This comprehensive online interior design course includes 12 self study modules, and weekly 1:1 telephone and or video consultations. I will personally guide and inspire you through your creative learning journey.
Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - Introduction to Microsoft 365 threat protection Explore Extended Detection & Response (XDR) response use cases Understand Microsoft Defender XDR in a Security Operations Center (SOC) Explore Microsoft Security Graph Investigate security incidents in Microsoft Defender XDR 2 - Mitigate incidents using Microsoft 365 Defender Use the Microsoft Defender portal Manage incidents Investigate incidents Manage and investigate alerts Manage automated investigations Use the action center Explore advanced hunting Investigate Microsoft Entra sign-in logs Understand Microsoft Secure Score Analyze threat analytics Analyze reports Configure the Microsoft Defender portal 3 - Protect your identities with Microsoft Entra ID Protection Microsoft Entra ID Protection overview Detect risks with Microsoft Entra ID Protection policies Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - Remediate risks with Microsoft Defender for Office 365 Automate, investigate, and remediate Configure, protect, and detect Simulate attacks 5 - Safeguard your environment with Microsoft Defender for Identity Configure Microsoft Defender for Identity sensors Review compromised accounts or data Integrate with other Microsoft tools 6 - Secure your cloud apps and services with Microsoft Defender for Cloud Apps Understand the Defender for Cloud Apps Framework Explore your cloud apps with Cloud Discovery Protect your data and apps with Conditional Access App Control Walk through discovery and access control with Microsoft Defender for Cloud Apps Classify and protect sensitive information Detect Threats 7 - Respond to data loss prevention alerts using Microsoft 365 Describe data loss prevention alerts Investigate data loss prevention alerts in Microsoft Purview Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 9 - Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Start recording activity in the Unified Audit Log Search the Unified Audit Log (UAL) Export, configure, and view audit log records Use audit log searching to investigate common support issues 10 - Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium) Explore Microsoft Purview Audit (Premium) Implement Microsoft Purview Audit (Premium) Manage audit log retention policies Investigate compromised email accounts using Purview Audit (Premium) 11 - Investigate threats with Content search in Microsoft Purview Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 12 - Protect against threats with Microsoft Defender for Endpoint Practice security administration Hunt threats within your network 13 - Deploy the Microsoft Defender for Endpoint environment Create your environment Understand operating systems compatibility and features Onboard devices Manage access Create and manage roles for role-based access control Configure device groups Configure environment advanced features 14 - Implement Windows security enhancements with Microsoft Defender for Endpoint Understand attack surface reduction Enable attack surface reduction rules 15 - Perform device investigations in Microsoft Defender for Endpoint Use the device inventory list Investigate the device Use behavioral blocking Detect devices with device discovery 16 - Perform actions on a device using Microsoft Defender for Endpoint Explain device actions Run Microsoft Defender antivirus scan on devices Collect investigation package from devices Initiate live response session 17 - Perform evidence and entities investigations using Microsoft Defender for Endpoint Investigate a file Investigate a user account Investigate an IP address Investigate a domain 18 - Configure and manage automation using Microsoft Defender for Endpoint Configure advanced features Manage automation upload and folder settings Configure automated investigation and remediation capabilities Block at risk devices 19 - Configure for alerts and detections in Microsoft Defender for Endpoint Configure advanced features Configure alert notifications Manage alert suppression Manage indicators 20 - Utilize Vulnerability Management in Microsoft Defender for Endpoint Understand vulnerability management Explore vulnerabilities on your devices Manage remediation 21 - Plan for cloud workload protections using Microsoft Defender for Cloud Explain Microsoft Defender for Cloud Describe Microsoft Defender for Cloud workload protections Enable Microsoft Defender for Cloud 22 - Connect Azure assets to Microsoft Defender for