Duration 5 Days 30 CPD hours This course is intended for This course is intended for Experienced system administrators responsible for deploying and administering JBoss Enterprise Application Platform 6 in large-scale production environments. At least 2 years' experience as a JBoss Enterprise Application Platform administrator. Be a Red Hat Certified Specialist in Enterprise Application Server Administration on Enterprise Application Platform 6 (or later) or have equivalent experience . Overview Upon successful completion of this course, students will be able to provision and manage Red Hat JBoss Enterprise Application Platform 6 in large-scale production environments. This course empowers you to provision and manage Red Hat© JBoss© Enterprise Application Platform (JBoss EAP) in large-scale production environments. Intended for experienced administrators, this course will help you gain a deeper understanding of how to work with JBoss EAP by taking a closer look at installation, clustering, deployments, scripting, management, messaging, and security with a view towards building on the skills established in the Red Hat JBoss Application Administration I (JB248) course. 1 - INSTALLATION Given the proper installation media, perform Red Hat© JBoss© Enterprise Application Platform 6 installations that are repeatable, upgradeable, and silent. 2 - CLUSTERING Demonstrate a proficient knowledge of clustering components, their configuration, and application to clustered architectures. 3 - DEPLOYMENT Deploy an application in various types of production environments. 4 - SCRIPTING Script various configuration and management scenarios using command line interface (CLI). 5 - MANAGEMENT Use various tools to monitor and manage JBoss Enterprise Application Platform. 6 - MESSAGING Learn how to manage supported messaging systems. 7 - SECURITY Configure security settings that include authentication, authorization, networking, and the management interfaces. 8 - OVERVIEW OF JBOSS OPERATIONS NETWORK Learn the functionality of JBoss Operations Network and its use cases. Also learn how to install a JBoss Operations Network server, an agent, and agent plug-ins. 9 - MONITORING RESOURCES Learn how to use JBoss Operations Network to monitor managed resources, including defining alerts, baselines, and notifications Additional course details: Nexus Humans Red Hat JBoss Application Administration II (AD348) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat JBoss Application Administration II (AD348) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This introductory-level course is intended for Business Analysts and Data Analysts (or anyone else in the data science realm) who are already comfortable working with numerical data in Excel or other spreadsheet environments. No prior programming experience is required, and a browser is the only tool necessary for the course. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Throughout the hands-on course students, will learn to leverage Python scripting for data science (to a basic level) using the most current and efficient skills and techniques. Working in a hands-on learning environment, guided by our expert team, attendees will learn about and explore (to a basic level): How to work with Python interactively in web notebooks The essentials of Python scripting Key concepts necessary to enter the world of Data Science via Python This course introduces data analysts and business analysts (as well as anyone interested in Data Science) to the Python programming language, as it?s often used in Data Science in web notebooks. This goal of this course is to provide students with a baseline understanding of core concepts that can serve as a platform of knowledge to follow up with more in-depth training and real-world practice. This course introduces data analysts and business analysts (as well as anyone interested in Data Science) to the Python programming language, as it's often used in Data Science in web notebooks. This goal of this course is to provide students with a baseline understanding of core concepts that can serve as a platform of knowledge to follow up with more in-depth training and real-world practice. Additional course details: Nexus Humans Python for Data Science Primer: Hands-on Technical Overview (TTPS4872) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Python for Data Science Primer: Hands-on Technical Overview (TTPS4872) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4.5 Days 27 CPD hours This course is intended for This is an intermediate course for experienced data professionals such as z/OS system programmers, who are responsible for the installation and maintenance of z/OS UNIX. Overview