We couldn't find any listings for your search.
Know someone teaching this? Help them become an Educator on Cademy.
Acceptance and Commitment Therapy (ACT) Package: Embrace Your True Self and Live Authentically Discover the transformative power of Acceptance and Commitment Therapy (ACT) with Miss Date Doctor’s specialized package. ACT is a cutting-edge form of therapy that helps you accept your thoughts and emotions while aligning your actions with your core values. Say goodbye to old patterns of avoidance and self-doubt, and embrace a life of psychological flexibility and authenticity. Our experienced therapists will guide you through targeted exercises and techniques that empower you to embrace discomfort, develop resilience, and make meaningful changes in your life. With the ACT package, you’ll find the courage to face challenges head-on, build stronger relationships, and achieve your personal and relationship goals. This comprehensive program will equip you with the tools needed to navigate life’s uncertainties and build a stronger, happier you. 3 X 1 HOUR SESSION https://relationshipsmdd.com/product/acceptance-and-commitment-therapy-package/
CWISA training course description This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. What will you learn Describe wireless networking and IoT technologies. Explain basic RF communications. Plan wireless solutions. Describe how to implement wireless solutions. Use best practices in implementing wireless solutions. CWISA training course details Who will benefit: Anyone working with IoT technologies. Prerequisites: RF fundamentals. Duration 4 days CWISA training course contents Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. Mobile communications networks Mobile networks, LTE, 5G, Use cases. Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.
Build confidence & capability and engage in meaningful dialogue about race.
IPsec training course description This hands on course focuses on IPsec VPNs. Rather than focusing on one implementation this course concentrates on the technologies and protocols of IPsec. Starting with an overview of the complete IPsec architecture the course then moves onto ESP packet analysis along with encryption and authentication provided. IKEv1 and IKEv2 are both covered in detail. Having covered IPsec with pre shared keys the course then moves onto IPsec with certificates followed by IPsec issues. The course is vendor neutral with hands on with both Cisco and Microsoft implementations. What will you learn Explain how IPsec works. Explain the role of AH, ESP and IKE. Configure IPsec. Troubleshoot IPsec. IPsec training course details Who will benefit: Technical staff working with IPsec. Prerequisites: Definitive IP VPNs for engineers. Duration 3 days IPsec training course contents What is IPsec? How to spell IPsec, IPsec is IP security, confidentiality, integrity, authenticity, replay protection, what is a VPN? Network layer security, IPsec and IPv4, IPsec and IPv6, the suite of protocols, the standard, IPsec RFCs, IPsec history. Hands on Analysis of 'normal' IP packets. IPsec architecture The IPsec protocols, AH vs ESP, Why two headers? transport mode, tunnel mode, Remote access VPNs, site to site VPNs, security associations, SA database, Security Parameters Index, implementations: Host tack, Bump in the Stack, Bump in the Wire. Hands on Configuring IPsec. AH What AH does, the stack, The AH header, What is authenticated? Device authentication. AH in transport mode, AH in tunnel mode. Hands on AH packet analysis. ESP What ESP does, the ESP header, ESP in transport mode, ESP in tunnel mode, ESP and SA, ESP and SPI. Hands on ESP packet analysis, policy configuration. IPsec encryption IPsec is a framework, standard algorithms, ESP keys, the role of IKE, key lifetimes, how IKE generates the keys, DES, 3DES, AES, cipher block chaining, counter mode, other encryption. Hands on Encryption configuration. IPsec authentication Authentication types, IPsec authentication, Authentication algorithms: MD5, keyed SHA-1, HMAC-MD5, HMAC-SHA-1, HMAC-RIPEMD, other authentication algorithms. Hands on Authentication configuration. IKE Internet Key Exchange, IKE and the SAD, the two phase negotiation, ISAKMP, ISAKMP header, pre shared keys, digital signatures, public key encryption, Diffie Hellman, proposals, counter proposals, nonces, identities, phase 1 negotiation: main mode, aggressive mode, base mode. Phase 2 negotiation: quick mode, new group mode. Hands on IKE packet analysis. More IKE PFS, IKE and dynamic addresses, XAUTH, hybrid authentication, CRACK, ULA, PIC. User level authentication. IKE renegotiation, heartbeats. Hands on Troubleshooting IPsec. IKEv2 The IKEv2 exchange, IKE_SA_INIT, IKE_AUTH, CREATE_CHILD_SA, IKEv2 packets, the informational exchange. Comparing IKev1 vs IKE v2. Hands on IKEv2 configuration and analysis. PKI What is PKI?, Digital certificates, Certificate authorities, CA servers, RA, VA, certificates, CA hierarchy, CRLs, certificate formats. Hands on installing and configuring certificate servers. IPsec issues NAT, IPsec overhead and fragmentation. Summary IPsec strengths and weaknesses. Where to get further information.
