• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5414 Sciences courses

Somato-Limbic-Metacognitive-(SLM)Process

By Simon Lee Maryan Lt

The Negative Thought Pattern Interrupt does exactly what it says Course curriculum 1 Welcome to the course! Welcome from Simon Lee Maryan, Course Creator What is the Somato-Limbic Metacognitive Process (SLM Process)? CPD Accreditation About the Course Creator How to Navigate this course What Are Your Initial Outcomes SLM Process Course Learning Outcomes Individual Change Readiness Assessment 2 Part 1 - Theory Part 1 - Introduction Video 3 Bonus Module 1: Psychological and Physiological Effects of Stress Lesson BM1.1: Stress and Work Lesson BM1.2: Types of Stress and Causes Lesson BM1.3: Physical Effects of Stress - Musculoskeletal Lesson BM1.4: Physical Effects of Stress - Respiratory Lesson BM 1.5: Physical Effects of Stress - Cardiovascular Lesson BM 1.6: Physical Effects of Stress - Endocrine Lesson BM 1.7: Physical Effects of Stress - Gastrointestinal Lesson BM 1.8: Physical Effects of Stress - Nervous Lesson BM1.9 - Psychological Effects of Stress 4 Bonus Module 2: Psychological and Physiological Effects of Fatigue Lesson BM2.1: Definition of Fatigue Lesson BM2.2: Types of fatigue and Causes Lesson BM2.3: Psychological Effects of Fatigue Lesson BM2.4: Methods to Manage Stress and Fatigue 5 Module 1: Foundation Theory Lesson 1.1: The Principles for SuccessFREE PREVIEW Lesson 1.2: Creating Outcomes with Positive Effect Lesson 1.3: Setting an Intervention Up For Success Lesson 1.4: Cause and Effect Lesson 1.5: The Mind-Body Connection Lesson 1.6: Neurological Connections Lesson 1.7: The Presuppositions for Life Module 1 Assessment 6 Module 2: Communication Principles and Skills Module 2: Introduction Video Lesson 2.1: A Communication Model Lesson 2.2: Observing Body Language and Non-Verbal Communication Lesson 2.2.1: Behavioural Profiling Aide Memoire Lesson 2.2.2: Basic Behavioural Profiling Exercises Lesson 2.3: Rapport - What is it, how do we build and maintain it? Lesson 2.4: Our Senses and Language Lesson 2.4.1: Exercise - Sensory Preference Lesson 2.4.1 - Exercise Worksheet Lesson 2.5: Predicate Language Module 2 Assessment 7 Module 3: Eye Movement Patterns Module 3 Introduction Video Lesson 3.1: Eye Movement Pattern Cues Lesson 3.2: How to Elicit Eye Patterns Lesson 3.3: Eye Tracking Exercise Lesson 3.3.1 Eye Tracking Exercise Sheet - PDF Lesson 3.4: Synesthesia Module 3 Assessment 8 Module 4: Submodalities Module 4 Introduction Video Lesson 4.1: Modalities and Submodalities Lesson 4.2: Possible uses for Changing Submodalities and How to Elicit Them Lesson 4.3: Using Submodalities for Change Lesson 4.3.1: Exercise - Submodality Change Video: How to use the Submodality Checklist Lesson 4.3.2: Submodality Checklist PDF Module 4 Assessment 9 Module 5: The Limbic System, Memory and Brain Activity Module 5: Introduction Video Lesson 5.1: How the Limbic System Affects Memory Lesson 5.1.1: Memory Graphics - Downloads Lesson 5.2: Perceptual Blindness and Conscious Overload Lesson 5.3: Brain Activity and Brain Waves Lesson 5.4: Circadian Rhythm Lesson 5.4.1: Exercise Worksheet - Sleep Diary Lesson 5.5:Ultradian Rhythm Module 5 Assessment 10 Module 6: Influences on Your State of Mind, Emotions, Beliefs and Decisions Module 6: Introduction Video Lesson 6.1: Influences on Your State of Mind Lesson 6.2: Emotional Response vs Decisions Lesson 6.3: Beliefs Lesson 6.4: Identifying Limiting Beliefs Lesson 6.4.1: Exercise Worksheet - Identify Your Limiting Beliefs Lesson 6.5: Limiting Beliefs - Framing Principle, Frame of Reference Lesson 6.5.1: Reframing, Schemas, Meaning Lesson 6.5.2 - Exercise Worksheet - Identify Your Frames of Reference, Schemas and Meaning Lesson 6.6: Values Lesson 6.6.1: Values Exercise Video Explanation Lesson 6.6.1 - Values Exercise WorkSheet Lesson 6.6.2: Beliefs Behind Your Values Video Explanation Lesson 6.6.2 - Exercise Worksheet 2 - Beliefs Behind Your Values Module 6 Assessment 11 Module 7:The Logical Levels Model for Personal Change Module 7: Introduction Video Lesson 7.1: An Introduction to the Logical Levels Model Lesson 7.2: Logical Levels - Environment Lesson 7.3: The logical Levels - Behaviour Lesson 7.4: The Logical Levels - Capability Lesson 7.5: The Logical Levels Model - Beliefs and Values Lesson 7.6: The Logical Levels Model - Identity Lesson 7.7: The Logical Levels Model - Purpose Video Explanation of Personal Exploration Exercise Lesson 7.8: Personal Exploration Exercise - PDF Module 7 Assessment 12 Module 8: Behavioural Change Module 8: Introduction Video Lesson 8.1: The Behavioural Change Learning Cycle Behavioural Change Learning Cycle - Video Explanation Behavioural Change Learning Cycle PDF Lesson 8.2: The Intentional Change Model Lesson 8.2.1: Reflective Exercise - Who Helped Me and Who Tried Lesson 8.3: The Intentional Change Model Cont. Module 8 Assessment 13 Part 2 - Techniques Part 2 - Techniques Introduction 14 Module 9: Negative Thought Pattern Interrupt Lesson 9.1: Negative Thought Pattern Interrupt - What Is It? Lesson 9.2: NTPI - The Process Overview Lesson 9.3: NTPI - The Process in Detail Lesson 9.4: NTPI - Live Video Demo with Client Lesson 9.5: NTPI Assignment 15 Module 10: The Whole Brain State Lesson 10.1: The Whole Brain State (WBS) - Description Lesson 10.2: WBS - The Process Lesson 10.3: The Whole Brain State - Live Video Demo with Client Lesson 10.4: Whole Brain State Assignment 16 Module 11: Anchoring Lesson 11.1: Brief History of Anchoring Lesson 11.2: Uses of Anchoring Lesson 11.3: 5 Keys to Anchoring - ITURN Lesson 11.4: The Anchoring Process Lesson 11.4.1: Icarus Anchoring Process - PDF Download Lesson 11.5: Anchoring - Live Video Demo with Client Lesson 11.6: Anchoring Assignment Lesson 11.7: How to Bring all Three Techniques Together 17 Module 12: Eye Patterning and Re-imprinting Lesson 12.1: What Is Eye Patterning and Re-Imprinting Lesson 12.2: What Are Memories & Imprints & How Are They Created? Lesson 12.3: Brick Walls and Feeling Stuck Lesson 12.4: Eye Patterning and Re-imprinting Process Lesson 12.5: EPRI - Live Video Demo with Client Lesson 12.6: Eye Patterning and Re-imprinting Assignment 18 Module 13: Swish Pattern Lesson 13.1: The Swish Pattern Lesson 13.2: Keys To Successful SWISH Patterns Lesson 13.3: SWISH Pattern Guide Script 19 Module 14: Purpose Lesson 14.1: Purpose Lesson 14.2: Your Purpose Statement - Exercise Worksheet 20 Module 15: Case Studies Assignment Lesson 15.1 - Case Study Assignment Lesson 15.2: Sample Case Studies and Informed Consent Form 21 Bonus Module 3: Personal Needs Lesson B3.1: How are Your Personal Needs Being Fulfilled? Lesson B3.1 - Exercise Worksheet - Hierarchy of Needs 22 Next steps More resources for you Before you go...Please leave us your thoughts on your experience of this course. This is invaluable to us as it means you are helping us to continuously improve our courses as we learn from you.

