Onderwerp
Automatisering & ICT/IT
Communicatie
Financieel
HR
Inkoop & logistiek
Management
Secretarieel & Administratief
Marketing
Opleiding & Onderwijs
Persoonlijke Effectiviteit
Productie, techniek & bouw
Kwaliteit- & Projectmanagement
Sales
Vitaliteit & Gezondheid
Taalcursus
Zorg & Verzorging
Juridisch
Internet & Media
Arbo & Veiligheid
Hobby & Vrije Tijd
Vastgoed & Makelaardij
Abonnementen
Locatie
Niveau
Type
Keurmerk

Opleidingen

58.491 resultaten

IBM InfoSphere Master Data Management Fundamentals (V11.6) [1Z802G]

OVERVIEW This course will build a foundation for students interested in what master data is and how it is managed. The student will learn about master data management (MDM), MDM implementation styles, and a variety of MDM use cases. The student will then be introduced to multiple IBM MDM solutions and will gain an understanding of the capabilities of each solution. If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms OBJECTIVES An introduction to MDM • What is Master data? • What is Master Data Management? • Issues addressed by MDM and benefits of MDM Use cases • Sampling of real world use cases and examples MDM and service oriented architecture • What is a Service Oriented Architecture (SOA)? • IBM’s SOA Reference Architecture • How does MDM and SOA relate? MDM implementation styles • Consolidation Style • Collaborative Style • Registry Style • Co-existence Style • Transactional Style • Staffing an MDM project Infosphere MDM • InfoSphere MDM Virtual Module • InfoSphere MDM Physical Module • InfoSphere MDM PME • InfoSphere MDM Collaborative Edition • InfoSphere MDM Reference Data Management • MDM Express CONTENT Please refer to course overview
€310
E-Learning

Introduction to 802.1X Operations for Cisco Security Professionals - CPLL [8021X-CPLL]

OVERVIEW This course shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.   Duration: E-learning: Equivalent of 2 days of instruction with videos, practice, and challenges     OBJECTIVES After completing this course you should be able to: Describe Cisco Identity-Based Networking Services (IBNS) for providing access control to corporate networks Describe Extensible Authentication Protocol (EAP) authentication types and methods, and the role of Remote Authentication Dial-In User Service (RADIUS) in EAP communications Describe how to configure Cisco Catalyst switches, Cisco Wireless LAN Controllers (WLCs), and Cisco ISE for 802.1X operation Describe how to configure access for non-supplicant devices in an 802.1X deployment Describe how to plan and deploy Cisco IBNS Networks with Cisco ISE and 802.1X CONTENT Describing Cisco Identity-Based Networking Services Cisco IBNS Overview Authentication, Authorization, and Accounting (AAA) Role in Cisco IBNS Compare Cisco IBNS and Cisco ISE Solutions Explore Cisco IBNS Architecture Components Explore Cisco TrustSec Describing 802.1X EAP Authentication Explore the IEEE 802.1X Standard Explore 802.1X and EAP Explain EAP Methods Describe the Role of RADIUS in EAP Communications Configuring Devices for 802.1X Operation Identify 802.1X Components and Topologies Configure Cisco Catalyst Switch for 802.1X Compare IBNS 1.0 and 2.0 on Cisco Catalyst Switch Configure Cisco WLC for 802.1X Configure Cisco ISE for 802.1X Configure Supplicants for 802.1X Operation Configuring Access for Non-Supplicant Devices Configure Cisco IBNS for Non-Supplicant Devices Explore IBNS 2.0 for Non-Supplicant Devices Configure Cisco Central Web Authentication for Guests Designing Cisco IBNS Networks with Cisco ISE and 802.1X Cisco ISE Architectural Components Introducing the Cisco ISE Bring Your Own Device (BYOD) Process Identify Cisco ISE Deployment Options Identify Component Compatibilities with 802.1X Review 802.1X Design Considerations Lab outline Configure and Test 802.1X Operations
€185
E-Learning

Cisco Aggregation Services Router 9000 Series Essentials [ASR9KE-CPLL]

