Duration 3 Days 18 CPD hours This course is intended for This course is intended for beginner to intermediate business and requirements analysts who are looking to improve their elicitation and requirements writing and documentation skills. This course is also a great fit for technical writers, product and software testers, project managers, product owners who work closely with business analysts or who perform some for of business analysis themselves. Overview Understand the role of the business analyst and core competencies for performing successfully Discuss the criticality of business analysis and requirements for successful project outcomes Understand the main professional associations and standards supporting business analysts in the industry Discuss the common problems with requirements and explore approaches to address these issues Obtain a clear understanding of the various requirements types and the significance for eliciting each type Demonstrate your ability to identify stakeholders Explore various methods for understanding and analyzing stakeholders Discuss and apply good planning practices to requirements elicitation efforts Obtain knowledge and understanding of over 15 current and commonly applied elicitation techniques Understand how to progress from elicitation to analysis to documentation Write well-formed and validated requirements Gain understanding of the best practices for writing quality requirements Learn the technical writing techniques that apply directly to writing requirements documents Discuss writing pitfalls, risks that impact requirements, and how to address them Learn best practices for communicating and collaborating with stakeholders, sharing the results of elicitation and the resulting documentation Learn approaches for validating requirements Understand the difference between validating requirements and validating the solution With elicitation serving as a major component of the requirements process, it is imperative that business analysts maintain high competency levels in elicitation practices and technique use to help organizations overcome the requirements related challenges faced on projects. Regardless whether you are a practitioner just starting off your career in business analysis or whether you have been performing the role for some years, this course will provide insight into the latest thoughts on elicitation and writing effective requirements and present a number of current techniques that are being applied on projects across industries today. Review of Foundational Concepts Definition of a business analysis Definition of business analyst BA role vs. PM role Business analysis competencies Benefits of business analysis Purpose for having a BA standard IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Business analysis core concepts Discussion: Project challenges Understanding Requirements Common problems with requirements Understand the problem first Define the business need Situation statements and moving to requirements Understanding requirement types Business requirements Stakeholder/User Requirements Solution Requirements Functional Requirements Non-Functional Requirements Assumptions and Constraints Discussions: Requirement problems, business needs, and identifying non-functional requirements Discovering Stakeholders Definition of a stakeholder Stakeholder types Identifying stakeholders Performing stakeholder analysis Stakeholders and requirements Tips for identifying stakeholders Grouping stakeholders Creating a RACI model Tips for analyzing stakeholders Documenting results of stakeholder analysis Workshop: Discovering stakeholders Preparing for Requirements Elicitation Planning for elicitation Benefits of elicitation planning What do you plan? The elicitation plan Setting objectives for elicitation Determining the scope for elicitation Establishing pre-work Determining the outputs for the session The iterative nature of elicitation Elicitation roles Elicitation planning techniques Discussions: Who to involve in elicitation, planning impacts, and unplanned elicitation Workshop: Planning for elicitation Conduct Requirements Elicitation Elicitation skillset Types of elicitation techniques Using active listening in elicitation Techniques for performing elicitation Benchmarking/Market Analysis Brainstorming Business Rules Analysis Collaborative Games Concept Modeling Data Mining Data Modeling Document Analysis Focus Groups Interface Analysis Interviews Observation Process Modeling Prototyping Survey or Questionnaire Workshops Write Effective Requirements Elicitation and Analysis Requirements related issues Implications of bad requirements Elicitation and documentation Writing skillset Documenting requirements Modeling requirements Defining the project life cycle Impact of project life cycle on documentation Requirements specifications Characteristics of good requirements Guidelines for writing textual requirements Structuring a requirement Writing pitfalls Traceability Requirements attributes Risks associated to requirements Discussions: Project Life Cycle and Correcting Poorly Written Requirements Workshops: Documenting Requirements and Identify Characteristics of Good Requirements Confirm and Communicate Elicitation Requirements Business analysis communication Requirements communication Communication skills The 7 Cs Timing of communication Planning communication Importance