Discover effective new ways to: find out what the problem is, communicate with reluctant teens, discover their hidden strengths, promote positive behaviour change, improve their mental health – and much more… Accredited CPD Certificate: 6 hours Length: 1 day (9.15am - 4.00pm GMT) The best live online I have attended so far and I’ve done eight! Everything was relevant – completely spot onTEACHER / TUTOR Live Online – Join Richard Brook on Tuesday 19th March for this live online training event via Zoom. Simply book your place and we will email you details of how to join the Zoom workshop the day before. BONUS RECORDING – the training is recorded, in case anyone experiences technical difficulties on the day, so you will also get a recording for a limited time afterwards to maximise your learning. Why take this course This live online training event gives you the essential knowledge, tips and practical skills you need to help troubled teenagers unlock their potential and begin to build lives for themselves that work well. Tutor Richard Brook has a wealth of hands-on practical experience in adolescent mental health and social work which he draws on throughout the day – you will have plenty of time to ask questions and discuss how you can implement the skills and techniques in your own work or with the teens you care for. The programme is varied and intensive, yet lively with a strong focus on gaining skills. It clarifies what healthy teenage development looks like, why things can go wrong and the best ways to help young people overcome obstacles and begin to create lives for themselves that work well. Richard also shows how, by working with the ‘givens’ of human nature, and ensuring that sound knowledge of how people really function is applied intelligently to teenagers, you can speed up progress, reduce anti-social behaviour and teen depression, and bring young people real benefits. At the end of the day you will find yourself more empowered to respond effectively to each individual’s needs and temperament, whilst avoiding yourself the emotional pitfalls of working in stressful situations. Such a realistic and logical approach – it's given me lots of ideas for working with a variety of people, not just teenagers!PROBATION OFFICER What will you learn An increased understanding of what drives most problematic behaviour, including anti-social behaviour Essential knowledge and skills to deliver effective interventions to young people, both individually and in groups A deeper understanding of the causes of adolescent mental health problems Simple yet effective techniques for engaging uncommunicative young people, building rapport and promoting behavioural changes Constructive ways to help prevent teenage depression, anxiety and stress Four vital guiding principles that ensure your work with young people is relevant and effective Ways to motivate young people and help them set achievable goals How to discover and build upon a young person’s strengths and engage them in practical problem-solving Knowledge of how the insights from the human givens approach can dramatically improve interventions and their outcomes The opportunity to discuss how you could implement these in your own work with a highly knowledgeable tutor who has years of hands-on experience Also covered: The common misconceptions about adolescence What healthy teenage development looks like – this may bring you some surprises! A clear and logical foundation upon which to structure creative and effective interventions Ways to respond effectively to each individual’s needs, temperament and learning style How to avoid the emotional pitfalls of working in stressful situations An expanded repertoire of skills and a refined understanding of what works and – most importantly – why Course Programme The ‘How to help troubled and troublesome teenagers’ course starts at 9.15am and runs until 4.00pm. 9.15am Join the Zoom meeting 9.30am What’s the trouble? 11.00am Comfort break and discussion 11.30am How to communicate with teenagers 1.00pm Lunch break 1.45pm Practical problem solving 2.45pm Comfort break and discussion 3.00pm How to help them create a life that works well 4.00pm Day ends This course has been independently accredited by the internationally recognised CPD Standards Office for 6 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.