Execute the tasks required to prepare a z/OS installation for implementing z/OS UNIXExecute the tasks to install the z/OS UNIX software featuresUse the information provided in this class to perform the basic customization necessary to fully implement the z/OS UNIX kernel, the file system, the shell and utilities, and z/OS UNIX applicationsPut in place the RACF security required for z/OS UNIX resources and applicationsMake appropriate definitions for the activation of TCP/IP sockets by z/OS UNIXIdentify and use the processes and data required for monitoring and tuning the z/OS UNIX environment This course is designed to provide you with the skills required to install and customize z/OS UNIX (full name z/OS UNIX System Services), and to manage and monitor the z/OS UNIX environment. Day 1 Welcome Unit 1: z/OS UNIX implementation overview Unit 2: z/OS UNIX services initial installation Exercise 1: Move from default to full mode function Exercise 2: IPL in full function mode and enable a nonvolatile root HFS Unit 3: File system customization Day 2 Exercise 3: Customizing the file system Unit 4: Security customization Exercise 4: Defining and managing UNIX users, OMVS security Day 3 Unit 5: Shell customization Exercise 5: UNIX System Services and shell customization Unit 6: Customizing applications, daemons, and servers Exercise 6: UNIX processes Exercise 7: Access control list and enhanced ASCII support Day 4 Unit 7: File system management and system maintenance Exercise 8: Managing HFS and zFS data sets Unit 8: Managing z/OS UNIX operations Unit 9: Exploiting TCP/IP with z/OS UNIX Exercise 9: Managing z/OS UNIX Additional course details: Nexus Humans OP25 IBM z/OS UNIX System Services Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the OP25 IBM z/OS UNIX System Services Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Application Consultant Business Process Owner / Team Lead / Power User Overview This course will prepare you to: Provide an overview of basic customizing settings in the main components of Financial Accounting with SAP S/4HANA Configure the Master Data Settings (G/L Accounts, Customer and Vendor Accounts) of Financial Accounting with SAP S/4HANA Configure the Document Control and Posting Control Settings of Financial Accounting with SAP S/4HANA Configure the Settings for Financial Document Clearing of Financial Accounting with SAP S/4HANA The course provides an overview of how to implement Financial Accounting capabilities of SAP S/4HANA in order to cover the related business requirements. You will gain the mandatory foundation knowledge required in order to understand and configure business processes for the SAP S/4HANA financials module in the areas of general ledger, accounts payable, and accounts receivable accounting. For the Master Data, the Document Control/Posting Control and Financial Document Clearing you will practice some configurations and verify the result by using the application. Course Outline Short Overview of SAP S/4HANA Core Financial Accounting (FI) Configuration Managing Organizational Units in Financial Accounting (FI) Checking the Basic Settings in New General Ledger (G/L) Accounting Outlining the Variant Principle Managing Fiscal Year Variants Master Data Maintaining General Ledger (G/L) Accounts Managing Customer and Vendor Accounts Document Control Configuring the Header and Line Items of Financial Accounting (FI) Documents Managing Posting Periods Managing Posting Authorizations Posting Control Analyzing Document Splitting Maintaining Default Values Configuring Change Control Configuring Document Reversal Configuring Payment Terms and Cash Discounts Maintaining Taxes and Tax Codes Posting Cross-Company Code Transactions Financial Document Clearing Performing Open Item Clearing Managing Payment Differences Additional course details: Nexus Humans S4F12 SAP Basics of Customizing for Financial Accounting: GL, AP, AR in SAP S/4HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the S4F12 SAP Basics of Customizing for Financial Accounting: GL, AP, AR in SAP S/4HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Cybersecurity analysts and engineers and security operations specialists, as well as administrators and product deployers. Overview Successful completion of this instructor-led course with hands-on lab activities should enable you to: Describe the architecture and components of the Cortex XDR family Use the Cortex XDR management console, including reporting Create Cortex XDR agent installation packages, endpoint groups, and policies Deploy Cortex XDR agents on endpoints Create and manage Exploit and Malware Prevention profiles Investigate alerts and prioritize them using starring and exclusion