In this course we explore how we have attempted to build inclusive circles of support around individuals and contrast this with a radical approach to hospitality and community building – the Community Circle. The purpose of community circles is to bring people from a local community together to share their skills, talents, gifts and resources. This idea is based upon the premise that ALL of us need three things in our lives to make us happy and fulfilled: these are money, friendship and meaning. We believe that everyone needs community, everyone needs to be heard and everyone needs to have fun. Online Course now available via Teachable Platform – Creating Community Circles Learn at your own pace… lots of text and video support Category Inclusion Peer Support Parents and Carers Description Building Community Circles In this course we explore how we have attempted to build inclusive circles of support around individuals and contrast this with a radical approach to hospitality and community building – the Community Circle. The purpose of community circles is to bring people from a local community together to share their skills, talents, gifts and resources. This idea is based upon the premise that ALL of us need three things in our lives to make us happy and fulfilled: these are money, friendship and meaning. We believe that everyone needs community, everyone needs to be heard and everyone needs to have fun. Community Circles are based upon reciprocity and the assumption that EVERYONE has both gifts and needs – whether these are labelled or not. The circles adopt the fundamental value of inclusion that ‘all means all’, no one is excluded from community circles, instead the circle members work out how to include everyone equally and safely. A community circle is made up of participants and allies from the local community. The meeting starts with everyone sharing food and conversations. Next the group comes together in a circle so that everyone can see each other and shares what is good and new in their lives, everyone gets a turn to be listened to. ‘New and Good’ breaks the habit of thinking about and acting from what’s wrong, it is an exercise of giving and receiving attention with one another and it also provides a strong foundation of strengths from which we can think about and tackle difficulties. The group is then asked the question what do they want, need or have to offer. Community circles provide a great foundation or starting point from which to explore connections, build relationships, locate resources and share skills. These circles will be a particularly important resource for Brokers and the people that they work for. They provide a safe forum in which people can meet and friendships can start, a natural reservoir of people and relationships where people can be invited to offer their time and capacity. To be successful we have to start from a belief in inclusion. A belief that: 1 We are all born ‘in’. 2 All means all. 3 Everyone needs to belong. 4 Everyone is ready. 5 Everyone needs support. 6 Everyone can communicate. 7 Everyone can contribute. 8 Together we’re better. Learning Objectives For participants to learn how to create a Community Circle. For participants to understand the underlying rationale and ethos of this way of working. To explore ways of maximising an individual’s inclusion and connection with the wider community. To explore ways of helping with friendship, social connection and education. To increase confidence, social skills and presence of disabled adults and those with a wide range of need in their local community by focusing on their contribution. Who Is It For? Anyone interested in mobilising the community to make it more inclusive around disabled or challenging individuals. Course Content Understanding ordinary needs – plus the true dimensions of social inclusion Building relationships Creating natural circles of support Creating a community circle If you like this you will almost certainly enjoy: Person Centred Planning using PATH and MAPS
In this workshop we explore how to understand movement differences of those with ADHD/Autism, Tourettes or Cerebral Palsy in a non-medical way. Online course coming soon Online Course now available via Teachable Platform – Understanding Movement Differences Learn at your own pace… lots of text and video support Course Category Inclusion Autism and Communication Behaviour and Relationships Description In this workshop we explore how to understand movement differences of those with ADHD/Autism, Tourettes or Cerebral Palsy in a non-medical way. Learning Objectives To understand movement differences using a respectful model that helps us all empathise For participants to understand the underlying rationale and ethos of this way of working To explore ways of maximising an individual’s inclusion and connection with the wider community through useful strategies around their movement challenges To explore ways of helping with movement accommodations Who Is It For? Anyone interested in mobilising the community to make it more inclusive around disabled or challenging individuals. Course Content • Understanding movement differences: stopping/starting/executing/switching and combining • Inclusion strategies • Building relationships • Frameworks of support
