Destroy and Rebuild Yourself: Identity Engineering Protocol
This course teaches a disciplined protocol for dismantling limiting identity patterns and installing a target identity with measurable behavioral proofs.…
Instructor: T.I. Team
Level: everybody
Duration: 8 weeks
Price: $35
Course Curriculum
Module 1 — Identity Mapping and Baseline Control
- 1.1 — Operational Definition of Identity: From Narrative to Measurable System
- 1.2 — Habit and Selfhood Foundations: The Identity-Habit Interface
- 1.3 — Self-Talk, Appraisals, and the Belief Layer: How Cognitions Maintain Identity
- 1.4 — Roles, Contexts, and Social Reinforcement Loops
- 1.5 — Values Hierarchy and Decision Rules: Eliminating Vagueness
- 1.6 — Agency and Self-Efficacy Baseline: Control Beliefs That Actually Predict Action
- 1.7 — Trigger and Avoidance Inventory: Locating the Fault Lines
- 1.8 — The Identity Engineering Dashboard: Metrics, Logs, and Review Cadence
Module 2 — Deconstruction: Dismantling Limiting Identity Patterns
- 2.1 — Secondary Gains and Hidden Payoffs: Why the Pattern Persists
- 2.2 — Identity-Protective Rationalizations: The Rule System That Defends the Old Self
- 2.3 — Cognitive Restructuring for Identity: Thoughts as Hypotheses, Not Commands
- 2.4 — Disidentification Protocols: Defusion, Self-as-Context, and Role Separation
- 2.5 — Interrupting Default Behaviors: Breaking the Loop at the Earliest Control Point
- 2.6 — Implementation Intentions: If–Then Control for Triggered States
- 2.7 — Narrative Dismantling: Removing the Story Without Losing the Lesson
- 2.8 — Deconstruction Review: Stability Tests and “Old Identity Reassembly” Warning Signs
Module 3 — Reconstruction: Designing and Installing the Target Identity
- 3.1 — Target Identity Specification: Traits, Standards, and Behavioral Proofs
- 3.2 — Values-Based Stabilization: Commitments That Outlast Mood
- 3.3 — Replacement Architecture I: Habit Installation and the Proof Ladder
- 3.4 — Replacement Architecture II: Environment Design and Friction Engineering
- 3.5 — Feedback Loops: Measurement, Review, and Adaptive Correction
- 3.6 — Self-Efficacy Engineering: Mastery Experiences and Controlled Exposure
- 3.7 — Social and Role Re-Contracting: Updating Expectations Without Conflict Escalation
- 3.8 — Reconstruction Audit: Proof Density, Drift Detection, and System Hardening
Module 4 — Durability and Integration: 30/60/90-Day Mastery Cycles
- 4.1 — Relapse Prevention: Early Warning Signals and Response Protocols
- 4.2 — Stress Testing: Controlled Pressure Without Identity Collapse
- 4.3 — Maintenance Cycles: 30/60/90-Day Planning and Reset Mechanics
- 4.4 — Integration into Work Systems: Standards, Scheduling, and Output Proofs
- 4.5 — Integration into Relationships: Reinforcement Design and Boundary Maintenance
- 4.6 — Identity Under Boredom: Anti-Drift Systems and Renewal Practices
- 4.7 — Advanced Diagnostics: When the System Fails, Find the Layer
- 4.8 — Mastery Plan: Long-Run Identity Engineering and Periodic Rebuilds