
Opleidingen
58.491
resultaten
IBM InfoSphere Master Data Management Fundamentals (V11.6) [1Z802G]
OVERVIEW
This course will build a foundation for students interested in what master data is and how it is managed. The student will learn about master data management (MDM), MDM implementation styles, and a variety of MDM use cases. The student will then be introduced to multiple IBM MDM solutions and will gain an understanding of the capabilities of each solution.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms
OBJECTIVES
An introduction to MDM • What is Master data? • What is Master Data Management? • Issues addressed by MDM and benefits of MDM Use cases • Sampling of real world use cases and examples MDM and service oriented architecture • What is a Service Oriented Architecture (SOA)? • IBM’s SOA Reference Architecture • How does MDM and SOA relate? MDM implementation styles • Consolidation Style • Collaborative Style • Registry Style • Co-existence Style • Transactional Style • Staffing an MDM project Infosphere MDM • InfoSphere MDM Virtual Module • InfoSphere MDM Physical Module • InfoSphere MDM PME • InfoSphere MDM Collaborative Edition • InfoSphere MDM Reference Data Management • MDM Express
CONTENT
Please refer to course overview

€310
E-Learning
Introduction to 802.1X Operations for Cisco Security Professionals - CPLL [8021X-CPLL]
OVERVIEW
This course shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers. You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.
Duration: E-learning: Equivalent of 2 days of instruction with videos, practice, and challenges
OBJECTIVES
After completing this course you should be able to:
Describe Cisco Identity-Based Networking Services (IBNS) for providing access control to corporate networks
Describe Extensible Authentication Protocol (EAP) authentication types and methods, and the role of Remote Authentication Dial-In User Service (RADIUS) in EAP communications
Describe how to configure Cisco Catalyst switches, Cisco Wireless LAN Controllers (WLCs), and Cisco ISE for 802.1X operation
Describe how to configure access for non-supplicant devices in an 802.1X deployment
Describe how to plan and deploy Cisco IBNS Networks with Cisco ISE and 802.1X
CONTENT
Describing Cisco Identity-Based Networking Services
Cisco IBNS Overview
Authentication, Authorization, and Accounting (AAA) Role in Cisco IBNS
Compare Cisco IBNS and Cisco ISE Solutions
Explore Cisco IBNS Architecture Components
Explore Cisco TrustSec
Describing 802.1X EAP Authentication
Explore the IEEE 802.1X Standard
Explore 802.1X and EAP
Explain EAP Methods
Describe the Role of RADIUS in EAP Communications
Configuring Devices for 802.1X Operation
Identify 802.1X Components and Topologies
Configure Cisco Catalyst Switch for 802.1X
Compare IBNS 1.0 and 2.0 on Cisco Catalyst Switch
Configure Cisco WLC for 802.1X
Configure Cisco ISE for 802.1X
Configure Supplicants for 802.1X Operation
Configuring Access for Non-Supplicant Devices
Configure Cisco IBNS for Non-Supplicant Devices
Explore IBNS 2.0 for Non-Supplicant Devices
Configure Cisco Central Web Authentication for Guests
Designing Cisco IBNS Networks with Cisco ISE and 802.1X
Cisco ISE Architectural Components
Introducing the Cisco ISE Bring Your Own Device (BYOD) Process
Identify Cisco ISE Deployment Options
Identify Component Compatibilities with 802.1X
Review 802.1X Design Considerations
Lab outline
Configure and Test 802.1X Operations

€185
E-Learning
Cisco Aggregation Services Router 9000 Series Essentials [ASR9KE-CPLL]
OVERVIEW
The Cisco Aggregation Services Router 9000 Series Essentials course introduces you to the features and functions of the Cisco Aggregation Services Router (ASR) 9000 Series platforms. Through a combination of lecture and hands-on labs, you will gain an understanding of all major aspects of the platform, including hardware, Layer 2 and Layer 3 services, routing protocols including Segment Routing, Layer 2 and Layer 3 multicast, Quality of Service (QoS) features, and network virtualization. The course investigates Cisco Internetworking Operating System (IOS) XR 64-Bit Linux-based feature parity in the environment, as well as how to install Cisco IOS® XR 64-Bit software packages.