Somato-Limbic-Metacognitive-(SLM)Process
Delivered Online On Demand
£1,495

NVQ Level 2 Diploma in Construction Operations and Civil Engineering Services - Roadbuilding

5.0(29)

By Site Competence

Blue CSCS Card Level 2 NVQ Diploma in Construction Operations and Civil Engineering Services - Roadbuilding This qualification provides you with the opportunity to showcase their knowledge, skills and understanding in their chosen within the Civil Engineering and Highways Sector. You will have the relevant experience at least one of the 14 specific specialisms. You will work in one of the following areas: Pathway 1: Bituminous Paving - Machine Pathway 2: Concrete Paving - Machine Pathway 3: Slurry/Micro Surfacing - Machine Pathway 4: Slurry/Micro Surfacing - Manual Pathway 5: Surface Dressing - Machine Pathway 6: High Friction Surfacing - Machine Pathway 7: High Friction Surfacing - Manual Pathway 8: Planing - Machine Pathway 9: Road Recycling - Machine Pathway 10: Soil Stabilisation - Machine Pathway 11: Surface Retexturing - Machine Pathway 12: Pavement Marking - Machine Pathway 13 Pavement Marking - Manual operations Pathway 14: Pavement Marking - Road Studs Induction - As soon as you register you will be given a dedicated assessor. They will arrange an induction and together with your assessor, you will get to decide on the pathway which best proves your competency. The induction is used to plan out how you will gather the relevant evidence to complete the course. During the course - The assessor will work with you to build a portfolio of evidence that allows you to showcase your knowledge, skills and experience. The assessor will also regularly review and provide you with feedback. This will allow you to keep on track to progress quickly. You will be assessed through various methods such as observations, written questions, evidence generated from the workplace, professional discussion, and witness testimonials. On completion - Once all feedback has been agreed, the Internal Quality Assurer will review your portfolio and in agreement with your assessor the certificate will be applied for. To download our PDF for this course then please click here.

