About the technique: The Kusum Modak Method, previously referred to as Ayurvedic Yoga Massage (AYM), Traditional Ayurvedic Massage, or simply Ayurvedic Massage, is now named in honor of its creator. This change was introduced with the establishment of the Modak Institute, founded by Kusum Modak to preserve her legacy with integrity and authenticity for future generations. This contemporary method combines traditional Ayurvedic Massage with Yoga, developed through Kusum Modak’s studies with her teachers, Limaye and B. K. S. Iyengar, in Pune, India. The therapy focuses on activating breath, circulation, and vital energy through deep touch using hands and feet, along with tractions and stretching maneuvers. Treatments are conducted on an orthopedic mat using vegetable oil and a natural powder called Vekhand, derived from a root known in the West as Calamus. Course Information: Course Structure: Over 10 days, students will gain the knowledge and skills to practice the Kusum Modak MethodSM and become officially certified as bodywork therapists by the Modak Institute. The program includes: Students will cultivate a therapeutic perspective and build confidence in applying the technique. This course follows the updated guidelines set forth by Kusum Modak through the Modak Institute. Content: Total Hours: 80 hours of practical classes + 4 hours online + 12 hours assessment Duration: 10 days (in person classes) Dates: June 3rd to 7th and June 10th to 14th, 2025 Schedule: 9:00 AM to 1:00 PM and 2:00 PM to 6:00 PM Course Location: Roots of Respect, 16 Blenheim Terrace Woodhouse LS2 9HN United Kingdom Hands-on practical exercises Detailed technical understanding of the 118 maneuvers Dedicated time for questions, reviews, and session exchanges Introduction to the basics of the technique (structure & practice); Kusum Modak MethodSM history and influential contributors; Introduction of Ayurveda Principles; The elements of the Kusum Modak MethodSM - AYTM The steps of the therapy sequence; Learning to warm up the muscles; Use of hands and feet (walking on the back); Understanding the quality of the touch to perform Kusum Modak MethodSM; Using therapy props (why and when to use them); Manoeuvres and stretching – how to apply and its variations; Synchronisation of the pressure and breath; Learning to set up a 1-hour sequence (which is the original duration) that will serve the needs of each client; Applied anatomy to the technique and subtle anatomy, pathology and application of the studied content; Client Assessment protocols. Why the medical history form is essential?; Contraindications; Postural correction and student welfare practices (preparing the body for delivery) Assessment: We offer complementary activities designed to provide a deeper understanding of the Method and to help you develop a more precise approach to your practice. To be approved and certified, you must: You will receive clear instructions and guidance to help you succeed, as well as detailed information about the evaluation criteria. The 4 hours of online activities include complementary lectures and related assignments. - Anatomy - Demystifying the Kusum Modak Method - Holistic Medical Systems - SOAP notes and Health History form Certification: You have two options: Review with Q&A Supervised Practice (individual correction, gaining accuracy) How to maintain health + wellbeing as a bodywork therapist. Attend 100% of the in person classes. Submit 10 case studies on the same person, including reports for 10 SOAP notes. Provide a video recording of the final session. MODAK INSTITUTE CERTIFICATE: The Modak Institute certificate is awarded to students upon successful completion of the course, which includes final assessment activities to be submitted within 60 days after the in person training. This certificate is issued by the Modak Institute, the only institute officially authorized and endorsed by Master Kusum Modak to represent her method. It validates that students are fully qualified to work professionally with Prerequisites: While no formal prerequisites are required, physical, mental, and emotional health are essential to participate in the intensive activities. Students will also develop awareness to their clients’ needs and enhance their own mindfulness during practice. Training Price: Modak Institute Certificate: 1650 GBP Level 3 Diploma Kusum Modak Method: + 295 GBP Payment Plan 1 - 100% Payment upfront with discount (50 GBP off) until March 15th 2 - 50% deposit - 50% until May 20th 3 - 4x (Feb, Mar, Apr, May) 4 - 5x (Feb, Mar, Apr, May, Jun) Please feel free to reach out if you need to arrange your payments differently. Cancellation Policy the Kusum Modak MethodSM and ensures their eligibility to obtain therapist insurance, providing recognition and support to practice as certified therapists. Once your final assessment is evaluated and approved, your certificate will be issued and sent directly to your email. Each certificate includes a unique digital code, enabling easy verification of your credentials and affiliation worldwide through Modak Institute website. MODAK INSTITUTE CERTIFICATE + LEVEL 3 DIPLOMA KUSUM MODAK METHOD: Same process as described above + Students may request the UK Level 3 Diploma Kusum Modak Method Certificate for an additional fee of 295 GBP, which requires completing three additional online courses (150 hours) to meet accreditation requirements. The student must request this certificate option at the time of registration. What’s Included: About the teachers: Purnima Full refundable with in two months in advance Partial refundable 50% in a month before starting the training After that is a non-refundable payment. 84 hours of structured and methodically designed training (80 in person + 4 online). Note: the student need to reserve plus 12 hours for assessment. Modak Manual, including photos of all maneuvers and additional insights into the method’s history and references. Official Modak Institute Certification. Access to video lectures. Oil and powder for use during the course. One year of membership in the Modak Institute, including: Participation in an online plataform Access to official graphic materials for promotional use Inclusion in the Modak Institute’s agenda for work promotion Exclusive Q&A WhatsApp group moderate by Purnima and Julia.
