Archives: Shop

Showing 61–75 of 103 results

  • Obsessive-Compulsive and Histrionic Personality Disorder (3.5 Hours)

    $29.99

    Obsessive-compulsive personality disorder is one of the most common clinical entities on Axis II of DSM-IV. It is frequently confused with obsessive-compulsive disorder, and the differences will be outlined. The psychodynamic underpinnings of OCPD will be discussed, and the optimal psychotherapeutic approaches will be illustrated. Randomized controlled trials validated the efficacy of psychodynamic psychotherapy in the treatment of OCPD.

    Histrionic personality disorder has a time-honored tradition that links it with hysterical personality disorder. The two can be considered as residing on a continuum with histrionic personality disorder having more in common with borderline personality disorder, while hysterical personality disorder has more in common with character neuroses. Some of the underlying psychodynamic features will be discussed, and psychotherapeutic strategies will be outlined.

    This training covers:

    • The major psychodynamic themes in obsessive-compulsive personality disorder
    • The difference between obsessive-compulsive disorder and obsessive-compulsive personality disorder
    • Optimal psychotherapeutic strategies with patients who have obsessive-compulsive personality disorder
    • The major psychodynamic themes in histrionic and hysterical personality disorders
    • Diagnostic differences and the strategic therapeutic differences between hysterical and histrionic personality disorders
    • Management of erotic and eroticized transferences in histrionic personality disorder as well as patients who are hysterically organized

    On-Demand Video

    Continuing Education (CE credit): 3.5 hours – Contact Us for Continuing Education credits and costs.

    Presenter: Glen Gabbard, M.D.

    Venue: Live Conference Presentation

    Location: San Diego, CA

  • On-Demand Video WAVR-21 Training presented by Stephen White PhD

    NEW, On-demand video, 5-hour, small-group training on the WAVR-21 V-3, presented by Stephen White, PhD–one of the developers of the tool.

    Access is limited to small groups. Contact info@SpecializedTraining.Com for more information.

    For more information on the WAVR-21 V-3, or to purchase the manual or coding booklets, Click Here.

  • Sale!

    Paranoia and Violence (2 APA CUs)

    Original price was: $69.99.Current price is: $49.99.

    This 2-hour training on the relationship between paranoia and violence is provided by one of the nation’s leading experts on the topic, Phill Resnick, MD.

    The training addresses paranoia and the related characteristics and behaviors suggestive of impending violence
    Learning objectives
    Students will be supported to:
    • Employ strategies for improving risk assessment with paranoid individuals
    • Identify motives and triggers correlated with violence committed by paranoid individuals
    • Distinguish between making a threat and posing a threat
    2 hours of APA Continuing Education

    Specialized Training Services is approved by the American Psychological Association to sponsor continuing education for psychologists. Specialized Training Services maintains responsibility for this program and its content.

    This program was originally delivered in July, 2024, via Zoom for the University of Michigan’s Center for Forensic Psychiatry
  • Pathways from Childhood Aggression to Adolescent Violence (3.5 Hours)

    $29.99

    One of the important developmental starting points in understanding violence is that physical aggression is essentially universal in infants (and equally so for males and females). Early trauma creates risk that this early aggression will coalesce into violent behavior in adolescence. The experience of abuse sets the child up for the kind of “risky thinking” that leads to chronic patterns of aggression, bad behavior, acting out and violating the rights of others that can lead to a diagnosis of “conduct disorder.” If no intervention occurs, this pattern of childhood conduct disorder becomes the entryway into adolescent delinquent and antisocial violent behavior. The more socially toxic (and traumatic) the environment in which childhood and adolescence occur, the more likely it is that childhood conduct disorder will translate into adolescent violence. Changing patterns of aggression in girls provide a useful insight into how and why these processes take place. This presentation will analyze these behaviors in girls and boys for their similarities and differences and discuss the implications for violence in adolescence.