policies Tune Security profiles using Cortex XDR exceptions Perform and track response actions in the Action Center Perform basic troubleshooting related to Cortex XDR agents Deploy a Broker VM and activate the Local Agents Settings applet Understand Cortex XDR deployment concepts and activation requirements Work with the Customer Support Portal and Cortex XDR Gateway for authentication and authorization This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies. The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. The training concludes with discussions about basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment. Course Outline Module 1 - Cortex XDR Overview Module 2 - Cortex XDR Main Components Module 3 - Cortex XDR Management Console Module 4 - Profiles and Policy Rules Module 5 - Malware Protection Module 6 - Exploit Protection Module 7 - Cortex XDR Alerts Module 8 - Tuning Policies Using Exceptions Module 9 - Response Actions Module 10 - Basic Agent Troubleshooting Module 11 - Broker VM Overview Module 12 - Deployment Considerations Additional course details: Nexus Humans Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for System administrators who are either new to JBoss or have experience with JBoss Enterprise Application Platform 5. Base experience with system administration on Microsoft Windows, UNIX, or Linux© operating systems. Understanding of hardware and networking. Note: No prior knowledge of Java, scripting, or JBoss Developer Studio is required. Overview Upon successful completion of this course, students will be able to take the Red Hat Certified JBoss Administration (RHCJA) Exam. In this course, you'll discover the best practices for installing and configuring Red Hat© JBoss© Enterprise Application Platform (JBoss EAP) 7. Through hands-on labs, you'll learn the essential, real-world tasks that you need to know as a system administrator to effectively deploy and manage applications on JBoss EAP. This course will help prepare you to take the Red Hat Certified Specialist in Enterprise Application Server Administration exam. 1 - OVERVIEW OF JBOSS ENTERPRISE APPLICATION PLATFORM Learn the concepts and terminology of JBoss© Enterprise Application Platform 6, and install and run a JBoss Enterprise Application Platform instance. 2 - CONFIGURE JBOSS ENTERPRISE APPLICATION PLATFORM IN STANDALONE MODE Understand the directory structure of standalone mode and the standalone.xml configuration file, and deploy an application onto a standalone server. 3 - CONFIGURE JBOSS ENTERPRISE APPLICATION PLATFORM IN DOMAIN MODE Set up a domain, including a domain controller managing multiple host controllers. Also learn how to deploy an application onto a domain. 4 - CONFIGURE SERVERS Define a server group on a host, add servers to a server group, and deploy an application to a server group. 5 - USE THE CLI TOOL Learn how the command-line Interface tool can be used to script administrative tasks. 6 - THE DATASOURCE SUBSYSTEM Understand database connection pools in JBoss Enterprise Application Platform and how to configure the datasource subsystem. Learn how to deploy a Java? Database Connectivity (JDBC) driver and define a datasource. 7 - THE LOGGING SUBSYSTEM Configure the logging subsystem, including configuring the built-in handlers and loggers. 8 - THE MESSAGING SUBSYSTEM Understand JMS and HornetQ, including how to define and configure connection factories and destinations (topics and queues). 9 - THE SECURITY SUBSYSTEM Configure the security subsystem, including securing the management interfaces, securing an application, and securing a JMS destination. Also learn how to define an Lightweight Directory Access Protocol (LDAP) and database security realm. 10 - JVM CONFIGURATION Configure the JVM for both standalone and domain modes. 11 - MIGRATING APPLICATIONS TO JBOSS ENTERPRISE APPLICATION PLATFORM 6 Understand classpath and module dependencies, JPA issues, updating security settings, and other tips on how to migrate an application to JBoss Enterprise Application Platform 6. 12 - THE WEB SUBSYSTEM Configure the HTTP and HTTPS Connectors, set up an SSL connection, and configure an AJP Connector. 13 - INTRODUCTION TO CLUSTERING Set up JBoss Enterprise Application Platform 6 in a cluster in both standalone and domain mode.