Duration: Equivalent of 4 days of video instruction with hands-on lab practice
This course is worth 32 Continuing Education (CE) Credits
OBJECTIVES
After you complete this course you will be able to:
List and describe the major features and benefits of a Cisco ASR 9000 Series router
List and describe the major features and benefits of the Cisco 64-Bit IOS XR operating system
Understand data flow through the Cisco ASR 9000 Series router
Configure Cisco ASR 9000, back out of configuration changes, and restore older versions of the configuration
Install the Cisco IOS XR 64-Bit Software operating system, package information envelopes and software maintenance updates
Enable multicast routing on a Cisco ASR 9900 Series router
Configure Layer 3 VPN services
Configure Ethernet link bundles
Configure local Ethernet Line (E-Line) Layer 2 VPN (L2VPN)
Configure Ethernet over Multiprotocol Label Switching (EoMPLS) E-Line L2VPN
Configure EoMPLS with pseudowire backup
Configure local Ethernet LAN(E-LAN) L2VPN
Describe Virtual Private LAN Service (VPLS) L2VPN
Describe VPLS with Border Gateway Protocol (BGP) autodiscovery
Configure service-based Connectivity Fault Management (CFM)
Configure Layer 2 multicast features
Describe basic QoS implementation
Describe how to configure and verify network Virtualization (nV) on the ASR 9000 series
CONTENT
Cisco ASR 9000 Series Hardware
Examining the Cisco ASR 9000 Series Chassis
Examining the Cisco ASR 9000 Series Architecture
Examining the Route Switch Processor/ Route Processor (RSP/RP) Functions and Fabric Architecture
Examining the Cisco ASR 9000 Series Line Card
Examining the Cisco ASR 9000 Power Subsystems
Cisco IOS XR 64-Bit Software Architecture and Linux Fundamentals
Cisco IOS XR 64-Bit Software Fundamentals
Cisco ASR 9000 IOS XR 64-Bit vs. 32-Bit
Exploring Linux Fundamentals
Cisco IOS XR 64-Bit Software Installation
Examining Resource Allocations and Media Mappings
Migrating to Cisco IOS XR 64-Bit Software
Performing Disaster Recovery
Installing Software Packages
Cisco IOS XR 64-Bit Software Configuration Basics
Configuring Cisco IOS XR 64-Bit Basic Operations
Cisco IOS XR 64-Bit Initial Configuration
Reviewing the Configuration
Cisco IOS XR 64-Bit Software Routing Protocols
Exploring Intermediate System to Intermediate System (IS-IS)
Exploring OSPF
Exploring BGP
Exploring Routing Protocol for LLN
Multicast Routing
Exploring Multicast Routing
Exploring Protocol Independent Multicast (PIM)
Cisco Multiprotocol Label Switching
Examining the MPLS Forwarding Infrastructure
Implementing the MPLS Label Distribution Protocol (LDP)
Cisco IOS XR 64-Bit Segment Routing
Segment Routing Concepts
Interior Gateway Protocol Segment Routing (IGP SR) Control Plane Overview
Prefix and Adjacency Segment IDs (SIDs)
SR IS-IS Multi-Level and OSPF Multi-Area
IS-IS SR Configuration and Verification
OSPF SR Configuration and Verification
Layer 3 VPNs
Examining L3VPNs
Exploring L3VPN Control and Data Flow
Configuring L3VPNs
Verifying the L3VPN Operation
Cisco ASR 9000 Layer 2 Architecture
Examining Carrier Ethernet and Flexible Ethernet Edge
Comparing Layer 2 and Layer 3 VPNs
Examining the ASR 9000 Layer 2 Infrastructure and Ethernet Flow Points (EFPs)
Layers 2 and 3 Coexistence and VLAN Tag Manipulation
Exploring the Layer 2 Network Infrastructure
Point-to-Point Layer 2 Services
Point-to-Point Alternating Current-Alternating Current (AC-AC) and Attachment Circuit Redundancy
Point-to-Point AC-Pseudowire (PW) Cross-Connect
Examining Pseudowire Redundancy and Resiliency
Layer 2 Multicast
Examining the Cisco ASR 9000 Series Multicast
Implementing Multicast
Quality of Service
QoS Basics and the Modular QoS CLI (MQC) Mode
Layer 2 QoS Example
Labs:
Lab 1: ASR 9904 Hardware Discovery Lab
Lab 2: Device Discovery and Initial Configuration
Lab 3: Installing Cisco IOS XR 64-Bit Software
Lab 4: Cisco IOS XR 64-Bit Software Operations
Lab 5: Configuring IS-IS Routing
Lab 6: Configuring OSPF Routing
Lab 7: Configuring Internal BGP (iBGP) Routing
Lab 8: IPv4 Multicast Configuration
Lab 9: Configuring Multiprotocol Label Switching
Lab 10: Configuring and Verifying IGP Segment Routing
Lab 11: Configuring Layer 3 Virtual Private Network
Lab 12: Local E-Line Service
Lab 13: EoMPLS Service

€915
E-Learning
IBM Cognos Analytics: Dashboard Essentials (V11.1.x) [B6289G]
OVERVIEW
This Web-Based Training course teaches authors how to create dashboards in IBM Cognos Analytics so users can explore and interact with their data and gain insight into their business. You will learn how to add data sources, create and interact with dashboards, and customize content for presentation. You will also learn how to create effective narratives by using stories, and how to use explorations to perform a deeper analysis on your data.
OBJECTIVES
CONTENT
Introduction to dashboarding in IBM Cognos Analytics
Create basic dashboards
Advanced dashboarding
Create a story
Create an exploration

€180
E-Learning
IBM Cognos Analytics: Modeling with Data Modules (V11.1.x) [B6290G]
OVERVIEW
This training teaches data modelers how to model data using data modules in IBM Cognos Analytics. Users will learn how to create data modules from different sources, such as uploaded files. They will also identify how to customize their data modules by adding joins, calculations, and filters. In addition, they will examine how to group their data (for example, by using navigation paths), how to share their data modules with others, and how to make use of some advanced modeling techniques, such as relative date analysis.
If you are enrolling in a Self Paced Virtual Classroom or Web Based Training course, before you enroll, please review the Self-Paced Virtual Classes and Web-Based Training Classes on our Terms and Conditions page, as well as the system requirements, to ensure that your system meets the minimum requirements for this course. http://www.ibm.com/training/terms
OBJECTIVES
Data modeling in IBM Cognos Analytics
Create and use data modules
Intent-driven modeling
Use the web modeling user interface: overview Create a data module
Sources for data modules
Create a new data module in IBM Cognos Analytics: high level steps
Add and relink sources
Enable data caching Modify and refine a data module
What happens when you create a data module?
How can I modify and refine a data module?
Modifying the graphic representation Create relationship joins
What are relationships?
Create a relationship: high-level steps
Modify relationships
Create new tables Customize data modules using filters and calculations
Customizing a data module
Creating filters
Viewing, editing, and removing filters
Creating calculations
Cleaning data
Using custom calculations Group data and create navigation paths
Group data
Group on a numeric column
Group on a text column
Create a navigation path Share a data module What happens when you share a data module? Advanced data modeling techniques
Perform relative date analysis: overview
Using the sample calendars to enable relative date analysis
Create a data module for relative date analysis
Customizing the reference date for relative date analysis
Deal with multiple grains of data
Set security in data modules Assessment
CONTENT
Please refer to course overview

€270
E-Learning
BCS Practitioner Certificate in Business Analysis Practice - Inclusief Examen [BCS-BAP]
VIRTUAL TRAINING CENTER
wo 7 mei 2025
en 4 andere data
OVERVIEW
Deze 3-daagse BCS Certificate in Business Analysis Practice cursus behandelt het scala aan concepten, benaderingen en technieken die van toepassing zijn op het Practitioner Certificate in Business Analysis Practice en is relevant voor iedereen die een breed begrip van het onderwerp nodig heeft. De nadruk van het certificaat ligt op het gebruik van een holistische benadering voor het onderzoeken en verbeteren van bedrijfssituaties, met het oog op het ontwikkelen van effectieve, haalbare bedrijfsoplossingen.