    Four elements of “risky thinking” that link early trauma to conduct disorder in childhood
    Three elements of social toxicity that affect the prognosis for childhood conduct disorder
    Two risk factors and two protective factors affecting the impact of early trauma on subsequent aggression and violence

    On Demand Video

    Continuing Education (CE credit): 3.5 hours– watch the video, pass the test, print your certificate!

    Presenter: James Garbarino, Ph.D.

    Venue: Live Conference Presentation

    Location: San Diego, CA

    Best viewing is done with a mid-sized screen as a full screen will lose some of its resolution. This video is from a live conference presentation and is largely unedited. In some cases you may not hear a question asked by a participant however, in most cases the presenter will repeat the question.

    We recommend you take notes just as you would if you were in a live conference as those notes will be helpful to learning and will come in handy for the test which follows.

  • Personality Disorders: Progress in Understanding Etiology – Innovations in Assessment and Treatment (3.5 Hours)

    $29.99

    Program description:

    Research on personality disorder has increased considerably in recent years leading to fundamental changes in ideas about the structure, origins, classification, and treatment of this disorder. This talk will provide a broad overview of this work and its implications for assessment and treatment. Progress in understanding the dimensional structure of personality disorder will be discussed in terms of its implications for future classifications, assessment, and treatment planning. Traditional ideas that personality disorder arises from psychosocial adversity are being supplemented with an understanding of genetic influences on personality that have important implications for treatment and ideas about the nature of therapeutic change. It will be argued that these developments, along with the results of systematic evaluations of treatment outcome, point to the importance of an integrated and eclectic approach to treatment that combines strategies and interventions from different therapeutic models.

    Workshop Content

    • Growth in empirical research and challenges to traditional assumptions
    • Nosology and Assessment: The limitations of categorical diagnoses and the emerging consensus on the dimensional structure of personality disorder
    • Implications for assessment
    • Application in treatment planning
    • Etiology: Personality disorder as a bio-psychological entity
    • Genetic and psychosocial influences on personality
    • The interplay of genes and environment in the pathogenesis of personality disorder
    • Implications for treatment
    • Treatment of personality disorder
    • Results of outcome studies
    • Importance of an integrated eclectic approach
    • Conceptualizing the treatment process

    On-Demand Video

    Continuing Education (CE credit): Contact Us for Continuing Education credits and costs

    Presenter: John Livesley, M.D., Ph.D.

    Venue: Live Conference Presentation

    Location: San Diego, CA

  • The Power of Prevention

    $729.95

    On-Demand Video Threat Assessment Training

    This premium, on-demand, 18-module course offers world-class foundational education on pre-violence warning signs and risk factors; related stressors and triggers; mental disturbance and its relationship to targeted violence; personal grievance and ideological motivations; signs of potential imminent violence; gathering information, understanding social media impact, and avoiding various critical biases. This course will also teach practical threat assessment and management, offering instruction on the full life cycle of a case including intake, triage, critical threat assessment stages, changing levels of concern, full-spectrum threat management strategies, and responsible follow-up including case closure.

    *****EMAIL US AT INFO@SPECIALIZEDTRAINING.COM TO INQUIRE ABOUT OUR GROUP DISCOUNT*****

    Presenters: Reid Meloy, PhD, ABPP      and     Molly Amman, JD

    Bundle 1 (1 hour) contains:

    • Module 1 – Introduction: The course introduction outlines the course content, provides some fundamental concepts, and discusses recent case law in threat assessment and management.
    • Module 2 – Understanding Planned Violence: This module explains different modes of violence and how they intersect with biology and behavior, offers explanatory case examples, and addresses threats versus violence.
    • If you’d like to purchase Bundle 1 only, please Click Here

    Bundle 2 (1 hour) contains:

    • Module 3 – Risk Factors for Violence: Gain an in-depth understanding of how risk factors can create a future vulnerability to considering planned violence, with research findings and case examples.
    • If you’d like to purchase Bundle 2 only, please Click Here

    Bundle 3 (1.5 hours) contains:

    • Module 4 – Proximal Warning Behaviors and the Pathway to Violence: Learn, in compelling detail, about the patterns of behavior that suggest accelerating risk toward planned violence. Filled with real world case examples, current research, and in-depth analysis.
    • If you’d like to purchase Bundle 3 only, please Click Here

    Bundle 4 (1 hour) contains:

    • Module 5 – Signs of Imminence: This succinct module describes those behaviors which appear to be associated with a short period before violence could unfold.
    • Module 6 – Stressors and Triggers: Events or circumstances with the potential to degrade a person of concern’s coping abilities are described, along with a framework for analysis and case example
    • Module 7 – Threat Reducing Factors: Facts, circumstances, or even personal attributes of the person of concern that may operate to reduce violence potential are described and explained.
    • Module 8 – Violence Risk and Threat Assessment Instruments: These important tools are categorized and explained, along with examples in each category and a source for additional information.
    • Module 9 – Deciding on a Level of Concern: This module offers a framework by which the threat assessor may consistently assess and label cases, which is a key to effective communication and appropriate action.
    • If you’d like to purchase Bundle 4 only, please Click Here

    Bundle 5 (.75 hour) contains:

    • Module 10 – Stalking and Intimate Partner Violence: Unparalleled analysis and explanation of stalkers, stalking behaviors and violence, and key aspects of intimate partner violence for threat assessors.
    • If you’d like to purchase Bundle 5 only, please Click Here

    Bundle 6 (.5 hour) contains:

    • Module 11 – Avoiding Cognitive Biases That Derail Assessment and Management: Different forms of bias are revealed and explained, to enable threat assessors to avoid them in case work.
    • If you’d like to purchase Bundle 6 only, please Click Here

    Bundle 7 (1.5 hours) contains:

    • Module 12 – Information Gathering and Interviewing: An important discussion of data in threat assessment investigations and how this concept differs from other types of investigations. Special tips for interviewing the subject of inquiry.
    • Module 13 – Social Media’s Place in Threat Assessment: Describes the ways in which social media relates to on-the-ground behavior, plus key psychological and behavioral concepts.
    • If you’d like to purchase Bundle 7 only, please Click Here

    Bundle 8 (1 hour) contains:

    • Module 14 – Threat Management: Informed by the assessment, threat management is the key to altering the course of events. This module describes the threat management spectrum of options, illustrated by numerous case examples. Particular attention is paid to safe  and future-oriented terminations, expulsions, and long suspensions..
    • If you’d like to purchase Bundle 8 only, please Click Here

    Bundle 9 (.5 hour) contains:

    • Module 15 – Special Considerations in the K-12 Environment: Special characteristics of the K-12 environment are discussed, along with zero tolerance policies, K-12 threat assessment structured professional judgment tools, and attachment and its relationship to targeted violence by juveniles. Particular attention is paid to safe  and future-oriented terminations, expulsions, and long suspensions.
    • If you’d like to purchase Bundle 9 only, please Click Here

    Bundle 10 (1.25 hours) contains:

    • Module 16 – Threat Assessment Mechanics: This crucial module describes each step—and the reasons for them—in the lifecycle of a threat assessment and management case, from intake to case closure.
    • Module 17 – Setting Up your Program and Threat Assessment Team: This module is for anyone responsible for writing or evaluating workplace violence prevention policy, establishing a program, or setting up a threat assessment team. It also addresses maximizing bystander reporting of concerning behavior
    • Module 18 – Overview of the Threat Assessment and Management Arc: Review of the threat assessment and management process, discussion of resources for networking, knowledge and training, and final thoughts of the presenters.
    • If you’d like to purchase Bundle 10 only, please Click Here

    Purchase the whole 10-hour package for $729.95   or CLICK HERE for the Continuing Education hours version

  • Preventing and Managing Violence in Organizations – Workplace Violence, Targeted Violence, and Active Shooters

    $69.99

    Organizations of all types and sizes, whether they are a business, educational institution, healthcare provider, or house-of-worship, need to plan for the possibility of violent acts that may impact its people, assets, and activities. Preventing and Managing Violence in Organizations: Workplace Violence, Targeted Violence, and Active Shooters provides a comprehensive approach to addressing workplace violence, active shooter and assailant events, and other forms of targeted violence. The book takes a unique perspective that the prevention and management of violence in an organization is a risk and business management issue, rather than a siloed security issue.  As such, the book’s objective is to help organizations develop a program for preventing and managing violence that can be integrated into their day-to-day overall business management approach.