This interactive programme will use the topic of equity, diversity, and inclusion to illustrate the problem of unconscious bias and the practical solutions to overcome it. The programme will provide the opportunity for self-reflection, open discussion, and training on some of the softer skills to maximise objectivity in the workplace.
4G & 5G Roaming Scenarios & Procedures course description This course is designed to explain the roaming procedures of modern mobile networks, based on the GSMA roaming specification the course explains all scenarios where a mobile subscriber may find themselves whilst visiting a preferred mobile network partner. Interconnection between MNOs and the use of GRX & IPX as an interworking process. The course will work through the registration & authentication procedure, download of the user profile, the APN configuration & DIAMETER process to verify user authenticity. VoLTE roaming and IMS registration procedures for voice support & SMS delivery will be discussed and explained. What will you learn Architecture Models Technical requirements for interfaces - 4G Roaming Scenarios Technical requirements & recommendations for services Other Technical Requirements & Recommendations Technical Requirements for QoS support Technical Requirements & Recommendations for Interfaces - 5G Scenarios Technical Requirements & Recommendations for Interworking & Coexistence with E-UTRAN & EPC Technical Requirements & Recommendations for Services Other Technical Requirements & Recommendations 4G & 5G Roaming Scenarios & Procedures course details Who will benefit: Those working in mobile networks. Prerequisites: None. Duration 3 days 4G & 5G Roaming Scenarios & Procedures course contents Architecture Models 4G Evolved Packet System 5G Core Network SGs Interface for CSFB& SMS over SGs Technical Requirements for Interfaces - 4G Roaming Scenarios General requirements for inter-PLMN interfaces Stream Control Transmission Protocol (SCTP) IAMETER S8 Interface SGW selection PGW selection GTP Transport Layer engineering S9 interface Implementation requirements Guidelines for DIAMETER over S9 S6a & S6d interface Gy interface Guidelines for DIAMETER over Gy Legacy interworking scenarios VPLMN has not implemented LTE HPLMN has not implemented LTE Co-existence scenarios Possible scenarios 2G/3G roaming agreement only 2G/3G LTE roaming agreement LTE roaming registrations Consequences of different APN approaches when roaming Guidance regarding the APN approach when roaming Inter-RAT handover Handover & access restrictions to/from 2G/3G & LTE (Active mode) Access restriction for 2G/3G and/or LTE (Idle mode) Handover of PDN Connections between GERAN/UTRAN & LTE Handover to/from non-3GPP accesses & LTE Bandwidth considerations ARP considerations at handover from LTE to 2G/3G Tech requirements & recommendations for Services SMS SMS over SGs Voice CSFB Roaming retry for CSFB Roaming Forwarding for CSFB Coexistence of Roaming Forwarding & Roaming Retry Recommended procedures IMS Voice Roaming Architecture Other Technical Requirements & Recommendations Access Control Addressing APN for IMS based services IMS Well Known APN APN for Home Operator Services Gateway Selection Inter-PLMN roaming handover Data off related functionality Emergency Services Emergency PDN connectivity Emergency Call indicator Security GTP Security DIAMETER Security DIAMTER Roaming hubbing Default APN E-UTRA NR Dual Connectivity with EPC GW Selection for E-UTRA-NR Dual Connectivity TAC/LAC Restriction Guidelines Technical Requirements for QoS support QoS parameters definition QoS Management in the Home Routed architecture QoS control for IMS APN in the S8HR architecture Support of QoS in GRX/IPX QoS Control in Local Breakout architecture Technical Requirements & Recommendations for Interfaces - 5G Scenarios General requirements for inter-PLMN interfaces Transport protocol - TCP/IP Serialisation protocol - JSON Interface Definition language - OpenAPI Application Protocol - HTTP2 Inter-PLMN (N32) Interface N32c N32f ALS & IPX HTTP Proxy SMF & UPF in HPLMN & VPLMN Requirements related to Service Based Architecture Naming, addressing & routing for 5G SA roaming SEPP load distribution SEPP administration, naming convention & routing SEPP HTTP redirections Technical Requirements & Recommendations for Interworking & Coexistence with E-UTRAN & EPC Interworking scenarios Coexistence scenarios Inter-RAT Handover Handover & Access restriction between 5GC & EPC Technical Requirements & Recommendations for Services Network slicing Voice, Video & Messaging Location support UE Route Selection Policy Other Technical Requirements & Recommendations Access control IP Addressing DNN for IMS based services Emergency PDU Session Emergency Services Fallback Security Steering of Roaming in 5GS Technical Requirements for QoS support 5G QoS model 5G QoS profile QoS Control
Experience transformative relationship counselling tailored specifically for singles with our exceptional package: “Relationship Counselling for Singles with Miss Date Doctor.” Discover the power of self-discovery, personal growth, and fostering healthy connections under the expert guidance of Miss Date Doctor, a renowned relationship coach. In this comprehensive package, you’ll embark on a journey of self-exploration and gain invaluable insights to enhance your dating life and prepare yourself for meaningful relationships. Our specialized approach focuses on addressing the unique challenges faced by singles in their pursuit of love and companionship. Here’s what our “Relationship Counselling for Singles with Miss Date Doctor” package Self-Discovery and Relationship Readiness Assessment: Gain a deep understanding of yourself, your values, and your relationship goals. Explore topics like self-reflection, self-awareness, and relationship readiness to align your desires with your personal growth