OVERVIEW The Cisco Aggregation Services Router 9000 Series Essentials course introduces you to the features and functions of the Cisco Aggregation Services Router (ASR) 9000 Series platforms. Through a combination of lecture and hands-on labs, you will gain an understanding of all major aspects of the platform, including hardware, Layer 2 and Layer 3 services, routing protocols including Segment Routing, Layer 2 and Layer 3 multicast, Quality of Service (QoS) features, and network virtualization. The course investigates Cisco Internetworking Operating System (IOS) XR 64-Bit Linux-based feature parity in the environment, as well as how to install Cisco IOS® XR 64-Bit software packages. Duration: Equivalent of 4 days of video instruction with hands-on lab practice This course is worth 32 Continuing Education (CE) Credits OBJECTIVES After you complete this course you will be able to: List and describe the major features and benefits of a Cisco ASR 9000 Series router List and describe the major features and benefits of the Cisco 64-Bit IOS XR operating system Understand data flow through the Cisco ASR 9000 Series router Configure Cisco ASR 9000, back out of configuration changes, and restore older versions of the configuration Install the Cisco IOS XR 64-Bit Software operating system, package information envelopes and software maintenance updates Enable multicast routing on a Cisco ASR 9900 Series router Configure Layer 3 VPN services Configure Ethernet link bundles Configure local Ethernet Line (E-Line) Layer 2 VPN (L2VPN) Configure Ethernet over Multiprotocol Label Switching (EoMPLS) E-Line L2VPN Configure EoMPLS with pseudowire backup Configure local Ethernet LAN(E-LAN) L2VPN Describe Virtual Private LAN Service (VPLS) L2VPN Describe VPLS with Border Gateway Protocol (BGP) autodiscovery Configure service-based Connectivity Fault Management (CFM) Configure Layer 2 multicast features Describe basic QoS implementation Describe how to configure and verify network Virtualization (nV) on the ASR 9000 series CONTENT Cisco ASR 9000 Series Hardware Examining the Cisco ASR 9000 Series Chassis Examining the Cisco ASR 9000 Series Architecture Examining the Route Switch Processor/ Route Processor (RSP/RP) Functions and Fabric Architecture Examining the Cisco ASR 9000 Series Line Card Examining the Cisco ASR 9000 Power Subsystems Cisco IOS XR 64-Bit Software Architecture and Linux Fundamentals Cisco IOS XR 64-Bit Software Fundamentals Cisco ASR 9000 IOS XR 64-Bit vs. 32-Bit Exploring Linux Fundamentals Cisco IOS XR 64-Bit Software Installation Examining Resource Allocations and Media Mappings Migrating to Cisco IOS XR 64-Bit Software Performing Disaster Recovery Installing Software Packages Cisco IOS XR 64-Bit Software Configuration Basics Configuring Cisco IOS XR 64-Bit Basic Operations Cisco IOS XR 64-Bit Initial Configuration Reviewing the Configuration Cisco IOS XR 64-Bit Software Routing Protocols Exploring Intermediate System to Intermediate System (IS-IS) Exploring OSPF Exploring BGP Exploring Routing Protocol for LLN Multicast Routing Exploring Multicast Routing Exploring Protocol Independent Multicast (PIM) Cisco Multiprotocol Label Switching Examining the MPLS Forwarding Infrastructure Implementing the MPLS Label Distribution Protocol (LDP) Cisco IOS XR 64-Bit Segment Routing Segment Routing Concepts Interior Gateway Protocol Segment Routing (IGP SR) Control Plane Overview Prefix and Adjacency Segment IDs (SIDs) SR IS-IS Multi-Level and OSPF Multi-Area IS-IS SR Configuration and Verification OSPF SR Configuration and Verification Layer 3 VPNs Examining L3VPNs Exploring L3VPN Control and Data Flow Configuring L3VPNs Verifying the L3VPN Operation Cisco ASR 9000 Layer 2 Architecture Examining Carrier Ethernet and Flexible Ethernet Edge Comparing Layer 2 and Layer 3 VPNs Examining the ASR 9000 Layer 2 Infrastructure and Ethernet Flow Points (EFPs) Layers 2 and 3 Coexistence and VLAN Tag Manipulation Exploring the Layer 2 Network Infrastructure Point-to-Point Layer 2 Services Point-to-Point Alternating Current-Alternating Current (AC-AC) and Attachment Circuit Redundancy Point-to-Point AC-Pseudowire (PW) Cross-Connect Examining Pseudowire Redundancy and Resiliency Layer 2 Multicast Examining the Cisco ASR 9000 Series Multicast Implementing Multicast Quality of Service QoS Basics and the Modular QoS CLI (MQC) Mode Layer 2 QoS Example Labs: Lab 1: ASR 9904 Hardware Discovery Lab Lab 2: Device Discovery and Initial Configuration Lab 3: Installing Cisco IOS XR 64-Bit Software Lab 4: Cisco IOS XR 64-Bit Software Operations Lab 5: Configuring IS-IS Routing Lab 6: Configuring OSPF Routing Lab 7: Configuring Internal BGP (iBGP) Routing Lab 8: IPv4 Multicast Configuration Lab 9: Configuring Multiprotocol Label Switching Lab 10: Configuring and Verifying IGP Segment Routing Lab 11: Configuring Layer 3 Virtual Private Network Lab 12: Local E-Line Service Lab 13: EoMPLS Service
€915
E-Learning

IBM Cognos Analytics: Dashboard Essentials (V11.1.x) [B6289G]

OVERVIEW This Web-Based Training course teaches authors how to create dashboards in IBM Cognos Analytics so users can explore and interact with their data and gain insight into their business. You will learn how to add data sources, create and interact with dashboards, and customize content for presentation. You will also learn how to create effective narratives by using stories, and how to use explorations to perform a deeper analysis on your data. OBJECTIVES CONTENT Introduction to dashboarding in IBM Cognos Analytics Create basic dashboards Advanced dashboarding Create a story Create an exploration
€180
E-Learning

IBM Cognos Analytics: Modeling with Data Modules (V11.1.x) [B6290G]

OVERVIEW This training teaches data modelers how to model data using data modules in IBM Cognos Analytics. Users will learn how to create data modules from different sources, such as uploaded files. They will also identify how to customize their data modules by adding joins, calculations, and filters. In addition, they will examine how to group their data (for example, by using navigation paths), how to share their data modules with others, and how to make use of some advanced modeling techniques, such as relative date analysis. If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms OBJECTIVES Data modeling in IBM Cognos Analytics Create and use data modules Intent-driven modeling Use the web modeling user interface: overview Create a data module Sources for data modules Create a new data module in IBM Cognos Analytics: high level steps Add and relink sources Enable data caching Modify and refine a data module What happens when you create a data module? How can I modify and refine a data module? Modifying the graphic representation Create relationship joins What are relationships? Create a relationship: high-level steps Modify relationships Create new tables Customize data modules using filters and calculations Customizing a data module Creating filters Viewing, editing, and removing filters Creating calculations Cleaning data Using custom calculations Group data and create navigation paths Group data Group on a numeric column Group on a text column Create a navigation path Share a data module What happens when you share a data module? Advanced data modeling techniques Perform relative date analysis: overview Using the sample calendars to enable relative date analysis Create a data module for relative date analysis Customizing the reference date for relative date analysis Deal with multiple grains of data Set security in data modules Assessment CONTENT Please refer to course overview
€270
E-Learning

