LOOKING FOR: ADULT FICTION Jade Kavanagh is a Literary Agent at Darley Anderson Literary Agency. She has a degree in English Literature from the University of Westminster then went on to achieve her Masters in Modern and Contemporary Fictions. Alongside assisting Camilla Bolton on her list of clients Jade is building her own list of suspense, thriller and horror with distinct voices and setting. Across these genres Jade looks for powerful female narratives and dynamic characterisation. She wants female characters like Shiv Roy (Succession), Emily Gilmore (Gilmore Girls), Annalise Keating (How to Get Away with Murder), Buffy Summers (Buffy), Ellen Ripley (Alien), Dana Scully (The X Files), Detective Kima Greggs (The Wire). Jade would love something with a big book club hook that readers devour in one sitting. Setting and atmosphere are of huge appeal. She wants stories with a vivid sense of place and to be immersed in the world of the characters. Jade wants detail down to what shade of lipstick or colour of the lamp on their bedside table and the nature and landscape around them. She loves luxury settings she can get excited about reading and descriptions to lose herself in. Jade also loves dark twists on glamorous concepts and settings. Think The Devil Wears Prada meets Killing Eve, or Real Housewives or Succession meets How to Kill My Family or something akin to White Lotus. Across the spectrum of horror and speculative fiction, Jade is looking for haunting stories filled with slow build darkness and characters with heart. Think 28 Days Later and The Last of Us. She really wants a dark witchy story… or on the cozier side a fresh take on something like Practical Magic or Charmed. Jade wants heroes to root for, and villains that terrify and enrage her in equal measure. One of Jade's favourite TV shows is Orphan Black; she'd love to see a book series like this. As a proud member of the Twilight generation, (Team Edward forever!) she’d also love to read a modern vampire novel. Show her American Psycho meets Dracula. Give her 2023 Carlisle Cullen in a thriller or a new take on Buffy. Whilst not actively looking for sci-fi novels, Jade would love to see A Scully and Mulder for the 2020s! Notably, Jade looks for voices from all walks of life. She is incredibly passionate about bringing working-class voices into the commercial fiction space. She would love to hear from new exciting talent, telling stories about everyday people with relatable voices, people she grew up with, people she can imagine. Jade would like you to submit a covering letter, 1 -2 page synopsis and the first 5,000 words of your completed manuscript in a single word document. (In addition to the paid sessions, Jade is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 4 November 2024
Zumba fitness in Hammersmith & Barnes with club Azucar – Latin dance taught by native instructor Patricia Nunez from Brazil every Monday @ 6 pm @ Rivercourt Methodist church, king st, w6 9jt nearest tube station Ravenscourt park (1-minute walk)
Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview Identify the AWS services that support the different phases of Operational Excellence, an AWS Well-Architected Framework pillar Manage access to AWS resources using AWS accounts and organizations and AWS Identity and Access Management (IAM) Maintain an inventory of in-use AWS resources by using AWS services, such as AWS Systems Manager, AWS CloudTrail, and AWS Config Develop a resource deployment strategy using metadata tags, Amazon Machine Images (AMIs), and AWS Control Tower to deploy and maintain an AWS cloud environment Automate resource deployment by using AWS services, such as AWS CloudFormation and AWS Service Catalog Use AWS services to manage AWS resources through CloudOps lifecycle processes, such as deployments and patches Configure a highly available cloud environment that uses AWS services, such as Amazon Route 53 and Elastic Load Balancing, to route traffic for optimal latency and performance Configure AWS Auto Scaling and Amazon EC2 Auto Scaling to scale out your cloud environment based on demand Use Amazon CloudWatch and associated features, such as alarms, dashboards, and widgets, to monitor your cloud environment Manage permissions and track activity in your cloud environment by using AWS services, such as AWS CloudTrail and AWS Config Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service State the purpose, benefits, and appropriate use cases for mountable storage in your AWS Cloud environment Explain the operational characteristics of object storage in the AWS Cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier Build a comprehensive cost model to help gather, optimize, and predict your cloud costs by using services such as AWS Cost Explorer and the AWS Cost & Usage Report This course teaches systems operators and anyone performing cloud operations functions how to manage and operate automatable and repeatable deployments of networks and systems on AWS. You will learn about cloud operations functions, such as installing, configuring, automating, monitoring, securing, maintaining, and troubleshooting these services, networks, and systems. The course also covers specific AWS features, tools, and best practices related to these functions. Prerequisites Successfully completed the AWS Technical Essentials course Background in either software development or systems administration Proficiency in