A 1-day course open to anyone wishing to explore the use of therapeutic touch to enhance wellbeing and improve engagement with a person living with dementia on their terms and with dignity. We’ll cover specialist massage techniques on easily accessible areas of the body i.e. the arms, hands and face with a view to meeting needs and facilitating expressing emotions in a dementia friendly way. We’ll explore the intricacies of consent, how the law impacts us and the benefits of massage so you can sell your service well all through a trauma informed lens. We’ll take a look at how the brain is impacted by dementia to understand certain behaviours and then focus on compassionate communication giving you immediately useable tools to connect without words and traverse the rocky road of relationships with your loved one or client more smoothly. “When words escape us, touch says it all.” No qualifications needed – just hands and an open heart. * Learn innovative, progressive & advanced specialist techniques to connect with compassion * Improve communication and fulfil unmet needs with practical tools & skills * Explore ways of communicating and easing anxiety and reducing medication needs through nuturing touch. * Provide meaningful engagement through truly “person centred” & “holistic” approaches * Increase confidence & competence working in this field * For qualified bodywork therapists, carers, family, friends & dementia professionals For more details on course content, please see frequently asked questions. CORNWALL: You can book both the Massaging Persons Living with Dementia course, 0n October 18, 2024, and course and the Aromatherapy for Persons Living with Dementia course, on October 19, 2024, as a package for £350 (a saving of £50) – please choose the option on the checkout. BRISTOL: You can book both the Massaging Persons Living with Dementia course, 0n March 13, 2024, and course and the Aromatherapy for Persons Living with Dementia course, on March 14, 2024, as a package for £350 (a saving of £50) – please choose the option on the checkout. 1-1 TRAINING 1-1 training may be preferable because you would like a personal touch, 1-1 is your preferred style of learning or one of the planned dates does not suit you. 1-1 training provides you with flexibility of training to suit your specific needs and goals. Please click on the 1-1 training button. It is a good idea to get in touch 1st so that you can confirm a date that is suitable for us both. You can book one-toone training here or by contacting Nicolle by email After successfully completing the course, either in a group or 1-1, qualified therapists will gain CPD points with one or more of the professional bodies. Carers and other professionals will receive a certificate of attendance. ‘The course was far wider than just massage and I have been trying things out with the dementia people in one of the care homes I visit with remarkable results. One lady who just sits and does not interact with anyone happily told us all about the war and what Windsor was like when she was a young girl’ JC, Massage Therapist, Fleet, Hants “An opportunity to learn how to enable people who have dementia feel comfortable about having massage & nurturing touch, learning specialist techniques that reflect understanding the world from your client or loved one’s perspective.”
PRINCE2® Practitioner : In-House Training Projects fail for a variety of reasons including poor planning, lack of defined quality criteria, poor understanding of the business drivers, inadequate control, and lack of senior management involvement in other words, lack of a structured best practice approach to project delivery. PRINCE2® (6th Edition is the current version) is a structured, process-based approach for project management providing a methodology which can be easily tailored and scaled to suit all types of projects. It is the de facto standard for project management in the UK Government and is also used extensively in more than 150 countries worldwide with in excess of 20,000 organizations already benefitting from its powerful approach. It can be used easily in combination with PMI®'s PMBOK® Guide to provide a robust project methodology, or to augment an existing PMBOK®-based methodology with additional rigor around areas such as Quality, Organization, and Benefits Realization. The goals of this course are to take participants to the next level of understanding and application of the PRINCE2® methodology and to prepare them to sit the Practitioner exam. Using APMG provided sample exam papers and additional project case studies, participants will learn how to apply what they learned during the Foundation course and how to approach the OTE Practitioner exam, which is aimed at testing their ability to apply PRINCE2® in an actual project environment simulated via a case study provided as part of the exam. What you will Learn You'll learn how to: Tailor and apply the principles, themes, process structure, techniques, and management products of PRINCE2® within a work environment, via carefully selected case studies Define the PRINCE2® 6th Edition method at the Practitioner level Prepare for and take the Practitioner exam Getting Started Introductions Course structure Course goals and objectives Tailoring PRINCE2® Tailoring PRINCE2® Adopting PRINCE2® Tailoring PRINCE2® to suit different projects Adopting PRINCE2® in an organizational environment Controlled Start Recap management products Study business case and risk Study activities and responsibilities in: Starting up a project Initiating a project Controlled Progress Study management products and risk Study activities and responsibilities in: Getting work done Monitoring and reporting Issues and escalation Controlled Close Study Activities and Responsibilities in Closing a Project Activities and roles Roles and Responsibilities Principles Exercise Product-basedPlanning Producing a product breakdown structure (PBS) Producing a product flow diagram (PFD) Linking product breakdown structures and product flow diagrams to product descriptions
Gain comprehensive training in safe holding techniques for medical procedures with our "Clinical Safe Holding Techniques" course. Ensure procedural success and prevent injuries to patients and healthcare providers.