BCS Practitioner Certificate in Business Analysis Practice - Inclusief Examen [BCS-BAP]

VIRTUAL TRAINING CENTER wo 7 mei 2025 en 4 andere data
OVERVIEW Deze 3-daagse BCS Certificate in Business Analysis Practice cursus behandelt het scala aan concepten, benaderingen en technieken die van toepassing zijn op het Practitioner Certificate in Business Analysis Practice en is relevant voor iedereen die een breed begrip van het onderwerp nodig heeft. De nadruk van het certificaat ligt op het gebruik van een holistische benadering voor het onderzoeken en verbeteren van bedrijfssituaties, met het oog op het ontwikkelen van effectieve, haalbare bedrijfsoplossingen. This 3-day BCS Certificate in Business Analysis Practice training covers the range of concepts, approaches and techniques that are applicable to the Practitioner Certificate in Business Analysis Practice and is relevant to anyone requiring a broad understanding of the subject. The certificate’s focus is on using a holistic approach to the investigation and improvement of business situations, with a view to developing effective, feasible business solutions. OBJECTIVES Candidates should be able to demonstrate knowledge, understanding and application of Business Analysis Practice principles and techniques in the following areas: The breadth of the role of a Business Analyst (BA), the value of the role to organisations and the skills required of a BA to support successful business change. The processes and techniques of strategy analysis. Investigation of an organisation’s business systems in order to uncover the problems and issues occurring within them. The importance of, and techniques used within, stakeholder management and the need for analysing perspectives. Conceptual modelling through the use of business activity models. Recommendations for business improvements and how they may be identified through gap analysis between desired and current business models. The role of a business case within the business change lifecycle, including the contents of a business case for the development and implementation of business changes. AUDIENCE For people who already have a business analysis role and want to gain a deeper understanding of business analysis strategy and application Suitable for business analysts, business managers and members of their team, business change managers and project managers CERTIFICATION Type Multiple choice Duration 60 minutes Supervised Yes Open Book No Pass Mark 26/4 Calculators Calculators cannot be used during this examination. Delivery Digital or Paper based, depending on the course format NEXT STEP   CONTENT Learning Objectives 1. Rationale for Business Analysis 5% Candidates will be able to: 1.1 Explain the role of the BA throughout the stages of the business change lifecycle. 1.2 Understand the scope of the BA role within the context of the range of analysis activities: strategic analysis and definition; business analysis; IT systems analysis. 1.3 Identify that there are three areas of competency for a BA: personal qualities, business knowledge and professional techniques. 2. Understanding the Strategic Context 15% Candidates will be able to: 2.1 Apply the MOST technique to analyse the internal environment of an organisation. 2.2 Apply the resource audit technique to analyse the internal environment of an organisation. 2.3 Apply the PESTLE technique to analyse the external environment of an organisation. 2.4 Apply Porter’s Five Forces technique to analyse the external environment of an organisation. 2.5 Explain the purpose of a SWOT analysis. 2.6 Identify strengths, weaknesses, opportunities and threats for a given scenario. 2.7 Define and explain the relationship between the following terms: 2.7.1 Critical Success Factor. 2.7.2 Key Performance Indicator. 2.7.3 Performance Target. 2.8 Define the elements of the balanced business scorecard and describe how it may be used to identify critical success factors and key performance indicators. 3. Understanding the Current Situation 15% Candidates will be able to: 3.1 Identify the generic stakeholder categories defined in the stakeholder wheel. 3.2 Identify relevant investigation techniques for a given scenario, including: 3.2.1 Interviews. 3.2.2 Workshops. 3.2.3 Observation. 3.2.4 Document analysis. 3.2.5 Scenario analysis. 3.2.6 Surveys or questionnaires. 3.3 Explain the rationale for taking a holistic view when investigating a business situation. 3.4 Interpret the business situation represented in: rich pictures; mind maps and fishbone diagrams. 4. Stakeholder Analysis and Management 20% Candidates will be able to: 4.1 In a given scenario, describe stakeholders in terms of their power/influence and level of interest. 4.2 Select an appropriate stakeholder management strategy based on the position on the Power/Interest Grid. 4.3 Apply the CATWOE technique to explore stakeholder business perspectives. 4.4 Explain different stakeholder business perspectives based on elements of CATWOE to identify similarities and differences in their worldviews. 5. Analysing and Modelling Business Activities 25% Candidates will be able to: 5.1 Explain the rationale for building conceptual models of a business situation. 5.2 Understand how to construct a conceptual business activity model, based on a given scenario. 5.3 Show understanding of how the five types of high level activity within a business activity model (and the dependencies between them) represent a stakeholder’s business perspective. 5.4 Explain the role of the planning activities in determining performance targets for a business system represented in the business activity model. 5.5 Explain the role of the enabling activities, in acquiring and replenishing resources for a business system represented in the business activity model. 5.6 Explain the role of the doing activities in conducting the work of the transformation, as defined in the stakeholder’s CATWOE. 5.7 Explain the role of monitoring and control activities, in regulating a business system represented in the business activity model. 5.8 Explain the three types of business events: 5.8.1 External. 5.8.2 Internal. 5.8.3 Time based. 5.9 In a given business activity model, identify the business events that will be handled by a particular business activity. 5.10 Explain the rationale for the consensus business activity model. 6. Identifying Potential Solutions 10% Candidates will be able to: 6.1 In a given business scenario, distinguish between the different categories of business rule: 6.1.1 External constraints. 6.1.2 Internal policies. 6.1.3 Internal procedures. 6.2 Describe the process for carrying out gap analysis, through comparison of the conceptual business activity model and existing business situation. 6.3 Define the components of a new business model: 6.3.1 Process. 6.3.2 Organisation. 6.3.3 People. 6.3.4 Information. 6.3.5 Technology. 7. Building the Business Case 10% Candidates will be able to: 7.1 Explain the rationale for the development of a business case. 7.2 Describe the contents of a business case, including: 7.2.1 Background description. 7.2.2 Options and their descriptions. 7.2.3 Costs, including: 7.2.3.1 Areas of cost. 7.2.3.2 Tangible and intangible costs. 7.2.3.3 Quantifying costs. 7.2.4 Benefits, including: 7.2.4.1 Areas of business benefit. 7.2.4.2 Tangible and intangible benefits. 7.2.4.3 Quantifying benefits. 7.2.5 Cost/benefit analysis using investment appraisal techniques. 7.2.6 Risks, including: 7.2.6.1 Areas of risk. 7.2.6.2 Types of risk. 7.2.6.3 Risk analysis. 7.2.7 Impacts. 7.2.8 Recommendations – the preferred option. 7.3 Interpret a scenario in order to identify the following: 7.3.1 Tangible and intangible costs. 7.3.2 Tangible and intangible benefits. 7.3.3 Risks. 7.3.4 Impacts. 7.4 Understand the rationale for the development of the financial case and the following appraisal techniques: 7.4.1 Payback. 7.4.2 Discounted cash flow. 7.4.3 Internal rate of return. 7.5 Explain where a business case sits within the business change lifecycle and the rationale for reviewing it at each stage.
€1.920
Klassikaal
max 16