Every relationship has its ups and downs, but sometimes these become too difficult for a couple to manage on their own… Accredited CPD Certificate: 6 hours Length: 1 day (9.15am–4.00pm GMT) Probably the best couples therapy training course I have ever attended. Very full, hugely informative contentWELLBEING OFFICER, SOLENT MIND Live training delivered online – Attend Jennifer Broadley’s online training masterclass live online on Tuesday 21st May 24 via Zoom. The content covered is the same as her attended workshop with a few modifications to some of the exercises, and you will have plenty of opportunities to ask questions. All you need is a quiet place to watch, a computer or tablet and a strong internet signal, the rest is easy – simply book your place as normal, and we will email you details of how to join the Zoom workshop. BONUS RECORDING – the training is recorded, in case anyone experiences technical difficulties on the day, so you will also get a recording for a limited time afterwards to maximise your learning. Why take this course Relationship issues are one of the most common causes of emotional distress – and often the reason people seek help. A solid understanding of why difficulties arise, and what can be done about them, is extremely useful therefore for all caring professionals, not just those working with couples. Drawing on pioneering research, Jennifer Broadley’s one-day couples counselling course gives you this important knowledge, along with a range of strategies and proven tips for working effectively and ethically with more than one client. She shares the practical guidelines and skills she has acquired over many years of successfully helping couples using the human givens approach to build and maintain supportive and mutually rewarding relationships. Presented without psychobabble, and making good use of insightful case histories, Jennifer demystifies an area of counselling that many find daunting or fear is complicated. The day covers: the most effective ways to help and build rapport with couples in conflicted relationships; the sex differences in processing emotions; non-blame talking styles; the long-term impact of parenting; past conditioning, including psychological traumas, that can give clues about why difficulties arose; and what we can learn from the way successful couples facilitate mutual needs satisfaction. Well worth attending – and the money. I'm going back refreshed and well resourced, with lots of new skills and strategies to try.PSYCHOTHERAPIST What will you learn Essential skills for building and maintaining rapport with two emotionally-aroused people Ways to encourage both partners to engage in solving their difficulties How to teach non-blaming communication skills and explain the differences in male and female behaviour to clients What to do if one or even both parties are having an affair How to deal with issues specific to couple counselling, such as confidentiality The key points you need to bear in mind when working with more than one client at a time How to structure effective therapy sessions and goal setting with two people Effective ways to help each partner begin to cooperate in helping the other get their emotional needs met The key ingredients for a healthy and mutually rewarding relationship An insight into the many common relationship problems – and how to help clients overcome them (illustrated with case histories) Tips and techniques for staying objective and empathetic, whilst calming your clients’ high emotional arousal How to recognise and interrupt disruptive behaviour patterns How to use Solution Focused Questioning to initiate change How to manage setbacks and keep the partners motivated How to tell when the relationship isn’t the problem – and what to do about it How to use Guided Imagery with two people Information regarding the latest research into effective couples therapy How early life experiences can influence our relationships, and what to do about this now Creative ways to develop effective interventions, including using tasks and metaphor Asperger’s syndrome – how to work with couples if one or both show Asperger traits, a common cause of relationship problems Considering the wider picture, including other family members Course notes, Accredited CPD Certificate and more… Course Programme The ‘Couples therapy – a practical masterclass’ counselling course starts at 9.15am and runs until 4.00pm. (GMT). 9.15am Join the Zoom meeting 9.30am What predicts relationship stability and fulfilment? 11.00am Comfort break and discussion 11.30am Building empathy, how to use RIGAAR™ 1.00pm Lunch break 1.45pm Structuring therapeutic interventions, establishing goals, and moving forward 2.45pm Comfort break and discussion 3.00pm Valuing the bigger context 4.00pm Day ends Who is this course suitable for? Anyone considering working therapeutically with couples Psychotherapists and counsellors already working with couples who would like additional insights, tools and strategies to use Anyone involved in mental health or whose work involves dealing with couples or families, including: social workers, psychologists, teachers, GPs and health visitors Anyone who is interested in learning solution focused, brief therapy interventions, working from the human givens approach, to facilitate a rapid process of change for couples in distress Anyone wanting to overcome their own insecurity in a relationship or to learn more about the myriad dynamics that come into play in relationships will benefit from the information given on this course. Please Note This course is not a substitute for therapy.