of Collaboration Planning collaboration Documenting communication/collaboration needs Confirming elicitation results Verify requirements Characteristics of good requirements (revisited) Requirements checklist Requirements validation Signing off on requirements Discussions: Responsibility for Communication, Eliciting Communication Needs, Validation Signoff Workshops: Communicating Requirements and Obtaining Signoff Evaluate the Solution Business analyst role in solution evaluation Why solutions under perform What we are looking for in solution evaluation When does solution evaluation occur Performing solution evaluation Planning solution evaluation Metrics that might exist Evaluating long term performance Qualitative vs. quantitative measures Tools & techniques used in solution evaluation Comparing expected to actuals When solution evaluation discovers a variance Tools/techniques for analyzing variances Proposing a recommendation Communicating results of solution evaluation Discussion: Addressing Variance Wrap up and Next Steps Useful books and links on writing effective requirements BABOK© Guide Business Analysis for Practitioners: A Practice Guide Additional course details: Nexus Humans BA04 - Eliciting and Writing Effective Requirements training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA04 - Eliciting and Writing Effective Requirements course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
5G training course description This course is designed to give the delegate an understanding of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. During the course we will investigate the 10 pillars for 5G, which will include various Radio Access Technologies that are required to interwork smoothly. Hence we will look at the 4G Pro features and other RATs. What will you learn List the ten pillars of 5G deployment. Explain the 5G Internet and Software Distributed Networks (SDN). Explain carrier aggregation, the mobile cloud and RAT virtualisation. Explain an overall picture of 5G architecture. 5G training course details Who will benefit: Anyone who is looking to work with next generation networks. Prerequisites: Mobile communications demystified Duration 3 days 5G training course contents Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, small cell, o SON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. 4G LTE advanced features *MIMO, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP, * Uplink Multi-Cell Reception. ICIC & eICIC ICIC, Homogeneous to heterogeneous network, eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). Carrier aggregation Component carriers (CC), * CC aggregation, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configurations (Rel 9, 10 & 12). Enhanced Interference Mitigation & Traffic Adaptation (eIMTA) TDD UL-DL reconfiguration for traffic adaptation, Reconfiguration mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, innovation centre, 5G in North America, research, company R & D, 5G specifications. The 5G internet Cloud services, IoT & context awareness, network reconfiguration & virtualization support, hypervisors, SDN, the controller, service-oriented API, OpenFlow switches, SDN operation, SDN control for traffic flow redirection, OpenFlow controllers, how SDN works, application, control and infrastructure layers, a programmable network, how SDN & NFV tie together, SDN's downside, SDN orchestration, Mobility, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture, network virtualization (VNet), INM, NetInf, ForMux, MEEM, GP & AM, QoS support, network resource provisioning, IntServ, RSVP, DiffServ, CoS, aggregated resource provisioning, SICAP, MARA, Emerging approach for resource over-provisioning, example use case architecture for the 5G internet, integrating SDN/NFV for efficient resource control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations, network operations. Small cells for 5G Average spectral efficiency evolution, What are small cells? WiFi & Femto cells as candidate small-cell technologies, Capacity limits & achievable gains with densifications, gains with multi-antenna techniques, gains with small cells, Mobile data demand, approach & methodology, subscriber density projections, traffic demand projections, global mobile data traffic increase modelling, country level backhaul traffic projections, 2020 average spectrum requirement, Small cell challenges, backhaul, spectrum, automation. Cooperation for next generation wireless networks Cooperative diversity & relaying strategies, Cooperative ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol, NCCARQ overview, PHY layer impact, Performance evaluation, simulation scenario and results. Mobile clouds; technology & services for future communications platforms Mobile cloud, software, hardware and networking resources, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4, software stacks, infrared, near field communications (NFC), store & forward vs compute & forward, random/linear network coding. Security for 5G communications Potential 5G architectures, Security issues & challenges in 5G, user equipment, mobile malware attacks, 5G mobile botnets, attacks on 4G networks, C-RNTI & packet sequence numbers based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, attacks on mobile operator's network, user data & identity attacks, DDoS attacks, amplification, HSS saturation, external IP networks.