BCS Foundation Certificate in Business Analysis - Inclusief Examen [BCS-FBA]

Nieuwegein (Iepenhoeve 5) wo 14 mei 2025 en 6 andere data
OVERVIEW Deze 3-daagse BCS Foundation cursus behandelt het scala van concepten, benaderingen en technieken die van toepassing zijn op Business Analyse. Kandidaten worden geacht hun kennis en begrip van deze aspecten van Business Analysis aan te tonen. De BCS Foundation Certificate in Business Analysis certificering biedt een basis voor de reeks van gespecialiseerde BCS modulaire certificaten op het gebied van Business Analysis, IS Consultancy en Business Change. De certificering kan ook worden gebruikt als de op kennis gebaseerde specialistische module voor het International Diploma in Business Analysis. Daarnaast biedt de certificering basiskennis op het gebied van bedrijfsanalyse voor specialisten in andere disciplines, met name projectmanagers en systeemontwikkelaars. De syllabus is gebaseerd op de BCS publicatie Business Analysis, 3rd edition, en het wordt aanbevolen dat deze tekst wordt bestudeerd door diegenen die zich voorbereiden op het afleggen van dit examen. De titels van de syllabus hebben betrekking op de relevante titels van hoofdstukken, paragrafen en teksten in deze publicatie. This 3-day BCS Foundation course covers the range of concepts, approaches and techniques that are applicable to Business Analysis. Candidates are required to demonstrate their knowledge and understanding of these aspects of Business Analysis. The BCS Foundation Certificate in Business Analysis certification provides a foundation for the range of specialist BCS modular certificates in the areas of Business Analysis, IS Consultancy and Business Change. The certification can also be used as the knowledge-based specialist module for the International Diploma in Business Analysis. In addition, the certification provides foundation-level Business Analysis knowledge for specialists in other disciplines, particularly Project Managers and System Developers. The syllabus is based on the BCS publication Business Analysis, 3rd edition, and it is recommended that this text is studied by those preparing to take this examination. The headings listed in the syllabus relate to the relevant chapter headings, section headings and text included in this publication. OBJECTIVES Candidates should be able to demonstrate knowledge and understanding of business analysis principles and techniques. Key areas are: the role and competencies of a business analyst strategy analysis business system and business process modelling stakeholder analysis investigation and modelling techniques requirements engineering business case development AUDIENCE The certificate is relevant to anyone requiring an understanding of Business Analysis Including Business analysts Business managers and their staff Business change managers Project managers CERTIFICATION Examination Details Examination type: Multiple-choice Questions Number of questions: 40 Pass mark: 65% Open book/notes: No Electronic equipment/aides permitted: No Exam duration: 60 minutes The Rules and Regulations for EXIN’s examinations apply to this exam. NEXT STEP   CONTENT 1. What is Business Analysis The origins of business analysis The development of business analysis - The impact of outsourcing - Competitive advantage of using IT - Successful business change - The importance of the business analyst - Business analysts as internal consultants The scope of business analysis work - The range of analysis activities - Strategic analysis and definition - IT systems analysis - Business analysis Taking a holistic approach The role and responsibilities of a business analyst - Definition of the business analyst role - Further aspects of the business analyst role 2. The Competencies of a Business Analyst Personal qualities Business knowledge Professional techniques The development of competencies 3. Strategy Analysis The context for strategy The definition of strategy (Johnson, Scholes and Whittington 2008) Strategy development External environment analysis - PESTLE analysis - Porter’s five forces model Internal environment analysis - MOST analysis - Resource Audit - Boston Box SWOT analysis Executing strategy - The McKinsey 7-S model - The Balanced Business Scorecard - Critical Success Factors and Key Performance Indicators 4. The Business Analysis Process Model An approach to problem-solving Stages of the business analysis process model - Investigate the situation - Consider the perspectives - Analyse the needs - Evaluate the options - Define the requirements Objectives of the process model stages Procedure for each process model stage Techniques used within each process model stage 5. Investigation techniques Interviews - Advantages and disadvantages of interviewing - Preparing for interviewing - Conducting the interview - Following up the interview Observation - Advantages and disadvantages of observation - Formal observation - Protocol analysis - Shadowing - Ethnographic studies Workshops - Advantages and disadvantages of workshops - Preparing for the workshop - Facilitating the workshop - Techniques - Following the workshop Scenarios - Advantages and disadvantages of scenarios - Process for developing scenarios - Documenting scenarios Prototyping - Advantages and disadvantages of prototyping Quantitative approaches - Surveys or Questionnaires - Special Purpose Records - Activity Sampling - Document Analysis Documenting the current situation - Rich Pictures - Mind Maps 6. Stakeholder Analysis and Management Stakeholder categories and identification - Customers - Partners - Suppliers - Competitors - Regulators - Owners - Employees - Managers Analysing stakeholders - The Power/Interest Grid Stakeholder management strategies - No or low interest and no or low power/influence - Some or high interest but no or low power/influence - No or low to high interest but some power/influence - No or low interest but high power/influence - Some interest and high power/influence - High interest and high power/influence Managing stakeholders - Stakeholder plan/assessment Understanding stakeholder perspectives - Soft Systems Methodology - Analysing the perspectives - CATWOE Business activity models - Creating a business activity model - Types of activities – Plan, Enable, Do, Monitor, Control - Developing a consensus model 7. Modelling Business Processes Organisational context - Functional view of an organisation An alternative view of an organisation The organisational view of business processes Value propositions Process models - Business events - Developing the business process model Analysing the as-is process model Improving business processes (to-be business process) - Business rules - Simplify the process - Remove bottlenecks - Change the sequence of tasks - Redefine process boundary - Automate the processing - Redesign the process 8. Defining the solution Gap analysis - Identifying areas of concern - Framework for gap analysis (elements of POPIT model) - Formulating options Introduction to Business Architecture Definition of Business Architecture Business Architecture techniques - Definition of a capability model - Definition of a value stream 9. Making a Business and Financial Case The business case in the project lifecycle Identifying options Assessing project feasibility - Business feasibility - Technical feasibility - Financial feasibility Structure of a business case - Contents of a business case - Categories of costs and benefits - Impact assessment - Risk assessment Investment appraisal - Payback - Discounted cash flow and Internal rate of return 10. Establishing the Requirements A framework for requirements engineering Actors in requirements engineering - The business representatives - The project team Requirements elicitation - Tacit and explicit knowledge - Requirements elicitation techniques Requirements analysis - Requirements filters - SMART requirements Requirements validation 11. Documenting and Managing Requirements The requirements document - Structure - Content of the requirements document The requirements catalogue - Types of requirements; general, technical, functional and non-functional - Hierarchy of requirements - Documenting a requirement Managing requirements - Elements of requirements management 12. Modelling Requirements Modelling system functions - Use case diagrams Modelling system data - Entity Relationship Diagrams o Entities, attributes and relationships o Types of relationships - Class Models o Objects and classes o Attributes o Associations 13. Delivering the Requirements Delivering the solution  Context Lifecycles - The waterfall lifecycle - The ‘V’ model lifecycle - Incremental lifecycle - Iterative systems development lifecycle 14. Delivering the Business Solution BA role in the business change lifecycle Design stage - Information and Technology o Development o Testing o Design Implementation stage - SARAH model Realisation stage - Contents of the benefits plan
€1.649
Klassikaal
max 16

