• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

994 Memory courses in Lees delivered Online

The Immediate Care Process

By Simon Lee Maryan Lt

The Negative Thought Pattern Interrupt does exactly what it says Course curriculum 1 Welcome to the course! Welcome from Simon Lee Maryan, Course Creator What is the Immediate Care Process? CPD Accreditation About the Course Creator How to Navigate this course What Are Your Initial Outcomes Individual Change Readiness Assess 2 Part 1 - Theory Part 1 - Introduction Video 3 Bonus Module 1: Psychological and Physiological Effects of Stress Lesson BM1.1: Stress and Work Lesson BM1.2: Types of Stress and Causes Lesson BM1.3: Physical Effects of Stress - Musculoskeletal Lesson BM1.4: Physical Effects of Stress - Respiratory Lesson BM 1.5: Physical Effects of Stress - Cardiovascular Lesson BM 1.6: Physical Effects of Stress - Endocrine Lesson BM 1.7: Physical Effects of Stress - Gastrointestinal Lesson BM 1.8: Physical Effects of Stress - Nervous Lesson BM 1.9 - Psychological Effects of Stress 4 Bonus Module 2: Psychological and Physiological Effects of Fatigue Lesson BM 2.1: Definition of Fatigue Lesson BM 2.2: Types of fatigue and Causes Lesson BM 2.3: Psychological Effects of Fatigue Lesson BM 2.4: Methods to Manage Stress and Fatigue 5 Module 1: Foundation Theory Lesson 1.1: The Principles for Success Lesson 1.2: Creating Outcomes with Positive Effect Lesson 1.3: Cause and Effect Lesson 1.4: The Mind-Body Connection Lesson 1.5: Neurological Connections Lesson 1.6: The Presuppositions for Life 6 Module 2: Communication Principles and Skills Module 2: Introduction Video Lesson 2.1: A Communication Model Lesson 2.2: Observing Body Language and Non-Verbal Communication Lesson 2.2.1: Behavioural Profiling Aide Memoire Lesson 2.2.2: Basic Behavioural Profiling Exercises Lesson 2.3: Rapport - What is it, how do we build and maintain it? Lesson 2.4: Our Senses and Language Lesson 2.4.1: Exercise - Sensory Preference Lesson 2.4.1 - Exercise Worksheet Lesson 2.5: Predicate Language Module 2 Assessment 7 Module 3: The Limbic System, Memory and Brain Activity Lesson 3.1: How the Limbic System Affects Memory Lesson 3.1.1: Memory Graphics - Downloads Lesson 3.2: Perceptual Blindness and Conscious Overload Lesson 3.3: Brain Activity and Brain Waves Lesson 3.4: Circadian Rhythm Lesson 3.4.1: Exercise Worksheet - Sleep Diary Lesson 3.5:Ultradian Rhythm Module 3 Assessment 8 Module 4: Influences on Your State of Mind, Emotions, Beliefs and Decisions Lesson 4.1: Influences on Your State of Mind Lesson 4.2: Emotional Response vs Decisions Lesson 4.3: Beliefs Lesson 4.4: Identifying Limiting Beliefs Lesson 4.4.1: Exercise Worksheet - Identify Your Limiting Beliefs Lesson 4.5: Limiting Beliefs - Framing Principle, Frame of Reference Lesson 4.5.1: Reframing, Schemas, Meaning Lesson 4.5.2 - Exercise Worksheet - Identify Your Frames of Reference, Schemas and Meaning Lesson 4.6: Values Lesson 4.6.1: Values Exercise Video Explanation Lesson 4.6.1 - Values Exercise WorkSheet Lesson 4.6.2: Beliefs Behind Your Values Video Explanation Lesson 4.6.2 - Exercise Worksheet 2 - Beliefs Behind Your Values Module 4 Assessment 9 Module 5: Behavioural Change Module 5: Introduction Video Lesson 5.1: The Behavioural Change Learning Cycle Behavioural Change Learning Cycle - Video Explanation Behavioural Change Learning Cycle PDF Lesson 5.2: The Intentional Change Model Lesson 5.2.1: Reflective Exercise - Who Helped Me and Who Tried Lesson 5.3: The Intentional Change Model Cont. Module 5 Assessment 10 Part 2 - Techniques Part 2 - Techniques Introduction 11 Module 6: Negative Thought Pattern Interrupt Lesson 6.1: Negative Thought Pattern Interrupt - What Is It? Lesson 6.2: NTPI - The Process Overview Lesson 6.3: NTPI - The Process in Detail Lesson 6.4: NTPI - Live Video Demo with Client 12 Module 7: The Whole Brain State Lesson 7.1: The Whole Brain State (WBS) - Description Lesson 7.2: WBS - The Process Lesson 7.3: The Whole Brain State - Live Video Demo with Client 13 Module 8: Anchoring Lesson 8.1: Brief History of Anchoring Lesson 8.2: Uses of Anchoring Lesson 8.4.1: Icarus Anchoring Process - PDF Download Lesson 8.4: The Anchoring Process Lesson 8.5: Anchoring - Live Video Demo with Client Lesson 8.6: Hot to Bring All Three Techniques Together 14 Bonus Module 3: Personal Needs Lesson B3.1: How are Your Personal Needs Being Fulfilled? Lesson B 3.2 - Exercise Worksheet - Hierarchy of Needs 15 Next steps More resources for you Before you go...