Award-winning, highly cost effective, certified leadership & management training for your organisation Online and face to face learning for cohorts of between 50- 100,000 users. Available Globally. World-leading content mapped to your vision, organisational objective and your competency framework. Full reporting transparency and engagement tracking. Capability uplift at scale, in the most cost effective, impactful way possible Beneficial for GMC or JCI compliance Give your workforce access to world-leading MIT Sloan Management Review content. Stunning, award-winning learning platform available on all devices. Overview Attract, retain and inspire the best national and global talent with training that will make your hospital thrive It’s essential your investment is ulitised and has the desired impact. Our content is relatable and relevant so encourages active usage and engagement. We are invested in making sure you get a great return on your investment each day. Our programmes are: Focused on your organisation’s strategic objectives and competency framework. We help you tackle pressing issues Made for you. Our platform can intigrate with your learning management system (LMS) Cost-effective. Develop teams, departments and organisation wide with our innovative platform Prestigious. Give your workforce access to world-leading MIT Sloan Management Review and Mayo Clinic content Recognised by the Chartered Management Institute (CMI) & fully CPD certified Flexible. On-demand learning via our platform and app. Keep the workforce learning on the go. No study leave required Global. Made by NHS doctors and used by healthcare professionals worldwide Hybrid. Face to face group sessions delivered by clinical and leadership experts, supported by our technology Organised. Upload your own specific training material to our platform to save time and resourses Trusted and Accredited. We have the only management and leadership courses in the world accredited by: World leading content supported by cutting edge technology. Made for healthcare professionals. Course Content Content to inspire your workforce What is the role of leader? Building and Leading Successful teams CPDwatch Building and Leading Successful teams Building and Leading Successful teams Leading with Values and Ethics CPDwatch Leading with Values and Ethics Leading with Values and Ethics watch Leadership Insights on Leading with Executive Presence Leadership Insights on Leading with Executive Presence watch Leadership Insights on Building & Leading Teams Leadership Insights on Building & Leading Teams watch Leadership Toolkit: Facilitating a Workshop Leadership Toolkit: Facilitating a Workshop watch Leadership Toolkit: Facilitating a Brainstorming Session Leadership Toolkit: Facilitating a Brainstorming Session watch Leadership Toolkit: Running a Team Debrief Leadership Toolkit: Running a Team Debrief watch The Characteristics of an Accountable Leader The Characteristics of an Accountable Leader Leading through Shared Vision CPDwatch Leading through Shared Vision Leading through Shared Vision watch Evaluating Your Management Style Evaluating Your Management Style watch The Adaptive Leader: Be an Iceberg The Adaptive Leader: Be an Iceberg The Collaborative Leader CPDwatch The Collaborative Leader The Collaborative Leader Leading through Problem Solving and Decision Making CPDwatch Leading through Problem Solving and Decision Making Leading through Problem Solving and Decision Making watch Leadership Insights on Leading Diversity Leadership Insights on Leading Diversity watch Leadership Insights on Judgment and Decisiveness Leadership Insights on Judgment and Decisiveness Leading with Judgment and Decisiveness CPDwatch Leading with Judgment and Decisiveness Leading with Judgment and Decisiveness Accountable Leadership CPDwatch Accountable Leadership Accountable Leadership watch Leadership Insights on Being Accountable Leadership Insights on Being Accountable watch Expert Insights on Networking & Building Relationships Expert Insights on Networking & Building Relationships watch Building Your Professional Network Building Your Professional Network watch Leadership Insights on Networking with your Peers Leadership Insights on Networking with your Peers watch Networking to Improve Leadership Effectiveness Networking to Improve Leadership Effectiveness watch Empowering Employees Empowering Employees read MIT Sloan Management Review on New Leader Transitions MIT Sloan Management Review on New Leader Transitions read All the Leader You Can Be: The Science of Achieving Extraordinary Executive Presence All the Leader You Can Be: The Science of Achieving Extraordinary Executive Presence read MIT Sloan Management Review on The Adaptive Leader MIT Sloan Management Review on The Adaptive Leader read MIT Sloan Management Review Article on Looking for Opportunity in the Midst of Crisis MIT Sloan Management Review Article on Looking for Opportunity in the Midst of Crisis read Executive Presence: The Art of Commanding Respect like a CEO, Second Edition Executive Presence: The Art of Commanding Respect like a CEO, Second Edition read MIT Sloan Management Review on Leader as Motivator MIT Sloan Management Review on Leader as Motivator listen The Accountable Leader: Developing Effective Leadership Through Managerial Accountability The Accountable Leader: Developing Effective Leadership Through Managerial Accountability listen From Bud to Boss: Secrets to a Successful Transition to Remarkable Leadership From Bud to Boss: Secrets to a Successful Transition to Remarkable Leadership listen Strategic Connections: The New Face of Networking in a Collaborative World Strategic Connections: The New Face of Networking in a Collaborative World listen The Courage Way: Leading and Living with Integrity The