• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

39435 BA courses

BOID10 SAP BusinessObjects Information Design Tool

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Data Consultants/Managers, Developers, Program/Project Managers, and System Administrators. Overview This course is designed to give you the comprehensive skills needed to work with the Information Design Tool. The Information Design Tool enables designers to extract, define, and manipulate metadata from relational and OLAP sources to create and deploy SAP BusinessObjects universes.In this course you learn how to use data from different source systems (SAP and non-SAP) with the SAP BusinessObjects BI client tools. This five-day course is designed to give you the comprehensive skills and in-depth knowledge needed to create SAP BusinessObjects universes using the SAP BusinessObjects Information Design Tool. Basic SAP BusinessObjects Universe Design Describing Universes Defining the Components of a Universe Data Connections Defining connections Data Foundations Creating Data Foundations Using Joins Business Layers Accessing Data through the Business Layer Integrating the Business Layer Components Validating Objects Creating Measure Objects Creating Shortcut Joins Loops in a Data Foundation Resolving Loops with Joined Tables Resolving Loops Using Aliases Resolving Loops Using Contexts Detecting Contexts Editing Contexts Testing Contexts Resolving Recursive Loops Data Restrictions Defining Data Restrictions Applying Mandatory Data Restrictions Applying Optional Data Restrictions Lists of Values (LOV) Providing a List of Values Parameters Illustrating Runtime Parameters Object @functions Using Object @functions in Queries Applying the Aggregate Awareness Optimization Method Using Other @ Functions Navigation Paths Defining Drill Down Navigation Paths Derived Tables Creating Derived Tables Key Awareness Defining Numeric Keys Universe Management with Data Foundation and Business Layer Views Managing a Universe using the Data Foundation View Managing a Universe using the Business Layer View Universe Optimization Optimizing Universes Using Parameters Universe Deployment and Security Deploying a Universe Securing a Published Universe Creating Data Security Profiles Creating Business Security Profiles Assigning Security Profiles to Users Identifying the Priority of Security Settings Updating a Published Universe SQL Clause Processing Problems Determining How the Order of SQL Clauses Affects Data Returned Detecting Ambiguity Caused by SQL Requests Run Against Joined Tables Resolving Ambiguity Caused by SQL Requests Run Against Joined Tables Identifying Fan Traps Resolving Ambiguity Caused by SQL Requests Run Against Joined Tables Outer Join Problem Resolution Resolving an Ambiguous Outer Join Using @AggregateAware Universe Creation from Different Data Sources Identifying the Different Data Sources Creating an OLAP Universe Creating a Multi-source Universe Shared Projects Using Shared Projects Manipulating Other Designers' Resources Universe Conversion Converting Existing .unv Universes Translation Deploying Universes in Different Languages