The Immediate Care Process
Delivered Online On Demand
£795

PIC Microcontroller EEPROM: A Step By Step Practical Course Online

By Study Plex

Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. Course Curriculum Introduction Introduction 00:02:00 Who We Are 00:05:00 Different Type of Memories in PIC Microcontroller Different Type of Memories in PIC Microcontroller 00:04:00 Special Function Register EEPROM Special Function Register 00:06:00 EECON1 and EECON2 Registers 00:06:00 Reading/Writing Data to/From EEPROM Memory Reading Data from EEPROM Memory 00:02:00 Writing Data to EEPROM Memory 00:05:00 EEPROM Read and Write Functions EEPROM Read and Write Functions 00:04:00 Software Requirements Download And Install Proteus Software Free 00:11:00 Download and Install MikroC Pro 00:11:00 Practical Example Coding EEPROM Write and Read Example 00:08:00 Practical Circuit Assembly and Working Mechanism Explained 00:15:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

PIC Microcontroller EEPROM: A Step By Step Practical Course Online
Delivered Online On Demand
£19

Preparing to Teach

By Marell Consulting Limited

This session is for those who find themselves teaching even though they have not gone through teacher training. It is designed to give you the basic tools you need to begin delivering to ensure that learning takes place.

Preparing to Teach
Delivered in Birmingham or UK Wide or OnlineFlexible Dates
£497

CL464G IBM Db2 11.1 Advanced Database Administration

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an advanced course for DBAs and technical individuals who plan, implement, and maintain Db2 11.1 databases Overview This course is designed to teach you how to: Perform advanced monitoring using the Db2 administrative views and routines in SQL queries. Manage the disk space assigned in Database Managed Storage (DMS) and Automatic Storage table spaces, including the activities of the rebalancer. Use SQL queries and Db2 commands to check the high water mark on table spaces and to monitor the rebalance operation. Utilize the REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces using database or tablespace backup images. Plan and execute the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. Create incremental database or tablespace level backups to reduce backup processing and backup image storage requirements. Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity. Describe the various types of database memory including buffer pools, sort memory, lock memory and utility processing memory. Adjust database or Db2 instance configuration options to improve application performance or processing efficiency. Implement Db2 Self Tuning Memory management for specific database memory areas. This course is designed to teach you how to Perform advanced monitoring using the Db2 administrative views and routines in SQL queries. Manage the disk space assigned in Database Managed Storage (DMS) and Automatic Storage table spaces, including the activities of the rebalancer. Use SQL queries and Db2 commands to check the high water mark on table spaces and to monitor the rebalance operation. Utilize the REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces using database or tablespace backup images. Plan and execute the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. Create incremental database or tablespace level backups to reduce backup processing and backup image storage requirements. Implement automatic storage management for table spaces and storage groups or enable automatic resize options for DMS managed table spaces to reduce administration requirements and complexity. Describe the various types of database memory including buffer pools, sort memory, lock memory and utility processing memory. Adjust database or Db2 instance configuration options to improve application performance or processing efficiency. Implement Db2 Self Tuning Memory management for specific database memory areas. Course Outline Advanced Monitoring Db2 Table Space Management Db2 Database Memory Management Database rebuild supportDb2 database and tablespace relocation Db2 Incremental Backup Additional course details: Nexus Humans CL464G IBM Db2 11.1 Advanced Database Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CL464G IBM Db2 11.1 Advanced Database Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CL464G IBM Db2 11.1 Advanced Database Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Inside an Artists mind Vibrant Acrylics Red, Red wine 1 hour 32 mins

By Marilyn Allis

Get inside my mind as I work out how to paint this awesome memory in colourful Vibrant acrylics.

Inside an Artists mind Vibrant Acrylics Red, Red wine 1 hour 32 mins
Delivered Online On Demand
£8.99

Inside an Artists mind Vibrant Bouzios Brazil Acrylics 1 hour 13 mins

By Marilyn Allis

Get inside my mind as I work out how to paint this awesome memory in colourful Vibrant acrylics.