Courage Way: Leading and Living with Integrity listen Executive Presence: The Art of Commanding Respect Like a CEO Executive Presence: The Art of Commanding Respect Like a CEO The importance of skillful communication Leading across Cultures CPDwatch Leading across Cultures Leading across Cultures watch Leadership Insights on Setting and Managing Priorities Leadership Insights on Setting and Managing Priorities watch Expert Insights on Collaboration Expert Insights on Collaboration Becoming a Successful Collaborator CPDwatch Becoming a Successful Collaborator Becoming a Successful Collaborator Leading with Judgment and Decisiveness CPDwatch Leading with Judgment and Decisiveness Leading with Judgment and Decisiveness watch Managing Conflict across Cultures Managing Conflict across Cultures watch Managing Conflict in High Performance Teams Managing Conflict in High Performance Teams watch Leadership Insights on Conflict Management Leadership Insights on Conflict Management The Collaborative Leader CPDwatch The Collaborative Leader The Collaborative Leader watch Leadership Insights on Leading Across Cultures Leadership Insights on Leading Across Cultures Leading Diversity CPDwatch Leading Diversity Leading Diversity Encouraging Team Communication and Collaboration CPDwatch Encouraging Team Communication and Collaboration Encouraging Team Communication and Collaboration Navigating Challenging Situations with Diplomacy and Tact CPDwatch Navigating Challenging Situations with Diplomacy and Tact Navigating Challenging Situations with Diplomacy and Tact Facing Virtual Team Challenges CPDwatch Facing Virtual Team Challenges Facing Virtual Team Challenges watch Leadership Insights on Problem Solving & Decision Making Leadership Insights on Problem Solving & Decision Making watch Leadership Insights on Leading through Disruption Leadership Insights on Leading through Disruption watch Leadership Insights on Leading through Motivation Leadership Insights on Leading through Motivation Leading Others through Conflict CPDwatch Leading Others through Conflict Leading Others through Conflict Cultivating Cross-functional Team Collaboration CPDwatch Cultivating Cross-functional Team Collaboration Cultivating Cross-functional Team Collaboration watch Running a Team Debrief Running a Team Debrief watch Leaders Have to Be Human Leaders Have to Be Human watch Collaborating Beyond the Team Collaborating Beyond the Team watch How the Power of Listening Can Reveal Your Team's Motivating Tensions How the Power of Listening Can Reveal Your Team's Motivating Tensions read Successful Time Management: How to be Organized, Productive and Get Things Done Successful Time Management: How to be Organized, Productive and Get Things Done read Managing Conflict at Work: Understanding and Resolving Conflict for Productive Working Relationships Managing Conflict at Work: Understanding and Resolving Conflict for Productive Working Relationships read Conflict Management Conflict Management read Committed Teams: Three Steps to Inspiring Passion and Performance Committed Teams: Three Steps to Inspiring Passion and Performance read Building the Team Organisation: How to Open Minds, Resolve Conflict, and Ensure Cooperation Building the Team Organisation: How to Open Minds, Resolve Conflict, and Ensure Cooperation read MIT Sloan Management Review on Problem Solving and Decision Making MIT Sloan Management Review on Problem Solving and Decision Making read Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done read MIT Sloan Management Review on Negotiation MIT Sloan Management Review on Negotiation read 5 Critical Conversations to Talent Development: Tips, Tools & Intelligence for Developing Talent 5 Critical Conversations to Talent Development: Tips, Tools & Intelligence for Developing Talent read MIT Sloan Management Review on Developing People MIT Sloan Management Review on Developing People read MIT Sloan Management Review on Cross-Functional Collaboration MIT Sloan Management Review on Cross-Functional Collaboration listen Opening Doors to Teamwork and Collaboration: 4 Keys That Change Everything Opening Doors to Teamwork and Collaboration: 4 Keys That Change Everything How to create and lead change Contributing as a Virtual Team Member CPDwatch Contributing as a Virtual Team Member Contributing as a Virtual Team Member Leading Innovation CPDwatch Leading Innovation Leading Innovation Leading with Strategic Thinking CPDwatch Leading with Strategic Thinking Leading with Strategic Thinking watch Leadership Insights on Strategic Thinking Leadership Insights on Strategic Thinking Building and Leading Successful Teams CPDwatch Building and Leading Successful Teams Building and Leading Successful Teams watch Leadership Insights on Building & Leading Teams Leadership Insights on Building & Leading Teams Creating a Successful Business Execution Culture CPDwatch Creating a Successful Business Execution Culture Creating a Successful Business Execution Culture watch How to Build Trust in a Team How to Build Trust in a Team watch Leadership Insights on Leading Innovation Leadership Insights on Leading Innovation watch Leadership Insights on Leading a Culture of Execution Leadership Insights on Leading a Culture of Execution watch Leadership Insights on Leading through Change Leadership Insights on Leading through Change Leading through the Challenge of Change CPDwatch Leading through the Challenge of Change Leading through the Challenge of Change watch Leadership Insights on Leading Collaboratively Leadership Insights on Leading Collaboratively Facilitating Sustainable Change CPDwatch Facilitating Sustainable Change Facilitating Sustainable Change watch Disruptive Leadership Disruptive Leadership read Learning to Think Strategically Learning to Think Strategically read