This 3-day BCS Certificate in Business Analysis Practice training covers the range of concepts, approaches and techniques that are applicable to the Practitioner Certificate in Business Analysis Practice and is relevant to anyone requiring a broad understanding of the subject. The certificate’s focus is on using a holistic approach to the investigation and improvement of business situations, with a view to developing effective, feasible business solutions.
OBJECTIVES
Candidates should be able to demonstrate knowledge, understanding and application of
Business Analysis Practice principles and techniques in the following areas:
The breadth of the role of a Business Analyst (BA), the value of the role to organisations
and the skills required of a BA to support successful business change.
The processes and techniques of strategy analysis.
Investigation of an organisation’s business systems in order to uncover the problems
and issues occurring within them.
The importance of, and techniques used within, stakeholder management and the need
for analysing perspectives.
Conceptual modelling through the use of business activity models.
Recommendations for business improvements and how they may be identified through
gap analysis between desired and current business models.
The role of a business case within the business change lifecycle, including the contents
of a business case for the development and implementation of business changes.
AUDIENCE
For people who already have a business analysis role and want to gain a deeper understanding of business analysis strategy and application
Suitable for business analysts, business managers and members of their team, business change managers and project managers
CERTIFICATION
Type Multiple choice
Duration 60 minutes
Supervised Yes
Open Book No
Pass Mark 26/4
Calculators Calculators cannot be used during this examination.
Delivery Digital or Paper based, depending on the course format
NEXT STEP
CONTENT
Learning Objectives
1. Rationale for Business Analysis 5%
Candidates will be able to:
1.1 Explain the role of the BA throughout the stages of the business change lifecycle.
1.2 Understand the scope of the BA role within the context of the range of analysis
activities: strategic analysis and definition; business analysis; IT systems analysis.
1.3 Identify that there are three areas of competency for a BA: personal qualities,
business knowledge and professional techniques.
2. Understanding the Strategic Context 15%
Candidates will be able to:
2.1 Apply the MOST technique to analyse the internal environment of an organisation.
2.2 Apply the resource audit technique to analyse the internal environment of an
organisation.
2.3 Apply the PESTLE technique to analyse the external environment of an organisation.
2.4 Apply Porter’s Five Forces technique to analyse the external environment of an
organisation.
2.5 Explain the purpose of a SWOT analysis.
2.6 Identify strengths, weaknesses, opportunities and threats for a given scenario.
2.7 Define and explain the relationship between the following terms:
2.7.1 Critical Success Factor.
2.7.2 Key Performance Indicator.
2.7.3 Performance Target.
2.8 Define the elements of the balanced business scorecard and describe how it may be
used to identify critical success factors and key performance indicators.
3. Understanding the Current Situation 15%
Candidates will be able to:
3.1 Identify the generic stakeholder categories defined in the stakeholder wheel.
3.2 Identify relevant investigation techniques for a given scenario, including:
3.2.1 Interviews.
3.2.2 Workshops.
3.2.3 Observation.
3.2.4 Document analysis.
3.2.5 Scenario analysis.
3.2.6 Surveys or questionnaires.
3.3 Explain the rationale for taking a holistic view when investigating a business situation.
3.4 Interpret the business situation represented in: rich pictures; mind maps and fishbone
diagrams.
4. Stakeholder Analysis and Management 20%
Candidates will be able to:
4.1 In a given scenario, describe stakeholders in terms of their power/influence and level
of interest.
4.2 Select an appropriate stakeholder management strategy based on the position on the
Power/Interest Grid.
4.3 Apply the CATWOE technique to explore stakeholder business perspectives.
4.4 Explain different stakeholder business perspectives based on elements of CATWOE
to identify similarities and differences in their worldviews.
5. Analysing and Modelling Business Activities 25%
Candidates will be able to:
5.1 Explain the rationale for building conceptual models of a business situation.
5.2 Understand how to construct a conceptual business activity model, based on a given
scenario.
5.3 Show understanding of how the five types of high level activity within a business
activity model (and the dependencies between them) represent a stakeholder’s
business perspective.
5.4 Explain the role of the planning activities in determining performance targets for a
business system represented in the business activity model.
5.5 Explain the role of the enabling activities, in acquiring and replenishing resources for
a business system represented in the business activity model.
5.6 Explain the role of the doing activities in conducting the work of the transformation, as
defined in the stakeholder’s CATWOE.
5.7 Explain the role of monitoring and control activities, in regulating a business system
represented in the business activity model.
5.8 Explain the three types of business events:
5.8.1 External.
5.8.2 Internal.
5.8.3 Time based.
5.9 In a given business activity model, identify the business events that will be handled
by a particular business activity.
5.10 Explain the rationale for the consensus business activity model.
6. Identifying Potential Solutions 10%
Candidates will be able to:
6.1 In a given business scenario, distinguish between the different categories of business
rule:
6.1.1 External constraints.
6.1.2 Internal policies.
6.1.3 Internal procedures.
6.2 Describe the process for carrying out gap analysis, through comparison of the
conceptual business activity model and existing business situation.