Emotional Intelligence 1 Day Training in Leeds
Emotional Intelligence 1 Day Training in Wakefield
Emotional Intelligence 1 Day Training in Harrogate
Acceptance and Commitment Therapy (ACT) Package: Embrace Your True Self and Live Authentically Discover the transformative power of Acceptance and Commitment Therapy (ACT) with Miss Date Doctor’s specialized package. ACT is a cutting-edge form of therapy that helps you accept your thoughts and emotions while aligning your actions with your core values. Say goodbye to old patterns of avoidance and self-doubt, and embrace a life of psychological flexibility and authenticity. Our experienced therapists will guide you through targeted exercises and techniques that empower you to embrace discomfort, develop resilience, and make meaningful changes in your life. With the ACT package, you’ll find the courage to face challenges head-on, build stronger relationships, and achieve your personal and relationship goals. This comprehensive program will equip you with the tools needed to navigate life’s uncertainties and build a stronger, happier you. 3 X 1 HOUR SESSION https://relationshipsmdd.com/product/acceptance-and-commitment-therapy-package/
CWISA training course description This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. What will you learn Describe wireless networking and IoT technologies. Explain basic RF communications. Plan wireless solutions. Describe how to implement wireless solutions. Use best practices in implementing wireless solutions. CWISA training course details Who will benefit: Anyone working with IoT technologies. Prerequisites: RF fundamentals. Duration 4 days CWISA training course contents Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. Mobile communications networks Mobile networks, LTE, 5G, Use cases. Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.
IPsec training course description This hands on course focuses on IPsec VPNs. Rather than focusing on one implementation this course concentrates on the technologies and protocols of IPsec. Starting with an overview of the complete IPsec architecture the course then moves onto ESP packet analysis along with encryption and authentication provided. IKEv1 and IKEv2 are both covered in detail. Having covered IPsec with pre shared keys the course then moves onto IPsec with certificates followed by IPsec issues. The course is vendor neutral with hands on with both Cisco and Microsoft implementations. What will you learn Explain how IPsec works. Explain the role of AH, ESP and IKE. Configure IPsec. Troubleshoot IPsec. IPsec training course details Who will benefit: Technical staff working with IPsec. Prerequisites: Definitive IP VPNs for engineers. Duration 3 days IPsec training course contents What is IPsec? How to spell IPsec, IPsec is IP security, confidentiality, integrity, authenticity, replay protection, what is a VPN? Network layer security, IPsec and IPv4, IPsec and IPv6, the suite of protocols, the standard, IPsec RFCs, IPsec history. Hands on Analysis of 'normal' IP packets. IPsec architecture The IPsec protocols, AH vs ESP, Why two headers? transport mode, tunnel mode, Remote access VPNs, site to site VPNs, security associations, SA database, Security Parameters Index, implementations: Host tack, Bump in the Stack, Bump in the Wire. Hands on Configuring IPsec. AH What AH does, the stack, The AH header, What is authenticated? Device authentication. AH in transport mode, AH in tunnel mode. Hands on AH packet analysis. ESP What ESP does, the ESP header, ESP in transport mode, ESP in tunnel mode, ESP and SA, ESP and SPI. Hands on ESP packet analysis, policy configuration. IPsec encryption IPsec is a framework, standard algorithms, ESP keys, the role of IKE, key lifetimes, how IKE generates the keys, DES, 3DES, AES, cipher block chaining, counter mode, other encryption. Hands on Encryption configuration. IPsec authentication Authentication types, IPsec authentication, Authentication algorithms: MD5, keyed SHA-1, HMAC-MD5, HMAC-SHA-1, HMAC-RIPEMD, other authentication algorithms. Hands on Authentication configuration. IKE Internet Key Exchange, IKE and the SAD, the two phase negotiation, ISAKMP, ISAKMP header, pre shared keys, digital signatures, public key encryption, Diffie Hellman, proposals, counter proposals, nonces, identities, phase 1 negotiation: main mode, aggressive mode, base mode. Phase 2 negotiation: quick mode, new group mode. Hands on IKE packet analysis. More IKE PFS, IKE and dynamic addresses, XAUTH, hybrid authentication, CRACK, ULA, PIC. User level authentication. IKE renegotiation, heartbeats. Hands on Troubleshooting IPsec. IKEv2 The IKEv2 exchange, IKE_SA_INIT, IKE_AUTH, CREATE_CHILD_SA, IKEv2 packets, the informational exchange. Comparing IKev1 vs IKE v2. Hands on IKEv2 configuration and analysis. PKI What is PKI?, Digital certificates, Certificate authorities, CA servers, RA, VA, certificates, CA hierarchy, CRLs, certificate formats. Hands on installing and configuring certificate servers. IPsec issues NAT, IPsec overhead and fragmentation. Summary IPsec strengths and weaknesses. Where to get further information.