BCS Practitioner Certificate in Requirements Engineering - Inclusief Examen [BCS-RE]

Amsterdam ARISTO (Teleportboulevard 100) ma 15 sep. 2025 en 3 andere data
OVERVIEW Deze 3-daagse BCS Requirements Engineering Practice training + examen dekt de reeks concepten, benaderingen en technieken die van toepassing zijn op het Practitioner Certificate in Requirements Engineering. Het is relevant voor iedereen die werkzaam is binnen een bedrijfs- of informatiesysteemdomein, en die inzicht nodig heeft in de aard, definitie en het gebruik van requirements van goede kwaliteit. This 3-day BCS Requirements Engineering Practice training + exam covers the range of concepts, approaches and techniques that are applicable to the Practitioner Certificate in Requirements Engineering. It is relevant to anyone working within a business or information systems domain, who requires an understanding of the nature, definition and use of good quality requirements. OBJECTIVES You’ll learn how to take a systematic approach to eliciting, analysing, validating, documenting and managing requirements. The certificate includes: An introduction to the requirements engineering process The hierarchy of requirements How to identify stakeholders in the requirements process How to elicit requirements Modelling, designing and analysing requirements Requirements management AUDIENCE This Practitioner Certificate is designed for people who want to elicit, analyse, validate, document and manage requirements Suitable for business analysts, business managers and members of their team, business change managers and project managers CERTIFICATION Type: Multiple choice Duration: 60 minutes Supervised: Yes Open Book: No Pass Mark: 25/40 Calculators: Calculators cannot be used during this examination. NEXT STEP   CONTENT 1. Introduction to Requirements Engineering 5% Candidates will be able to: 1.1 Define the term ‘requirements’ and the characteristics of a requirement. 1.2 Explain the rationale for Requirements Engineering and the application of the Requirements Engineering framework. 1.3 Explain the rationale of requirements planning and estimating. 1.4 Describe the elements that should be considered as the contents of a project initiation document, terms of reference or project charter: 1.4.1 Business objectives. 1.4.2 Project objectives. 1.4.3 Scope. 1.4.4 Constraints (budget, timescale, standards). 1.4.5 Authority or sponsor. 1.4.6 Resources. 1.4.7 Assumptions. 2 Hierarchy of Requirements 10% Candidates will be able to: 2.1 Show understanding of the rationale for the requirements hierarchy and describe how it is applied in Requirements Engineering. 2.2 Explain the categories within the hierarchy: 2.2.1 Business policy (general) requirements. 2.2.2 Technical policy requirements. 2.2.3 Functional requirements. 2.2.4 Non-functional requirements. 3 Stakeholders in the Requirements Process 5% Candidates will be able to: 3.1 Define the term stakeholder. 3.2 Explain the key roles of the following project stakeholders during Requirements Engineering: 3.2.1 Project Manager. 3.2.2 Developer. 3.2.3 Tester. 3.2.4 Solution Architect. 3.3 Explain the key roles of the following business stakeholders during Requirements Engineering: 3.3.1 Project Sponsor. 3.3.2 Subject Matter Expert. 3.3.3 End User. 3.3.4 Business Manager. 3.4 Interpret a given scenario, identify stakeholders and describe their contribution to Requirements Engineering. 4 Requirements Elicitation 20% Candidates will be able to: 4.1 Explain different knowledge types: 4.1.1 Tacit / Non-tacit (explicit). 4.1.2 Individual / Corporate. 4.2 Interpret a given scenario to identify different knowledge types. 4.3 Interpret a given scenario to identify relevant elicitation techniques from the following list: 4.3.1 Interviews. 4.3.2 Workshops. 4.3.3 Observation. 4.3.4 Focus groups. 4.3.5 Prototyping. 4.3.6 Scenario analysis. 4.3.7 Document analysis. 4.3.8 Surveys. 4.3.9 Record searching. 4.3.10 Special purpose records. 4.3.11 Activity sampling. 4.4 Describe the principles and application of the elicitation techniques (listed in 4.3). 4.5 List the advantages and disadvantages of the elicitation techniques (listed in 4.3). 4.6 Discuss the suitability of the elicitation techniques (listed in 4.3) for Agile and linear development approaches. 5 Use of Models in Requirements Engineering 10% Candidates will be able to: 5.1 Explain the rationale for modelling the functional requirements (processing and data) of an information system and describe how models help the analyst to: 5.1.1 Generate questions in order to clarify a requirement and remove ambiguity. 5.1.2 Define business rules. 5.1.3 Cross-check requirements for consistency and completeness. 