6.3 Define the components of a new business model:
6.3.1 Process.
6.3.2 Organisation.
6.3.3 People.
6.3.4 Information.
6.3.5 Technology.
7. Building the Business Case 10%
Candidates will be able to:
7.1 Explain the rationale for the development of a business case.
7.2 Describe the contents of a business case, including:
7.2.1 Background description.
7.2.2 Options and their descriptions.
7.2.3 Costs, including:
7.2.3.1 Areas of cost.
7.2.3.2 Tangible and intangible costs.
7.2.3.3 Quantifying costs.
7.2.4 Benefits, including:
7.2.4.1 Areas of business benefit.
7.2.4.2 Tangible and intangible benefits.
7.2.4.3 Quantifying benefits.
7.2.5 Cost/benefit analysis using investment appraisal techniques.
7.2.6 Risks, including:
7.2.6.1 Areas of risk.
7.2.6.2 Types of risk.
7.2.6.3 Risk analysis.
7.2.7 Impacts.
7.2.8 Recommendations – the preferred option.
7.3 Interpret a scenario in order to identify the following:
7.3.1 Tangible and intangible costs.
7.3.2 Tangible and intangible benefits.
7.3.3 Risks.
7.3.4 Impacts.
7.4 Understand the rationale for the development of the financial case and the following
appraisal techniques:
7.4.1 Payback.
7.4.2 Discounted cash flow.
7.4.3 Internal rate of return.
7.5 Explain where a business case sits within the business change lifecycle and the
rationale for reviewing it at each stage.

€1.920
Klassikaal
max 16
BCS Foundation Certificate in Business Analysis - Inclusief Examen [BCS-FBA]
Nieuwegein (Iepenhoeve 5)
wo 14 mei 2025
en 6 andere data
OVERVIEW
Deze 3-daagse BCS Foundation cursus behandelt het scala van concepten, benaderingen en technieken die van toepassing zijn op Business Analyse. Kandidaten worden geacht hun kennis en begrip van deze aspecten van Business Analysis aan te tonen.
De BCS Foundation Certificate in Business Analysis certificering biedt een basis voor de reeks van gespecialiseerde BCS modulaire certificaten op het gebied van Business Analysis, IS Consultancy en Business Change. De certificering kan ook worden gebruikt als de op kennis gebaseerde specialistische module voor het International Diploma in Business Analysis. Daarnaast biedt de certificering basiskennis op het gebied van bedrijfsanalyse voor specialisten in andere disciplines, met name projectmanagers en systeemontwikkelaars. De syllabus is gebaseerd op de BCS publicatie Business Analysis, 3rd edition, en het wordt aanbevolen dat deze tekst wordt bestudeerd door diegenen die zich voorbereiden op het afleggen van dit examen. De titels van de syllabus hebben betrekking op de relevante titels van hoofdstukken, paragrafen en teksten in deze publicatie.
This 3-day BCS Foundation course covers the range of concepts, approaches and techniques that are applicable to Business Analysis. Candidates are required to demonstrate their knowledge and understanding of these aspects of Business Analysis.
The BCS Foundation Certificate in Business Analysis certification provides a foundation for the range of specialist BCS modular certificates in the areas of Business Analysis, IS Consultancy and Business Change. The certification can also be used as the knowledge-based specialist module for the International Diploma in Business Analysis. In addition, the certification provides foundation-level Business Analysis knowledge for specialists in other disciplines, particularly Project Managers and System Developers. The syllabus is based on the BCS publication Business Analysis, 3rd edition, and it is recommended that this text is studied by those preparing to take this examination. The headings listed in the syllabus relate to the relevant chapter headings, section headings and text included in this publication.
OBJECTIVES
Candidates should be able to demonstrate knowledge and understanding of business analysis principles and techniques.
Key areas are:
the role and competencies of a business analyst
strategy analysis
business system and business process modelling
stakeholder analysis
investigation and modelling techniques
requirements engineering
business case development
AUDIENCE
The certificate is relevant to anyone requiring an understanding of Business Analysis
Including
Business analysts
Business managers and their staff
Business change managers
Project managers
CERTIFICATION
Examination Details
Examination type: Multiple-choice
Questions Number of questions: 40
Pass mark: 65%
Open book/notes: No
Electronic equipment/aides permitted: No
Exam duration: 60 minutes
The Rules and Regulations for EXIN’s examinations apply to this exam.
NEXT STEP
CONTENT
1. What is Business Analysis
The origins of business analysis
The development of business analysis
- The impact of outsourcing
- Competitive advantage of using IT
- Successful business change
- The importance of the business analyst
- Business analysts as internal consultants
The scope of business analysis work
- The range of analysis activities
- Strategic analysis and definition
- IT systems analysis
- Business analysis
Taking a holistic approach
The role and responsibilities of a business analyst
- Definition of the business analyst role
- Further aspects of the business analyst role
2. The Competencies of a Business Analyst
Personal qualities
Business knowledge
Professional techniques
The development of competencies
3. Strategy Analysis
The context for strategy
The definition of strategy (Johnson, Scholes and Whittington 2008)
Strategy development
External environment analysis
- PESTLE analysis
- Porter’s five forces model
Internal environment analysis
- MOST analysis
- Resource Audit
- Boston Box
SWOT analysis
Executing strategy
- The McKinsey 7-S model
- The Balanced Business Scorecard
- Critical Success Factors and Key Performance Indicators
4. The Business Analysis Process Model
An approach to problem-solving
Stages of the business analysis process model
- Investigate the situation
- Consider the perspectives
- Analyse the needs
- Evaluate the options
- Define the requirements
Objectives of the process model stages
Procedure for each process model stage
Techniques used within each process model stage
5. Investigation techniques
Interviews
- Advantages and disadvantages of interviewing
- Preparing for interviewing
- Conducting the interview
- Following up the interview
Observation
- Advantages and disadvantages of observation
- Formal observation
- Protocol analysis
- Shadowing
- Ethnographic studies
Workshops
- Advantages and disadvantages of workshops
- Preparing for the workshop
- Facilitating the workshop
- Techniques
- Following the workshop