BOID10 SAP BusinessObjects Information Design Tool
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat JBoss Application Administration II (AD348)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Experienced system administrators responsible for deploying and administering JBoss Enterprise Application Platform 6 in large-scale production environments. At least 2 years' experience as a JBoss Enterprise Application Platform administrator. Be a Red Hat Certified Specialist in Enterprise Application Server Administration on Enterprise Application Platform 6 (or later) or have equivalent experience . Overview Upon successful completion of this course, students will be able to provision and manage Red Hat JBoss Enterprise Application Platform 6 in large-scale production environments. This course empowers you to provision and manage Red Hat© JBoss© Enterprise Application Platform (JBoss EAP) in large-scale production environments. Intended for experienced administrators, this course will help you gain a deeper understanding of how to work with JBoss EAP by taking a closer look at installation, clustering, deployments, scripting, management, messaging, and security with a view towards building on the skills established in the Red Hat JBoss Application Administration I (JB248) course. 1 - INSTALLATION Given the proper installation media, perform Red Hat© JBoss© Enterprise Application Platform 6 installations that are repeatable, upgradeable, and silent. 2 - CLUSTERING Demonstrate a proficient knowledge of clustering components, their configuration, and application to clustered architectures. 3 - DEPLOYMENT Deploy an application in various types of production environments. 4 - SCRIPTING Script various configuration and management scenarios using command line interface (CLI). 5 - MANAGEMENT Use various tools to monitor and manage JBoss Enterprise Application Platform. 6 - MESSAGING Learn how to manage supported messaging systems. 7 - SECURITY Configure security settings that include authentication, authorization, networking, and the management interfaces. 8 - OVERVIEW OF JBOSS OPERATIONS NETWORK Learn the functionality of JBoss Operations Network and its use cases. Also learn how to install a JBoss Operations Network server, an agent, and agent plug-ins. 9 - MONITORING RESOURCES Learn how to use JBoss Operations Network to monitor managed resources, including defining alerts, baselines, and notifications Additional course details: Nexus Humans Red Hat JBoss Application Administration II (AD348) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat JBoss Application Administration II (AD348) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat JBoss Application Administration II (AD348)
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat JBoss Application Administration I (AD248)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for System administrators who are either new to JBoss or have experience with JBoss Enterprise Application Platform 5. Base experience with system administration on Microsoft Windows, UNIX, or Linux© operating systems. Understanding of hardware and networking. Note: No prior knowledge of Java, scripting, or JBoss Developer Studio is required. Overview Upon successful completion of this course, students will be able to take the Red Hat Certified JBoss Administration (RHCJA) Exam. In this course, you'll discover the best practices for installing and configuring Red Hat© JBoss© Enterprise Application Platform (JBoss EAP) 7. Through hands-on labs, you'll learn the essential, real-world tasks that you need to know as a system administrator to effectively deploy and manage applications on JBoss EAP. This course will help prepare you to take the Red Hat Certified Specialist in Enterprise Application Server Administration exam. 1 - OVERVIEW OF JBOSS ENTERPRISE APPLICATION PLATFORM Learn the concepts and terminology of JBoss© Enterprise Application Platform 6, and install and run a JBoss Enterprise Application Platform instance. 2 - CONFIGURE JBOSS ENTERPRISE APPLICATION PLATFORM IN STANDALONE MODE Understand the directory structure of standalone mode and the standalone.xml configuration file, and deploy an application onto a standalone server. 3 - CONFIGURE JBOSS ENTERPRISE APPLICATION PLATFORM IN DOMAIN MODE Set up a domain, including a domain controller managing multiple host controllers. Also learn how to deploy an application onto a domain. 4 - CONFIGURE SERVERS Define a server group on a host, add servers to a server group, and deploy an application to a server group. 5 - USE THE CLI TOOL Learn how the command-line Interface tool can be used to script administrative tasks. 6 - THE DATASOURCE SUBSYSTEM Understand database connection pools in JBoss Enterprise Application Platform and how to configure the datasource subsystem. Learn how to deploy a Java? Database Connectivity (JDBC) driver and define a datasource. 7 - THE LOGGING SUBSYSTEM Configure the logging subsystem, including configuring the built-in handlers and loggers. 8 - THE MESSAGING SUBSYSTEM Understand JMS and HornetQ, including how to define and configure connection factories and destinations (topics and queues). 9 - THE SECURITY SUBSYSTEM Configure the security subsystem, including securing the management interfaces, securing an application, and securing a JMS destination. Also learn how to define an Lightweight Directory Access Protocol (LDAP) and database security realm. 10 - JVM CONFIGURATION Configure the JVM for both standalone and domain modes. 11 - MIGRATING APPLICATIONS TO JBOSS ENTERPRISE APPLICATION PLATFORM 6 Understand classpath and module dependencies, JPA issues, updating security settings, and other tips on how to migrate an application to JBoss Enterprise Application Platform 6. 12 - THE WEB SUBSYSTEM Configure the HTTP and HTTPS Connectors, set up an SSL connection, and configure an AJP Connector. 13 - INTRODUCTION TO CLUSTERING Set up JBoss Enterprise Application Platform 6 in a cluster in both standalone and domain mode.

Red Hat JBoss Application Administration I (AD248)
Delivered OnlineFlexible Dates
Price on Enquiry