    The main theme of the book is that any program to prevent and manage violence in an organization needs to be an inclusive process: where everyone in the organization is viewed as a risk maker and risk taker, and therefore, a risk manager. The emphasis is on building a risk and security awareness culture in the organization so that everyone throughout the organization is aware and part of the solution. The book recognizes that many, if not most, organizations do not have a dedicated chief security officer to oversee the prevention and management of violence. It also recognizes that many resource allocation decisions are made by business managers, not the security manager.

    While other books approach this issue from a security perspective, this book takes the perspective that providing a safe and secure environment within the organization, and protecting its people, assets, and activities, is a business management imperative. Therefore, the book emphasizes the need to promote a risk and security awareness culture that is integrated into the organization’s system of management and all its activities and functions.  The “Introduction” section of the book includes a brief description of violence in organizations and the imperative for integrating the prevention and management of violence into the organization’s overall business management strategy. The “Framework” section helps business, human resource, risk, security, and safety managers build a programmatic framework to support prevention and management of violence in all the organizations activities. The “Tactics and Control Measures” section provides tactical and operational advice and tools on methods to prevent, respond to, and recover from potentially violent events.  For organizations that have adopted an ISO, Robust Process Improvement, or Six-Sigma management systems approach, they will immediately recognize that the elements described in the framework can be integrated seamlessly into their overall management system approach.

    Preventing and Managing Violence in Organizations illustrates a systems approach for preventing and managing violence in organizations that can also be used for managing other types of operational risks. Security managers will find the book useful for integrating security in the organization’s day-to-day activities—as an integral part of these activities—rather than an add-on activity. Security professionals will be able to present their program from a business and risk management perspective.

    Dr. Marc H. Siegel

  • Preventing Domestic Homicides

    $84.99

    Preventing Domestic Homicides: Lessons Learned from Tragedies focuses on the diverse nature of domestic homicides and what has been learned about the most effective prevention strategies from emerging research and the work of domestic violence death review committees in Canada, the US, the UK, NZ and AU. Each chapter focuses on different populations—specifically older women, youth dating relationships, indigenous women, immigrant and refugee populations, rural/remote communities, same-sex relationships, homicides with police & military, domestic homicide in the workplace, and children killed in the context of domestic violence. Topics cover current research, risk factors, and include case studies from domestic homicide review committees.

    Cases are summarized regarding major themes and recommendations, such as public awareness, professional training, risk assessment, intervention and collaboration amongst service systems. Written for academic and domestic violence researchers in sociology, criminology, psychology and psychiatry by global contributors with on-the-ground domestic homicide experience.

    1st Edition – March 24, 2020

  • The Psychology of Insider Risk – Detection, Investigation and Case Management

    $54.99

    Clinical psychologist and former intelligence officer Eric D. Shaw brings over 30 years of psychological consultation experience to the national security community, corporate investigations and law enforcement to this work on insider risk. After a career in counterterrorism, Dr. Shaw spent the last 20 years concentrating on insiders—employees who commit espionage, sabotage, intellectual property theft, present risks of harm to self and others, and other workplace risks, especially those influenced by mental health conditions.

    Dr. Shaw is the author of the Critical Pathway to Insider Risk (CPIR) which addresses the characteristics, experiences and connections at-risk employees bring to our organizations, the stressors that trigger higher levels of risk, the concerning behaviors that signal this risk has increased and the action or inaction by organizations that escalate insider risk. The CPIR also examines what these employees look like when they have broken bad and the personal characteristics, resources and support that can mitigate these risks. Dr. Shaw also examines specific risk accelerators like subject disgruntlement, personality disorders and problematic organizational responses that can escalate the speed and intensity of insider risks. The investigative applications, strengths and weaknesses of the CPIR are also considered.