maintaining operating systems at the command line, such as shell scripting in Linux environments or cmd/PowerShell in Windows Basic knowledge of networking protocols (TCP/IP, HTTP) 1 - Introduction to Cloud Operations on AWS What is Cloud Operations AWS Well-Architected Framework AWS Well-Architected Tool 2 - Access Management AWS Identity and Access Management (IAM) Resources, accounts, and AWS Organizations 3 - System Discovery Methods to interact with AWS services Tools for automating resource discovery Inventory with AWS Systems Manager and AWS Config Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config 4 - Deploy and Update Resources Cloud Operations in deployments Tagging strategies Deployment using Amazon Machine Images (AMIs) Deployment using AWS Control Tower 5 - Automate Resource Deployment Deployment using AWS CloudFormation Deployment using AWS Service Catalog Hands-On Lab: Infrastructure as Code 6 - Manage Resources AWS Systems Manager Hands-On Lab: Operations as Code 7 - Configure Highly Available Systems Distributing traffic with Elastic Load Balancing Amazon Route 53 8 - Automate Scaling Scaling with AWS Auto Scaling Scaling with Spot Instances Managing licenses with AWS License Manager 9 - Monitor and Maintain System Health Monitoring and maintaining healthy workloads Monitoring AWS infrastructure Monitoring applications Hands-On Lab: Monitor Applications and Infrastructure 10 - Data Security and System Auditing Maintaining a strong identity and access foundation Implementing detection mechanisms Automating incident remediation 11 - Operate Secure and Resilient Networks Building a secure Amazon Virtual Private Cloud (Amazon VPC) Networking beyond the VPC 12 - Mountable Storage Configuring Amazon Elastic Block Store (Amazon EBS) Sizing Amazon EBS volumes for performance Using Amazon EBS snapshots Using Amazon Data Lifecycle Manager to manage your AWS resources Creating backup and data recovery plans Configuring shared file system storage Hands-On Lab: Automating with AWS Backup for Archiving and Recovery 13 - Object Storage Deploying Amazon Simple Storage Service (Amazon S3) Managing storage lifecycles on Amazon S3 14 - Cost Reporting, Alerts, and Optimization Gaining AWS cost awareness Using control mechanisms for cost management Optimizing your AWS spend and usage Hands-On Lab: Capstone lab for CloudOps Additional course details: Nexus Humans Cloud Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This 2 day course is ideal for Team Leaders and Managers who have had little or no training in the role where they have to lead a team and take on management responsibilities. It will give them confidence and the skills to take decisions and get the best performance from their team. The most popular of our management training courses, the First Line Management course is specifically for people who are new to a management position or who are about to undertake a management position and have had no formal management training. Anyone who is new to a management or supervisory position will benefit from this course. Run over two days, the syllabus of the First Line Management course will cover a wide range of topics to give new or inexperienced managers a firm understanding of the foundations needed to begin their journey as a manager. It includes units on effective communication, managing your team, managing yourself, delegating, setting objectives, effective planning and personal development. Course Syllabus Module OneRole Assessment and Personal Development Planning Understanding roles and responsibilities Outline framework of management Taking the step into management Identifying personal development needs and planning Module TwoEffective Communication Skills Communicating to be effective - how and what to communicate Designing effective questioning techniques and listening actively Non-verbal communication Dealing with, and responding to, differing communication styles Module ThreeManaging Yourself Use of planning tools and techniques Dealing with time stealers and interruptions Learn how to delegate effectively Module FourManaging Your Team Understanding different management styles and how to use them Recognising performance management Setting expectations and clearly defining roles and responsibilities Pinpointing performance and motivating your team/individuals Learning the management actions required to maintain team effectiveness Team dynamics and looking at individual behaviour within teams First Line Management Course Management is the efficient, effective and economic use of resources to achieve results with and through the efforts of other people. Leadership – a definition Inspiring others to follow your lead by creating a compelling vision of the future, whereby targets are not merely achieved, but are surpassed . Leadership – a definition Inspiring others to follow your lead by creating a compelling vision of the future, whereby targets are not merely achieved, but are surpassed . The Role of the First Line Manager as ‘Leader'. First Line Managers have Leadership responsibilities – this is often the biggest challenge for Team Leaders and Supervisors who have to adapt from performing a task to motivating a team. At the beginning of the 21st century, the most powerful sources of growth, employment and wealth creation are found in innovation-driven industries. As a result, organisational leaders face a whole new set of challenges. They