Scenarios
- Advantages and disadvantages of scenarios
- Process for developing scenarios
- Documenting scenarios
Prototyping
- Advantages and disadvantages of prototyping
Quantitative approaches
- Surveys or Questionnaires
- Special Purpose Records
- Activity Sampling
- Document Analysis
Documenting the current situation
- Rich Pictures
- Mind Maps
6. Stakeholder Analysis and Management
Stakeholder categories and identification
- Customers
- Partners
- Suppliers
- Competitors
- Regulators
- Owners
- Employees
- Managers
Analysing stakeholders
- The Power/Interest Grid
Stakeholder management strategies
- No or low interest and no or low power/influence
- Some or high interest but no or low power/influence
- No or low to high interest but some power/influence
- No or low interest but high power/influence
- Some interest and high power/influence
- High interest and high power/influence
Managing stakeholders
- Stakeholder plan/assessment
Understanding stakeholder perspectives
- Soft Systems Methodology
- Analysing the perspectives
- CATWOE
Business activity models
- Creating a business activity model
- Types of activities – Plan, Enable, Do, Monitor, Control
- Developing a consensus model
7. Modelling Business Processes
Organisational context
- Functional view of an organisation
An alternative view of an organisation
The organisational view of business processes
Value propositions
Process models
- Business events
- Developing the business process model
Analysing the as-is process model
Improving business processes (to-be business process)
- Business rules
- Simplify the process
- Remove bottlenecks
- Change the sequence of tasks
- Redefine process boundary
- Automate the processing
- Redesign the process
8. Defining the solution
Gap analysis
- Identifying areas of concern
- Framework for gap analysis (elements of POPIT model)
- Formulating options
Introduction to Business Architecture
Definition of Business Architecture
Business Architecture techniques
- Definition of a capability model
- Definition of a value stream
9. Making a Business and Financial Case
The business case in the project lifecycle
Identifying options
Assessing project feasibility
- Business feasibility
- Technical feasibility
- Financial feasibility
Structure of a business case
- Contents of a business case
- Categories of costs and benefits
- Impact assessment
- Risk assessment
Investment appraisal
- Payback
- Discounted cash flow and Internal rate of return
10. Establishing the Requirements
A framework for requirements engineering
Actors in requirements engineering
- The business representatives
- The project team
Requirements elicitation
- Tacit and explicit knowledge
- Requirements elicitation techniques
Requirements analysis
- Requirements filters
- SMART requirements
Requirements validation
11. Documenting and Managing Requirements
The requirements document
- Structure
- Content of the requirements document
The requirements catalogue
- Types of requirements; general, technical, functional and non-functional
- Hierarchy of requirements
- Documenting a requirement
Managing requirements
- Elements of requirements management
12. Modelling Requirements
Modelling system functions
- Use case diagrams
Modelling system data
- Entity Relationship Diagrams
o Entities, attributes and relationships
o Types of relationships
- Class Models
o Objects and classes
o Attributes
o Associations
13. Delivering the Requirements
Delivering the solution
Context
Lifecycles
- The waterfall lifecycle
- The ‘V’ model lifecycle
- Incremental lifecycle
- Iterative systems development lifecycle
14. Delivering the Business Solution
BA role in the business change lifecycle
Design stage
- Information and Technology
o Development
o Testing
o Design
Implementation stage
- SARAH model
Realisation stage
- Contents of the benefits plan

€1.649
Klassikaal
max 16
BCS Practitioner Certificate in Requirements Engineering - Inclusief Examen [BCS-RE]
Amsterdam ARISTO (Teleportboulevard 100)
ma 15 sep. 2025
en 3 andere data
OVERVIEW
Deze 3-daagse BCS Requirements Engineering Practice training + examen dekt de reeks concepten, benaderingen en technieken die van toepassing zijn op het Practitioner Certificate in Requirements Engineering. Het is relevant voor iedereen die werkzaam is binnen een bedrijfs- of informatiesysteemdomein, en die inzicht nodig heeft in de aard, definitie en het gebruik van requirements van goede kwaliteit.
This 3-day BCS Requirements Engineering Practice training + exam covers the range of concepts, approaches and techniques that are applicable to the Practitioner Certificate in Requirements Engineering. It is relevant to anyone working within a business or information systems domain, who requires an understanding of the nature, definition and use of good quality requirements.
OBJECTIVES
You’ll learn how to take a systematic approach to eliciting, analysing, validating, documenting and managing requirements. The certificate includes:
An introduction to the requirements engineering process
The hierarchy of requirements
How to identify stakeholders in the requirements process
How to elicit requirements
Modelling, designing and analysing requirements
Requirements management
AUDIENCE
This Practitioner Certificate is designed for people who want to elicit, analyse, validate, document and manage requirements
Suitable for business analysts, business managers and members of their team, business change managers and project managers
CERTIFICATION
Type: Multiple choice
Duration: 60 minutes
Supervised: Yes
Open Book: No
Pass Mark: 25/40
Calculators: Calculators cannot be used during this examination.
NEXT STEP
CONTENT
1. Introduction to Requirements Engineering 5%
Candidates will be able to:
1.1 Define the term ‘requirements’ and the characteristics of a requirement.
1.2 Explain the rationale for Requirements Engineering and the application of the
Requirements Engineering framework.
1.3 Explain the rationale of requirements planning and estimating.
1.4 Describe the elements that should be considered as the contents of a project
initiation document, terms of reference or project charter:
1.4.1 Business objectives.
1.4.2 Project objectives.
1.4.3 Scope.
1.4.4 Constraints (budget, timescale, standards).
1.4.5 Authority or sponsor.
1.4.6 Resources.
1.4.7 Assumptions.
2 Hierarchy of Requirements 10%
Candidates will be able to:
2.1 Show understanding of the rationale for the requirements hierarchy and describe how
it is applied in Requirements Engineering.