Leading with Strategic Thinking: Four Ways Effective Leaders Gain Insight, Drive Change, and Get Results Leading with Strategic Thinking: Four Ways Effective Leaders Gain Insight, Drive Change, and Get Results read Demystifying Strategic Thinking: Lessons from Leading CEOs Demystifying Strategic Thinking: Lessons from Leading CEOs read MIT Sloan Management Review on Building and Leading Teams MIT Sloan Management Review on Building and Leading Teams read Virtual Leadership: Practical Strategies for Getting the Best Out of Virtual Work and Virtual Teams Virtual Leadership: Practical Strategies for Getting the Best Out of Virtual Work and Virtual Teams read Managing and Leading People through Organizational Change: The Theory and Practice of Sustaining Change through People Managing and Leading People through Organizational Change: The Theory and Practice of Sustaining Change through People read The Effective Change Manager's Handbook: Essential Guidance to the Change Management Body of Knowledge The Effective Change Manager's Handbook: Essential Guidance to the Change Management Body of Knowledge read Choosing to Change: An Alternative Understanding of Change Management Choosing to Change: An Alternative Understanding of Change Management Why leaders should possess emotional intelligence Leading by Developing People CPDwatch Leading by Developing People Leading by Developing People watch Leadership Insights on Critical Thinking Leadership Insights on Critical Thinking watch Knowing When to Think Critically Knowing When to Think Critically Developing Your Critical Thinking and Cognitive Flexibility CPDwatch Developing Your Critical Thinking and Cognitive Flexibility Developing Your Critical Thinking and Cognitive Flexibility Leading through Setting and Managing Priorities CPDwatch Leading through Setting and Managing Priorities Leading through Setting and Managing Priorities watch Managing Priorities Managing Priorities watch Leadership Insights on Leading with Values & Ethics Leadership Insights on Leading with Values & Ethics The Collaborative Leader CPDwatch The Collaborative Leader The Collaborative Leader The Agile Leader CPDwatch The Agile Leader The Agile Leader watch Disruptive Leadership Disruptive Leadership Make The Time You Need: Get Organised CPDwatch Make The Time You Need: Get Organised Make The Time You Need: Get Organised watch Leadership Insights on Emotional Intelligence Leadership Insights on Emotional Intelligence Becoming an Emotionally Intelligent Leader CPDwatch Becoming an Emotionally Intelligent Leader Becoming an Emotionally Intelligent Leader Managing in a Crisis CPDwatch Managing in a Crisis Managing in a Crisis watch Planning Crisis Communications Planning Crisis Communications watch Crisis Management for Leaders Crisis Management for Leaders watch Take a Deep Breath and Manage Your Stress Take a Deep Breath and Manage Your Stress watch Being a Mindful Leader Being a Mindful Leader watch Overcome Emotional Feelings Overcome Emotional Feelings Managing Pressure and Stress to Optimise Your Performance CPDwatch Managing Pressure and Stress to Optimise Your Performance Managing Pressure and Stress to Optimise Your Performance watch Expert Insights on Managing Stress Expert Insights on Managing Stress watch Emotional Intelligence and Effective Leadership Emotional Intelligence and Effective Leadership watch Helping Your Team Work Helping Your Team Work watch Fair and Just Decision Making Fair and Just Decision Making read MIT Sloan Management Review on Setting and Managing Priorities MIT Sloan Management Review on Setting and Managing Priorities read Advances in Authentic and Ethical Leadership Advances in Authentic and Ethical Leadership read Resilient Organisations: How to Survive, Thrive and Create Opportunities Through Crisis and Change Resilient Organisations: How to Survive, Thrive and Create Opportunities Through Crisis and Change read 50 Activities For Managing Stress 50 Activities For Managing Stress read Emotional Intelligence Pocketbook: Little Exercises for an Intuitive Life Emotional Intelligence Pocketbook: Little Exercises for an Intuitive Life read Mindful Leadership: The 9 Ways to Self-Awareness, Transforming Yourself, and Inspiring Others Mindful Leadership: The 9 Ways to Self-Awareness, Transforming Yourself, and Inspiring Others The significance of coaching in your career Developing Successful Coaching Relationships CPDwatch Developing Successful Coaching Relationships Developing Successful Coaching Relationships watch Working on Shared Goals through Teaming Working on Shared Goals through Teaming watch Initiating a Coaching Relationship Initiating a Coaching Relationship watch Coaches Build Self-Confidence Coaches Build Self-Confidence watch Be a Better Coach Be a Better Coach watch Coaching Team Members Coaching Team Members Leading by Developing People CPDwatch Leading by Developing People Leading by Developing People watch Delivering Results While Developing People Delivering Results While Developing People watch How to Increase Engagement How to Increase Engagement watch Leadership Insights on Coaching Leadership Insights on Coaching watch Leadership Insights on Developing Women Leaders Leadership Insights on Developing Women Leaders watch Leadership Insights on Leading Collaboratively Leadership Insights on Leading Collaboratively watch Creating a Vision Creating a Vision watch Becoming A More Effective Delegator Becoming A More Effective Delegator read MIT Sloan Management Review on Leader as Coach Special Collection MIT Sloan Management Review on Leader as Coach Special Collection read Anytime Coaching: Unleashing Employee Performance, Second Edition Anytime Coaching: Unleashing Employee Performance, Second Edition read Coaching and Mentoring: Practical Techniques for