    This work also describes the behavioral science tools deployed in insider investigations, especially those designed to locate and understand persons at-risk and help organizations intervene to avoid escalation or manage potential damage. Case examples are drawn from intelligence community, corporate and law enforcement investigations. Specific insider cases where the use of behavioral science tools is described in detail include leaks, anonymous threats, erotomania, hacking, violence risk, mass destruction threats and espionage.

    The work closes with consideration of the many current and future challenges insider risk professionals face. These include the challenge of recognizing suicidal ideation as a gateway to other forms of insider risk, understanding when subject therapy will, and will not reduce risk, deciphering belief in conspiracy theory from significant extremist risk, appreciating insider threats to our elections and the unique challenges posed when the insider is a leader.

    Eric Shaw, PhD

  • The Psychology of Stalking

    $20.00$69.99

    8 CE hours available

    Specialized Training Services is approved by the
    American Psychological Association to sponsor
    continuing education for psychologists.
    Specialized Training Services retains
    responsibility for this program.

    Add To CartLoading Done This product has multiple variants. The options may be chosen on the product page
  • The Psychology of Stalking: Clinical and Forensic Perspectives

    $49.99

    327 pages, published in 1998.
    J. Reid Meloy

    “The Psychology of Stalking is the first Scholarly book on stalking ever published. Virtually every serious writer and researcher in this area of criminal psychopathology has contributed to this comprehensive resource. These chapters explore stalking from social, psychiatric, psychological, legal and behavioral perspectives. New thinking and data are presented on threats, pursuit characteristics, psychiatric diagnosis, offender-victim typologies, cyberstalking, false victimization syndrome, erotmania, stalking and domestic violence, stalking of public figures, and many other aspects of stalking. This landmark text is of interest to both professionals and other thoughtful individuals who recognize the serious nature of this ominous social behavior at the end of the millennium.” Excerpt taken from bookcover

    “The Psychology of Stalking is a comprehensive, up to date, scholarly review that includes everything from Shakespeare’s stalking sonnets to cyberstalking. It provides a wealth of useful information. The book is must reading for law enforcement and mental health professionals that deal with stalkers.” Phillip J. Resnick, M.D. Director of Forensic Psychiatry, Case Western Reserve University

    “J. Reid Meloy and his colleagues have blended clinical insight, scientific rigor, and legal precision to produce the one indispensable book on stalking. Encyclopedic in coverage and gracefully written, this work will have enormous influence on practice, policy, and research. With the publication of The Psychology of Stalking: Clinical and Forensic Perspectives, the study of stalking has come of age.” John Monahan, Ph.D. University of Virginia School of Law

  • Reading Red Flags, Separating Danger from Drama and Desire

    $49.99$69.99

    Reading Red Flags in Threat Assessment: Separating Danger From Drama

    Presented by Wendy Patrick, JD, MDiv, PhD
    This seminar will teach you how to enhance your powers of perception by learning what to look for, where to look, and how to interpret what you see.  In this seminar, Wendy Patrick, author of “Red Flags,” will demonstrate how four areas of examination can revolutionize the way you perceive danger, manage dangerous people, and protect yourself as well as your community, illustrated through real case examples, corroborated by 25 years of practice, as well as abundant psychological research.

    This is an on-demand video that is sold with or without CE units.

    About Wendy Patrick, JD, MDiv, PhD:

    • Association of Threat Assessment Professionals Certified Threat Manager
    • Author of Red Flags: How to Spot Frenemies, Underminers, and Ruthless People
    • Co-author of New York Times bestseller Reading People (revision)
    • Author of Why Bad Looks Good: Biblical Wisdom to Make Smart Choices
    • Psychology Today columnist: Why Bad Looks Good
    • Host, Today with Dr. Wendy KCBQ radio
    Add To CartLoading Done This product has multiple variants. The options may be chosen on the product page
  • Red Flags: Frenemies, Underminers, and Ruthless People

    $15.99

    We all wear emotional blinders: keeping society moving smoothly depends on it. But when you absolutely must rely on another person, you have to be able to assess them objectively. Red Flags will train you to spot deceptive or dangerous people.