OP25 IBM z/OS UNIX System Services Implementation

By Nexus Human

Duration 4.5 Days 27 CPD hours This course is intended for This is an intermediate course for experienced data professionals such as z/OS system programmers, who are responsible for the installation and maintenance of z/OS UNIX. Overview Execute the tasks required to prepare a z/OS installation for implementing z/OS UNIXExecute the tasks to install the z/OS UNIX software featuresUse the information provided in this class to perform the basic customization necessary to fully implement the z/OS UNIX kernel, the file system, the shell and utilities, and z/OS UNIX applicationsPut in place the RACF security required for z/OS UNIX resources and applicationsMake appropriate definitions for the activation of TCP/IP sockets by z/OS UNIXIdentify and use the processes and data required for monitoring and tuning the z/OS UNIX environment This course is designed to provide you with the skills required to install and customize z/OS UNIX (full name z/OS UNIX System Services), and to manage and monitor the z/OS UNIX environment. Day 1 Welcome Unit 1: z/OS UNIX implementation overview Unit 2: z/OS UNIX services initial installation Exercise 1: Move from default to full mode function Exercise 2: IPL in full function mode and enable a nonvolatile root HFS Unit 3: File system customization Day 2 Exercise 3: Customizing the file system Unit 4: Security customization Exercise 4: Defining and managing UNIX users, OMVS security Day 3 Unit 5: Shell customization Exercise 5: UNIX System Services and shell customization Unit 6: Customizing applications, daemons, and servers Exercise 6: UNIX processes Exercise 7: Access control list and enhanced ASCII support Day 4 Unit 7: File system management and system maintenance Exercise 8: Managing HFS and zFS data sets Unit 8: Managing z/OS UNIX operations Unit 9: Exploiting TCP/IP with z/OS UNIX Exercise 9: Managing z/OS UNIX Additional course details: Nexus Humans OP25 IBM z/OS UNIX System Services Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the OP25 IBM z/OS UNIX System Services Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

OP25 IBM z/OS UNIX System Services Implementation
Delivered OnlineFlexible Dates
Price on Enquiry

WM666 IBM Integration Bus V10 Application Development I

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This intermediate course is designed for experienced Integration Specialists and Senior-Level Developers with experience in application development, messaging middleware applications, and transport protocols such as HTTP and FTP. Overview Describe the features and uses of the IBM Integration BusDevelop, deploy, and test message flow applicationsGenerate message flow applications from predefined patternsUse IBM Integration Bus problem determination aids to diagnose and solve development and runtime errorsDescribe the function and appropriate use of IBM Integration Bus processing nodesWrite basic Extended Structured Query Language and Java programs to transform dataUse the IBM Graphical Data Mapping editor to transform dataDefine, use, and test simple XML and Data Format Description Language (DFDL) data modelsDescribe supported transport protocols and how to call them in message flows This course teaches you how to use IBM Integration Bus to develop, deploy, and support message flow applications. Students will learn how to construct applications to transport and transform data. Course Outline Course introduction Introduction to IBM Integration Bus Application development fundamentals Exercise: Importing and testing a message flow Creating message flow applications Exercise: Creating a message flow application Connecting to IBM MQ Exercise: Connecting to IBM MQ Controlling the flow of messages Exercise: Adding flow control to a message flow application Modeling the data Exercise: Creating a DFDL model Processing file data Exercise: Processing file data Using problem determination tools and help resources Exercise: Using problem determination tools Exercise: Implementing explicit error handling Mapping messages with the Graphical Data Mapping editor Referencing a database in a message flow application Exercise: Referencing a database in a map Using Compute nodes to transform messages Exercise: Transforming data by using the Compute and JavaCompute nodes Processing JMS, HTTP, and web service messages Preparing for production Exercise: Creating a runtime-aware message flow Course summary Additional course details: Nexus Humans WM666 IBM Integration Bus V10 Application Development I training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM666 IBM Integration Bus V10 Application Development I course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WM666 IBM Integration Bus V10 Application Development I
Delivered OnlineFlexible Dates
Price on Enquiry