5.2 Interpret a given scenario to develop a context diagram. 5.3 Interpret a given scenario to identify the different types of event that can initiate processing (external, time based, internal). 5.4 Understand how to construct a UML use case diagram for a given scenario to represent the functional requirements for an information system, including the following notational elements: 5.4.1 System boundary. 5.4.2 Actors (user role, another system and time). 5.4.3 Use cases. 5.4.4 Communication relationships (associations) between actors and use cases. - It should be noted that there is no requirement to understand include and extend constructs. 5.5 Interpret a UML Class diagram (comprising of classes, attributes, associations and multiplicities) that represents the data requirements for a given scenario, and describe the business rules that are represented. - It should be noted that there is no requirement to understand operations, association classes, generalisation (and associated concepts of inheritance and polymorphism), aggregation and composition. 5.6 Explain the benefits to be derived from cross-referencing models and illustrate how this can be achieved by using a CRUD matrix (of function or event against data). 6 Requirements Documentation 15% Candidates will be able to: 6.1 Explain the rationale for creating a requirements document and for documenting requirements at different levels of definition, relating to: 6.1.1 The nature of the solution. 6.1.2 The level of priority. 6.1.3 The delivery approach. 6.2 Understand how to construct requirements documentation for a given scenario, using the following specified styles: 6.2.1 User story. 6.2.2 Use case. 6.2.3 Requirements list. 6.2.4 Requirements catalogue. 6.3 Describe a requirement in terms of its characteristics or attributes and explain why each of the following may be needed: 6.3.1 Identifier. 6.3.2 Name. 6.3.3 Description. 6.3.4 Source. 6.3.5 Owner. 6.3.6 Author. 6.3.7 Type (general, technical, functional, non-functional). 6.3.8 Priority. 6.3.9 Business area. 6.3.10 Stakeholders. 6.3.11 Associated non-functional requirements. 6.3.12 Acceptance criteria. 6.3.13 Related requirements. 6.3.14 Related documents. 6.3.15 Comments. 6.3.16 Rationale. 6.3.17 Resolution. 6.3.18 Version history. 6.4 Describe the structure and contents of the requirements document: 6.4.1 Introduction and background. 6.4.2 Business process models. 6.4.3 Function model (use case diagram) of defined requirements. 6.4.4 Data model (class model) of defined requirements. 6.4.5 Requirements (defined using the selected documentation style). 6.4.6 Glossary. 7 Requirements Analysis 20% Candidates will be able to: 7.1 Explain the rationale for prioritising requirements, using the MoSCoW prioritisation technique. 7.2 Interpret a given scenario and apply the MoSCoW prioritisation technique. 7.3 Examine individual requirements; apply filters and quality criteria to assess that they are well defined. 7.4 Use requirements for a given scenario to check for technical, business and financial feasibility. 7.5 Assign a requirement type to an individual requirement. 7.6 Organise the requirements for a given scenario by requirement type and functional area. 7.7 Within a given requirement set: 7.7.1 Identify and resolve duplicate requirements. 7.7.2 Identify and reconcile overlapping requirements. 7.7.3 Identify conflicting requirements and explain how requirements negotiation could be applied to resolve these conflicts. 7.7.4 Identify ambiguous requirements and aspects to be defined to remove ambiguity. 7.8 Explain the use of prototyping to elaborate requirements. 8 Requirements Validation 5% Candidates will be able to: 8.1 Describe the rationale for the following approaches to requirements validation: 8.1.1 Informal reviews. 8.1.2 Formal reviews: 8.1.2.1 Structured walkthrough. 8.1.2.2 Prototype reviews. 8.2 Explain the steps to be followed in the validation process for requirements artefacts: 8.2.1 Plan review. 8.2.2 Conduct review of artefacts. 8.2.3 Collect comments. 8.2.4 Undertake actions. 8.2.5 Revise artefacts. 8.2.6 Obtain approval. 9 Requirements Management 10% Candidates will be able to: 9.1 Explain the rationale for requirements management. 9.2 Define the elements of requirements management and the links between them. 9.3 Explain the structure and elements of a change control process. 9.4 Explain the structure and elements of version control. 9.5 Define two forms of traceability and how projects benefit from each of them: 9.5.1 Horizontal (forwards from origin to delivery and backwards from delivery to origin). 9.5.2 Vertical (to business objectives). 9.6 Explain the rationale and the approach to achieving requirements traceability..
€1.920
Klassikaal
max 16

