise Overview of systems management by using enterprise management solutions Overview of the Configuration Manager architecture Overview of the Configuration Manager administrative tools Tools for monitoring and troubleshooting a Configuration Manager site Lab : Exploring the Configuration Manager tools Analyzing data using queries, reports, and CMPivot Introduction to queries Configuring SQL Server Reporting Services Analyzing the real-time state of a device by using CMPivot Lab : Creating and running queries Lab : Configuring SSRS Lab : Analyzing the real-time state of a device by using CMPivot Preparing the Configuration Manager management infrastructure Configuring site boundaries and boundary groups Configuring resource discovery Organizing resources using device and user collections Lab : Configuring boundaries and resource discovery Lab: Configuring user and device collections Deploying and managing the Configuration Manager client Overview of the Configuration Manager client Deploying the Configuration Manager client Configuring and monitoring client status Managing client settings and performing management operations Lab : Deploying the Microsoft System Center Configuration Manager client software Lab: Configuring and monitoring client status Lab : Managing client settings Managing inventory for PCs and applications Overview of inventory collection Configuring hardware and software inventory Managing inventory collection Configuring software metering Configuring and managing Asset Intelligence Lab : Configuring and managing inventory collection Lab : Configuring software metering Lab : Configuring and managing Asset Intelligence Distributing and managing content used for deployments Preparing the infrastructure for content management Distributing and managing content on distribution points Lab : Distributing and managing content for deployments Deploying and managing applications Overview of application management Creating applications Deploying applications Managing applications Deploying virtual applications by using System Center Configuration Manager (Optional) Deploying and managing Windows Store apps Lab : Creating and deploying applications Lab : Managing application supersedence and removal Lab : Deploying virtual applications by using Configuration Manager (Optional) Lab : Using Configuration Manager to deploy Windows Store apps Maintaining software updates for managed PCs The software updates process Preparing a Configuration Manager site for software updates Managing software updates Configuring automatic deployment rules Monitoring and troubleshooting software updates Enabling third-party updates Lab : Configuring the site for software updates Lab : Deploying and managing software updates Implementing Endpoint Protection for managed PCs Overview of Endpoint Protection in Configuration Manager Configuring, deploying, and monitoring Endpoint Protection policies Configuring and deploying advanced threat policies Lab : Implementing Microsoft System Center Endpoint Protection Lab : Implementing advanced threat policies Managing compliance and secure data access Overview of Compliance Settings Configuring compliance settings Viewing compliance results Managing resource and data access Lab : Managing compliance settings Managing operating system deployment An overview of operating system deployment Preparing a site for operating system deployment Deploying an operating system Managing Windows as a service Lab : Preparing the site for operating -system deployment Lab : Deploying operating -system images for bare-metal installations Managing and maintaining a Configuration Manager site Configuring role-based administration Configuring Remote Tools Overview of Configuration Manager site maintenance Backing up and recovering a Configuration Manager site Lab : Configuring role-based administration Lab : Configuring Remote Tools Lab : Maintaining a Configuration Manager site Additional course details: Nexus Humans 20703-1 Administering System Center Configuration Manager training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 20703-1 Administering System Center Configuration Manager course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

20703-1 Administering System Center Configuration Manager
Delivered OnlineFlexible Dates
Price on Enquiry

Confidence Building Training: Personal Development Skills

4.3(43)

By John Academy

Empower yourself with our Confidence Building Training: Personal Development Skills course. Enhance your self-assurance, communication prowess, and leadership abilities. Gain practical strategies to overcome obstacles, project confidence in the workplace, and cultivate respectful relationships. Elevate your personal and professional growth with expert guidance and interactive learning experiences.

Confidence Building Training: Personal Development Skills
Delivered Online On Demand1 hour 30 minutes
£23.99

How Addiction, Anxiety, Depression & Trauma Go Together

4.3(43)

By John Academy

Course Overview Without proper aid, issues like addiction, anxiety, or PTSD can get out of hand and destroy the affected people's lives. The How Addiction, Anxiety, Depression & Trauma Go Together course is giving you the opportunity to help out these poor souls. In this course, you will learn essential knowledge and skills to provide support to those who are suffering. The How Addiction, Anxiety, Depression & Trauma Go Together course will teach you the ins and outs of the healing process. You will learn the importance of re-framing. From this valuable course, you will understand how to identify the negative core beliefs and grasp detailed information on addiction-related problems. The modules will teach you the strategies required for recovering from trauma, alcohol and drugs. You will receive lessons on existentialism, the power of now and the importance of forgiveness. In this step by step learning process, you will understand the difference between attachment and authenticity. This How Addiction, Anxiety, Depression & Trauma Go Together course is designed to educate you on these sensitive issues and give you the skills to pursue a career in the relevant industry. Join the course and enrich your knowledge. Learning Outcomes Understand the process of healing and re-framing Enrich your knowledge about addiction issues Know the difference between shock and trauma Learn the strategies of eliminating negative thoughts Gain in-depth knowledge about the process of recovering from addiction and trauma Familiarize with the power of forgiveness Who is this course for? This course is suitable for anyone interested in learning this topic and the professions working in the relevant fields. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path  The How Addiction, Anxiety, Depression & Trauma Go Together course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Therapist Psychologist Introduction Introduction 00:01:00 Healing, Thriving & Re-Framing Healing 00:11:00 The Art of Thriving 00:04:00 The Art & Benefits of Reframing 00:03:00 Advocate vs. Adversary 00:09:00 Addiction, Beliefs & Ambivalences Dependence & Addiction & the Relationship to Fear, Phobia & Anxiety 00:11:00 Rumpelstiltskin, Grace & Enlightenment 00:03:00 Negative Core Beliefs 00:05:00 Family Beliefs vs. Personal Beliefs 00:07:00 Observation, Awareness, Mindfulness and the Ambivalence of Addiction 00:03:00 'C' Words for Change - the Power of Just One Letter 00:06:00 Attitude = Experience 00:06:00 The Way Forward in Clearing Trauma PTSD - Shock vs. Trauma 00:04:00 Energy Packets - What are they? 00:05:00 Trauma List 00:05:00 Inner Dialogue 00:04:00 TAT Pose & the Three-Spot Tapping Points 00:07:00 Atavisms & Miasms 00:05:00 The Issue of the 'Super-Sensitive' 00:02:00 Releasing Negative Feelings 00:08:00 Process, Possibilities & Awareness Alcohol & Drug Recovery - other considerations 00:03:00 Seasonal Affective Disorder (S.A.D.) 00:03:00 Pyroluria 00:05:00 The Animal Metaphor Exercise 00:12:00 Daily Energy Tune-Up 00:09:00 Questions, Reflections, Insights & Healing Options Existentialism - the questions 00:05:00 Energy Medicine Healing Modalities 00:03:00 The Need for Forgiveness 00:04:00 Sydney Banks - Reflections on 'The Enlightened Gardener' 00:04:00 The Tao of Tapas 00:08:00 The Power of Now 00:07:00 Addiction, Authenticity, Boundaries & Enabling Attachment vs. Authenticity 00:06:00 Finding the Palace of Possibilities 00:07:00 Addiction & its Paradoxes 00:30:00 Addiction, Boundaries & Enabling 00:57:00 The use of Medication for Alcohol Use Disorder (AUD) 00:07:00 Live a Life that Matters 00:02:00 Things Have Changed 00:05:00 Resources Resources - How Addiction, Anxiety, Depression & Trauma Go Together 00:00:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

How Addiction, Anxiety, Depression & Trauma Go Together
Delivered Online On Demand4 hours 46 minutes
£18