Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws
Duration 2 Days 12 CPD hours This course is intended for It is appropriate for Managers, Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, managers; supervisors, team leaders, and process operators. Overview Describe business process improvement (BPI) business drivers.Plan, manage and close requirements for a Business Process Improvement project Understand the essential elements of a successful BPI initiative.Identify candidate business processes for improvement.Understand the essential elements of a successful BPI initiative.Identify candidate business processes for improvement.Apply a methodology to business process improvement projects. This 2-day course aims at introducing its attendees to the core values, principles, and practices of Business Process Improvement. Introduction - A Business Process Improvement (BPI) Overview Why are we here today? What is BPI? Benefits of BPI Specific challenges/obstacles and successes Process improvement examples: Industry specific examples Famous debacles to avoid and successes to emulate Your role in helping to identify problems Overview of the Joiner 7-Step Method What is the Joiner 7-Step Method? Walkthrough of the Joiner 7-Step Method Template: Introduce and review Process Improvement Template Case Study Exercise: Read and discuss introduction to the Case Study Step #1: Initiate the Project Types of business problems typically encountered at insurance companies and banks How to recognize a business-related problem Identifying the gaps (delta between current and future states) Ownership of the project and the business problem Defining measurable success criteria Case Study Exercise: Complete the Problem Statement section (Step #1) of the template Step #2: Define Current Situation What are symptoms of a problem? Looking for symptoms of the problem Performing Stakeholder Analysis Technique: View a RACI Matrix Defining the impacts caused by the problem Technique: Business Process Modeling (As-Is) Understand how to draw an As-Is Business Process Model Case Study Exercise: Complete the Define Current Situation section (Step #2) of the template Step #3: Identify Root Causes What are root causes? Performing Root Cause Analysis Technique: Fishbone Diagram using the cafeteria example Case Study Exercise: Discuss a Fishbone Diagram Technique: Pareto Chart (discuss and show example) Case Study Exercise: Complete the Identify Root Causes section (Step #3) of the template Step #4: Develop Solutions Identifying options for problem resolution Avoid jumping to conclusions Technique: Brainstorming Case Study Exercise: Conduct a Brainstorming Session Recognizing pros and cons for each option Technique: Kempner-Tregoe (?Must-Have? vs. ?Nice-to-Have?) Case Study Exercise: Determine best solution using a ?simple? Kempner-Tregoe model Case Study Exercise: Complete the Develop Solutions section (Step #4) of the template Step #5: Define Measurable Results Prototyping the solution Technique: Business Process Modeling (To-Be) Measuring results against the success criteria (Step #1) Case Study Exercise: Review changes to an As-Is Business Process Model Case Study Exercise: Complete the Define Measurable Results section (Step #5) of the template Step #6: Standardize Process Defining how the process will be documented Plan and understand organizational readiness Discuss how employees are empowered to identify and act upon their ideas Identifying follow-up needs (i.e., training) for the staff that will be impacted Technique: Communication Plan Case Study Exercise: Complete the Standardize Process section (Step #6) of the template Step #7: Determine Future Plans Monitoring the process for Continuous Process Improvement (The ?Plan-Do-Check-Act? Cycle) Understand how to sustain the improvements made by the Joiner 7-Step Method Technique: PDCA form Case Study Exercise: Complete the Determine Future Plans section (Step #7) of the template Going Forward with a Plan of Action Identifying process problems in your organization Individual Exercise: Name three (3) possible areas for improvement Prioritize and define the next steps Individual Exercise: Using a new template complete Step 2 & Step 3 for one possible area for improvement you have identified
This video content is designed to give you an introduction to the Results Planner. The aim is to get you started and help you Plan, Propel and Prosper in your life and business.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Technical professionals involved in architecting, building, and operating AWS solutions. Overview In this course, you will learn to: Identify the Well-Architected Framework features, design principles, design pillars, and common uses Apply the design principles, key services, and best practices for each pillar of the WellArchitected Framework Use the Well-Architected Tool to conduct Well-Architected Reviews The Well-Architected Framework enables you to make informed decisions about your customers architectures in a cloud-native way and understand the impact of design decisions that are made. By using the Well-Architected Framework, you will understand the risks in your architecture and ways to mitigate them.This course is designed to provide a deep dive into the AWS Well-Architected Framework and its 5 pillars.This course also covers the Well-Architected Review process, and using the AWS Well-Architected Tool to complete reviews. Module 1: Well-Architected Introduction History of Well-Architected Goals of Well-Architected What is the AWS Well-Architected Framework? The AWS Well-Architected Tool Module 2: Design Principles Operational Excellence
Duration 3 Days 18 CPD hours This course is intended for Developers & Developer Consultants Overview To discuss the role of the ABAP Dictionary in the SAP system and its scope of functions. This course discusses the role of the ABAP Dictionary in the SAP system and its scope of functions. Introduction to the ABAP Dictionary Describing the ABAP Dictionary Data Types in the ABAP Dictionary Creating Domains and Data Elements Creating Flat Structures Creating Table Types and Deep Structures Creating Type Groups Database Tables Creating Transparent Tables Defining Cluster Tables and Pooled Tables Performance During Table Access Creating Database Table Indexes Setting Up Table Buffering Input Checks Creating Fixed Values Defining Foreign Keys to Perform Input Checks Creating Text Tables Dictionary Object Dependencies Differentiating Between Active and Inactive Dictionary Objects Identifying Dependencies with ABAP Dictionary Objects Table Changes Performing a Table Conversion Enhancing Tables Using Append Structures Views and Maintenance Views Creating Database Views Creating Maintenance Views Creating View Clusters Search Helps Creating Search Helps Applying Advanced Search Help Techniques