Cloud Explore and manage your resources with asset inventory Configure auto provisioning Manual log analytics agent provisioning 23 - Connect non-Azure resources to Microsoft Defender for Cloud Protect non-Azure resources Connect non-Azure machines Connect your AWS accounts Connect your GCP accounts 24 - Manage your cloud security posture management? Explore Secure Score Explore Recommendations Measure and enforce regulatory compliance Understand Workbooks 25 - Explain cloud workload protections in Microsoft Defender for Cloud Understand Microsoft Defender for servers Understand Microsoft Defender for App Service Understand Microsoft Defender for Storage Understand Microsoft Defender for SQL Understand Microsoft Defender for open-source databases Understand Microsoft Defender for Key Vault Understand Microsoft Defender for Resource Manager Understand Microsoft Defender for DNS Understand Microsoft Defender for Containers Understand Microsoft Defender additional protections 26 - Remediate security alerts using Microsoft Defender for Cloud Understand security alerts Remediate alerts and automate responses Suppress alerts from Defender for Cloud Generate threat intelligence reports Respond to alerts from Azure resources 27 - Construct KQL statements for Microsoft Sentinel Understand the Kusto Query Language statement structure Use the search operator Use the where operator Use the let statement Use the extend operator Use the order by operator Use the project operators 28 - Analyze query results using KQL Use the summarize operator Use the summarize operator to filter results Use the summarize operator to prepare data Use the render operator to create visualizations 29 - Build multi-table statements using KQL Use the union operator Use the join operator 30 - Work with data in Microsoft Sentinel using Kusto Query Language Extract data from unstructured string fields Extract data from structured string data Integrate external data Create parsers with functions 31 - Introduction to Microsoft Sentinel What is Microsoft Sentinel? How Microsoft Sentinel works When to use Microsoft Sentinel 32 - Create and manage Microsoft Sentinel workspaces Plan for the Microsoft Sentinel workspace Create a Microsoft Sentinel workspace Manage workspaces across tenants using Azure Lighthouse Understand Microsoft Sentinel permissions and roles Manage Microsoft Sentinel settings Configure logs 33 - Query logs in Microsoft Sentinel Query logs in the logs page Understand Microsoft Sentinel tables Understand common tables Understand Microsoft Defender XDR tables 34 - Use watchlists in Microsoft Sentinel Plan for watchlists Create a watchlist Manage watchlists 35 - Utilize threat intelligence in Microsoft Sentinel Define threat intelligence Manage your threat indicators View your threat indicators with KQL 36 - Connect data to Microsoft Sentinel using data connectors Ingest log data with data connectors Understand data connector providers View connected hosts 37 - Connect Microsoft services to Microsoft Sentinel Plan for Microsoft services connectors Connect the Microsoft Office 365 connector Connect the Microsoft Entra connector Connect the Microsoft Entra ID Protection connector Connect the Azure Activity connector 38 - Connect Microsoft Defender XDR to Microsoft Sentinel Plan for Microsoft Defender XDR connectors Connect the Microsoft Defender XDR connector Connect Microsoft Defender for Cloud connector Connect Microsoft Defender for IoT Connect Microsoft Defender legacy connectors 39 - Connect Windows hosts to Microsoft Sentinel Plan for Windows hosts security events connector Connect using the Windows Security Events via AMA Connector Connect using the Security Events via Legacy Agent Connector Collect Sysmon event logs 40 - Connect Common Event Format logs to Microsoft Sentinel Plan for Common Event Format connector Connect your external solution using the Common Event Format connector 41 - Connect syslog data sources to Microsoft Sentinel Plan for syslog data collection Collect data from Linux-based sources using syslog Configure the Data Collection Rule for Syslog Data Sources Parse syslog data with KQL 42 - Connect threat indicators to Microsoft Sentinel Plan for threat intelligence connectors Connect the threat intelligence TAXII connector Connect the threat intelligence platforms connector View your threat indicators with KQL 43 - Threat detection with Microsoft Sentinel analytics What is Microsoft Sentinel Analytics? Types of analytics rules Create an analytics rule from templates Create an analytics rule from wizard Manage analytics rules 44 - Automation in Microsoft Sentinel Understand automation options Create automation