LOOKING FOR: ADULT FICTION, NON-FICTION Donald Winchester began his publishing career at Penguin Press – working on a variety of non-fiction titles – before moving to A P Watt, then the world’s oldest literary agency. There he worked for five years with a number of acclaimed and prize-winning authors and began building a list of fiction and non-fiction for adults. He joined Watson, Little as an agent in 2013. Donald is building his list and is interested in literary fiction and well-written commercial fiction, particularly debut authors, as well as memoir. He is particularly interested in literary fiction which maintains a high level of prose, pushes boundaries of style, while retaining emotional heart and a sense of plot. He’s also looking for upmarket fiction which builds a fully-formed plot with a satisfying emotional arc, whether that be historical or contemporary – and the mixing of tropes from genre fiction (crime, sci-fi, romance, etc) also interest him. In non-fiction, he is keen to see writing on history, popular science, social issues, nature, music, sport, film and technology. In all these areas he’s looking for experts in their fields who can convey their expertise and enthusiasm to a wide audience in an appealing way. Donald would like you to submit a covering letter, 1 - 2 page synopsis and the first three chapters of your manuscript in a single word document. (In addition to the paid sessions, Donald is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 22 January 2025
Software development training course description This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-361, and build an understanding of these topics: Core programming, Object-Oriented programming, general software development, web applications, desktop applications, and databases. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. What will you learn Describe core programming. Explain Object Oriented programming. Describe general software development. Describe Web applications. Describe desktop applications. Explain how databases work. Software development training course details Who will benefit: Anyone looking to learn the fundamentals of software. Prerequisites: None. Duration 3 days Software development training course contents Core programming Computer storage and data types How a computer stores programs and the instructions in computer memory, memory stacks and heaps, memory size requirements for the various data storage types, numeric data and textual data. Computer decision structures Various decision structures used in all computer programming languages; If decision structures; multiple decision structures, such as Ifâ¦Else and switch/Select Case; reading flowcharts; decision tables; evaluating expressions. Handling repetition For loops, While loops, Do...While loops and recursion. Understand error handling Structured exception handling. Object-oriented programming Classes Properties, methods, events and constructors; how to create a class; how to use classes in code. Inheritance Inheriting the functionality of a base class into a derived class. Polymorphism Extending the functionality in a class after inheriting from a base class, overriding methods in the derived class. Encapsulation Creating classes that hide their implementation details while still allowing access to the required functionality through the interface, access modifiers. General software development Application life cycle management Phases of application life cycle management, software testing. Interpret application specifications Application specifications, translating them into prototypes, code, select appropriate application type and components. Algorithms and data structures Arrays, stacks, queues, linked lists and sorting algorithms; performance implications of various data structures; choosing the right data structure. Web applications Web page development HTML, CSS, JavaScript. ASP.NET web application development Page life cycle, event model, state management, client-side versus server-side programming. Web hosting Creating virtual directories and websites, deploying web applications, understanding the role of Internet Information Services. Web services Web services that will be consumed by client applications, accessing web services from a client application, SOAP, WSDL. Desktop applications Windows apps UI design guideline categories, characteristics and capabilities of Store Apps, identify gestures. Console-based applications Characteristics and capabilities of console- based applications. Windows Services Characteristics and capabilities of Windows Services. Databases Relational database management systems Characteristics and capabilities of database products, database design, ERDs, normalisation concepts. Database query methods SQL, creating and accessing stored procedures, updating and selecting data. Database connection methods Connecting to various types of data stores, such as flat file; XML file; in-memory object; resource optimisation.
IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death⦠keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.
Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification. Overview Install and configure mobile devices Compare and contrast networking hardware Configure internet connections and wireless networking Troubleshoot hardware and networks Install motherboards, RAM, storage devices, CPUs and add-on cards Deploy and configure connected devices Summarize cloud-computing concepts and virtualization CompTIA A+ certified professionals are proven problem solvers. They support today's core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today's digital world. It is the only industry-recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end-point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace. Prerequisites While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training. Lesson 1: Installing Motherboards and Connectors Topic 1A: Explain Cable Types and Connectors Topic 1B: Install and Configure Motherboards Topic 1C: Explain Legacy Cable Types Lesson 2: Installing System Devices Topic 2A: Install and Configure Power Supplies and Cooling Topic 2B: Select and Install Storage Devices Topic 2C: Install and Configure System Memory Topic 2D: Install and Configure CPUs Lesson 3: Troubleshooting PC Hardware Topic 3A: Apply Troubleshooting Methodology Topic 3B: Configure BIOS/UEFI Topic 3C: Troubleshoot Power and Disk Issues Topic 3D: Troubleshoot System and Display Issues Lesson 4: Comparing Local Networking Hardware Topic 4A: Compare Network Types Topic 4B: Compare Networking Hardware Topic 4C: Explain Network Cable Types Topic 4D: Compare Wireless Networking Types Lesson 5: Configuring Network Addressing and Internet Connections Topic 5A: Compare Internet Connection Types Topic 5B: Use Basic TCP/IP Concepts Topic 5C: Compare Protocols and Ports Topic 5D: Compare Network Configuration Concepts Lesson 6: Supporting Network Services Topic 6A: Summarize Services Provided by Networked Hosts Topic 6B: Compare Internet and Embedded Appliances Topic 6C: Troubleshoot Networks Lesson 7: Summarizing Virtualization and Cloud Concepts Topic 7A: Summarize Client-Side Virtualization Topic 7B: Summarize Cloud Concepts Lesson 8: Supporting Mobile Devices Topic 8A: Set Up Mobile Devices and Peripherals Topic 8B: Configure Mobile Device Apps Topic 8C: Install and Configure Laptop Hardware Topic 8D: Troubleshoot Mobile Device Issues Lesson 9: Supporting Print Devices Topic 9A: Deploy Printer and Multifunction Devices Topic 9B: Replace Print Device Consumables Topic 9C: Troubleshoot Print Device Issues
Person centred rehabilitation is designed to create a better life for an individual by the provision of an intense input designed to being about social change. This usually entails a series of visits focused on getting the person out and about to increase confidence, social skills and presence in their local community and to pursue goals and dreams. Usually, the work is carried out under the close clinical supervision of a practicing psychologist. Course Category Inclusion Person Centred Planning Visioning and Problem Solving Peer Support Description Person Centred Rehabilitation Person centred rehabilitation is designed to create a better life for an individual by the provision of an intense input designed to being about social change. This usually entails a series of visits focused on getting the person out and about to increase confidence, social skills and presence in their local community and to pursue goals and dreams. Usually, the work is carried out under the close clinical supervision of a practicing psychologist. PERSON CENTRED PLANNING A Person Centred Planning event would be carried out using the PATH or MAP process – majoring on dreams and goal setting leading to precise action planning. Facilitators would carry out the PATH or other person centred process. A large graphic will be one of the outcomes of the meetings this is a great visual record and a shared memory of the event. This will also inform the priorities for the later follow up inclusion facilitation work. Following the PATH event a ‘scoping report’ is created outlining what Inclusion Facilitation could offer and highlighting what dreams and goals the individual has. INCLUSION FACILITATION The PATH is also provides a good opportunity for the Facilitator to meet the focus person in a comfortable positive environment. Agreed visits from the Inclusion Facilitator are then carried out over a 3 month period. After this intensive input the Inclusion Facilitator will hand over to the existing family, carers and PA team to carry on where he or she has left off. This transition time is planned from the outset. An experienced psychologist needs to be there to support the facilitator at all times and will guide all work done by the inclusion facilitator. Is this just Support work? No! This is proactive engagement – doing whatever is required. This is not passively or reactively providing what is asked for – we are actively pursuing a good life for the individual. The work is built on careful research around a person’s interests and what opportunities exist locally There is community mapping There is work to tackle an individual’s own resistance and reluctance to engage more socially There is a need to engage with people in social settings that the individual attends to build bridges and connections – we are bridge builders You will need to build circles around a person There is a need to create the conditions in which friendships can flourish There is a need for direct psychological supervision and support throughout This work is short term and intense. The facilitator’s main aims will vary depending on the dreams and goals of the focus person. The basic aim of the inclusion facilitator is to better the focus person’s quality of life. Learning Objectives 1 To create a better life for the Individual. 