have to change and will increasingly need to rely on the knowledge, skills, experience and judgement of all their people. Organisational leaders will need to place less emphasis on traditional structures and control, and concentrate on five key priorities: . Five Key Priorities . using strategic vision to motivate and inspire empowering employees at all levels accumulating and sharing internal knowledge gathering and integrating external information challenging the status quo and enabling creativity Using Strategic Vision. Effective leaders will develop a strategic vision that is clear and compelling, and communicate it in a way that gives a real sense of purpose and direction. A powerful vision is clear about direction and objectives, proactive in its approach, but allows room for flexibility about the means of achievement. A powerful vision is important because it is one way of linking the present to a desirable future. The role of strategic planning is then to map out a path to achieve that vision. However, visionary thinking should not be the exclusive province of the organisation's top executives. Successful leaders will encourage participation in the formulation of a strategic vision that offers different perspectives and encourages commitment. It is also important to empower employees with the responsibility and authority to implement the vision. . Empowering Employees. Some people have proposed the view that the great leader is a great servant [2]. Certainly, many organisations believe that an environment based on trust will produce better results than one of rules, regulation and hierarchy. This means that leaders will increasingly have to respond to their employees' needs and take on some unaccustomed roles, such as coach, teacher, information provider, facilitator, listener or supporter. But for empowerment to work, organisations will have to share information and knowledge far more than they have done in the past. This will certainly include First Line Managers . Challenging the status quo and enabling creativity. There are a number of ways in which effective First Line Managers can challenge the status quo and enable creativity: . Facilitate ‘constructive dissent', i.e. encourage people to question openly a manager's perspective without fear of retaliation. An interesting example of this is at Motorola, where employees can file a ‘minority report' and lodge a different point of view to their immediate First Line Manager on a business issue. Foster a culture that encourages risk-taking. Create a sense of urgency by producing a compelling picture of the risks of not changing. To summarise, successful First Line Managers will be those that are proactive both in facilitating organisational learning and encouraging positive adaptation to external changes. . A 2 day First Line Manager Course will accelerate the process for Team Leaders and Supervisors to reach a high level of competence and confidence in the Leadership role they have . Sample Exercises Our range of bespoke First Line Manager modules works wonders! The course outlines may look as you'd expect - but the content, approach and effect is very much greater than expectations. We have a very large library of innovative exercises that are highly effective in capturing and embedding the learning points in a practical way. Following each exercise - that may be aligned to a 'Financial Theme' - they are debriefed fully and related to how the learning can to be applied back in the work-place. They are also really great fun!! Here are some template modules and sample exercises designed to embed the learning in a motivational and memorable way:- Sample 'ice-breaker' Exercise - Number Crunch The team must be effectively led and motivated to work as one to reach their objective of visiting each location in a short period of time. Debrief - Leadership and co-ordination, strategy and planning, adapting approach, decision making & control Sample Exercise - Through the Hoop Taking the full team through the 'hoop' within the 'stretching' time limit is likely to exceed the group's own self-limitations. Time ManagementSample Exercise - Cones This task requires the team to take a numbered tower of 5 cones from point 'A' to 'B' in a specific order; this will have to meet the criteria outlined in the brief. The option of 'C' is vital to achieve the results. Debrief: Stepping back for overview Planning disciplines Time-budgeting Skills audit for delegation Handling ConflictSample Exercise - Cave Rescue Requires that the group make some difficult choices and then hold a press conference to justify their decisions while under scrutiny and criticism. This also displayed some required leadership learning; notably that a unified leadership team is crucial to gain commitment and confidence and also how vital it is to plan for any communication that will involve some sort of conflict. Handling Conflict and maintaining control in a professional manner are key debriefing points from this exercise. Communication, Negotiation & InfluenceSample Exercise - Red & White There is a specific time managed agenda and itinerary, which puts the group under pressure. The key challenge is for the sub-groups to maximise the commercial value from the task, however there is always a great danger that the individuals attempt to gain financial progress at the expense of the other group! Debriefing Points: Engaging the other group to 'buy-in' to