Duration 1 Days 6 CPD hours This course is intended for This course is intended for both novice and experienced IT professionals, Network Administrators new to Active Directory, Help Desk Personnel, Network Support Personal, Desktop Support Personal, Managers that oversee IT personnel, Developers that create products that interact with Active Directory and Exchange Administrators. Overview At Course Completion you will Understand the industry standards used in Active Directory and their importance. Recognize the functionality of Domain Controllers and Active Directory Replication mechanisms. Understand Forest, Domain and OU structure. Recognize and understand the role of Active Directory Sites. Skills needed to determine Domain Controller Server versions, Forest and Domain Functional levels. Describe authentication Mechanisms in Active Directory NTLM and Kerberos. Optimize and maintain Group Policy Objects (GPO) used in Active Directory. Understand the functioning of Active Directory Partitions and the Global Catalog. Fundamental understanding of using Active Directory with Cloud Services like Federation Services and Azure. This one-day instructor-led class is intended for IT professionals and IT managers who work with Active Directory or supervise IT professionals that work with Active Directory. Additionally, IT professionals that work with products that integrate with Active Directory such as Exchange can also benefit. In this course, students learn how and why Active Directory was developed by Microsoft, the fundamental architecture, basic design, management, as well as security and fundamentals for cloud integration with services like Azure. Module 1: Principles of Active Directory Development of Active Directory What is X.500 LDAP Active Directory Architecture NTLM and Kerberos Managing operating systems with GPOs, Workplace Join and InTune Active Directory Groups: Domain Local, Global and Universal Using and Managing Active Directory Domain Controllers Forest and Domain Functional Levels Introduction to Active Directory Partitions and the Global Catalog Basic Forest Structure and Design Basic Domain Structure and Design Basic OU Structure and Design Module 2: Fundamentals of WAN management with Active Directory Understanding AD Sites and WAN Traffic Management Basic AD Sites and Logon Traffic Introduction to AD Sites and Replication Traffic Bridgehead Servers and Site Link Objects Site Aware Applications Module 3: Introduction to Active Directory Group Policy Objects Introduction to Group Policy Administrative Templates Fundamental Concepts of GPO Scripts Introduction to Creating and Using GPOs Principles of Managing Multiple GPOs Block, Enforce and Inheritance GPOs and Active Directory Versions Introduction to Controlling and Installing Software with GPOs, SRP and App Locker Module 4: Principles of Active Directory Integration Active Directory and ?The Cloud? User Principle Names, Authentication and Active Directory Federated Services Conclusion, Additional Resources, Labs and Exercises Additional course details: Nexus Humans 55152AC Fundamentals of Active Directory training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55152AC Fundamentals of Active Directory course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for ECSS is designed for anyone who wants to enhance their skills and make a career in information security, network security, and computer forensics fields. It can be IT Specialists, Network Administrators, or System Administrators. Overview Upon successful completion of this course, students will learn: Key issues plaguing the information security, network security, and computer forensics. Fundamentals of networks and various components of the OSI and TCP/IP model. Various network security protocols. Various types of information security threats and attacks, and their countermeasures. Social engineering techniques, identify theft, and social engineering countermeasures. Different stages of the hacking cycle Identification, authentication, and authorization concepts Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot. Fundamentals of IDS and IDS evasion techniques. Data backup techniques and VPN security. Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security. Different types of web server and web application attacks, and countermeasures. Fundamentals of ethical hacking and pen testing. Incident handling and response process. Cyber-crime and computer forensics investigation methodology. Different types of digital evidence and digital evidence examination process. Different type of file systems and their comparison (based on limit and features). Gathering volatile and non-volatile information from Windows and network forensics analysis mechanism. Steganography and its techniques. Different types of log capturing, time synchronization, and log capturing tools. E-mails tracking and e-mail crimes investigation. Writing investigation report. This is an entry-level security program covering the fundamental concepts and giving a holistic overview of the key components of information security, computer forensics, and network security. Course Outline Information Security Fundamentals Networking Fundamentals Secure Network Protocols Information Security Threats and Attacks Social Engineering Hacking Cycle Identification, Authentication, and