Developing Learning and Performance, Third Edition Coaching and Mentoring: Practical Techniques for Developing Learning and Performance, Third Edition read The Extraordinary Coach: How the Best Leaders Help Others Grow The Extraordinary Coach: How the Best Leaders Help Others Grow read Leading the Unleadable: How to Manage Mavericks, Cynics, Divas, and Other Difficult People Leading the Unleadable: How to Manage Mavericks, Cynics, Divas, and Other Difficult People read 100 Ways to Motivate Others: How Great Leaders Can Produce Insane Results without Driving People Crazy, Third Edition 100 Ways to Motivate Others: How Great Leaders Can Produce Insane Results without Driving People Crazy, Third Edition read Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done Communicate Like a Leader: Connecting Strategically to Coach, Inspire, and Get Things Done listen 50 Top Tools for Coaching: A Complete Toolkit for Developing and Empowering People, Third Edition 50 Top Tools for Coaching: A Complete Toolkit for Developing and Empowering People, Third Edition
European Data Protection Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows. The training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program. Privacy Programme Management Principles of Privacy Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organisation through process and technology-regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Manager (CIPM) certification programme. Make a difference in your organization and in your career. The CIPM designation says that you're a leader in privacy program administration and that you've got the goods to establish, maintain and manage a privacy program across all stages of its lifecycle. About This Course Delivered in a modular format, this four day course covers Days 1 & 2 Module 1: Data Protection Laws Introduces key European data protection laws and regulatory bodies, describing the evolution toward a Harmonised European Legislative Framework. Module 2: Personal Data Defines and differentiates between types of data-including personal, anonymous, pseudo-anonymous and special categories. Module 3: Controllers and Processors Describes the roles and relationships of controllers and processors. Module 4: Processing Personal Data Defines data processing and GDPR processing principles, Explains the application of the GDPR and outlines the legitimate bases for processing personal data. Module 5: Information provision Explains controller obligations for providing information about data processing activities to data subjects and Supervisory Authorities. Module 6: Data Subjects 'Rights Describes data subjects' rights, applications of rights and obligations controller and processor. Module 7: Security or Processing Discusses considerations and duties of controllers and processors for Ensuring security of personal data and providing notification of data breaches. Module 8: Accountability Investigates accountability requirements, data protection management systems, data protection impact assessments, privacy policies and the role of the data protection officer. Module 9: International Data Transfers Outlines options and obligations for transferring data outside the European Economic Area, Decisions adequacy and appropriateness safeguards and derogations. Module 10: Supervision and Enforcement Describes the role, powers and procedures or Supervisory Authorities; the composition and tasks of the European Data Protection Board; the role of the European Data Protection Supervisor; and remedies, liabilities and penalties for non-compliance. Module 11: Compliance Discusses the applications of European data protection law, legal bases and compliance requirements for processing personal data in practice, employers-including processing employee data, surveillance, direct marketing, Internet technology and communications and outsourcing. Days 3 & 4 Module 1: Introduction to privacy program management Identifies privacy program management responsibilities, and describes the role of accountability in privacy program management. Module 2: Privacy governance Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organization, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks. Module 3: Applicable laws and regulations Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organizational strategy. Module 4: Data assessments Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments. Module 5: Policies Describes common types of privacy-related policies, outlines components and offers strategies for implementation. Module 6: Data subject rights Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten. Module 7: Training and awareness Outlines strategies for developing and implementing privacy training and awareness programs. Module 8: Protecting personal information Examines a holistic approach to protecting personal information through privacy by design. Module 9: Data breach incident plans Provides guidance on planning for and responding to a data security incident or breach. Module 10: Measuring, monitoring and auditing program performance Relates common practices for monitoring, measuring, analyzing and auditing privacy program performance Prerequisites There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP SITE What's Included? 1 years membership of the IAPP Breakfast, Lunch, mid-morning and afternoon snacks, teas, coffees Official Study Guides* Official Participant Guides* Official Exam Q&A's* Both exam fees * In electronic format for Live Online and hard copy for Classroom delegates Who Should Attend? This course is suitable for aspiring Data Protection Officers, as well as Information Security Managers, Lawyers, Data Managers, Analysts and Risk Teams. Provided by Our Guarantee We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.