Build confidence & capability and engage in meaningful dialogue about race.
This interactive programme will use the topic of equity, diversity, and inclusion to illustrate the problem of unconscious bias and the practical solutions to overcome it. The programme will provide the opportunity for self-reflection, open discussion, and training on some of the softer skills to maximise objectivity in the workplace.
4G & 5G Roaming Scenarios & Procedures course description This course is designed to explain the roaming procedures of modern mobile networks, based on the GSMA roaming specification the course explains all scenarios where a mobile subscriber may find themselves whilst visiting a preferred mobile network partner. Interconnection between MNOs and the use of GRX & IPX as an interworking process. The course will work through the registration & authentication procedure, download of the user profile, the APN configuration & DIAMETER process to verify user authenticity. VoLTE roaming and IMS registration procedures for voice support & SMS delivery will be discussed and explained. What will you learn Architecture Models Technical requirements for interfaces - 4G Roaming Scenarios Technical requirements & recommendations for services Other Technical Requirements & Recommendations Technical Requirements for QoS support Technical Requirements & Recommendations for Interfaces - 5G Scenarios Technical Requirements & Recommendations for Interworking & Coexistence with E-UTRAN & EPC Technical Requirements & Recommendations for Services Other Technical Requirements & Recommendations 4G & 5G Roaming Scenarios & Procedures course details Who will benefit: Those working in mobile networks. Prerequisites: None. Duration 3 days 4G & 5G Roaming Scenarios & Procedures course contents Architecture Models 4G Evolved Packet System 5G Core Network SGs Interface for CSFB& SMS over SGs Technical Requirements for Interfaces - 4G Roaming Scenarios General requirements for inter-PLMN interfaces Stream Control Transmission Protocol (SCTP) IAMETER S8 Interface SGW selection PGW selection GTP Transport Layer engineering S9 interface Implementation requirements Guidelines for DIAMETER over S9 S6a & S6d interface Gy interface Guidelines for DIAMETER over Gy Legacy interworking scenarios VPLMN has not implemented LTE HPLMN has not implemented LTE Co-existence scenarios Possible scenarios 2G/3G roaming agreement only 2G/3G LTE roaming agreement LTE roaming registrations Consequences of different APN approaches when roaming Guidance regarding the APN approach when roaming Inter-RAT handover Handover & access restrictions to/from 2G/3G & LTE (Active mode) Access restriction for 2G/3G and/or LTE (Idle mode) Handover of PDN Connections between GERAN/UTRAN & LTE Handover to/from non-3GPP accesses & LTE Bandwidth considerations ARP considerations at handover from LTE to 2G/3G Tech requirements & recommendations for Services SMS SMS over SGs Voice CSFB Roaming retry for CSFB Roaming Forwarding for CSFB Coexistence of Roaming Forwarding & Roaming Retry Recommended procedures IMS Voice Roaming Architecture Other Technical Requirements & Recommendations Access Control Addressing APN for IMS based services IMS Well Known APN APN for Home Operator Services Gateway Selection Inter-PLMN roaming handover Data off related functionality Emergency Services Emergency PDN connectivity Emergency Call indicator Security GTP Security DIAMETER Security DIAMTER Roaming hubbing Default APN E-UTRA NR Dual Connectivity with EPC GW Selection for E-UTRA-NR Dual Connectivity TAC/LAC Restriction Guidelines Technical Requirements for QoS support QoS parameters definition QoS Management in the Home Routed architecture QoS control for IMS APN in the S8HR architecture Support of QoS in GRX/IPX QoS Control in Local Breakout architecture Technical Requirements & Recommendations for Interfaces - 5G Scenarios General requirements for inter-PLMN interfaces Transport protocol - TCP/IP Serialisation protocol - JSON Interface Definition language - OpenAPI Application Protocol - HTTP2 Inter-PLMN (N32) Interface N32c N32f ALS & IPX HTTP Proxy SMF & UPF in HPLMN & VPLMN Requirements related to Service Based Architecture Naming, addressing & routing for 5G SA roaming SEPP load distribution SEPP administration, naming convention & routing SEPP HTTP redirections Technical Requirements & Recommendations for Interworking & Coexistence with E-UTRAN & EPC Interworking scenarios Coexistence scenarios Inter-RAT Handover Handover & Access restriction between 5GC & EPC Technical Requirements & Recommendations for Services Network slicing Voice, Video & Messaging Location support UE Route Selection Policy Other Technical Requirements & Recommendations Access control IP Addressing DNN for IMS based services Emergency PDU Session Emergency Services Fallback Security Steering of Roaming in 5GS Technical Requirements for QoS support 5G QoS model 5G QoS profile QoS Control