collaboration Commercial consequences when collaboration is lacking or difficult Effective communication and influence across barriers Global Thinking & Business Mind-setSample Exercise - Dragon's Den The delegation is split into 2 -3 groups - each with a specific product or service to win the Dragons' investment. (A specialised Toy; A unique Team Building Training programme; An eBook Library; An innovative soft-ware package for the Retail Industry Sector. They have to also present to the Dragon's Den their business case for feedback and negotiate with the Dragons to gain either an 'I'm in' or an 'I'm out' reply. Debrief: Global business potential Supply Chain appreciation Commercial framework Performance ManagementSample Exercise - Juggling The group will be asked to set their own team target of how many 'issues' (balls) they can manage at one time. This involves devising a sequence between the group to achieve maximum results without making any mistakes. We introduce different balls which represent different degrees of complexity, challenging the group's preparation and approach to a variety 'team members' needs. Debrief: How to maintain focus when pressure is applied Ensuring effective communication Clarifying the approach for dealing with the unexpected Setting expectations and reviewing delivery Treating every team member as an individual Prioritisation & OrganisationSample Exercise - Labyrinth This activity requires the group to solve a number of tasks through verbal communication only, but they will be forbidden to write any information down or make any gestures using their hands. They will each be provided with a great deal of different pieces of data that has to be assimilated within an increasingly pressurised time-scale. The material also contains distracting and misleading 'red-herrings'. The task requires delegates to keep focussed on the 'critical path' and be very organised in order to meet the dead-line. Debrief: Rigour of planning - SMART Prioritising through ambiguity Time budgeting Assigning roles & responsibilities to break down volume of material The value of keeping accurate records In-House & Classroom Courses Available Online We have developed an alternative to traditional face-to-face training that continues to provide a full learning experience, and allows delegates to learn effectively whilst self-isolating from home. This is how it looks: Delegates booked on Classroom and In-House courses will continue to have access to their trainer online throughout the days that the course is booked to run. Prior to a delegate's course start date, they will be enrolled on our e-learning platform (in partnership with BCF Group) for the course they are booked on to. They will also be given contact information for their trainer, and details of how to access the online workshops. Delegates will not require any special IT equipment. A desktop computer, laptop, tablet, or a mobile phone with internet and audio capability is all that is required. Delegates taking ILM Qualifications will then proceed to the book review, video review and work based assignments with 12 months tutor support as appropriate, and in line with our previous arrangements. We hope you agree that this blended learning experience represents the safest way to continue supporting our clients and delegates during the Coronavirus disruption. In-House Courses This is our own management training course which has been developed and refined over the many years we have been providing it to delegates from organisations in virtually every industry. This means that the course syllabus is flexible and can be tailored to the specific requirements of a new first line manager or managers, making it ideal for companies or organisations who require an in-house first line management training course which is attended by a number of current or potential managers. Scheduled Courses A one day version of this First Line Management course is available as an Open Course delivered at our partner, the BCF's Training suites in Nottingham and Reading from the following scheduled dates... Classroom Course - Nottingham (NG12 4DG) Classroom training courses enable you to benefit from having the tutor and other delegates right there in the room with you. Face-to-face training sessions are one of the best ways to learn, as it is easy to ask questions and have group discussions. Cost: £595 + vat 16 October 2023 09 January 2024 11 March 2024 Classroom Course - Reading (RG41 5QS) Classroom training courses enable you to benefit from having the tutor and other delegates right there in the room with you. Face-to-face training sessions are one of the best ways to learn, as it is easy to ask questions and have group discussions. Cost: £595 + vat 07 December 2023 15 February 2024 14 May 2024 Zoom™ Course Attending a course via Zoom videoconferencing gives you all of the benefits of classroom training without the need to leave your home or office. You still benefit from a real tutor facilitating the programme, and the content is exactly the same. Cost: £495 + vat 11 September 2023 04 December 2023 13 March 2024 Dickson Training Ltd Founded in 1985 in Yorkshire, we have built an impressive and loyal client base. Our partnerships are built by consistently delivering outstanding development solutions and working in close collaboration with our clients, resulting in us becoming a leading UK and international training provider.