ISDN training course description A comprehensive look at ISDN, as used in voice and data environments. What will you learn Recognise the issues and impacts of using dial up networks. Describe ISDN. Describe ISDN signalling in voice and data environments. Configure a Cisco router to use ISDN. ISDN training course details Who will benefit: Anyone working with ISDN. Prerequisites: Intro to data communications & networking Duration 2 days ISDN training course contents Introduction Dialup connectivity vs. leased lines vs. packet switched networks. ISDN offerings, services, benefits vs. modems. ISDN architectures Use of ISDN by routers, Dial up, top up, backup. Internet access, PCs and ISDN. BRI and PRI ISDN switches, B channels, D channel, ISDN functions and reference points, NT1, NT2, TE1, TE2, Terminal adapters, R,S,T,U interfaces, ISDN standards. PPP Encapsulation, PPP services, PAP and CHAP, Multilink PPP, BACP. ISDN and the seven layer model B channel layers versus D channel layers, the I standards, Q.921, Q.931. Configuration issues for ISDN E.164 addressing and IP addresses, ensuring only the correct traffic brings up the ISDN line. ISDN services Bearer services, teleservices, supplementary services, MSN, sub addressing, CLIâ¦
4G training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. 4G training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days 4G training course contents LTE Introduction The path to LTE, 3GPP. LTE to LTE advanced. LTE Architecture The core, Access, roaming. Protocols: User plane, Control plane. Example information flows. Bearer management. Spectrum allocation. LTE technologies Transmission, reception, OFDMA, multiple antenna, MIMO. LTE Air interface Air interface protocol stack. Channels, Resource Grid, cell acquisition. Up and downlink controls. Layer 2 protocols. Cell acquisition Power on, selecting networks and cells. RRC connection. Attach procedure. Mobility management Roaming, RRC_IDLE, RRC_CONNECTED, cell reselection, handover, interoperation with UMTS and GSM networks. Voice and text IMS, QoS, policy and charging.
Broadband access training course description ADSL is a broadband technology providing fast Internet access (amongst other applications) over existing telephone lines. This course covers an overview of the DSL family, what ADSL is through to how ADSL works. What will you learn Describe what ADSL is. Describe how ADSL works. Describe the ADSL architecture. Recognise the limitations of ADSL. List the elements required for an ADSL installation. Broadband access training course details Who will benefit: Network engineers and anyone who will be working with ADSL. Prerequisites: Intro to data communications & networking Duration 2 days Broadband access training course contents What is ADSL? Broadband definitions, OSI layer 1, ADSL services, WANS. ADSL features: always on, point to point, Asymmetric, speeds. ADSL benefits, xDSL family, standards, history, example DSL forum documents. ADSL architecture The big picture, The PSTN and telephones, Digital and analogue, PSTN and modems, ADSL vs. modem speeds, Block 1: Customer premises, Block 2: The last mile, Block 3: The exchange, Block 4: the core network. Customer premises Splitters, micro filters, splitter architectures, Splitterless ADSL, ADSL modems, USB, ADSL routers. The local loop ADSL PHY, Some basics, ADSL margins, speed implications, distances, RADSL, Line testing, whoosh tests, line coding, multiple channels, FDM, echo cancellation, Modulation: AM, FM, PM, QAM, QAM constellations, DMT, CAP, Framing, Superframes, fast data mode, interleaved mode, RADSL revisited. The exchange Local exchange ADSL items, DSLAMs, ADSL racks, Contention. The core network The role of the core network, ATM, ATM VPI/VCI, ATM cells, ATM layers, AAL5, RAS, Home gateways. ADSL and the higher layers Layer 2 choices, PPPoA, PPP, CHAP, Layer 4 and above, ADSL and ATM. Installing and configuring ADSL Choosing providers, line activation, hardware requirements, Configuring layer 1 and layer 2, Configuring IP. Summary ITU ADSL standards