2.2 Explain the categories within the hierarchy:
2.2.1 Business policy (general) requirements.
2.2.2 Technical policy requirements.
2.2.3 Functional requirements.
2.2.4 Non-functional requirements.
3 Stakeholders in the Requirements Process 5%
Candidates will be able to:
3.1 Define the term stakeholder.
3.2 Explain the key roles of the following project stakeholders during Requirements
Engineering:
3.2.1 Project Manager.
3.2.2 Developer.
3.2.3 Tester.
3.2.4 Solution Architect.
3.3 Explain the key roles of the following business stakeholders during Requirements
Engineering:
3.3.1 Project Sponsor.
3.3.2 Subject Matter Expert.
3.3.3 End User.
3.3.4 Business Manager.
3.4 Interpret a given scenario, identify stakeholders and describe their contribution to
Requirements Engineering.
4 Requirements Elicitation 20%
Candidates will be able to:
4.1 Explain different knowledge types:
4.1.1 Tacit / Non-tacit (explicit).
4.1.2 Individual / Corporate.
4.2 Interpret a given scenario to identify different knowledge types.
4.3 Interpret a given scenario to identify relevant elicitation techniques from the following
list:
4.3.1 Interviews.
4.3.2 Workshops.
4.3.3 Observation.
4.3.4 Focus groups.
4.3.5 Prototyping.
4.3.6 Scenario analysis.
4.3.7 Document analysis.
4.3.8 Surveys.
4.3.9 Record searching.
4.3.10 Special purpose records.
4.3.11 Activity sampling.
4.4 Describe the principles and application of the elicitation techniques (listed in 4.3).
4.5 List the advantages and disadvantages of the elicitation techniques (listed in 4.3).
4.6 Discuss the suitability of the elicitation techniques (listed in 4.3) for Agile and linear
development approaches.
5 Use of Models in Requirements Engineering 10%
Candidates will be able to:
5.1 Explain the rationale for modelling the functional requirements (processing and data)
of an information system and describe how models help the analyst to:
5.1.1 Generate questions in order to clarify a requirement and remove ambiguity.
5.1.2 Define business rules.
5.1.3 Cross-check requirements for consistency and completeness.
5.2 Interpret a given scenario to develop a context diagram.
5.3 Interpret a given scenario to identify the different types of event that can initiate
processing (external, time based, internal).
5.4 Understand how to construct a UML use case diagram for a given scenario to
represent the functional requirements for an information system, including the
following notational elements:
5.4.1 System boundary.
5.4.2 Actors (user role, another system and time).
5.4.3 Use cases.
5.4.4 Communication relationships (associations) between actors and use cases.
- It should be noted that there is no requirement to understand include and extend
constructs.
5.5 Interpret a UML Class diagram (comprising of classes, attributes, associations and
multiplicities) that represents the data requirements for a given scenario, and
describe the business rules that are represented.
- It should be noted that there is no requirement to understand operations,
association classes, generalisation (and associated concepts of inheritance and
polymorphism), aggregation and composition.
5.6 Explain the benefits to be derived from cross-referencing models and illustrate how
this can be achieved by using a CRUD matrix (of function or event against data).
6 Requirements Documentation 15%
Candidates will be able to:
6.1 Explain the rationale for creating a requirements document and for documenting
requirements at different levels of definition, relating to:
6.1.1 The nature of the solution.
6.1.2 The level of priority.
6.1.3 The delivery approach.
6.2 Understand how to construct requirements documentation for a given scenario, using
the following specified styles:
6.2.1 User story.
6.2.2 Use case.
6.2.3 Requirements list.
6.2.4 Requirements catalogue.
6.3 Describe a requirement in terms of its characteristics or attributes and explain why
each of the following may be needed:
6.3.1 Identifier.
6.3.2 Name.
6.3.3 Description.
6.3.4 Source.
6.3.5 Owner.
6.3.6 Author.
6.3.7 Type (general, technical, functional, non-functional).
6.3.8 Priority.
6.3.9 Business area.
6.3.10 Stakeholders.
6.3.11 Associated non-functional requirements.
6.3.12 Acceptance criteria.
6.3.13 Related requirements.
6.3.14 Related documents.
6.3.15 Comments.
6.3.16 Rationale.
6.3.17 Resolution.
6.3.18 Version history.
6.4 Describe the structure and contents of the requirements document:
6.4.1 Introduction and background.
6.4.2 Business process models.
6.4.3 Function model (use case diagram) of defined requirements.
6.4.4 Data model (class model) of defined requirements.
6.4.5 Requirements (defined using the selected documentation style).
6.4.6 Glossary.
7 Requirements Analysis 20%
Candidates will be able to:
7.1 Explain the rationale for prioritising requirements, using the MoSCoW prioritisation
technique.
7.2 Interpret a given scenario and apply the MoSCoW prioritisation technique.
7.3 Examine individual requirements; apply filters and quality criteria to assess that they
are well defined.
7.4 Use requirements for a given scenario to check for technical, business and financial
feasibility.
7.5 Assign a requirement type to an individual requirement.
7.6 Organise the requirements for a given scenario by requirement type and functional
area.
7.7 Within a given requirement set:
7.7.1 Identify and resolve duplicate requirements.
7.7.2 Identify and reconcile overlapping requirements.
7.7.3 Identify conflicting requirements and explain how requirements negotiation
could be applied to resolve these conflicts.
7.7.4 Identify ambiguous requirements and aspects to be defined to remove
ambiguity.
7.8 Explain the use of prototyping to elaborate requirements.
8 Requirements Validation 5%
Candidates will be able to:
8.1 Describe the rationale for the following approaches to requirements validation:
8.1.1 Informal reviews.
8.1.2 Formal reviews:
8.1.2.1 Structured walkthrough.
8.1.2.2 Prototype reviews.
8.2 Explain the steps to be followed in the validation process for requirements artefacts:
8.2.1 Plan review.
8.2.2 Conduct review of artefacts.
8.2.3 Collect comments.
8.2.4 Undertake actions.
8.2.5 Revise artefacts.
8.2.6 Obtain approval.
9 Requirements Management 10%
Candidates will be able to:
9.1 Explain the rationale for requirements management.
9.2 Define the elements of requirements management and the links between them.
9.3 Explain the structure and elements of a change control process.
9.4 Explain the structure and elements of version control.
9.5 Define two forms of traceability and how projects benefit from each of them:
9.5.1 Horizontal (forwards from origin to delivery and backwards from delivery to
origin).