rules 45 - Threat response with Microsoft Sentinel playbooks What are Microsoft Sentinel playbooks? Trigger a playbook in real-time Run playbooks on demand 46 - Security incident management in Microsoft Sentinel Understand incidents Incident evidence and entities Incident management 47 - Identify threats with Behavioral Analytics Understand behavioral analytics Explore entities Display entity behavior information Use Anomaly detection analytical rule templates 48 - Data normalization in Microsoft Sentinel Understand data normalization Use ASIM Parsers Understand parameterized KQL functions Create an ASIM Parser Configure Azure Monitor Data Collection Rules 49 - Query, visualize, and monitor data in Microsoft Sentinel Monitor and visualize data Query data using Kusto Query Language Use default Microsoft Sentinel Workbooks Create a new Microsoft Sentinel Workbook 50 - Manage content in Microsoft Sentinel Use solutions from the content hub Use repositories for deployment 51 - Explain threat hunting concepts in Microsoft Sentinel Understand cybersecurity threat hunts Develop a hypothesis Explore MITRE ATT&CK 52 - Threat hunting with Microsoft Sentinel Explore creation and management of threat-hunting queries Save key findings with bookmarks Observe threats over time with livestream 53 - Use Search jobs in Microsoft Sentinel Hunt with a Search Job Restore historical data 54 - Hunt for threats using notebooks in Microsoft Sentinel Access Azure Sentinel data with external tools Hunt with notebooks Create a notebook Explore notebook code
In this course we deepen participants understanding of systemic racism and the spectrum of privilege. It challenges the participants to examine their behaviours and take close looks at some of the views they have held since a very young age, e.g. this area is a “bad” area, because it has a high proportion of black/brown people living in it, or that young black men in tracksuits are “thugs”. We think about where these messages come from and how people are indoctrinated by the media. Course Category Inclusion Team Building Leadership Emotional needs Description In this course we deepen participants understanding of systemic racism and the spectrum of privilege. It challenges the participants to examine their behaviours and take close looks at some of the views they have held since a very young age, e.g. this area is a “bad” area, because it has a high proportion of black/brown people living in it, or that young black men in tracksuits are “thugs”. We think about where these messages come from and how people are indoctrinated by the media. We explore the reasons why white people are so defensive when it comes to talking about race. We discuss having racial biases and the implications of them, such as unconsciously insulting people around us in the workplace. When we become aware of how our behaviours can affect people, we then look for solutions. The course is designed for groups of professionals to come together as a team to try and take responsibility for the racism that goes on in their workplace – empowering the leadership to have difficult conversations with team members and create a paradigm shift across the entire organisation. Please come with an open mind, and you might be surprised at what you find out. We are striving for a world where racism is an open conversation and not a topic that we shy away from. Testimonials “That was a really insightful session and thought provoking. I would love to attend more sessions on racism. Thank you for the engaging questions and delivery” “Lots of things to reflect on!” Learning Objectives Participants will: Confront their own racism and unconscious biases Become aware of the ways they treat people differently based on race Think about practical changes they can make in their workplaces Who Is It For? Leadership teams seeking guidance and reflection Educators who want to get it right People who have had not had much contact with people outside their own race People who believe they are “not racist” Course Content Background – brief history of systemic racism Racism as a binary – the problem with thinking only “bad” people can be racist Trust – how do we feel around people we don’t trust? Difference – how do we act when we feel different? What do Good Manners look like around people of different cultures? What does Good Allyship look like in the workplace? Why don’t we talk about race? What does your race mean to you? Examining our privilege – activity Interracial friendship video Visioning – what does the ideal workplace look like? Setting Actions – what achievable actions can we set to bring us closer to our dream future?
Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Introduction to Google Ads Welcome to Google Ads Masterclass! 00:12:00 ow to Make the Most of This Course, Plus a Sneak Peak of What's to Come! 00:19:00 Google Ads Formula Calculator 00:14:00 What is Google Ads? 00:12:00 Where do Google Ads Show Up? 00:13:00 Complimentary AdVenture Media Account Audit (exclusions apply) 00:06:00 Creating And Setting Up Our First Google Ads Account Creating Your First Gooogle Ads Account 00:08:00 Understanding the Google Ads Account Hierarchy 00:08:00 Using Your Website Navigational Structure to Structure Your Google Ads Campaigns 00:20:00 Understanding Network Settings 00:13:00 Understanding Location Targeting 00:12:00 Configuring Location Targeting in Google Ads 00:09:00 Viewing Location Reports in Google Ads 00:14:00 Understanding Advanced Location Options 00:16:00 Setting and Configuring Languages 00:04:00 Setting Your Daily Budget and Understanding How Daily Budgets Work in Google Ads 00:12:00 Finding Your Hourly Reports in the Google Ads Interface 00:06:00 Using Google's Default Bid Strategy (Clicks) And Optional Max CPC Bid Limit 00:05:00 Bidding Strategies: Target Search Page Location 00:05:00 Bidding Strategies: Target ROAS 00:10:00 Bidding Strategies: Target CPA 00:05:00 Bidding Strategies: Target Outranking Share 00:07:00 Bidding Strategies: Maximize Clicks 00:05:00 Bidding Strategies: Enhanced CPC Bidding 00:04:00 Bidding Strategies: Manual CPC Bidding 00:04:00 Introduction to Dynamic Search Ads! 00:07:00 Understanding Sitelink Extensions 00:14:00 Callout Extensions 00:05:00 Call Extensions 00:08:00 Structured Snippet Extensions 00:06:00 App Extensions 00:02:00 Message Extensions 00:08:00 Promotion Extensions 00:09:00 Price Extensions 00:12:00 Understanding Ad Rotation Settings 00:05:00 The Basics of Ad Scheduling 00:11:00 Understanding the Basics of Device Targeting 00:15:00 Understanding Campaign URL Options 00:07:00 Structuring Your Ads Groups Like a Professional Ad Group Structure Basics and Organization 00:14:00 Ad Group Structure Ideas 00:06:00 Creating Our First Ad Group in Google Ads 00:09:00 How To Write Killer Ads in Google ads! The Anatomy of Google Text Ads 00:07:00 Compliance in Google Text Ads 00:05:00 Requesting a Manual Review of Your Ads and Expediting the Process 00:02:00 Best Practices for Successful Text Ads 00:14:00 Real Life Case Ad Copy Case Study: Medical Equipment Company 00:15:00 The BJ Fogg Behavioral Model 00:38:00 Creating Our First Ad in Google Ads 00:13:00 Setting Up Your Adwords Billing Configuring Your Billing Details in Google Ads 00:05:00 Keywords In Depth - The Heartbeat Of Your Account Keyword Basics_ Keywords vs Queries 00:08:00 The Basics of Keyword Research 00:11:00 The Basics of Keyword Planning 00:13:00 The Basics of Keyword Organization 00:06:00 Understanding Keyword Match Types 00:12:00 Keyword Match Types: Broad Match Modified 00:06:00 Keyword Match Types: Broad Match Modified 00:06:00 Keyword Match Types: Phrase Match 00:06:00 Keyword Match Types: Exact Match 00:12:00 Keyword Match Types: Negative Match 00:12:00 Using the Search Term Report to Find Negative Keywords Part 1 00:15:00 Using the Search Term Report to Find Negative Keywords Part 2 00:17:00 Understanding Negative Keyword Lists 00:12:00 Traffic Sculpting: Negative Keywords at the Ad Group Level 00:18:00 Adding Negative Keywords at The Ad Group Level 00:09:00 Traffic Sculpting Using OPTMYZR 00:07:00 Keyword Research: Google Suggestions, Google Related Searches and Autocomplete 00:14:00 Using Additional Research Tools to Get Negative Keyword Ideas 00:11:00 Keyword Research: Using the Google Keyword Planner 1 00:20:00 Keyword Research: Using the Google Keyword Planner 2 00:15:00 Keyword Research: Downloading Keyword Ideas from the Google Keyword Planner 00:16:00 Keyword Planning: The 6 Main Ways People Communicate With Search Engines 00:16:00 Keyword Planning: Understanding the Buyer Funnel 00:11:00 Keyword Planning: What Keywords Can Teach Us About Buying Intent 00:11:00 Keyword Planning: Using SEM Rush to Get Volume and Cost Estimates 00:18:00 Keyword Planning: Using SEM Rush to Get Keyword Ideas from Your Competitors 00:19:00 Keyword Planning: Using Google Keyword Planner to Get Volume & Cost Estimates 00:17:00 Keyword Organization: Getting Keywords Into Excel & Understanding Keyword Themes 00:16:00 Keyword Organization: Formatting Keywords in Excel 00:11:00 Keyword Organization: Using Pivot Tables to Visualize Your Campaign Structure 00:12:00 Keyword Organization: Using Mergewords to Generate Keyword Lists 00:13:00 Keyword Bidding Basics: Setting Your Initial Max CPC Bids 00:20:00 Account Structure - How to Structure Ad Groups Like a Pro Account Structure_ How To Create A New Ad Group Within Your Campaign 00:07:00 Importing Your Keyword Lists