Authorization Cryptography Firewalls Intrusion Detection System Data Backup Virtual Private Network Wireless Network Security Web Security Ethical Hacking and Pen Testing Incident Response Computer Forensics Fundamentals Digital Evidence Understanding File Systems Windows Forensics Network Forensics and Investigating Network Traffic Steganography Analyzing Logs E-mail Crime and Computer Forensics Writing Investigative Report Additional course details: Nexus Humans EC-Council Certified Security Specialist (ECSS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Security Specialist (ECSS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: System installers System integrators System administrators Network administrators Solutions designers Overview Upon completing this course, the learner will be able to meet these overall objectives: Describe the system architecture of Cisco WAN Automation Engine and Cisco WAE network abstraction Plan and deploy Cisco WAE Planning components, including Collector, WAE Design, and WAE Live Plan and deploy Cisco WAE Automation and explain the basics of Cisco WAE APIs Explain how to deploy changes to the network using Cisco WAE and XR Traffic Controller (XTC) Explain how to use the Cisco WAE Design application to solve problems and achieve business goals WAE200, Operating and Implementing Cisco WAN Automation Engine v3.0 is a 5-day course that gives you the basic knowledge necessary to plan, deploy, configure, and maintain the Cisco© WAN Automation Engine (WAE) solution. Extensive hands-on labs help you gain the necessary skills to install and maintain Cisco WAE systems.This course will help you:Learn to install Cisco WAN Automation EngineGain confidence with WAE configuration and basic troubleshootingPractice designing and managing bandwidth and traffic engineering WAE Solution and Architecture Overview Examining WAE Examining WAE Architecture and Design Examining WAE Applications and Use Cases WAE Solution Implementation Planning a WAE Deployment Deploying WAE Describing WAE Integration Options Network Model Configuration Describing the Collection Process Describing Network Interface Modules Creating Network Models Configuring WAE Modeling Daemon WAE Automation Bandwidth Applications Deploying Bandwidth on Demand Application Deploying Bandwidth Optimization Application WAE Design Fundamentals Getting Started with WAE Design Describing Demands and Traffic Tools Modeling Interior Gateway Protocol (IGP) and BGP Describing Failures and Simulation Analysis WAE Design Traffic Engineering and Optimization Engineering Traffic by Using Metrics Engineering Traffic by Using Resource Reservation Protocol with Traffic Engineering (RSVP-TE) Engineering Traffic by Using Segment Routing-Traffic Engineering (SR-TE) Engineering Traffic by Using Latency Constraints Modeling Quality of Service (QoS) Introduction to WAE API Introducing WAE Design Remote Procedure Call (RPC) API Introducing WAE Optimization and Prediction Module (OPM) API Introducing WAE Server Representational State Transfer Configuration Protocol (RESTCONF) and Network Configuration Protocol (NETCONF) APIs WAE Live Deployment Describing the Components of WAE Live Configuring WAE Live Explaining WAE Live Features Maintenance and Troubleshooting Maintaining WAE Troubleshooting WAE Additional course details: Nexus Humans Cisco Operating and Implementing Cisco WAN Automation Engine (WAE200) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Operating and Implementing Cisco WAN Automation Engine (WAE200) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Customers are astute and well-practised in researching and seeking information, solutions and added value in the minimum number of clicks online. There's only so much time they're willing to spend carrying on clicking. This mentality isn't just restricted to the world of B2C. In our increasingly hectic world, where information is expected to be available instantly, it applies just as much to B2B. In this workshop, we look at how putting yourself in the shoes of your customer and mapping their decision-making and buying journey is critical to ensuring that you provide what they perceive as fast solutions and added value. You will learn all about the three pillars for creating competitive brand experiences: Customer engagement planning puts you firmly in the shoes of your customer, helping you to build meaningful marketing communications delivered through the right resources at the right time to inspire your customers to engage with you. This programme will help participants to: Understand the evolution of the customer buying journey Map a customer buying journey for your brand or solutions Understand the customer micro-moments and signals indicating interest and buying intent, both online and offline Apply the psychology of branding to build marketing communications with impact Develop sales and marketing content that differentiates your brand(s) from the competition by demonstrating unique value and how you can meet your customer's needs 1 The evolution of the customer journey Understand how the use of mobile has had an impact on the customer buying journey where today's customers can research and compare products and solutions whenever and wherever they like, making the purchase journey even less linear Explore how