Duration 1 Days 6 CPD hours This course is intended for Security Engineers Network Engineers Support staff Overview This course is intended to provide an understanding of Palo Alto Networks Next-Generation firewall technologies enable the student to perform a basic installation of Palo Alto Networks Next-Generation firewalls. Upon completion of this course, students will be able to: Explain the features and advantages of the Palo Alto Networks next-generation firewall architecture Understand the capabilities of App-ID, Content-ID, and User-ID Perform the basic configuration of the firewall including: Interfaces and virtual routers NAT Policies Security zones Objects Security policies Content security profiles View logs and basic reports This course was formerly named Palo Alto Networks Foundations of Next Generation Firewalls (EDU-150). ** Our foundation classes are just introductory trainings, NOT a full technical training. Your network has expanded beyond your organization\'s boundaries. Cloud locations and remote users (often using personal devices) have \'distributed\' the surface you need to both enable and protect.At the same time, the motivations of attackers and their sophistication have continued to evolve.Palo Alto Networks' next-generation firewalls are all based on a consistent Single-Pass Architecture, enabling security capability that is unique in the industry. This architecture is implemented in a portfolio of both physical and virtual appliances, designed to cover a range of performance and use case requirements.Features and management are consistent across the portfolio. Integration with GlobalProtect? mobile security service extends policy-based security to mobile devices (whether on-premises or remote). Integration with our threat intelligence services keeps information up to date for the firewall (e.g., URL categories, threat signatures). WildFire? cloud-based malware analysis environment integration supports a rapid \'feedback loop\' that enables the firewall to stop advanced threats throughout the attack lifecycle. Course Outline Module 0: Introduction Module 1: Platforms & Architecture Module 2: Getting Started Module 3: Basic Administration Module 4: Connectivity Module 5: Security Module 6: Logging & Reporting Additional course details: Nexus Humans Palo Alto Networks : Strata Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Strata Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is geared toward Windows system administrators, network administrators, and other system administrators who are interested in supplementing current skills or backstopping other team members, in addition to Linux system administrators who are responsible for these tasks: Configuring, installing, upgrading, and maintaining Linux systems using established standards and procedures Providing operational support Managing systems for monitoring system performance and availability Writing and deploying scripts for task automation and system administration Successful completion of Red Hat System Administration I (RH124) is recommended. Experienced Linux administrators seeking to accelerate their path toward becoming a Red Hat Certified System Administrator should start with the RHCSA Rapid Track course (RH199). Overview You should be able to demonstrate these skills: - Install Red Hat Enterprise Linux using Kickstart - Manage file systems and logical volumes - Manage scheduled jobs - Access network file systems - Manage SELinux - Control firewalls - Perform troubleshooting tasks Red Hat System Administration II (RH134) is designed as the second part of the Red Hat© Certified System Administrator (RHCSA©) training track for IT professionals who have taken Red Hat System Administration I (RH124). The course goes deeper into core Linux© system administration skills, including storage configuration, security feature management, task control, and installation and deployment of Red Hat© Enterprise Linux. Prerequisites Successful completion of Red Hat System Administration I (RH124) is recommended. 1 - Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart. 2 - Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. 3 - Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. 4 - Schedule future Linux tasks Schedule tasks to automatically execute in the future. 5 - Manage priority of Linux processes Influence the relative priorities at which Linux processes run. 6 - Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. 7 - Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. 8 - Connect to network-defined users and groups Configure systems to use central identity management services. 9 - Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. 10 - Manage logical volume management (LVM) storage Manage logical volumes from the command line. 11 - Access networked attached storage with network file system (NFS) Access (secure) NFS shares. 12 - Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. 13 - Control and troubleshoot the Red Hat Enterprise Linux boot process 14 - Limit network communication with firewall Configure a basic firewall. 15 - Comprehensive review Practice and demonstrate knowledge and skills learned in this course.