From Excel Into Your New Ad Group 00:10:00 Creating Multiple, Relevant Ads For Your New Ad Groups 00:13:00 How To Navigate Between Ad Groups, Keywords and Ads Within A Campaign 00:08:00 The Incredible Dynamics of The Adwords Auction Introduction To The AdWords Auction 00:20:00 Understanding Quality Score: Click Through Rate And Ad Relevancy 00:15:00 Understanding Quality Score: Landing Page Quality 00:07:00 Understanding Ad Rank and How It Is Calculated 00:12:00 When You Could Ignore Low Quality Scores (and when you can't!) 00:09:00 Advanced Techniques: Diagnosing Low Quality Score With Excel Pivot Tables (1/3) 00:08:00 Advanced Techniques: Diagnosing Low Quality Score With Excel Pivot Tables (2/3) 00:11:00 Advanced Techniques: Diagnosing Low Quality Score With Excel Pivot Tables (3/3) 00:07:00 Expanding And Refining Your Campaigns Navigating The AdWords Dashboard 00:16:00 How To Edit, Pause And Enable Keywords, Ad Groups and Campaigns 00:15:00 Editing The Essential Campaign Settings 00:06:00 How To Create New Campaigns That Will Improve Your Results 00:15:00 How ToUse Your Website To Make The Best Campaigns Possible 00:15:00 How To Set Up Powerful Custom Schedules For Your Campaigns 00:12:00 Understanding Bid Adjustments And Using Them To Enhance Your Custom Schedules 00:12:00 Negative Keywords - Your Greatest Ally Understanding Negative Keywords In-Depth 00:14:00 Using Broad, Phrase and Exact Match With Your Negative Keywords 00:06:00 Adding and Removing Negative Keywords and Negative Keyword Lists 00:20:00 Making Your Ads Unstoppable With Multiple Ad Extensions Introduction To Ad Extensions 00:06:00 The Benefits Of Using Ad Extensions 00:08:00 Different Types Of Ad Extensions and Best Practices 00:06:00 Adding Sitelink Extensions 00:08:00 Configuring Your Sitelink Extensions For The Best Results 00:11:00 Adding Callout Extensions And Phone Extensions 00:08:00 Remarking - Your Secret Weapon To Converting Like a Boss The 5 Primary Forms Of Remarketing 00:16:00 Realizing The Benefits And Importance Of Remarketing 00:12:00 How To Create And Add Your Remarketing Tag 00:09:00 Creating Your First Remarketing Audience 00:13:00 Configuring Your Remarketing Campaign Settings 00:13:00 Keeping Track of Profits With Conversion Tracking Understanding The Basics Of Conversion Tracking 00:14:00 Exploring The Different Conversion Actions Visitors Take On Your Site 00:14:00 Setting Up Conversion Tracking For Form Submissions 00:17:00 Generating And Installing Your Conversion Tracking Tag 00:09:00 Understanding The Basics Of Phone Call Tracking 00:09:00 Setting Up Phone Call Tracking And Understanding How To Analyze Conversion Data 00:09:00 Profitable Bidding Strategies Return On Investment (ROI) vs Return On Ad Spend (ROAS)_ Important Distinction 00:15:00 How To Mathematically Calculate ROI and ROAS 00:09:00 Calculating Max CPC Bids From Your Conversion Rate And Conversion Value 00:11:00 Calculating Profitable Keyword Bids Based On Revenue Per Click 00:09:00 Using Adwords Scripts to Enhance Performance And Increase Optimization Speed Introduction To AdWords Scripts - What Are Scripts 00:05:00 Bidding To Average Position AdWords Script Part 1 00:11:00 Bidding To Average Position AdWords Script Part 2 00:14:00 Conclusion ... Goodbye For Now! Conclusion 00:03:00 Bonus Material! Part 1. Understanding Search Queries and What We Learn From Searcher Languagage 00:18:00 Part 2. Accessing The Search Query Report and Understanding Long Tail Keywords 00:18:00 Part 3. Qualifying Your Ad Text and How To A/B Split Test Your Ads 00:22:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00
This day will introduce you to the basic techniques and skills involved in doing graphic facilitation. Learn how to use a BIG piece of paper and a handful of pens to create a memorable summary of your training day, team meeting or your work with young people and families. Learn how to harvest the essence of an event in a visual representation. This is a ‘hands on’ interactive day built around demonstrations of graphic facilitation, coaching and the chance to try things out. Ideal for teams who can then go on together to practice, practice, practice. Learning Objectives To introduce you to the basic skills of graphic facilitation – no previous experience is needed To develop your capacity to ‘listen under the words’ and draw out the deeper messages To help you suspend your self-doubt – “I can’t draw!” and rediscover your capacity to create an effective visual representation of a meeting/training day/conversation etc Course Content The day will introduce you to the fundamentals of graphic facilitation and will include the following topics: Pens, Pastels and Paper – what you will need to get started The basic ‘grammar’ of graphic facilitation; the essential shapes, using colour, images, lettering, words, creating connection How to listen for the essence of what is being said and translate this into visual language A chance to do it live – with coaching