2 Give Individual and family a clear vision of a good life and to support first steps towards this 3 To maximise individuals inclusion and connection with the wider community. 4 To help with friendship, social connection and education 5 To increase confidence, social skills and presence in their local community and to pursue goals and dreams. Who Is It For? Anyone who is involved in the rehabilitation of children or adults who have become disabled through accident or trauma and who is committed to helping them get their life back on track. Course Content Understanding ordinary needs – the dimensions of social inclusion Pursuing the dreams and goals of the individual Improving social skills Community Mapping Being comfortable in social environments Developing conversational skills Having a positive mindset Staying physically active Building relationships Help in meeting new people Create natural circles of support Creating a community circle Having positive body language Employment of support staff Pursuing personal interests If you like this you will almost certainly enjoy: Person Centred Planning using PATH and MAPs
Network+ training course description This network+ course covers the TCP/IP side of the exam. For delegates to pass the exam it is important that they meet the prerequisites, self study is also required. An intensive hands on IP foundation. The course focuses on all parts of TCP/IP including layers 4 to 7 on end stations as well as layer 3 on routers. The TCP/IP protocols are also studied to enable delegates to be able to troubleshoot TCP/IP using Wireshark. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Use ping, traceroute and other tools to diagnose faults on a network. Configure IP on PCs and routers. Plan IP addresses and subnets. Analyse IP and TCP packets using an analyser. Troubleshoot TCP/IP. Network+ training course details Who will benefit: Those wishing to pass the Network+ exam. Prerequisites: Introduction to data communications & networking Duration 5 days Network+ training course contents What is TCP/IP? TCP and IP are protocols, 7 layer model, network layers, hardware/software layers, internetworking, protocols, What is IP? What is TCP? The internet, The IAB, RFCs. Ping and Wireshark Host configuration, IP addresses, subnet masks, default gateways, ping. Hands on Base configuration. Testing with ping. Analysing packets with Wireshark. Switches and Wireshark Switches versus hubs, layer 2 forwarding table, flooding, broadcasts. Hands on Building a switched based network. Configuring network devices Configuration options, console port, putty, telnet. Hands on Configuring switches, telnet. IP IP packet format, protocol field, TTL, DiffServ, fragments, ICMP. Hands on IP packet analysis. IP addressing 32 bits, dotted decimal, rules, networks, role of subnet masks, simple subnetting, prefix notation. Broadcasts, special use addresses. Hands on Planning and implementing addressing. IP and the lower layers ARP, media not supporting ARP. Hands on ARP. Routing What are routers? What routers do, default gateways, routing and addressing, routing tables, ways to update routing tables. Hands on Building a routed network, traceroute. Routing protocols IGPs and EGPs, RIP, RIPv2, Why not to use RIP, OSPF, OSPF metrics, convergence, distance vector protocols, link state protocols. Hands on OSPF, analysing routing tables, loopbacks. Network simulators Network simulators, EVE-NG, GNS3, CML. Hands on Using EVE-NG. Subnetting Subnetting to the bit level, ranges, how prefixes are used. Hands on Subnetting. VLANS and IP addressing What are VLANs, tagging, 802.1Q, Inter VLAN routing. Hands on Inter VLAN routing. TCP and UDP Layer 4, port numbers, client ports, broadcasts multicasts and layer 4, UDP header, TCP header, connections, ACK, sliding windows, options, connection states. Sockets. Hands on Analysing TCP packets. IPv4 address configuration Private addresses, NAT, NAPT, dynamic addressing, DHCP, link local addresses. Hands on DHCP, NAT. IPv6 What is IPv6, 128 bit addresses, address formats, IPv6 address allocation, header format, migration, dual stack, tunnelling, NAT64, DNS64. Hands on IPv6 setup troubleshooting. IPv6 address configuration Static addressing, EUI-64 addresses, IPv6 address order, SLAAC, DHCPv6. Hands on SLAAC. Applications Clients, servers, HTTP, Email, resource sharing, VoIP, video, terminal emulation, remote desktop. Network management and SNMP. Hands on Servers, TFTP, VoIP packet analysis. DNS Names and addresses, hosts file, how DNS works. FQDNs, DNS client configuration. Hands on Troubleshooting DNS. Security Firewalls, firewall architectures, DMZ, how firewalls work, proxy servers, filtering, ACLs, IDS, VPNs, authentication, encryption, tunnels, secure protocols. Hands on Firewalls, SSH Troubleshooting Methods, tools. Using the 7 layer model. Troubleshooting toolkits. Hands on Fixing the network.