NVQ Level 2 Diploma in Construction Operations and Civil Engineering Services - Roadbuilding
Delivered In-Person in Market Rasen or UK WideFlexible Dates
£840

NVQ Level 2 Diploma in Construction Operations and Civil Engineering Services Construction Operations (Groundworks)

5.0(29)

By Site Competence

Blue CSCS Card Level 2 NVQ Diploma in Construction Operations and Civil Engineering Services Construction Operations (Groundworks) Induction - As soon as you register you will be given a dedicated assessor. They will arrange an induction and together with your assessor, you will get to decide on the pathway which best proves your competency. The induction is used to plan out how you will gather the relevant evidence to complete the course. During the course - The assessor will work with you to build a portfolio of evidence that allows you to showcase your knowledge, skills and experience. The assessor will also regularly review and provide you with feedback. This will allow you to keep on track to progress quickly. You will be assessed through various methods such as observations, written questions, evidence generated from the workplace, professional discussion, and witness testimonials. On completion - Once all feedback has been agreed, the Internal Quality Assurer will review your portfolio and in agreement with your assessor the certificate will be applied for. To download our PDF for this course then please click here.

NVQ Level 2 Diploma in Construction Operations and Civil Engineering Services Construction Operations (Groundworks)
Delivered In-Person in Market Rasen or UK WideFlexible Dates
£840

NVQ Level 2 Diploma in Construction Operations and Civil Engineering Services - Highways Maintenance

5.0(29)

By Site Competence

Blue CSCS Card Level 2 NVQ Diploma in Construction Operations and Civil Engineering Services - Highways Maintenance Induction - As soon as you register you will be given a dedicated assessor. They will arrange an induction and together with your assessor, you will get to decide on the pathway which best proves your competency. The induction is used to plan out how you will gather the relevant evidence to complete the course. During the course - The assessor will work with you to build a portfolio of evidence that allows you to showcase your knowledge, skills and experience. The assessor will also regularly review and provide you with feedback. This will allow you to keep on track to progress quickly. You will be assessed through various methods such as observations, written questions, evidence generated from the workplace, professional discussion, and witness testimonials. On completion - Once all feedback has been agreed, the Internal Quality Assurer will review your portfolio and in agreement with your assessor the certificate will be applied for. To download our PDF for this course then please click here.

NVQ Level 2 Diploma in Construction Operations and Civil Engineering Services - Highways Maintenance
Delivered in Market Rasen or UK Wide or OnlineFlexible Dates
£840

Relay Protection in Power Systems

By EnergyEdge - Training for a Sustainable Energy Future

Elevate your understanding of relay protection in power systems with EnergyEdge's specialized classroom training course and gain valuable insights.

Relay Protection in Power Systems
Delivered in Internationally or OnlineFlexible Dates
£1,499 to £1,699

Electrical Generators, Excitation Systems and Governing Systems

By EnergyEdge - Training for a Sustainable Energy Future

Take your understanding of electrical generators, excitation systems, and governing systems to the next level with EnergyEdge's classroom training. Enroll now and excel in your field!

Electrical Generators, Excitation Systems and Governing Systems
Delivered In-PersonFlexible Dates
£2,799 to £2,999

IMPORTANCE OF INTERNATIONAL DOCUMENTATION

By Export Unlocked Limited

This module aims to develop knowledge and understanding of the importance of customs documentation in the world of international trade to ensure both parties clearly understand the documentation that will be required in the import or export of goods or services.

IMPORTANCE OF INTERNATIONAL DOCUMENTATION
Delivered Online
£395

Gain valuable insights into power systems with EnergyEdge's classroom training course. Take the first step towards expertise.

Introduction to Power Systems
Delivered In-PersonFlexible Dates
£2,699 to £2,799

This Coaching Program is unlike any other Coaching certification in the Market, It gives you the exclusive opportunity to be qualified as an Executive & Life Coach, as well as learn the NLP tools and the business building aspect.

Success Coaching Diploma
Delivered OnlineFlexible Dates
£1,500

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495