marketers are adapting to this new customer behaviour and drawing upon various strategies to win the hearts and minds of their audiences 2 The See-Think-Do-Care framework Explore the many different frameworks used to track the customer journey Understand and apply the modern marketing model, where the internet has enabled the customer to hop between multiple touchpoints before making a purchase decision 3 Customer micro-moments and signals in their buying journey Understand the online and offline moments when customers seek information to research and make buying decisions Apply this understanding to build a marketing communication plan to reach customers at all stages of their buying journey 4 The role of branding in the customer journey Explore the psychology of branding Learn how to ensure your branding is relevant to your target customer needs Bring together your brand value and story to achieve brand loyalty 5 The Why-How-What framework Apply a systematic approach to build a successful and compelling brand Understand how starting with 'why' will help build your brand purpose Apply the content marketing matrix to communicate your brand's value Apply the hero-help-hub model to build engaging content marketing Actionable outcomes We will use your brand examples to provide opportunities for practice: You will learn and reflect on best practice examples of customer engagement You will discover your brand value, purpose and the 'sweet spot' to drive engagement with your customers You will create a customer engagement plan that can be implemented immediately within your business You will receive immediate feedback on your customer engagement plan You will have the opportunity to share common issues and solutions with your colleagues in the group
Duration 3 Days 18 CPD hours Overview VMware vSphere: What's New [V8] https://lms.nhcms.neYou will learn essential Terraform concepts including: Writing Terraform HCL code Deploying into common clouds such as AWS, Azure, Docker, Kubernetes, and VMWare Where Terraform fits in the Enterprise CI/CD model Differences between Terraform and Ansible As enterprises seek to deploy and maintain increasingly complex cloud infrastructure, there is a necessity to use ?Infrastructure as Code? (IaC) tools, like Terraform. An open-source, state management tool developed by HashiCorp, Terraform allows developers to use a common coding interface to work through their various clouds safely and efficiently. Attendees will leave being able to write and understand Terraform code (HCL), have a clear understanding of Terraform?s various components and supporting tools, as well as when to reach for Terraform over another IaC tool, such as Ansible. This class prepares you for Terraform Certifcation. Up and Running with Terraform Terraform Overview Defining ?declarative? How to think about Terraform (versus Ansible) Reviewing the Terraform Configuration Running the Terraform Configuration Provisioners Syntax Low Level? HCL syntax Style Conventions Comments Blocks Arguments JSON Configuration Syntax Resources Meta-Arguments depends_on count for_each provider lifecycle Data Sources Variables and Output Input Variables Output Values Local Values Functions String Collection Numeric Encoding Filesystem Date and Time Hash and Crypto IP Network Type Conversion Modules Module Blocks Module Sources Meta Arguments Terraform Templates templatefile Function Template Demonstration Introducing Data Sources Creating an External Data Source Building tftpl template files Expressions Types and Values Strings and Templates Reference to Values Operators Function Calls Conditionals For Expressions Splat Expressions Dynamic Blocks Type Constraints Version Constraints State Understanding the importants of states state storage and locking importing existing resources Remote State What to do when local state is lost CICD Piplines with Terraform Terraform and GitLab pipelines Terraform and Jenkins pipelines Enterprise Case Studies Terraform and Docker Terraform and Kubernetes Terraform and Amazon AWS Terraform and Azure Terraform and VMWare Understanding how to apply Terraform to your unique infrastructure Beyond Basics Intro to Go Programming Terraform Cloud Additional HashiCorp Offerings Backends Secrets Additional course details: Nexus Humans Terraform 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Terraform 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Authors Overview Please refer to course overview This course provides authors with an introduction to build reports using Cognos Analytics. Techniques to enhance, customize, and manage reports will be explored. Activities will illustrate and reinforce key concepts during this learning opportunity. What is IBM Cognos Analytics - Reporting The Welcome page Consume report content Interactive filtering Working with reports Dimensionally modeled relational dataUse personal data sources and data modules Upload personal data Upload custom images Using navigation paths in a data module Examine list reports Group data Format columns Include headers and footers Aggregate fact data Identify differences in aggregation Multiple facts and repeated information Use shared dimensions to create multi-fact queries Present repeated information Add repeated information to reports Create a mailing list report Create crosstab