MySQL Performance & Tuning training course description This MySQL Performance & Tuning course is designed for Database Administrators, Application Developers and Technical Consultants who need to monitor and tune the performance of MySQL servers and databases. The course provides practical experience in monitoring and tuning MySQL servers and databases. Note: This MySQL Performance & Tuning course does not cover clustering (other than at overview level), replication or non-standard storage engines such as Falcon and PBXT. What will you learn Develop a monitoring and tuning plan Use server configuration and status variables. Identify and improve problem queries. Make efficient use of indexes. Monitor and size memory caches and locks. Tune the MyISAM and InnoDB storage engine. Evaluate the use of partitioning for performance. MySQL Performance & Tuning training course details Who will benefit: Anyone who wishes to monitor and tune MySQL performance. Prerequisites: Delegates must have a working knowledge of MySQL Database Administration Duration 3 days MySQL Performance & Tuning training course contents Introduction to performance tuning Tuning overview, Resolving performance issues, Recommended approach to tuning, Items to evaluate, Where to look, Planning a monitoring routine, Building a new database for performance, Tuning an existing database, Setting suitable goals. MySQL performance tuning tools Administration tools, the information schema, performance-related SHOW commands, benchmarking tools, the MySQL performance schema, MonYog. Hands on Obtaining performance information. Schema design Normalisation, de-normalisation, naming conventions, load generation, stress testing and benchmarking tools, selecting data types, data types, character sets, choosing storage engines. Hands on effects of design on performance. Statement tuning Overview of statement tuning, identifying problem queries, the optimizer, explain, explain extended. Hands on identifying problem queries and using explain. Indexes Index overview, Types of index, Index tuning, Indexes and joins. Hands on Indexes and performance. Server configuration and monitoring Server configuration variables, server status variables, table cache, multi-threading, connection issues, query cache. Hands on setting and interpreting server variables and caching. Locking Types of locking, locking and storage engines, effects of locking on performance. Hands on locking and performance. The InnoDB engine Transactions, crash recovery, locking, monitoring InnoDB, caches and buffers, configuring data files, configuring the log files. Hands on InnoDB configuration and performance. Other storage engines MyISAM engine, merge engine, archive engine, memory engine, blackhole engine, CSV engine, the Spider engine, the ColumnStore engine, the MyRocks engine, mixing sorage engines. Hands on storage engine performance. Overview of clustering and performance Advantages of performance, advantages of clustering, performance issues and clustering, the NDBCluster engine, the Galera cluster, the Percona XtraDB cluster, MySQL InnoDB cluster, the federated engine, the federatedX engine, overview of other high availability techniques. NOSQL and Mencached overview. Dumping and loading data SQL statements versus delimited data, parameters affecting dump performance, parameters affecting load performance. Hands on dump and load performance. Partitioned tables Partitioned tables concepts, range partitioning, hash partitioning, key partitioning, list partitioning, composite partitioning or subpartitioning, partition pruning. Hands on partitioned table performance.
Introducing Therapy for Retroactive Jealousy Package: Overcoming Intrusive Thoughts and Fostering Emotional Well-being Are you struggling with retroactive jealousy, finding it difficult to cope with intrusive thoughts and emotions related to your partner’s past relationships? Miss Date Doctor’s Therapy for Retroactive Jealousy Package offers you expert support and guidance to overcome jealousy and foster emotional well-being in your current relationship. Retroactive jealousy is an emotional challenge that can cause distress and strain in relationships. Our experienced therapists are dedicated to helping you understand and manage these feelings, allowing you to build a healthier and more trusting connection with your partner. Here’s how the Therapy for Retroactive Jealousy Package can support you: Understanding Retroactive Jealousy: Our therapists will help you gain insights into the root causes of retroactive jealousy and its impact on your emotional well-being. Coping Strategies: We’ll equip you with effective coping strategies to manage intrusive thoughts and emotions, helping you reduce anxiety and distress. Building Self-Confidence: Therapy for retroactive jealousy can assist in building self-confidence and self-assurance, allowing you to feel more secure in your relationship. Effective Communication: We’ll guide you in improving communication with your partner about your feelings, fostering understanding and emotional connection. Developing Trust: Therapy will focus on rebuilding trust in your relationship, addressing any underlying issues that may contribute to feelings of jealousy. Letting Go of the Past: Our therapists will assist you in processing and letting go of obsessive thoughts related to your partner’s past. Positive Mindset: We’ll work towards cultivating a positive mindset, encouraging you to focus on the present and future rather than dwelling on the past. Embracing Emotional Intimacy: Therapy for retroactive jealousy can help you and your partner cultivate emotional intimacy and strengthen your bond. The Therapy for Retroactive Jealousy Package at Miss Date Doctor is designed to empower you to overcome jealousy and create a more fulfilling and trusting relationship. Our caring therapists provide a safe and supportive space to explore your feelings and concerns, allowing you to work towards emotional healing and a stronger connection with your partner. Invest in your emotional well-being and take the first step towards overcoming retroactive jealousy with the Therapy for Retroactive Jealousy Package. Embrace the opportunity to foster a more secure and loving relationship, free from the burden of intrusive thoughts and jealousy. Let our experienced therapists guide you towards a brighter and more emotionally fulfilling future. 3 x 1 hour sessions https://relationshipsmdd.com/product/therapy-for-retroactive-jealousy/