This is unlike any other leadership programme you’ve ever taken part in – it is all about learning the practicalities of showing up as an emotionally intelligent leader who is trusted, engages effectively, connects well, makes people feel they matter and creates a psychologically safe environment where people can bring their very best contributions to the team and the organisation.
Essential skill for all mental health professionals This 2-day workshop gives you the opportunity to see demonstrated, experience, and practice the steps of this powerful technique in a small group under the careful guidance of our expert tutor… Accredited CPD Certificate : 12 hours Length 2 days (9:30am - 4:00pm) Excellent course. A brilliantly encouraging and supportive environment in which to learnHARRIET, WORKSHOP PARTICIPANT Life-changing! A great weight has been lifted off my shoulders.NURSE (PREVIOUSLY TRAUMATISED BY A CAR ACCIDENT) Why take this course We have over 20 years of experience in teaching the rewind technique to health and welfare professionals – we’ve drawn on that experience to develop a course which gives you enough time to thorough absorb and practice the technique, understand why it works and to experience it yourself, so that you leave confident in your ability to use the rewind safely and effectively. The Rewind Technique* is an effective psychological intervention for successfully treating trauma and phobias and one of the most important skills you need to master to be able to work successfully with any anxiety disorder or condition which may have developed as a result of unresolved trauma. Even the most severe phobic and post-traumatic stress (PTSD) symptoms can be successfully addressed using the the rewind technique taught on this 2-day course, which has been refined* in line with understandings from neuroscience to make it as safe and reliably effective as possible. An essential therapeutic technique to have in your therapeutic ‘toolkit’, it is important to learn and practice it under the careful guidance of our expert tutor – you will leave the course knowing how to use the rewind technique safely and effectively having watched live demonstrations, had plenty of time to practice the steps involved with fellow students, the opportunity to experience the technique yourself and more. Our workshop has limited numbers so you will have plenty of opportunities for asking questions and the tutor, who has extensive clinical experience. Using the rewind technique you can, often surprisingly quickly, detraumatise bad memories, stop flashbacks and other PTSD symptoms, cure phobias, banish nightmares and reduce anxiety so you can help the victims of abuse, rape, violence, car accidents, fire, terrorism and panic attacks, heart attacks and other life-threatening experiences. Another key benefit of this technique is non disclosure – there is no need for people to repeatedly revisit or talk about specific details of the events that have traumatised them. This helps avoid embedding the trauma further and making the situation worse – as can sometimes inadvertently happen in other therapeutic approaches to treating trauma – and helps prevent the therapist or counsellor being vicariously traumatised by what they might hear. It is also invaluable when working therapeutically with people who have suffered persistent physical or sexual abuse, and people with OCD. People suffering from other conditions, such as depression, addictions or uncontrollable anger, may have experienced a traumatic event, which needs to be successfully detraumatised in order for them to move on with their lives. As a result of our training in the rewind technique – which we have been delivering for over 20 years – our graduates have brought relief to literally thousands of people (eg. case history / PTSD Resolution). Please note This is a powerful technique, which needs to be implemented with care – we recommend you take the time to learn it in person in a small group with a skilled and highly experienced tutor who can guide you through the important steps involved, oversee you as you practise them, answer your questions and give you crucial direct feedback. The version of the rewind technique* you will learn on this course has been refined in line with understandings from neuroscience to make it as safe and reliably effective as possible. The course is taught over two days to ensure you have enough time to thoroughly absorb and practice the steps involved so that you are confident in using it and know how to do so safely and effectively with clients. You will also learn when it is NOT appropriate to use this technique and how to ensure you avoid embedding any trauma further, or making a phobia worse. Guided imagery and visualisation skills form an essential part of the rewind technique, which is why they are a requirement for attending this course. This has huge potential to change people's lives for the better. I can't wait to put what I've learnt here to good usePSYCHIATRIC SUPPORT WORKER What will you learn How to detraumatise people quickly and safely The necessary skills to treat even severe phobias Why this version of the rewind technique is so effective, and how it works Under careful guidance from the tutor, you will: revisit key skills for relaxing clients in order to successfully work using the technique walk and talk through a step-by-step breakdown of the rewind technique see a live demonstration of working with a phobia or trauma practice each stage of the rewind technique in pairs practice the entire process, with other course participants, under supervision You will also