Deep Learning on AWS

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Developers responsible for developing Deep Learning applications Developers who want to understand concepts behind Deep Learning and how to implement a Deep Learning solution on AWS Overview This course is designed to teach you how to: Define machine learning (ML) and deep learning Identify the concepts in a deep learning ecosystem Use Amazon SageMaker and the MXNet programming framework for deep learning workloads Fit AWS solutions for deep learning deployments In this course, you?ll learn about AWS?s deep learning solutions, including scenarios where deep learning makes sense and how deep learning works. You?ll learn how to run deep learning models on the cloud using Amazon SageMaker and the MXNet framework. You?ll also learn to deploy your deep learning models using services like AWS Lambda while designing intelligent systems on AWS. Module 1: Machine learning overview A brief history of AI, ML, and DL The business importance of ML Common challenges in ML Different types of ML problems and tasks AI on AWS Module 2: Introduction to deep learning Introduction to DL The DL concepts A summary of how to train DL models on AWS Introduction to Amazon SageMaker Hands-on lab: Spinning up an Amazon SageMaker notebook instance and running a multi-layer perceptron neural network model Module 3: Introduction to Apache MXNet The motivation for and benefits of using MXNet and Gluon Important terms and APIs used in MXNet Convolutional neural networks (CNN) architecture Hands-on lab: Training a CNN on a CIFAR-10 dataset Module 4: ML and DL architectures on AWS AWS services for deploying DL models (AWS Lambda, AWS IoT Greengrass, Amazon ECS, AWS Elastic Beanstalk) Introduction to AWS AI services that are based on DL (Amazon Polly, Amazon Lex, Amazon Rekognition) Hands-on lab: Deploying a trained model for prediction on AWS Lambda Additional course details: Nexus Humans Deep Learning on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Deep Learning on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Deep Learning on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus CyberSAFE Extended Edition 2019 (CBS-310)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for the non-technical end user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks. This course is also designed for you to prepare for the Certified CyberSAFE credential. You can obtain your Certified CyberSAFE certificate by completing the Certified CyberSAFE credential process on the CHOICE platform following the course presentation. Overview In this course, you will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect yourself from those risks. You will: Identify the need for security Secure devices like desktops, laptops, smartphones, and more Use the Internet securely Regardless of your computer experience, this class will help you become more aware of technology ðrelated risks and what you can do to protect yourself and your organization from them. This course will help you to: ? Understand security compliance needs and requirements ? Recognize and avoid phishing and other social engineering ? Recognize and avoid viruses, ransomware, and other malware ? Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud. In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely. Course includes access to the CyberSAFE assessment. Upon successful completion of the assessment, learners will receive the CyberSAFE credential and digital badge. Identifying the Need for Security Identify Security Compliance Requirements Recognize Social Engineering and Avoid Phishing and other Attacks Securing Devices Maintain Physical Security of Devices Use Passwords for Security Protect Your Data Identify and Mitigate Viruses, Ransomware, and other Malware Use Wireless Devices Securely Using the Internet Securely Browse the Web Safely Use Email Securely Use Social Networking Securely Use Cloud Services Securely Additional course details: Nexus Humans CertNexus CyberSAFE Extended Edition 2019 (CBS-310) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus CyberSAFE Extended Edition 2019 (CBS-310) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus CyberSAFE Extended Edition 2019 (CBS-310)
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Certified Data Science Practitioner (CDSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for business professionals who leverage data to address business issues. The typical student in this course will have several years of experience with computing technology, including some aptitude in computer programming. However, there is not necessarily a single organizational role that this course targets. A prospective student might be a programmer looking to expand their knowledge of how to guide business decisions by collecting, wrangling, analyzing, and manipulating data through code; or a data analyst with a background in applied math and statistics who wants to take their skills to the next level; or any number of other data-driven situations. Ultimately, the target student is someone who wants to learn how to more effectively extract insights from their work and leverage that insight in addressing business issues, thereby bringing greater value to the business. Overview In this course, you will learn to: Use data science principles to address business issues. Apply the extract, transform, and load (ETL) process to prepare datasets. Use multiple techniques to analyze data and extract valuable insights. Design a machine learning approach to address business issues. Train, tune, and evaluate classification models. Train, tune, and evaluate regression and forecasting models. Train, tune, and evaluate clustering models. Finalize a data science project by presenting models to an audience, putting models into production, and monitoring model performance. For a business to thrive in our data-driven world, it must treat data as one of its most important assets. Data is crucial for understanding where the business is and where it's headed. Not only can data reveal insights, it can also inform?by guiding decisions and influencing day-to-day operations. This calls for a robust workforce of professionals who can analyze, understand, manipulate, and present data within an effective and repeatable process framework. In other words, the business world needs data science practitioners. This course will enable you to bring value to the business by putting data science concepts into practice Addressing Business Issues with Data Science Topic A: Initiate a Data Science Project Topic B: Formulate a Data Science Problem Extracting, Transforming, and Loading Data Topic A: Extract Data Topic B: Transform Data Topic C: Load Data Analyzing Data Topic A: Examine Data Topic B: Explore the Underlying Distribution of Data Topic C: Use Visualizations to Analyze Data Topic D: Preprocess Data Designing a Machine Learning Approach Topic A: Identify Machine Learning Concepts Topic B: Test a Hypothesis Developing Classification Models Topic A: Train and Tune Classification Models Topic B: Evaluate Classification Models Developing Regression Models Topic A: Train and Tune Regression Models Topic B: Evaluate Regression Models Developing Clustering Models Topic A: Train and Tune Clustering Models Topic B: Evaluate Clustering Models Finalizing a Data Science Project Topic A: Communicate Results to Stakeholders Topic B: Demonstrate Models in a Web App Topic C: Implement and Test Production Pipelines