Inside an Artists mind Vibrant Bouzios Brazil Acrylics 1 hour 13 mins
Delivered Online On Demand
£8.99

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

AN31 IBM Power Systems for AIX - Virtualization II - Advanced PowerVM and Performance

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This advanced course is for anyone responsible for implementing and managing virtualization features on a System p server including: AIX technical support individuals System administrators Systems engineers System Architects Overview Upon successful completion of this course, students will be able to: Describe the effect of the IBM PowerVM virtualization features on performance and monitoring, such as: Simultaneous multithreading (SMT), shared processors, multiple shared processor pools (MSPP), shared dedicated capacity, Active Memory Sharing (AMS), Active Memory Expansion (AME), Live Partition Mobility (LPM), and other virtualization features Interpret the outputs of AIX performance monitoring and tuning tools used to view the impact of features such as SMT, shared processors, additional shared processor pool activations, and device virtualization. Perform a Live Partition Mobility between two Power Systems servers Configure and monitor Active Memory Expansion Configure the Suspend and Resume and Active Memory Sharing features available with the Virtual I/O Server Implement the deduplication feature of Active Memory Sharing Students will learn how to implement advanced IBM PowerVM features, such as Active Memory Sharing, Active Memory Expansion, shared dedicated processors, multiple shared processor pools, and Live Partition Mobility. Students will learn how to implement advanced IBM PowerVM features, such as Active Memory Sharing, Active Memory Expansion, shared dedicated processors, multiple shared processor pools, and Live Partition Mobility. Additional course details: Nexus Humans AN31 IBM Power Systems for AIX - Virtualization II - Advanced PowerVM and Performance training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AN31 IBM Power Systems for AIX - Virtualization II - Advanced PowerVM and Performance course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AN31 IBM Power Systems for AIX - Virtualization II - Advanced PowerVM and Performance
Delivered OnlineFlexible Dates
Price on Enquiry

Digital Forensic Science: Essential Training

4.3(43)

By John Academy

Master the essential skills of Digital Forensic Science with our comprehensive training course. Explore topics such as forensic investigation, evidence management, file system analysis, network forensics, and more. Equip yourself to apprehend offenders, maintain evidence-based reporting, and present compelling digital evidence in the courtroom. Join us to enhance your expertise in this critical field and stay ahead in the ever-evolving landscape of digital forensics.

Digital Forensic Science: Essential Training
Delivered Online On Demand3 hours
£23.99

Linux engineer certification 1 (LPIC-2)

5.0(3)

By Systems & Network Training

Linux engineer certification training course description LPIC-2 is the second certification in LPI's multi level professional certification program. This course teaches the skills necessary to pass the LPI 201 exam; the first of two LPIC-2 exams. Specifically, the course covers the administration of Linux systems in small to medium sized mixed networks. What will you learn Perform advanced administration tasks. Perform advanced file system administration. Linux engineer certification training course details Who will benefit: Linux administrators. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Linux engineer certification fundamentals training course contents Part I The LPI 201 Exam Starting a System The Linux Boot Process, Firmware Startup, BIOS Startup, UEFI Startup, Linux Bootloaders, GRUB Legacy, GRUB 2, Alternative Bootloaders, Secure Bootloaders, Process Initialization, SysV Method, systemd Method, Upstart Method, System Recovery, Kernel Failures, Root Drive Failure. Maintaining the System Fluid Messaging, Static Messaging, System backups, Backup Strategies, Performing Backups, Installing Programs from Source, Obtaining and unpacking Installation Files, Compiling Programs, Resource Usage: Managing, measuring, predicting and troubleshooting. Mastering the Kernel What Is the Kernel? Kernel Features, Parts of the Kernel, Kernel Versions, Obtaining Source Code, Creating the Configuration File, Compiling and Installing the Kernel, Compiling and Installing Modules, Creating an Initial RAM Disk, Booting the New Kernel, Creating a Kernel Package, Maintaining the Kernel, Working with Module Files, Module Commands, Working with Hardware, Automatically Detecting Hardware, Troubleshooting the Kernel. Managing the Filesystem The Linux Filesystem, Filesystem Structures, Filesystem Types, Making Filesystems, Attaching Filesystems, Memory-Based Linux Filesystems, the Btrfs Filesystem, Btrfs Subvolumes, Btrfs Snapshots, Optical Filesystems, Swap Filesystems, Network-Based Filesystems, Auto-Mounting, Encrypted Filesystems, Maintaining Linux Filesystems, Adjusting a Filesystem, Checking and Repairing a Filesystem, SMART. Administering Advanced Storage Devices Configuring RAID, Implementing RAID on Linux, Managing a RAID Array, Adjusting Storage Devices, Looking at Drive Interface Concepts, Testing and Tuning Drives, Implementing iSCSI, Managing Logical Volumes, LVM, Creating Logical Volumes, Supporting Logical Volumes, Understanding the Device Mapper. Navigating Network Services Networking Basics, The Physical Layer, The Network Layer, The Transport Layer, The Application Layer, Configuring Network Features, Network Configuration Files, Graphical Tools, Command-Line Tools, Basic Network Troubleshooting, Checking the Log Files, the ARP Cache, Sending Test Packets, Testing Network Routes, Testing Client/Server Connectivity, Finding Host Information, Network Security, Advanced Network Troubleshooting, Viewing Open Network Connections, Viewing Network Statistics, Scanning the Network, Capturing Network Traffic.

Linux engineer certification 1 (LPIC-2)
Delivered in Internationally or OnlineFlexible Dates
£2,797