AAT Level 4 Professional Diploma in Accounting AAT Level 4 is the highest level or final stage of the AAT Accounting qualification. This qualification provides the skills necessary for a 'Finance Officer' role including the complex management accounting tasks, general management skills, drafting financial statements and specialist learning areas. This provides you with an opportunity to become a professional member of AAT and use MAAT after your name. You are also entitled to exemptions in the UK's chartered and certified accounting qualifications. Besides, if you want to pursue your career further in University, you are entitled to exemptions for up to two years in various universities in the UK. You will be awarded âAAT Level 4 Professional Diploma in Accounting certificateâ from the Association of Accounting Technicians (AAT), once you have passed all the professional-level qualification exams and skill tests. Once you finish Level 4 you become a professional member of AAT and you may use MAAT after your name to stand out from the crowd as an officially Accredited Accountant. What you will gain? Here you'll learn how to draft financial statements for limited companies, perform complex management accounting tasks and develop your own management skills, perform tax calculation for business & individuals and other specialist learning areas. The Level 4 Professional Diploma in Accounting covers the following areas: Management Accounting: Budgeting Management Accounting: Decision and Control Financial Statements of Limited Companies Accounting Systems and Controls Business Tax Personal Tax
It is important for Officers to understand the roles and responsibilities, processes and procedures involved when working with Elected Members. They also need to appreciate the significance of Elected Members as the decision-makers in local government. Officers have a responsibility to work and communicate with Elected Members effectively. This very successful course is designed to help Officers with this. Note: this is very much an indicative outline. The programme is tailored to the needs of each particular organisation. To provide managers with the knowledge and understanding they need to have productive working relationships with Elected Members and provide appropriate support. By the end of the course participants will: Understand the roles, responsibilities, processes and procedures in place for working with Elected Members Be able to identify the best way to approach potentially sensitive issues Understand the skills and behaviours required for working effectively with Members Be able to deploy their influencing skills more successfully Review their learning and have an action plan to take back and implement at work Note: this is very much an indicative outline. The programme is tailored to the needs of each particular organisation. 1 Introduction Welcome and introductions Objectives and programme overview 2 Working in a political environment What is political awareness? Contact and experience with Members Importance of the role of Members 3 Why be an Elected Member? Perceptions of what Elected Members are and do Values of Members and their motivations for doing what they do 4 Political decision-making in local government Current challenges and drivers affecting the organisation / the council Roles and responsibilities of Officers and Members Centrality of Members' strategic role 5 (Option) A day in the life of an Elected Member An Elected Member gives a talk about what they do 6 Having a beneficial relationship between Officers and Members 7 Member / Officer communication Discussion of the formal processes, service procedures, etc (whether enshrined in a protocol, Memorandum of Understanding, etc) Response times and requirements Procedures required by Heads of Service [if appropriate] 8 Influencing styles and strategies Different forms of power and how they impact Developing an appropriate 'influencing style' Exploring strategies for improving communication and influencing at work 9 Review and evaluation Review and evaluation of learning Personal action plans
Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. Information Security Perspectives The candidate understands the business interest of information security The canidate understands the customer perspective on governance The candidate understands the supplierïs responsibilities in security assurance Risk Mangement The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information Security Controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls
Read and discuss this witty, best-selling murder mystery - clever and compelling Highlights Join this book club and gain extra motivation to read in English 7 hours of live classes to help you develop fluent speaking in English Read this amusing book to develop your understanding of colloquial English Be corrected by an expert English teacher to remove errors and mistakes Practise and develop your English online in this 7 week English book club course using the Richard Osman's new series after The Thursday Murder Club, We Solve Murders. Each week you read some chapters, discuss them in class and improve specific areas of vocabulary or grammar while also examining literary aspects of the novel. Personalised feedback improves your grammar, vocabulary and pronunciation. The Book Club book This is the first in a new series for detective duo Steve and Amy Wheeler. Steve is happily retired and likes his routines: the pub quiz, sitting outside, his cat. His past was full of adventure, but now he likes a quiet life. His daughter-in-law Amy, however, loves adrenaline. She's a private security officer, protecting a world-famous author Rosie D’Antonio on a remote island. It should be a simple job, until there's a murder, a lot of money and someone trying to kill Amy. This thriller is filled with action, amusing lines and warmth. And you need to work out "whodunnit" - who committed the crime! 'The thing that shines through in Osman’s writing is that he really likes people and revels in all their foibles and eccentricities. All of which makes for a delightful read' THE OBSERVER Geoff says: "Richard Osman is the famous author of the best-selling Thursday Murder Club series. This new book has broken all records as the best-selling adult hardback fiction book in the UK. It is full of action, yet witty, with interesting characters, and full of British English idioms and colloquialisms - great for improving your knowledge of how English is actually spoken!"