reports Add measures to a crosstab Data sources for a crosstab Create complex crosstab reports Add items as peers Create crosstab nodes and crosstab members Work with crosstab data Format, sort, and aggregate a crosstab Create discontinuous crosstab reportsCreate visualization reports Visualization categories Customize visualizations Client side visualizations Enhanced map visualizations Focus reports using filters Create filters to narrow the focus Use advanced detail filters Apply a filter with aggregation Use summary filters Focus reports using prompts Examine parameters and prompts Create a parameter for a report item Add a prompt page Add a prompt item to a report Identify a prompt type Create a cascading prompt Use calculations What are calculations Add Date and Time functions Add string functions Display prompt selections in report titles Customize reports with conditional formatting Three steps for conditional formatting Create a variable Assign the variable to a report object Format based on the conditional value Conditionally render report objects Drill-through definitions Navigate to related data Enhance report layout View the structure of a report Use Guided report layout Force page breaks Create horizontal pagination Modify the report structure Format objects across reports Use additional report-building techniques Enhance a report design Add objects to reports Convert a list to a crosstab Explore reuse Additional course details: Nexus Humans B6258 IBM Cognos Analytics - Author Reports Fundamentals V11.1.x training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the B6258 IBM Cognos Analytics - Author Reports Fundamentals V11.1.x course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Ideal candidates include network professionals who are looking to build their foundational knowledge of the ClearPass product portfolio. Overview After you successfully complete this course, expect to be able to: Implement a ClearPass network access solution Design and apply effective services and enforcement in ClearPass Troubleshoot a ClearPass solution This course provides participants the foundational skills in Network Access Con-trol using the Aruba ClearPass product portfolio. This 5-day course includes both instructional modules and labs to teach participants about the major fea-tures in the ClearPass portfolio. Participants will learn how to setup ClearPass as an AAA server, and configure the Policy Manager, Guest, OnGuard and Onboard feature sets. In addition, this course covers integration with external Active Directory servers, Monitoring and Reporting, as well as deployment best practices. The student will gain insight into configuring authentication with ClearPass on both wired and wireless networks. Introduction to ClearPass BYOD High Level Overview Posture and Profiling Guest and Onboard AAA Policy Service Rules Authentication Authorization and Roles Enforcement Policy and Profiles External Devices Network Access Devices Messaging Services External Context Servers Endpoint Profiling Introduction to profiling Profiling collectors External collectors and profilers Roles and Enforcement Services Enforcement ClearPass roles Configuring Services Service selection rules Creating services Configuring Web Services Content Manager Skins Web page editor Guest Authentication Captive portal process Web logins Guest accounts Guest access with MAC authentication Guest Access Self-Registration Self-registration experience Configuring self-registration Self-registration process Wired Authentication Wired access Wired enforcement Profiling on wired ports Downloadable User Roles Requirements for DUR DUR enforcement profiles Dynamic Segmentation What is Dynamic Segmentation? How it works Configuring Dynamic Segmentation OnGuard Configuration Postures Posture policies OnGuard Agent Monitoring OnGuard OnGuard in Enforcement OnGuard workflow OnGuard enforcement Onboard Provisioning Configuring certificate authorities Portal setup Configuring services Onboard Administration Managing certificates Managing users and devices Certificate revocation and OCSP Administrative Operations Licenses Certificates Updates and upgrades Gathering logs ClearPass Cluster Cluster structure Policy Manager zones High availability Administrative Access Admin access to NADs Admin access to Policy Manager Guest operator logins Insight Reports Alerts Reports Administration Additional course details: Nexus Humans Aruba ClearPass Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Aruba ClearPass Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Join us for this step-by-step workshop to map your customer journey.