CertNexus Certified Data Science Practitioner (CDSP)
Delivered OnlineFlexible Dates
Price on Enquiry

CCVS Check Point Certified VSX Specialist

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Technical professionals who need to install, configure, and manage Virtual Security Extension (VSX) solutions within their network security environment. Overview Explain the benefits of virtual network security. Understand the basic functions, components, and advantages of VSX technology. Examine the VSX management infrastructure and understand how traffic flows within a VSX network. Discuss options for deploying VSX technology within various types of organizations. Understand how to install and configure VSX Gateways and Virtual Systems. Describe different routing schemes and features that are available to use within the VSX environment. Understand how to deploy additional VSX networking configurations that may be required in the environment. Understand the differences between deploying physical Security Gateway Clusters and VSX Gateway Clusters. Understand how Virtual System Load Sharing works to enhance VSX network performance. Understand how to use the VSX Provisioning Tool to add and remove virtual devices. Recall how CoreXL technology enhances Security Gateway performance and recognize how to use the technology in a VSX environment. Understand how to employ tools for optimizing resources allocated in a VSX environment. Identify various VSX command line tools commonly used to retrieve information and perform configuration changes. Understand how to use VSX utility commands to perform various maintenance tasks for the VSX environment. Understand how to troubleshoot and debug issues that may occur in a VSX environment. This course provides a comprehensive understanding of the Check Point VSX solution and describes how to deploy it within the corporate network environment. Course Topics VSX Overview Virtual System Installation and Configuration VSX Clustering Advanced VSX Features Troubleshooting VSX LAB EXERCISES Configuring the VSX Environment Deploying a Virtual System with a Physical Interface Deploying a VS with Bonded VLAN Interfaces Configuring Virtual System HA Converting VSX High Availability to Virtual System Load Sharing Maintaining the VSX Environment Using the CLI to Manage VSX Performance Tuning in VSX Troubleshooting VSX Issues Upgrading a VSX Environment Additional course details: Nexus Humans CCVS Check Point Certified VSX Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCVS Check Point Certified VSX Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CCVS Check Point Certified VSX Specialist
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Data Ethics for Business Professionals (DEBIZ)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for business leaders and decision makers, including C-level executives, project and product managers, HR leaders, Marketing and Sales leaders, and technical sales consultants, who have a vested interest in the representation of ethical values in technology solutions. Other individuals who want to know more about data ethics are also candidates for this course. This course is also designed to assist learners in preparing for the CertNexus DEBIZ™ (Exam DEB-110) credential. The power of extracting value from data utilizing Artificial Intelligence, Data Science and Machine Learning exposes the learning differences between humans and machines. Humans can apply ethical principles throughout the decision-making process to avoid discrimination, societal harm, and marginalization to maintain and even enhance acceptable norms. Machines make decisions autonomously. So how do we train them to apply ethical principles as they learn from decisions they make? This course provides business professionals and consumers of technology core concepts of ethical principles, how they can be applied to emerging data driven technologies and the impact to an organization which ignores ethical use of technology. Introduction to Data Ethics Defining Data Ethics The Case for Data Ethics Identifying Ethical Issues Improving Ethical Data Practices Ethical Principles Ethical Frameworks Data Privacy Accountability Transparency and Explainability Human-Centered Values and Fairness Inclusive Growth, Sustainable Development, and Well-Being Applying Ethical Principles to Emerging Technology Improving Ethical Data Practices Sources of Ethical Risk Mitigating Bias Mitigating Discrimination Safety and Security Mitigating Negative Outputs Data Surveillance Assessing Risk Ethical Risks in sharing data Applying professional critical judgement Business Considerations Data Legislation Impact of Social and Behavioral Effects Trustworthiness Impact on Business Reputation Organizational Values and the Data Value Chain Building a Data Ethics Culture/Code of Ethics Balancing organizational goals with Ethical Practice Additional course details: Nexus Humans CertNexus Data Ethics for Business Professionals (DEBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Data Ethics for Business Professionals (DEBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Data Ethics for Business Professionals (DEBIZ)
Delivered OnlineFlexible Dates
Price on Enquiry