Configuring BGP on Cisco Routers - CPLL [BGP-CPLL]

OVERVIEW Configuring BGP on Cisco Routers provides students with an in-depth knowledge of Border Gateway Protocol (BGP), a routing protocol that is one of the foundations of the Internet and New World technologies such as Multiprotocol Label Switching (MPLS). This course focuses on the theory of BGP, the configuration and troubleshooting of BGP on Cisco IOS routers. Extensive use of hands on labs has been incoporated into this curriculum to ensure learners have the skills required to configure and troublshoot BGP networks in customer environments.   Each student will have their own virtual pod of equipment with access to the labs 24x7 for 90 days.   This course is worth 40 Credits in the Continuing Education Program   e-Learning Interactive self-paced content that provides flexibility in terms of pace, place and time to suit individuals and organisations. These resources also consist of online books, educational podcasts and vodcasts, and video-based learning. OBJECTIVES After you complete this course you will be able to: Describe how to configure, monitor and troubleshoot basic BGP to enable interdomain routing in a network scenario with multiple domains. Describe how to use BGP policy controls to influence the route selection process in a network scenario where you must support connections to multiple ISPs. Describe how to use BGP attributes to influence the route selection process in a network scenario where you must support multiple connections. Describe how to successfully connect the customer network to the Internet in a network scenario in which multiple connections must be implemented. Describe how to configure the service provider network to behave as a transit AS in a typical implementation with multiple BGP connections to other autonomous systems. Enable route reflection and confederations as possible solutions to BGP scaling issues in a typical service provider network with multiple BGP connections to other autonomous systems. Describe the available BGP tools and features to optimize the scalability of the BGP routing protocol in a typical BGP network. CONTENT Introducing BGP Interdomain Routing Why External Routing Protocols? BGP Characteristics BGP Development Considerations Single-Homed Customers Multihomed Customers Transit Autonomous Systems Exploring BGP Path Attributes BGP Path Attributes Well-Known BGP Attributes Optional BGP Attributes AS-Path Attribute Next-Hop Attribute Establishing BGP Sessions BGP Neighbor Discovery Establishing a BGP Session BGP Keepalives MD5 Authentication Processing BGP Routes Receiving Routing Updates Building the BGP Table BGP Route Selection Criteria BGP Route Propagation Building the IP Routing Table Advertising Local Networks Automatic Summarization Configuring Basic BGP BGP Routing Process Configuring External Neighbors Announcing Networks in BGP Redistributing Routes into BGP BGP Conditional Route Injection BGP Support for TTL Security Check Multihomed Customer Problem Monitoring and Troubleshooting BGP Monitoring Overall BGP Routing Monitoring BGP Neighbors Monitoring the BGP Table Debugging BGP BGP Session Startup Problems BGP Neighbor Not Reachable BGP Neighbor not Configured BGP AS Number Mismatch Working with Transit AS Transit AS Tasks External Route Propagation Internal Route Propagation Packet Forwarding in an AS Core Router IBGP Requirements in a Transit AS Interacting with IBGP and EBGP in a Transit AS AS Path Processing in IBGP Multipath Load Sharing in BGP BGP Split Horizon IBGP Full Mesh IBGP Neighbors IBGP Next-Hope Processing Transit Network Using edge Routers as Next Hops Example Differences Between EBGP and IBGP Scalability Limitations of IBGP-Based Transit Backbones Forwarding Packets in a Transit AS Packet Forwarding in a Transit AS Recursive Lookup in Cisco IOS Software Routing Protocols in a Transit AS BGP and IGP Interaction Problems with BGP and IGP Interaction Monitoring and Troubleshooting IBGP in a Transit AS Monitoring IBGP Common IBGP Problems Troubleshooting IBGP Session Start-Up Issues Troubleshooting IBGP Route Selection Issues Troubleshooting IBGP Sychronization Issues Using Multihomed BGP Networks Business Requirements for Multihomed BGP Networks Technical Requirements for Multihomed BGP Networks BGP Route Selection Multihomed Customer Routing Policies Influencing BGP Route Selection Transit Traffic Issue Routing Update Reliability Issue Return Traffic Issue Employing AS Path Filters AS Path Filtering Services AS Path Regular Expressions String Matching Applying AS Path Filters Configuring BGP AS Path Filters Monitoring AS Path Filters Filtering with Prefix Lists Requirements for Prefix-Based Filters Prefix Lists vs IP Access Lists Configuring Prefix Lists BGP Filters Implementation Implementing Prefix Lists in the BGP Process Modifying Prefix Lists Monitoring Prefix Lists Using Outbound Route Filtering Outbound Route Filtering Inbound vs Outbound Filtering Example BGP Prefix-Based Outbound Route Filtering Outbound Route Filter Message Configuring Outbound Route Filtering Using Outbound Route Filtering Applying Route Maps as BGP Filters Route Map Overview BGP Route Map Policy List Support BGP Route Map Continue Prefix List Use in Route Maps BGP Filters Using Route Maps as BGP Filters Implementing Changes in BGP Policy Traditional Filtering Limitations BGP Soft Reset Enhancement Route Refresh Configuring Route Refresh Monitoring Route Refresh Influencing BGP Route Selection with Weights BGP Route Selection Criteria Influencing BGP Route Selection Configuring Per-Neighbor Weights Changing Weights with Route Maps BGP Route Selection and Filtering