journey. Building Confidence and Self-Esteem: Boost your confidence and develop a positive self-image. Discover strategies for overcoming insecurities and self-doubt while embracing your unique qualities. Learn and gain insight on “self-confidence exercises,” “building self-esteem,” and “self-empowerment techniques.” Effective Communication Skills: Master the art of communication to establish meaningful connections. Learn active listening techniques, assertiveness, and non-verbal communication skills. In depth coaching on the following areas “effective conversation skills,” “empathetic listening,” and “non-verbal cues in dating.” Understanding Relationship Patterns: Uncover patterns that may be hindering your dating success. Gain insights into attachment styles, relationship dynamics, and common pitfalls in dating. Explore related topics like “attachment theory,” “relationship patterns,” and “identifying toxic relationships.” Overcoming Dating Challenges: Tackle common dating obstacles with resilience and grace. Learn how to navigate rejection, deal with online dating fatigue, and manage expectations. We also teach you how to be better at “handling dating rejection,” “managing online dating burnout,” and “maintaining realistic dating expectations.” Developing Healthy Boundaries: Establish clear boundaries to protect your emotional well-being. Understand the importance of self-care, setting limits, and maintaining a healthy work-life-dating balance. Explore the following areas such as “self-care practices,” “boundary-setting in relationships,” and “maintaining work-life balance.” With our “Relationship Counselling for Singles with Miss Date Doctor” package, you’ll gain the tools and guidance necessary to navigate the dating world with confidence, authenticity, and a deeper understanding of yourself and your desires. Invest in your personal growth, enhance your dating experiences, and set the foundation for fulfilling relationships. Enroll in our transformative “Relationship Counselling for Singles with Miss Date Doctor” package today and embark on a journey toward lasting love and happiness. 3 sessions x 1 hour https://relationshipsmdd.com/product/relationship-counselling-for-singles-package/
In a world focused on digital media, 24-hour news channels and social channels, it’s really important to communicate with your audience – there are lots of opportunities to do this if you are interviewed by journalists. There’s the chance to deliver expert comments or take part in in-depth features or give a quote about your business or organisation. The media wants to stay relevant and engaged with its audience and you can play a part in that and talk to your audience. In our Broadcast Media Training Courses, we will teach you the best ways to share your story, how to answer those difficult questions and present yourself with confidence and style. This means you will capitalise on every opportunity. Our broadcast media and media interview training courses include: Crisis Media Training Benefits There are many reasons why businesses and organisations suddenly find themselves trending on social media or being talked about in the broadcast media. When something goes wrong, your every move is watched and then commented on online, putting you and your teams under even more pressure. So if the worst should happen and you find yourself or your company or business suddenly in the public eye, you need to be prepared. We’ll help you learn how to manage your response ensuring clarity and confidence. It’s vital you don’t leave a vacuum for others to fill so let us help you respond effectively. Why would I ever need Crisis Training? Brand reputation is the most important asset we have in the digital media age. Audiences want to engage with organisations which have credibility and authenticity. A crisis – not always of your making – can quickly undermine that if it’s handled badly. Communication is at the heart of crisis media training and we can show you how to deal with a wide range of situations, address concerns and criticism and ensure your message reaches audiences under the most pressured circumstances. Who needs to attend the training? Crisis Media Training isn’t just for the most senior CEO’s or Managing Directors. In order to support the authenticity of your response it’s important the people on the ground can talk to the public. And in the age of social media, if you’re talking to the public, you’re talking to the media. So the people dealing with the crisis are the people who should know how to communicate in a crisis. There are times when the top bosses must talk as they are accountable and are happy to demonstrate that level of responsibility. But the media will also ask to talk to the people handling the problem and we can show them how. How do I book Crisis Media Training? We can help you create the perfect training to stress test your messaging and make sure you’re ready to deliver your message if you find yourselves unexpectedly in the news. We’ll help you deal with challenging questions and diffuse the most tense of interviews. But our main criteria is that we design the training you want so we’ll work with you to create the perfect course. All you have to do is give one of our friendly team a ring on 0754 533 4269 or email us.
Simply speaking, Life Coaching is about raising awareness of how we can move from A to B. Sometimes we don't know what place B is, and we can use Coaching to gain clarity on what B looks and feels like. Life Coaching is non-directive, which means as a Coach, I help you to unlock your potential rather than tell you what to do. The experience creates a space for accountability and motivation to take positive action. My role as your Holistic Coach is to provide you with a safe space for you to ground, explore & embrace your emotions, claim your personal power to design & live your dream life.