RADIUS training course description A fast paced hands-on introduction to RADIUS. Moves from installation and configuration through to packet analysis and accounting. Practical exercises are spread throughout the course to maintain student interest. What will you learn Configure PPP and PAP/CHAP. Install and configure RADIUS servers. Describe how RADIUS works. Setup RADIUS accounting. Analyse RADIUS packets. Troubleshoot RADIUS installations. RADIUS training course details Who will benefit: Network Administrators. Support personnel. Anyone who will be working with RADIUS. Prerequisites: Knowledge of the TCP/IP protocols would be advantageous. Duration 2 days RADIUS training course contents What is RADIUS? AAA services, Authentication, Authorisation, Accounting, local AAA services, remote AAA services, What is RADIUS? RADIUS as a protocol, RADIUS as an architecture, RADIUS as a standard. Installing RADIUS RADIUS platforms, RADIUS servers, client server communications, services, daemons. Hands on Installing RADIUS and testing with NTRadPing. Server configuration Configuring clients on the server, shared secrets, usernames and passwords. IP address pools. Hands on Configuring a server and testing with NTRadPing. Client configuration Example clients, client configuration steps, enabling RADIUS, pointing clients to the server, shared secrets, example Cisco authentication, example Cisco authorization. Hands on Configuring clients for RADIUS. How RADIUS works RADIUS architecture, RADIUS and authentication, PPP, PAP, CHAP, RADIUS SUCCESS, RADIUS FAILURE, the RADIUS protocol stack, the RADIUS protocol, the RADIUS header, RADIUS codes, RADIUS attributes, ACCESS-REQUEST example, ACCESS-ACCECPT example, CHAP example, proprietary attributes, using unassigned type codes, RADIUS attribute 26, Cisco specific attributes. Hands on Analysing RADIUS packets, configuring PPP CHAP to work with RADIUS. RADIUS accounting Simplified operation, Accounting codes, Accounting attributes, client and server configuration for accounting. Hands on Configuring RADIUS accounting. RADIUS architectures Traditional architecture, multiple RADIUS servers for resilience, Proxy RADIUS servers, Realms, RADIUS in VPNs, RADIUS with 802.1x. Hands on Using multiple RADIUS servers, Proxies. Troubleshooting RADIUS General problem solving, basic tools, RADIUS troubleshooting, Common configuration errors, log files, RADIUS design and performance. Hands on Fixing RADIUS problems.
3G training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. 3G training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days 3G training course contents D3GPP specifications 3GPP standards body, Evolution path, Frequency and bandwidth, Conceptual model, UMTS general architecture, UTRAN architecture & radio access bearer. CDMA principles CDMA principle, Code characteristics, Code requirements. CDMA requirements Synchronization, Power control, Soft handover, Rake receiver, Antenna consideration, Multi-user detection. Radio interface protocol architecture Access stratum & non-access stratum, Overall protocol structure, Logical and transport channels, Physical channels, Protocol termination. Layer 2 Protocols Medium Access Control (MAC) Protocol, Radio Link Control (RLC) Protocol, Packet Data Convergence Protocol (PDCP) protocol, Radio Interface for Broadcast/Multicast Services. Radio Resource Control (RRC) Protocol RRC Architecture, RRC Protocol State, Broadcast of information, RRC connection management, Radio bearer management, RRC connection mobility functions, Power control, Ciphering and Integrity. Mobile procedures Mobility management states and transitions, UMTS identities, Procedures in Idle mode (location updates, cell selection/ re-selection), Circuit-switched call set-up, Packet-switched context activation and context preservation, Data transfer initialization, Soft-handover procedure. Introduction to HSPA The need for high speed data, Fast HARQ, Improved scheduling, Additional channels, Soft combining, HS-DSCH codes, Uplink HSPA vs downlink HSPA, Full HSPA, Use of MIMO, Enhanced CELL_FACH.
Give your staff market-leading delivery skills and intercultural communication techniques with our unique course. TILT has been delivered to military and commercial clients and is seen as best-practice for those training internationally.