Facilitation Skills for Business Analysts: Virtual In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA® Certification exam to become a Certified Business Analysis Professional (CBAP™). Business analysts are communicators who bridge the gap between people with business needs and knowledge and the people who will provide solutions. Business analysts are continuously involved in communications with stakeholders and developers as they create the solution to business problems. They participate in information-gathering sessions including interviewing, joint requirements definition, and Joint Application Design (JAD) workshops which are used to streamline information gathering and get immediate validation from user representatives. The business analyst is also involved with negotiating the solution with the stakeholders, upper-level management, and the developers, mediating among the groups when disagreements take place, and influencing the results of decisions during the solution cycle. This course teaches the methods needed to organize and run information-gathering events. It combines the basics of graphic decision making and modeling with facilitation, communication, and meeting management skills. What you will Learn At the end of this program, you will be able to: Identify the major touch points between key BABOK® Guide knowledge areas and business analysis communication Describe the facilitation skills that are most supportive of those intersections Improve your ability to apply these skills in the context of your business analyst functions Foundation Concepts The role of the Business analyst (BA) An Introduction to the BABOK® Guide Business analyst roles and the product / project life cycle (PLC) Facilitation skills for the business analyst The BABOK® Guide and Communication An introduction to the communication process Addressing basic communications challenges Planning business analysis communication Communication and BABOK® Guide tasks Targeted Elicitation Techniques Synergy between communication and targeted elicitation techniques Preparing for elicitation Cornerstone targeted technique: interviews Other targeted elicitation techniques Related general communication skills Group Elicitation Techniques Synergy between requirements communication and group elicitation techniques Cornerstone group elicitation technique - requirements workshops Other group elicitation techniques Related general communication skills - meeting management best practices Related general communication skills - facilitating best practices Process / Model-Based Elicitation Techniques Synergy between requirements communication and process / model-based elicitation techniques Process / model-based elicitation techniques Related interpersonal skills - problem solving and decision making Investigative Elicitation Techniques Synergy between requirements communication and investigative elicitation techniques Cornerstone investigative elicitation technique - document analysis Other investigative elicitation techniques Summary of elicitation techniques by usage in the requirements process Using Presentations, Structured Walkthroughs, and Influencing Structured walkthroughs, presentations, and influencing within BABOK® Guide tasks Cornerstone technique - structured walkthroughs General communication skill - presenting Related interpersonal skill - influencing Special Facilitation Skills - Negotiating and Mediating Negotiating Mediating
Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of Business Analysis (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Business Analysis principles and techniques. Key areas are: The breath of the role of a Business Analyst The processes and techniques of strategy analysis Investigation of an organization's business systems Techniques used within stakeholder analysis and the need for analyzing perspectives Conceptual modelling and business activity models Business improvements through gap analysis The Business case within the business change lifecycle The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered.The course provides in-depth knowledge and practice in Business Analysis Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Analysis Practice Exam Details Business Analysis Certification Scheme Rationale for Business Analysis The role of the BA throughout the stages of the Business change lifecycle The scope of the BA role within the context of the range of analysis activities Three areas of competencies Understanding the Strategic Context Techniques in practice: MOST Resource audit PESTLE Porter's Five Forces SWOT analysis CSF, KPI and Performance target Balanced Business Score Card Understanding the Current Situation Identification of stakeholder categories Identification of relevant investigation techniques The rationale for taking a holistic view Rich pictures, Mind Maps and Fishbone diagrams Stakeholder Analysis and Management Power/interest and level of interest Appropriate stakeholder management strategy Stakeholder perspectives and CATWOE technique Analysing and Modelling Business Activities Conceptual models of a business situation Five types of high level activity Planning activities Enabling activities Doing activities Monitoring and control activities Three types of business events The consensus business activity model Identifying Potential Solutions Different categories of business rules Gap analysis (through conceptual business activity model and as-is business situation) Components of a new business model Building the Business Case Rationale for the development of a business case Contents of a business case Identification of tangible/intangible costs and benefits, risks and impacts Rationale for the financial case and appraisal techniques Business case review in the business change lifecycle Additional course details: Nexus Humans Business Analysis - Practice training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Analysis - Practice course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.