gain: Vital tools for psycho-education – both adding to your own understanding and to pass on to clients A clear understanding of the fear response and how PTSD and phobias develop The detrimental impact traumas and phobias can have on a person’s life The crucial role of the pattern-matching processes in the brain in triggering phobic responses and post traumatic stress symptoms How the main treatment techniques for treating post traumatic stress disorder (PTSD), sub-threshold trauma and phobias (including EMDR, EFT and CBT) work – their advantages and disadvantages Why the rewind technique draws on the innate ability we all have to recover from trauma Pre-disposing factors for suffering a problematic post-traumatic response (or developing a phobia) Why critical incident debriefing increases the incidence of PTSD How this version of the rewind technique has been modified to make it safer and more reliable Trauma-focused rewinding: the psycho-biological reason why this refined rewind technique works so consistently well A step-by-step breakdown of the essential stages of the rewind technique The chance to see a live demonstration of working with a phobia or trauma You will leave with: The confidence to begin using the technique ethically and safely A clear understanding of the advantages of using a non-intrusive psychological technique to treat trauma, PTSD and phobias (where the client does not have to go into details about or repeatedly ‘revisit’ what has traumatised them) What to do if a client as an abreaction Important information about when not to use this technique – and what can be done instead An understanding of how the rewind technique can be used to work with Complex Trauma and cases involving ‘freeze’, shutdown or dissociative responses How you can carefully apply this technique to relieve a huge range of anxiety disorders Greater confidence in dealing with anxiety disorders and distress caused by trauma, phobias and flashbacks An understanding of how rapidly transformative this technique can be; on the last afternoon we view a filmed therapy session (and follow up) in which Joe Griffin uses the rewind technique to relieve a young man of his severe shark phobia There is also plenty of opportunity for you to ask questions and to experience and practice, under careful guidance, the various stages of the rewind technique yourself. Who is this course suitable for? Anyone working with distressed, phobic or traumatised people, who has already taken our Guided Imagery and Visualisation workshop (and ideally the Therapeutic Power of Language workshop too) as these skills are essential components of the rewind technique. If you help traumatised people (including children) or people suffering from any form of phobia or anxiety disorder – this includes: psychotherapists, counsellors, mental health nurses, OTs, health visitors, social workers, psychiatrists, GPs, clinical psychologists, midwives, welfare officers, youth workers, hypnotherapists and those working with traumatised members of public services, such as: firefighters, police, paramedics and military personnel – you will find the rewind technique and associated skills hugely helpful. Course requirements Guided imagery, relaxation and visualisation are an integral component of the Rewind Technique – if you don’t already have experience in using these skills therapeutically with others you must complete our Guided Imagery and Visualisation for Therapeutic Change workshop before attending this course (this is always run the day before our rewind technique training). This is to ensure you get the most out of this 2-day course and also have the necessary skills for practising the rewind technique safely and effectively. You would also find it useful to attend the Therapeutic Power of Language workshop beforehand if you can. All 3 workshops count towards Part 1 of the HG Diploma. Ros Townsend’s live online training Trauma: Patterns of the past is also useful for anyone working with or supporting someone suffering from unresolved trauma, or who would like to understand their own experiences of trauma better. She also runs a workshop on working with Complex Trauma. *About the Rewind Technique The Rewind Technique originated from one developed by Richard Bandler, one of the founders of NLP, when it was called the Visual/Kinaesthetic Dissociation protocol. A variant of this was developed by Dr David Muss, who called it the Rewind Technique. The version of the Rewind Technique you will learn on this 2-day course was refined by Joe Griffin and Ivan Tyrrell, co-founders of the human givens approach, to make it as reliably effective and safe as is possible by aligning the method with their insights into how trauma and phobias are processed in the brain. HG Therapists now follow a specific Rewind Protocol which follows the essential steps of the process that Griffin and Tyrrell set out. Course format This intense 2-day training proceeds through a blend of talks, live demonstrations, skill-developing exercises, practice sessions (under careful guidance) and deconstruction of filmed examples of the technique being used, including one with a severely traumatised young woman. There is also plenty of opportunity for networking and discussion during the breaks. The course was previously entitled: The fast phobia and trauma (PTSD) cure – a 2-day workshop in the rewind technique This course has been independently accredited by the internationally recognised CPD Standards Office for 12 hours of CPD training. On completion of this training you’ll receive CPD certificates from the College and the CPD Standards Office.