Gain a comprehensive understanding of positive behavior support principles, strategies, and techniques with our course. Ideal for educators, caregivers, and professionals working with individuals with developmental disabilities, mental health issues, or behavioral challenges.
Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.
Regular expressions training course description Regular expressions are an extremely powerful tool for manipulating text and data. They are now standard features in a wide range of languages and popular tools, including Python and MySQL. Regular expressions allow you to code complex and subtle text processing that you never imagined could be automated. Once you've mastered regular expressions, they'll become an invaluable part of your toolkit. You will wonder how you ever got by without them. What will you learn Use Regular Expressions. Troubleshoot Regular Expressions. Compare RE features among different versions. Explain how the regular expression engine works. Optimize REs. Match what you want, not what you don't want. Regular expressions training course details Who will benefit: Anyone looking to use regular expressions. Prerequisites: None. Duration 1 day Regular expressions training course contents Introduction to Regular Expressions Solving real problems, REs as a language, the filename analogy, language analogy, RE frame of mind, searching text files: egrep, egrep metacharacters, start and end of the line, character classes, matching any character with dot, alternation, ignoring differences in capitalization, word boundaries, optional items, other quantifiers: repetition, parentheses and backreferences, the great escape, expanding the foundation, linguistic diversification, the goal of a RE, more examples, RE nomenclature, Improving on the status quo. Extended introductory examples A short introduction to Perl, matching text with regular expressions, toward a more real-world example, side effects of a successful match, Intertwined regular expression, intermission, modifying text with regular expressions, example: form letter, example: prettifying a stock price, automated editing, a small mail utility, adding commas to a number with lookaround, text-to-HTML conversion, that doubled-word thing. Regular expression features and flavours The regex landscape, origins of REs, care and handling of REs, Integrated handling, procedural and object-oriented handling, search-and-replace example. strings character encodings and modes, strings as REs, character-encoding issues, unicode, regex modes and match modes, common metacharacters and features, character representations, character classes and class-like constructs, anchors and other 'zero-width assertions', comments and mode modifiers, grouping capturing conditionals and control. The mechanics of expression processing Two kinds of engines, new standards, regex engine types, from the department of redundancy department, testing the engine type, match basics, about the examples, rule 1: the match that begins earliest wins, engine pieces and parts, rule 2: the standard quantifiers are greedy, regex-directed versus text-directed, NFA engine: regex-directed, DFA engine: text-directed, first thoughts: NFA and DFA in comparison, backtracking, two important points on backtracking, saved states, backtracking and greediness, more about greediness and backtracking, problems of greediness, multi-character 'quotes', lazy quantifiers, greediness and laziness, laziness and backtracking, possessive quantifiers and atomic grouping, possessive quantifiers ?, +, *+, ++ and {m,n}+, the backtracking of lookaround, is alternation greedy? taking advantage of ordered alternation, NFA DFA and posix, the longest-leftmost', posix and the longest-leftmost rule, speed and efficiency. Practical regex techniques Continuation lines, matching an IP address, working with filenames, matching balanced sets of parentheses, watching out for unwanted matches, matching delimited text, knowing your data and making assumptions, stripping leading and trailing whitespace, matching and HTML tag, matching an HTML link, examining an HTTP