Read and discuss this witty, best-selling murder mystery - clever and compelling Highlights Join this book club and gain extra motivation to read in English 7 hours of live classes to help you develop fluent speaking in English Read this amusing book to develop your understanding of colloquial English Be corrected by an expert English teacher to remove errors and mistakes Practise and develop your English online in this 7 week English book club course using the Richard Osman's new series after The Thursday Murder Club, We Solve Murders. Each week you read some chapters, discuss them in class and improve specific areas of vocabulary or grammar while also examining literary aspects of the novel. Personalised feedback improves your grammar, vocabulary and pronunciation. The Book Club book This is the first in a new series for detective duo Steve and Amy Wheeler. Steve is happily retired and likes his routines: the pub quiz, sitting outside, his cat. His past was full of adventure, but now he likes a quiet life. His daughter-in-law Amy, however, loves adrenaline. She's a private security officer, protecting a world-famous author Rosie D’Antonio on a remote island. It should be a simple job, until there's a murder, a lot of money and someone trying to kill Amy. This thriller is filled with action, amusing lines and warmth. And you need to work out "whodunnit" - who committed the crime! 'The thing that shines through in Osman’s writing is that he really likes people and revels in all their foibles and eccentricities. All of which makes for a delightful read' THE OBSERVER Geoff says: "Richard Osman is the famous author of the best-selling Thursday Murder Club series. This new book has broken all records as the best-selling adult hardback fiction book in the UK. It is full of action, yet witty, with interesting characters, and full of British English idioms and colloquialisms - great for improving your knowledge of how English is actually spoken!"
Read and discuss this witty, best-selling murder mystery - clever and compelling Highlights Join this book club and gain extra motivation to read in English 7 hours of live classes to help you develop fluent speaking in English Read this amusing book to develop your understanding of colloquial English Be corrected by an expert English teacher to remove errors and mistakes Practise and develop your English online in this 7 week English book club course using the Richard Osman's new series after The Thursday Murder Club, We Solve Murders. Each week you read some chapters, discuss them in class and improve specific areas of vocabulary or grammar while also examining literary aspects of the novel. Personalised feedback improves your grammar, vocabulary and pronunciation. The Book Club book This is the first in a new series for detective duo Steve and Amy Wheeler. Steve is happily retired and likes his routines: the pub quiz, sitting outside, his cat. His past was full of adventure, but now he likes a quiet life. His daughter-in-law Amy, however, loves adrenaline. She's a private security officer, protecting a world-famous author Rosie D’Antonio on a remote island. It should be a simple job, until there's a murder, a lot of money and someone trying to kill Amy. This thriller is filled with action, amusing lines and warmth. And you need to work out "whodunnit" - who committed the crime! 'The thing that shines through in Osman’s writing is that he really likes people and revels in all their foibles and eccentricities. All of which makes for a delightful read' THE OBSERVER Geoff says: "Richard Osman is the famous author of the best-selling Thursday Murder Club series. This new book has broken all records as the best-selling adult hardback fiction book in the UK. It is full of action, yet witty, with interesting characters, and full of British English idioms and colloquialisms - great for improving your knowledge of how English is actually spoken!"
Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.