This training is for lawyers and covers key topics to ensure compliance with the Lexcel standard and other regulations.
Duration 3 Days Validity 3 years Course Overview The Level 3 Award in First Aid at Work is a nationally recognized qualification designed for individuals who need to gain the skills and knowledge to respond effectively in a workplace first aid emergency. This course is suitable for those working in environments with a high risk of accidents or injuries, including industries such as construction, manufacturing, and hospitality. The qualification meets the standards set by the Health and Safety Executive (HSE) and ensures participants can competently manage emergency situations, from assessing casualties to providing essential life-saving interventions. Upon successful completion, learners will have the confidence and practical skills necessary to handle a range of injuries and illnesses in the workplace, making them a valuable asset to their employers. What’s Covered Understanding the roles and responsibilities of a First Aider Conducting initial assessments of incidents Performing adult, child, and infant CPR & AED usage Managing unconscious casualties Providing treatment for wounds and bleeding Administering first aid for shock Dealing with injuries to bones, muscles, and joints (including fractures) Handling burns and scalds Responding to eye injuries Managing cases of poisoning Dealing with anaphylaxis and other severe allergic reactions Addressing minor injuries (e.g., cuts, bruises, and small burns) Understanding the legal requirements and importance of accurate incident reporting Entry Requirements Participants must be at least 16 years old on the first day of training. There are no formal entry requirements; however, learners are encouraged to have a good level of literacy and numeracy to complete the written assessments. Course Information Venue: All our 'Open' courses are delivered from our dedicated training venue: Pulse South Coast Ltd, Bentley Wildfowl, Harveys Lane, Ringmer, BN8 5AF On occasion we may use a separate venue, this will be advised on the course booking. Facilities: On your course you will be provided with tea & coffee making facilities and biscuits. We are in a rural location so we recommend brining lunch with you on the day. There is a microwave & fridge on site for your use. There is a garage that is approximately a 10 minute drive from our venue. Parking: We have a dedicated car park that is approximately a 300m walk to the training venue. There is no additional cost to use this parking. We accept no responsibility for any personal loss or theft while you are on our training courses or premises. Please ensure to keep your personal belongings safe at all times. What is required from you: All courses are delivered in English, you must have a basic understanding of the English language to attend. There is a requirement for you to show that you are capable of performing the skills you are taught on the course, due to this you will need to be physically able to demonstrate all practical elements of the course. Dress: As a company we pride ourselves on running immersive & practical training courses. You will often be expected to kneel & work outdoors, please dress appropriately. Identification: As we deliver Ofqual accredited courses, there is a requirement for you to show a form of ID on the first day of the course. This could be; a driving license, passport or something that clearly shows who you are. Timings: All of our courses have a minimum training time of six hours a day, we will often advertise a course as seven hours to include break times. On occasion it is required to go over the scheduled times, however this will always be discussed with the group on the day. Trainer: During your course you will have a designated trainer for the duration. They are there not only to assess for the qualification, but to offer you guidance and support throughout. Security: We accept no responsibility for any personal loss or theft while you are on our training courses or premises. Please ensure to keep your personal belongings safe at all times.