Duration 2 Days 12 CPD hours This course is intended for IT professionals interested in understanding the capabilities of the MDS 9000 Series using Cisco DCNM. IT professionals seeking a deeper knowledge of SAN operations using both CLI and DCNM may take the alternative 4-day course, Configuring Cisco MDS 9000 Series Switches (DCMDS). Much of the hands-on work in DCNMS is also covered in DCMDS. This course is also designed for professionals in the following roles including: Consulting systems engineer Data center engineers Data center operators Data center network management engineers Storage network administrator Network administrator Network engineer Sales engineer Technical solutions architect Overview After taking this course, you should be able to: Describe Cisco DCNM SAN components, licensing, high availability, and security features Describe Cisco DCNM SAN reports, alerts, event forwarding, and troubleshooting tools, including Cisco DCNM SAN Insights and SAN Analytics features The Managing SAN Infrastructure with Cisco© Data Center Network Manager (DCNMS) v1.0 course provides product training that that teaches you to deploy, operate, and maintain the Cisco Data Center Network Manager (DCNM) SAN solutions. You will learn to configure, monitor, and troubleshoot Cisco storage networking infrastructure using Cisco DCNM. Cisco DCNM provides management, automation, visualization, and troubleshooting across Cisco Nexus© and Cisco Multilayer Distributed Switching (MDS) solutions.You will learn how the DCNM serves as a Storage Area Network (SAN) solution for managing and troubleshooting Cisco storage architecture. Implementing Cisco DCNM SAN Cisco DCNM Solution Overview Implement Cisco DCNM SAN Integrate Cisco DCNM SAN with VMware vCenter Cisco DCNM SAN Licensing Monitoring and Troubleshooting SAN Infrastructure Using Cisco DCNM SAN Cisco DCNM SAN Alerts and Reports Dashboards in Cisco DCNM SAN SAN Troubleshooting with the Cisco DCNM SAN Analytics and Telemetry Streaming Additional course details: Nexus Humans Cisco Managing SAN Infrastructure with Cisco Data Center Network Manager v1.0 (DCNMS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Managing SAN Infrastructure with Cisco Data Center Network Manager v1.0 (DCNMS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for business leaders and decision makers, including C-level executives, project and product managers, HR leaders, Marketing and Sales leaders, and technical sales consultants, who have a vested interest in the representation of ethical values in technology solutions. Other individuals who want to know more about data ethics are also candidates for this course. This course is also designed to assist learners in preparing for the CertNexus DEBIZ⢠(Exam DEB-110) credential. The power of extracting value from data utilizing Artificial Intelligence, Data Science and Machine Learning exposes the learning differences between humans and machines. Humans can apply ethical principles throughout the decision-making process to avoid discrimination, societal harm, and marginalization to maintain and even enhance acceptable norms. Machines make decisions autonomously. So how do we train them to apply ethical principles as they learn from decisions they make? This course provides business professionals and consumers of technology core concepts of ethical principles, how they can be applied to emerging data driven technologies and the impact to an organization which ignores ethical use of technology. Introduction to Data Ethics Defining Data Ethics The Case for Data Ethics Identifying Ethical Issues Improving Ethical Data Practices Ethical Principles Ethical Frameworks Data Privacy Accountability Transparency and Explainability Human-Centered Values and Fairness Inclusive Growth, Sustainable Development, and Well-Being Applying Ethical Principles to Emerging Technology Improving Ethical Data Practices Sources of Ethical Risk Mitigating Bias Mitigating Discrimination Safety and Security Mitigating Negative Outputs Data Surveillance Assessing Risk Ethical Risks in sharing data Applying professional critical judgement Business Considerations Data Legislation Impact of Social and Behavioral Effects Trustworthiness Impact on Business Reputation Organizational Values and the Data Value Chain Building a Data Ethics Culture/Code of Ethics Balancing organizational goals with Ethical Practice Additional course details: Nexus Humans CertNexus Data Ethics for Business Professionals (DEBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Data Ethics for Business Professionals (DEBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.