This comprehensive course is designed to take you on a journey of mastering React, the popular JavaScript library for building dynamic user interfaces, and combining it with the power of .NET API for seamless back-end integration. This course will provide you with a solid foundation and hands-on experience in building full-stack applications.
This workshop gives an opportunity to focus on the emotional needs of boys and how to meet these. We lift the lid on an emerging urgent inclusion issue,namely meeting the emotional needs of boys. Everyone knows a boy. They may be pupil, son, brother, parent or partner. Boys when they become adults are over represented in the prison, and mental health system. Course Category Meeting emotional needs Description This workshop gives an opportunity to focus on the emotional needs of boys and how to meet these. We lift the lid on an emerging urgent inclusion issue,namely meeting the emotional needs of boys. Everyone knows a boy. They may be pupil, son, brother, parent or partner. Boys when they become adults are over represented in the prison, and mental health system. In one recent year 1300 young men committed suicide in the UK. In the UK the commonest cause of death among those aged 16-35 is suicide. Three men for every one woman kill themselves every year (Guardian, June 2006). 1 in 4 women experience domestic violence and 2 women a week are killed by a current or ex partner. Boys and men are a major concern. We need to find ways to allow them to unclench their hearts and learn to experience, process, communicate and manage their own emotional lives for their own and for the good of the wider community. Testimonials ‘Thanks for a super day, lots of good ideas for our citizens of the future. We need to offer them the best and what we would offer our own children’?? ‘Enjoyed the day very much. Brilliant ideas and lots of food for thought. Will use the solution circle. A great tool!’ ‘went well and the ethos/participation was commendably facilititated. well done’. ‘Wonderful day!’ ‘Still getting lots of positive messages this end.’ Learning Objectives Increased understanding of boys’ emotional needs Access to a wider range of practical strategies to impact on meeting emotional and behaviour problems Deeper understanding of core values surrounding inclusion of boys Opportunity to reflect on professional attitudes and behaviour towards boys and their emotional challenges New skills and processes to make boys’ inclusion and achievement more successful Who Is It For ? Early years and school based practitioners Key workers Teaching Assistants with support roles Heads and deputies SENCOs Advanced skills teachers Primary and secondary classroom teachers Parents Local authority support services Course Content The course explores the questions : Is there a problem with boys? What can we do to meet the emotional needs of boys? What helps? What should our priority be with boys? This workshop will explore: Cultural and historical expectations of boys in our society Shared experiences of teaching and parenting boys Circle of Courage as away of understanding emotional needs Fathers, mothers and sons Drinking and drugs: filling the emotional void Depression and suicide Anger and violence Solution Circle Problem Solving around boys needs What boys really need
This radical way of building empathy is inspired by the work of the ‘Roots of Empathy’ organisation in Canada. Roots of Empathy (ROE) is dedicated to building caring and peaceful societies through the development of empathy in children. It is a parenting education programme for elementary school students (between the ages of 3 to 14 years) based on monthly visits to the classroom by a parent and infant from the school neighbourhood. Course Category Behaviour and Relationships Autism and Communication Meeting emotional needs Description This radical way of building empathy is inspired by the work of the ‘Roots of Empathy’ organisation in Canada. As Mary Gordon founder of this way of working describes: ‘By regular visits to the classroom of local mums and their children build an empathic relationship with the baby.MARY GORDON Roots of Empathy (ROE) is dedicated to building caring and peaceful societies through the development of empathy in children. It is a parenting education program for elementary school students (between the ages of 3 to 14 years) based on monthly visits to the classroom by a parent and infant from the school neighbourhood. We teach teachers and educators to help children to observe, over the school year, how their baby forms an attachment to his or her parent. Children are encouraged to