    Learn how to:
    – Avoid selective attention
    – Observe people over time (bad guys rely on first impressions)
    – Ask questions: most people’s favorite topic is themselves
    – Cybersleuth to verify information and track down inconsistencies

    If you want to know whether a potential boyfriend is trustworthy, are hiring employees, selecting a child care worker, or have partners in business, you need RED FLAGS.

    Wendy L. Patrick, Ph.D.

    Paperback
    Published: 05-17-16
    Pages: 320

  • The Risks Within: Preventing & Managing Workplace Violence

    $34.99

    156 pages, published in 2022.
    Marc Mcelhaney, Ph.D.

    The term, “workplace violence” has become a frightful one, suggesting the seemingly sudden emergence of a crazed “active shooter”, resulting in multiple casualties. Dr. McElhaney, a psychological specialist in the prevention and management of high-risk behavior, urges us to reconsider our preconceptions and stereotypes if we are ever going to be able to successfully prevent these often-fatal events. Relying on real examples from his files, he demonstrates that these at-risk individuals always exist among us, often unrecognized, but for a variety of reasons and circumstances, have come to pose a danger to those around them. He introduces us specifically to the events surrounding Maria, Patrick, and Neil, otherwise “normal” individuals in most circumstances, but who had encountered a perfect storm of events in their lives that, without early recognition and intervention, could have resulted in violent consequences. In the second half of this book, the author provides us with a step-by-step guide to establishing a process that enables us to identify and safely manage these behaviors before they result in dangerous and fatal consequences. This is a critical read for any manager – or for any of us for that matter.

  • Schizoid, Schizotypal, and Paranoid Personality Disorders (3.5 Hours)

    $29.99

    The DSM-IV-TR personality disorders (PDs) classified in Cluster A are referred to as the “odd/eccentric” group of PDs. These Axis II disorders are considered to be on the “schizophrenia spectrum” along with the different categories of schizophrenia on Axis I. Patients with schizoid PD resemble those in the early stages of schizophrenia but, unlike those in such an early, prodromal phase of the Axis I condition, do not go on to develop schizophrenia. Schizotypal PD most closely fits the “odd/eccentric” label. Patients with schizotypal PD and Paranoid PD are thought to be genetically predisposed to develop these conditions, yet less vulnerable than those predisposed to develop schizophrenia itself. Good data about the prevalence of these disorders are not available as patients with these disorders are not generally treatment seeking. As is characteristic of all PDs, the diagnostic features of the Cluster A disorders are relatively stable over time, although under stress, peaks of more disabling pathology may occur. Comorbidity with other disorders (Axis I and II) is common. State-of-the-art assessment and treatment of the Cluster A PDs will be presented in this half day program.

    Workshop Content

    • DSM-IV-TR diagnosis of the Cluster A PDs
    • How to differentiate Cluster A PDs from Axis I psychotic disorders
    • Common patterns of comorbidity
    • A vulnerability/stress model for the development of these personality disorders
    • Treatment strategies to deal with the high levels of mistrust typical of these patients
    • Countertransference difficulties in working with Cluster A patients
    • Symptom-targeted psychopharmacological strategies
    • An integrated psychotherapy/psychopharmacology approach

    On-Demand Video

    Continuing Education (CE credit): Contact Us for Continuing Education credits and costs.

    Presenter: Philip Erdberg, Ph.D.

    Venue: Live Conference Presentation

    Location: San Diego, CA

Sign Up for Announcements

Sign up to receive updates on promotions, new products, and upcoming trainings.

Sign Up for Announcements


By submitting this form, you are consenting to receive marketing emails from: . You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

0
YOUR CART
  • No products in the cart.