Training for tutors, trainers and assessors in post-16 education
This very practical session is designed to enable participants to improve the impact, clarity and accuracy of their reports. It focuses equally on the two key areas - structure and writing technique. This course will help participants: Scope reports based on objective and intended readership Write a structured report Use the Fog Index to ensure readability Write grammatically correct and well-punctuated text Review and edit their work. 1 Introduction Objectives and overview Introductions and personal aims 2 What makes a good report? Practical activity and feedback 3 Before you start The planning process and scoping a report Organising information Key report headings What goes where? Writing practice and review 4 Writing tips and techniques Clear English and use of language Grammar and sentence structure Refresher in punctuation Writing in the third person The Fog Index - and how to measure readability 5 Pulling it all together Reviewing and proofing 6 Review Summary of key learning points Action planning
Duration 4 Days 24 CPD hours This course is intended for The course content is aimed at operators of devices running the Junos OS in a NOC environment. These operators include network engineers, administrators, support personnel, and reseller support personnel. Overview After successfully completing this course, you should be able to: Reduce the time it takes to identify and isolate the root cause of an issue impacting your network. Gain familiarity with Junos products as they pertain to troubleshooting. Become familiar with online resources valuable to Junos troubleshooting. Gain familiarity with Junos tools used in troubleshooting. Identify and isolate hardware issues. Troubleshoot problems with the control plane. Troubleshoot problems with interfaces and other data plane components. Describe the staging and acceptance methodology. Troubleshoot routing protocols. Describe how to monitor your network with SNMP, RMON, Junos Traffic Vision (formerly known as JFlow), and port mirroring. Become familiar with JTAC procedures. This instructor-led four-day course is designed to provide introductory troubleshooting skills for engineers in a network operations center (NOC) environment. Chapter 1: Course Introduction Course Introduction Chapter 2: Troubleshooting as a Process Before You Begin The Troubleshooting Process Challenging Network Issues The Troubleshooting Process Lab Chapter 3: Junos Product Families The Junos OS Control Plane and Data Plane Field-Replaceable Units Junos Product Families Lab: Identifying Hardware Components Chapter 4: Troubleshooting Toolkit Troubleshooting Tools Best Practices Lab: Using Monitoring Tools and Establishing a Baseline Chapter 5: Hardware and Environmental Conditions Hardware Troubleshooting Overview Memory and Storage Boot Monitoring Hardware-Related System Logs Chassis and Environmental Monitoring Lab: Monitoring Hardware and Environmental Conditions Chapter 6: Control Plane Control Plane Review System and User Processes Monitoring Routing Tables and Protocols Monitoring Bridging Monitoring the Address Resolution Protocol Lab: Control Plane Monitoring and Troubleshooting Chapter 7: Control Plane Protection Protection Overview DDOS Protection Loopback Filter Lab: Control Plane Monitoring and Troubleshooting Chapter 8: Data Plane ? Interfaces Interface Properties General Interface Troubleshooting Ethernet Interface Troubleshooting Lab: Monitoring and Troubleshooting Ethernet Interfaces Chapter 9: Data Plane ? Other Components Definition of a Data Plane Problem Data Plane Components Data Plane Forwarding Load-Balancing Behavior Firewall Filters and Policers Data Plane Troubleshooting Case Study Lab: Isolate and Troubleshoot PFE Issues Chapter 10: Staging and Acceptance Testing Initial Inspection and Power-on General System Checks Interface Testing Chapter 11: Troubleshooting Routing Protocols Troubleshooting OSPF Troubleshooting BGP Troubleshooting Routing Loops and Route Oscillation Lab: Troubleshooting Routing Protocols Chapter 12: High Availability High Availability Overview Graceful Routing Engine Switchover Graceful Restart Nonstop Active Routing and Bridging Unified In-Service Software Upgrade Chapter 13: Network Monitoring SNMP RMON Telemetry Flow Monitoring Lab: Monitoring the Network Chapter 14: vMX Troubleshooting vMX Overview Troubleshooting Lab: Monitoring vMX Chapter 15: JTAC Procedures Opening a Support Case Customer Support Tools The Content of a PR Transferring Files to JTAC Chapter 16: Automated Support and Prevention Overview Service Now Service Insight Lab: Automated Support and Prevention Additional course details: Nexus Humans JTNOC - Junos Troubleshooting in the NOC training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the JTNOC - Junos Troubleshooting in the NOC course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for data scientists with experience of Python who need to learn how to apply their data science and machine learning skills on Azure Databricks. Overview After completing this course, you will be able to: Provision an Azure Databricks workspace and cluster Use Azure Databricks to train a machine learning model Use MLflow to track experiments and manage machine learning models Integrate Azure Databricks with Azure Machine Learning Azure Databricks is a cloud-scale platform for data analytics and machine learning. In this course, students will learn how to use Azure Databricks to explore, prepare, and model data; and integrate Databricks machine learning processes with Azure Machine Learning. Introduction to Azure Databricks Getting Started with Azure Databricks Working with Data in Azure Databricks Training and Evaluating Machine Learning Models Preparing Data for Machine Learning Training a Machine Learning Model Managing Experiments and Models Using MLflow to Track Experiments Managing Models Managing Experiments and Models Using MLflow to Track Experiments Managing Models Integrating Azure Databricks and Azure Machine Learning Tracking Experiments with Azure Machine Learning Deploying Models
Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. Day 1 Introduction to AIX Using the System AIX Documentation Files and Directories Using Files Day 2 File Permissions The vi Editor Shell Basics Using Shell Variables Day 3 Processes Controlling Processes Customizing the User Environment AIX Utilities, Part I AIX Utilities, Part I (Continued) AIX Utilities, Part II Day 4 AIX Utilities, Part II (Continued) Additional Shell Features The AIX Graphical User Interface