URL, validating a hostname, plucking a hostname, plucking a URL, parsing CSV files. Crafting an efficient expression Efficiency vs. correctness, localizing greediness, global view of backtracking, more work for POSIX NFA, work required during a non-match, being more specific, alternation can be expensive, benchmarking, know what you re measuring, benchmarking with Python, common optimisations, the mechanics of regex application, pre-application optimizations, optimizations with the transmission, optimization of the regex itself, techniques for faster expressions, common sense techniques, expose literal text, expose anchors, lazy versus greedy: be specific, split into multiple REs, mimic initial-character discrimination, use atomic grouping and possessive quantifiers, lead the engine to a match, unrolling the loop, observations, using atomic grouping and possessive quantifiers, short unrolling examples, unrolling C comments, the free flowing regex, a helping hand to guide the match, a well-guided regex is a fast regex.
Peering at LINX training course description A one or two day induction course covering the technical procedures of LINX along with correct interaction with LINX and LINX members. This course focuses on the implementation of the technologies within the LINX network. For those already competent in BGP the one day version of this course is sufficient. What will you learn Explain the role of LINX in the Internet. Correctly connect to LINX. Recognise the correct procedures for peering at LINX. Use the current Best Current Practices. Peering at LINX training course details Who will benefit: Technical staff of new LINX members. Technical staff of companies preparing to join LINX. Non technical staff may also benefit from this course. Prerequisites: None. (For technical staff with BGP knowledge 1 day) Duration 1 to 2 days Peering at LINX training course contents Introduction and review Networks, The Internet, IP, routers, Autonomous systems, the structure of the Internet, the role of Internet Exchanges. BGP and peering. LINX, EuroIX, RIPE. What you get when you join LINX. LINX products: Connexions, Virtual PoPs, Colocation resales, LINX from anywhere. LINX infrastructure The original architecture, The growth of LINX, the current topology. LINX London locations. Dual LAN topology. LON1, LON2. Use of MPLS to connect London sites. Regional peering: LINX NoVa, LINX Manchester, LINX Wales, LINX Scotland, ManxIX, JEDIX. Connecting with LINX nnecting with LINX Locations. 1/10/100/400G. Interface specifications. Link aggregation. The racks and space provided, access to the racks, connecting WAN circuits into LINX. The connection form, How to link your ISP with LINX, switch assignments, limits on traffic, average measured traffic, getting statistics from LINX, Using looking glass. Allowed traffic. Port security Configuration hints LINX IP details, IPv4, IPv6, PTR records, Cisco base configuration, Juniper base configuration. Peering with other LINX members Preparing for peering, the peering template, setting up the peering, RFC 2142, the RIPE database, contacts, peeringdb.net, solving downed BGP sessions, escalation procedures. Peering configuration hints Cisco BGP configuration, Juniper BGP configuration. LINX additional services Private interconnect, LINX time service. NTP, Strata. The LINX route server Bi lateral peering, Multi lateral peering. How the LINX route server is configured. Use of communities on the route server, template for peering with the route server. Summary Getting further information, the LINX website, the LINX mailing lists.
Self esteem building Improve social anxiety Learning what to say and do in text and dates Education on modern dating techniques Online messages formatting and wording Confidence Coaching Online dating tips Online dating Coaching with your own personal dating coach Kino escalation Introspection and characteristic testing https://relationshipsmdd.com/product/online-dating-coaching-package/
Enhance your knowledge and skills in pressure area care with our comprehensive course. Ideal for healthcare professionals, caregivers, and nurses.