9.5.2 Vertical (to business objectives).
9.6 Explain the rationale and the approach to achieving requirements traceability..

€1.920
Klassikaal
max 16
Configuring BGP on Cisco Routers - CPLL [BGP-CPLL]
OVERVIEW
Configuring BGP on Cisco Routers provides students with an in-depth knowledge of Border Gateway Protocol (BGP), a routing protocol that is one of the foundations of the Internet and New World technologies such as Multiprotocol Label Switching (MPLS).
This course focuses on the theory of BGP, the configuration and troubleshooting of BGP on Cisco IOS routers. Extensive use of hands on labs has been incoporated into this curriculum to ensure learners have the skills required to configure and troublshoot BGP networks in customer environments.
Each student will have their own virtual pod of equipment with access to the labs 24x7 for 90 days.
This course is worth 40 Credits in the Continuing Education Program
e-Learning
Interactive self-paced content that provides flexibility in terms of pace, place and time to suit individuals and organisations. These resources also consist of online books, educational podcasts and vodcasts, and video-based learning.
OBJECTIVES
After you complete this course you will be able to:
Describe how to configure, monitor and troubleshoot basic BGP to enable interdomain routing in a network scenario with multiple domains.
Describe how to use BGP policy controls to influence the route selection process in a network scenario where you must support connections to multiple ISPs.
Describe how to use BGP attributes to influence the route selection process in a network scenario where you must support multiple connections.
Describe how to successfully connect the customer network to the Internet in a network scenario in which multiple connections must be implemented.
Describe how to configure the service provider network to behave as a transit AS in a typical implementation with multiple BGP connections to other autonomous systems.
Enable route reflection and confederations as possible solutions to BGP scaling issues in a typical service provider network with multiple BGP connections to other autonomous systems.
Describe the available BGP tools and features to optimize the scalability of the BGP routing protocol in a typical BGP network.
CONTENT
Introducing BGP
Interdomain Routing
Why External Routing Protocols?
BGP Characteristics
BGP Development Considerations
Single-Homed Customers
Multihomed Customers
Transit Autonomous Systems
Exploring BGP Path Attributes
BGP Path Attributes
Well-Known BGP Attributes
Optional BGP Attributes
AS-Path Attribute
Next-Hop Attribute
Establishing BGP Sessions
BGP Neighbor Discovery
Establishing a BGP Session
BGP Keepalives
MD5 Authentication
Processing BGP Routes
Receiving Routing Updates
Building the BGP Table
BGP Route Selection Criteria
BGP Route Propagation
Building the IP Routing Table
Advertising Local Networks
Automatic Summarization
Configuring Basic BGP
BGP Routing Process
Configuring External Neighbors
Announcing Networks in BGP
Redistributing Routes into BGP
BGP Conditional Route Injection
BGP Support for TTL Security Check
Multihomed Customer Problem
Monitoring and Troubleshooting BGP
Monitoring Overall BGP Routing
Monitoring BGP Neighbors
Monitoring the BGP Table
Debugging BGP
BGP Session Startup Problems
BGP Neighbor Not Reachable
BGP Neighbor not Configured
BGP AS Number Mismatch
Working with Transit AS
Transit AS Tasks
External Route Propagation
Internal Route Propagation
Packet Forwarding in an AS
Core Router IBGP Requirements in a Transit AS
Interacting with IBGP and EBGP in a Transit AS
AS Path Processing in IBGP
Multipath Load Sharing in BGP
BGP Split Horizon
IBGP Full Mesh
IBGP Neighbors
IBGP Next-Hope Processing
Transit Network Using edge Routers as Next Hops Example
Differences Between EBGP and IBGP
Scalability Limitations of IBGP-Based Transit Backbones
Forwarding Packets in a Transit AS
Packet Forwarding in a Transit AS
Recursive Lookup in Cisco IOS Software
Routing Protocols in a Transit AS
BGP and IGP Interaction
Problems with BGP and IGP Interaction
Monitoring and Troubleshooting IBGP in a Transit AS
Monitoring IBGP
Common IBGP Problems
Troubleshooting IBGP Session Start-Up Issues
Troubleshooting IBGP Route Selection Issues
Troubleshooting IBGP Sychronization Issues
Using Multihomed BGP Networks
Business Requirements for Multihomed BGP Networks
Technical Requirements for Multihomed BGP Networks
BGP Route Selection
Multihomed Customer Routing Policies
Influencing BGP Route Selection
Transit Traffic Issue
Routing Update Reliability Issue
Return Traffic Issue
Employing AS Path Filters
AS Path Filtering Services
AS Path Regular Expressions
String Matching
Applying AS Path Filters
Configuring BGP AS Path Filters
Monitoring AS Path Filters
Filtering with Prefix Lists
Requirements for Prefix-Based Filters
Prefix Lists vs IP Access Lists
Configuring Prefix Lists
BGP Filters Implementation
Implementing Prefix Lists in the BGP Process
Modifying Prefix Lists
Monitoring Prefix Lists
Using Outbound Route Filtering
Outbound Route Filtering
Inbound vs Outbound Filtering Example
BGP Prefix-Based Outbound Route Filtering
Outbound Route Filter Message
Configuring Outbound Route Filtering
Using Outbound Route Filtering
Applying Route Maps as BGP Filters
Route Map Overview
BGP Route Map Policy List Support
BGP Route Map Continue
Prefix List Use in Route Maps
BGP Filters
Using Route Maps as BGP Filters
Implementing Changes in BGP Policy
Traditional Filtering Limitations
BGP Soft Reset Enhancement
Route Refresh
Configuring Route Refresh
Monitoring Route Refresh
Influencing BGP Route Selection with Weights
BGP Route Selection Criteria
Influencing BGP Route Selection
Configuring Per-Neighbor Weights
Changing Weights with Route Maps
BGP Route Selection and Filtering Tools Summary
Setting BGP Local Preference
Consistent Route Selection Within the AS
BGP Local Preference
Configuring Default Local Preference
Monitoring Local Preference
Configuring Local Preference with Route Maps
Using AS Path Prepending
Return Path Selection in a Multhomed AS
AS Path Prepending
AS Path Prepending Design Considerations
BGP Hide Local-Autonoumous System
Exploring the BGP MED
Selecting the Proper Return Path
MED Progression in a BGP Network
Changing the MED
Troubleshooting the MED
Advanced MED Considerations
Addressing BGP Communities
Selecting the Proper Return Path
BGP Communities Overview
Using Communities
Configuring BGP Communities
BGP Named Community Lists
BGP Cost Community
BGP Link Bandwidth Feature
BGP Support for Sequenced Entries in Extended Community Lists
Exploring Customer-to-Provider Connectivity Requirements
Customer-to-Provider Connectivity Types
Customer Redundant Connectivity
Customer-to-Provider Routing Schemes
Customer Routing Schemes
Customer Addressing Schemes
Customer Addressing Requirements
Customer AS Number Allocation
Implementing Customer Connectivity Using Static Routing
When to Use Static Routing ?