Tools Summary Setting BGP Local Preference Consistent Route Selection Within the AS BGP Local Preference Configuring Default Local Preference Monitoring Local Preference Configuring Local Preference with Route Maps Using AS Path Prepending Return Path Selection in a Multhomed AS AS Path Prepending AS Path Prepending Design Considerations BGP Hide Local-Autonoumous System Exploring the BGP MED Selecting the Proper Return Path MED Progression in a BGP Network Changing the MED Troubleshooting the MED Advanced MED Considerations Addressing BGP Communities Selecting the Proper Return Path BGP Communities Overview Using Communities Configuring BGP Communities BGP Named Community Lists BGP Cost Community BGP Link Bandwidth Feature BGP Support for Sequenced Entries in Extended Community Lists Exploring Customer-to-Provider Connectivity Requirements Customer-to-Provider Connectivity Types Customer Redundant Connectivity Customer-to-Provider Routing Schemes Customer Routing Schemes Customer Addressing Schemes Customer Addressing Requirements Customer AS Number Allocation Implementing Customer Connectivity Using Static Routing When to Use Static Routing ? Characteristics of Static Routing Designing Static Route Propagation in a Service Provider Network BGP Backup with Static Routes Floating Static Routes with BGP Load Sharing with Static Routes Connecting a Customer to a Single Service Provider BGP Configuration on Customer Routes Conditional BGP Advertising in Customer Networks BGP Configuration on Service Provider Routers Removing Private AS Numbers BGP Support for Dual AS Configuration for Network AS Migrations Backup Solutions with BGP Load Sharing Load Sharing with BGP Multipath Load Sharing wth EBGP Multihop Connecting a Multihomed Customer to Multiple Service Providers BGP Configuration for Multihomed Customers Multihomed Customer Address Space Selection Multihomed Customer AS Number Selection AS Number Translation Primary and Backup Link Selection BGP Incoming Link Selection Load Sharing with Multiple Providers Scaling IGP and BGP in Service Provider Networks Common Service Provider Network Route Propagation in Service Provider Networks Scaling Service Provider Routing Protocols Scaling Service Provider Addressing Introducing Route Reflectors IBGP Scalability Issues in a Transit AS Route Reflector Split-Horizon Rules Redundant Route Reflectors Route Reflectors Clusters Additional Route Reflector Loop-Prevention Mechanisms Network Design with Route Reflectors Potential Network Issues Hierachical Route Reflectors Route Reflector Backbone Migration Configuring Route Reflectors Improving BGP Convergence BGP Convergence BGP Processes CPU Effects of BGP Processes Improving BGP Convergence PMTU Discovery Increasing Input Queue Depth BGP Prefix Independent Convergence BFD for BGP BGP Nonstop Forwarding Awareness BGP Scan Time BGP Advertisement Interval BGP Keepalive and Hold-Down Timers Optimizing BGP Scalability BGP Route Limiting Configuring BGP Route Limiting BGP Peer Groups Overview BGP Peer Groups as a Performance Tool BGP Peer Group Limitations Configuring BGP Peer Groups BGP Peer Group Configuration Examples BGP Dynamic Update Peer Groups Feature BGP Peer Templates Overview BGP Peer Templates Inheritance BGP Peer Templates Configuration BGP Route Dampening BGP Route Dampening Operation Configuring BGP Route Dampening Labs Discovery 1: Configure Basic BGP Discovery 2: Announce Networks in BGP Discovery 3: Implement the BGP Support for TTL Security Check Feature Discovery 4: Configure a Basic BGP Network Discovery 5: BGP Route Propagation Discovery 6: IBGP Full Mesh Discovery 7: BGP Administrative Distance Discovery 8: Configure a Transit AS Discovery 9: Configure Non-Transit Autonomous System Discovery 10: Filter Customer Prefixes Discovery 11: Prefix-Based Outbound Route Filtering Discovery 12: Configure Route Maps as BGP Filters Discovery 13: Configure BGP Using BGP Filtering Discovery 14: Configure Per-Neighbor Weights Discovery 15: Configure and Monitor Local Preference Discovery 16: Configure Local Preference Using Route Maps Discovery 17: Configure AS Path Prepending Discovery 18: Configure the MED Discovery 19: Configure Local Preference Using the Communities Discovery 20: Configure BGP Route Selection Using BGP Attributes Discovery 21: Configure Route Reflector Discovery 22: Implement Route Reflector Configurations Discovery 23: Configure BGP Route Limiting Discovery 24: Configure BGP Peer Groups Discovery 25: Configure BGP Route Dampening
€685
E-Learning

BTA Blockchain Bundle Digital Library [BTABKDL]

OVERVIEW With this bundle you will receive instant access to 10 classes and corresponding material, over 100 hours of content One year of unlimited access Sample quiz questions Class slides and lab guides for all courses 5 PDF exam study guides Access to BTA portal with free content available monthly Access to new courses development within that year OBJECTIVES Train at your own pace on the most trendy Blockchain subjects. With 10 training classes, over 100 hours of content you are getting the most comprehensive Blockchain education available. CONTENT With the bundle you have one year of access to: Blockchain Overview: Business Foundations On Demand Blockchain Solution Architecture Training On Demand Blockchain Security Training On Demand Ethereum Developer Training On Demand    Data Science and Blockchain On Demand   Corda Distributed Ledger Architecture On Demand  Blockchain for Healthcare Professionals On Demand Hyperledger Developer Training On Demand Hyperledger Fabric v1.4: Architecting, Designing and Deploying a Network On Demand IoT and Blockchain
€230
E-Learning