record how the infants develop. The children learn to spot their babies cues and unique temperament, while celebrating developmental milestones. Children are prepared for responsible and responsive parenting as they increase their knowledge about human development, learning, and infant safety. The baby project program brings about the development of empathy and emotional literacy: As children learn to take the perspective of others they are less likely to hurt through bullying, exclusion, aggression, and violence. Children learn how to challenge cruelty and injustice in their own classroom. Messages of social inclusion and activities that are consensus-building contribute to a culture of caring that changes the tone of the classroom. Involving fathers and men provides rich models of male nurturance Testimonials ‘13% increase in empathy scores for our year 1s’ ‘Years 2s empathy had increased by 35%’ ‘Now that I am older I can be happy for other people’ (6 year old) ‘Everyone is special – thats the truth – but when I was small I thought its not fair when someone got a present and I didn’t’ (7 year old) Dramatic improvements in children taking responsibility for actions and being less defiant over the year of the project. Learning Objectives Understanding of method and approach to building empathy with babies Full understanding of background to this approach Practical advice received as to how to set up baby project in classrooms across school Who Is It For ? Teachers School leaders Project Coordinators Social Care Course Content We will provide theoretical and evidence back ground to impact of this work. We will describe existing UK school based work. We will inspire staff in attendance to want to actively engage in this work There may even be a baby to hold!!
Click to read more about this training, in which we demonstrate a live problem solving approach which is based on the active participation of family members. Course Category Inclusion Parents and Carers Behaviour and relationships Problem Solving Description In this training we demonstrate a live problem solving approach which is based on the active participation of family members. ‘Family Circles’ is an evolving new approach to problem solving with families and is based on our years of family work and the development and use of the Circle of Adults process. Inspired by our own Parent Solutions work and the Circle of Adults process as well as Family Group Conferencing and other Restorative Interventions we bring you Family Circles. Essentially the approach involves gathering a family together for a process that is facilitated but majors on the family members offering each other their wisdom and ideas. The approach is capacity focused, person centred approach to working with families rather than the dominant deficit oriented and ‘medical model’ of viewing and planning for or doing things to families. This training can be modelled with a group of professionals or better still with a family. In our work with families we develop the importance of naming stories or theories and seeking linkages and synthesis between what is found out and explored about the family situation and its history. We like participants to sit with the uncertainty, to reflect on the question ‘why’ but without judgement of each other. Deeper reflections may span a whole range of perspectives from ‘within person’ considerations, to situational or systemic possibilities. Health or emotional issues can be reflected on alongside organisational or transactional aspects of what is going on for the family. The better the shared understanding the better the strategy or actions which emerge from these meetings. Quality hypotheses with a close fit to reality lead to more effective implementation in the real world. We encourage ‘loose’ thinking, a search for connections, deeper listening, an ‘open mind’, speculation and exploration without moral judgements. From this stance self-reflection as well as reflection on the situation can produce remarkable insights. The quality of theories or new stories generated is directly influenced by family members’ experiences and the models of learning, behaviour and emotion, systems, educational development, change and so on that they have been exposed to. Learning Objectives To provide opportunities for: Shared problem solving in a safe exploratory climate in which the family will find its own solutions. Individuals to reflect on their own actions and strategies An exploration of whole-family processes and their impact Emotional support and shared understandings of issues at a child, parent, family, school and community level. Feed back to each other on issues, ideas and strategies that are agreed to be worth sharing with them. Who Is It For? Anyone interested in working with families in a way that