Characteristics of Static Routing
Designing Static Route Propagation in a Service Provider Network
BGP Backup with Static Routes
Floating Static Routes with BGP
Load Sharing with Static Routes
Connecting a Customer to a Single Service Provider
BGP Configuration on Customer Routes
Conditional BGP Advertising in Customer Networks
BGP Configuration on Service Provider Routers
Removing Private AS Numbers
BGP Support for Dual AS Configuration for Network AS Migrations
Backup Solutions with BGP
Load Sharing
Load Sharing with BGP Multipath
Load Sharing wth EBGP Multihop
Connecting a Multihomed Customer to Multiple Service Providers
BGP Configuration for Multihomed Customers
Multihomed Customer Address Space Selection
Multihomed Customer AS Number Selection
AS Number Translation
Primary and Backup Link Selection
BGP Incoming Link Selection
Load Sharing with Multiple Providers
Scaling IGP and BGP in Service Provider Networks
Common Service Provider Network
Route Propagation in Service Provider Networks
Scaling Service Provider Routing Protocols
Scaling Service Provider Addressing
Introducing Route Reflectors
IBGP Scalability Issues in a Transit AS
Route Reflector Split-Horizon Rules
Redundant Route Reflectors
Route Reflectors Clusters
Additional Route Reflector Loop-Prevention Mechanisms
Network Design with Route Reflectors
Potential Network Issues
Hierachical Route Reflectors
Route Reflector Backbone Migration
Configuring Route Reflectors
Improving BGP Convergence
BGP Convergence
BGP Processes
CPU Effects of BGP Processes
Improving BGP Convergence
PMTU Discovery
Increasing Input Queue Depth
BGP Prefix Independent Convergence
BFD for BGP
BGP Nonstop Forwarding Awareness
BGP Scan Time
BGP Advertisement Interval
BGP Keepalive and Hold-Down Timers
Optimizing BGP Scalability
BGP Route Limiting
Configuring BGP Route Limiting
BGP Peer Groups Overview
BGP Peer Groups as a Performance Tool
BGP Peer Group Limitations
Configuring BGP Peer Groups
BGP Peer Group Configuration Examples
BGP Dynamic Update Peer Groups Feature
BGP Peer Templates Overview
BGP Peer Templates Inheritance
BGP Peer Templates Configuration
BGP Route Dampening
BGP Route Dampening Operation
Configuring BGP Route Dampening
Labs
Discovery 1: Configure Basic BGP
Discovery 2: Announce Networks in BGP
Discovery 3: Implement the BGP Support for TTL Security Check Feature
Discovery 4: Configure a Basic BGP Network
Discovery 5: BGP Route Propagation
Discovery 6: IBGP Full Mesh
Discovery 7: BGP Administrative Distance
Discovery 8: Configure a Transit AS
Discovery 9: Configure Non-Transit Autonomous System
Discovery 10: Filter Customer Prefixes
Discovery 11: Prefix-Based Outbound Route Filtering
Discovery 12: Configure Route Maps as BGP Filters
Discovery 13: Configure BGP Using BGP Filtering
Discovery 14: Configure Per-Neighbor Weights
Discovery 15: Configure and Monitor Local Preference
Discovery 16: Configure Local Preference Using Route Maps
Discovery 17: Configure AS Path Prepending
Discovery 18: Configure the MED
Discovery 19: Configure Local Preference Using the Communities
Discovery 20: Configure BGP Route Selection Using BGP Attributes
Discovery 21: Configure Route Reflector
Discovery 22: Implement Route Reflector Configurations
Discovery 23: Configure BGP Route Limiting
Discovery 24: Configure BGP Peer Groups
Discovery 25: Configure BGP Route Dampening

€685
E-Learning
BTA Blockchain Bundle Digital Library [BTABKDL]
OVERVIEW
With this bundle you will receive instant access to 10 classes and corresponding material, over 100 hours of content
One year of unlimited access
Sample quiz questions
Class slides and lab guides for all courses
5 PDF exam study guides
Access to BTA portal with free content available monthly
Access to new courses development within that year
OBJECTIVES
Train at your own pace on the most trendy Blockchain subjects. With 10 training classes, over 100 hours of content you are getting the most comprehensive Blockchain education available.
CONTENT
With the bundle you have one year of access to:
Blockchain Overview: Business Foundations On Demand
Blockchain Solution Architecture Training On Demand
Blockchain Security Training On Demand
Ethereum Developer Training On Demand
Data Science and Blockchain On Demand
Corda Distributed Ledger Architecture On Demand
Blockchain for Healthcare Professionals On Demand
Hyperledger Developer Training On Demand
Hyperledger Fabric v1.4: Architecting, Designing and Deploying a Network On Demand
IoT and Blockchain

€230
E-Learning