builds and makes use of their capacities rather than focus on their challenges and difficulties. Social Care teams School staff Community organisers Educational Psychologists Course Content True family empowerment Deepening shared stories and understandings Facilitating groups Problem solving process Handling family group communication Allowing direct feedback and challenge between participants in a safe way Building relationships Process: Family members are welcomed: Introductions are carried out, ground rules and aims clarified whilst coffee is drunk. A recap from the last session is carried out: To follow up developments and reflections after the last meeting. One issue is selected for the main focus Issue presentation: The family member who raised the concern is asked questions to tell the ‘story’ of the issue or problem. Additional questions/information from the group about the problem are gathered: Ground rules may need to be observed carefully here. Individual participants need to be kept focused and prevented from leaping to premature conclusions or to making ‘helpful’ suggestions about strategy. Relationship aspects to the problem are explored. Metaphors and analogies are invited. How would a fly on the wall see your relationship? If you were alone together on a desert island, what would it be like? Impact of previous relationships/spillage from one relationship to another are explored. Eg what situation they are reminded of? For instance, does this situation remind you of any of those angry but helpless feelings you had with your other son when he was an adolescent? This provides opportunities to reflect on how emotions rub off on other people. The parent feels really frustrated, and on reflection we can see that so does the child System/Organisation factors (Family system/school and community systems and so on): What aspects help or hinder the problem? For instance, does the pastoral system of the local school provide space, or time and skilled personnel able to counsel this young person and work actively with their parents? Synthesis. At this stage the Graphic facilitator summarises what they have heard. They then go on to describe linkages and patterns in what they have heard. This can be very powerful. The person doing the graphic work has been able to listen throughout the presentation process and will have been struck by strong messages, emotions and images as they have arisen. The story and meaning of what is happening in the situation may become a little clearer at this point. Typical links may be ‘mirrored emotions’ strong themes such as loss and separation issues, or repeated processes such as actions triggering rejection. This step provides an excellent grounding for the next process of deepening understanding. What alternative strategies/interventions are open to be used? Brainstormed and recorded. ’Either/ors’ need to be avoided at this time also. This needs to be a shared session in which the family member who is presenting the concern contributes as much as anyone. Care is needed to ensure that this person is not overloaded with other people’s strategies. The final selection of strategy or strategies from the brainstormed list is the problem presenter’s choice. Strategies might include: a special time for the young person, a meeting with the child’s parents to explore how she is being managed at home and to share tactics, a home-school diary, counselling, or an agreed action plan that all are aware of, agreed sanctions and rewards and so forth. Strategies may productively involve processes of restitution and restoration, when ‘sorry’ is not enough. Making it right, rather than punishments or rewards, may then becomes the focus. First Steps. The problem presenter is finally asked to agree one or two first steps which they can carry out over the next 3-7 days. It can help to assign a ‘coach’ who will check in with them to ensure they have carried out the action they have named. This is a time to be very specific. Steps should be small and achievable. The person is just ‘making a start’. A phone call, or making an agreement with a key other person not present at the meeting would be ideal examples. Final reflections. Sometimes referred to as a ‘round of words’ help with closure for all involved. Reflections are on the process not the problem. In large families this is best done standing in a circle. In smaller groups all can remain sitting. Passing around a ‘listening stick’ or something similar such as a stone or light heighten the significance of the process ending and improve listening. Finally the problem presenter is handed the ‘Graphic’ this is their record of the meeting and can be rolled and presented ceremoniously by the facilitators for maximum effect! If you liked this course you may well like: Parent Solutions