Duration 0.5 Days 3 CPD hours This course is intended for This course is primarily designed for business leaders, consultants, product and project managers, and other decision-makers who are interested in growing the business by leveraging the power of AI. Other individuals who wish to explore basic AI concepts are also candidates for this course. This course is also designed to assist students in preparing for the CertNexus AIBIZ⢠(Exam AIZ-210) credential. Overview In this course, you will identify ways in which AI can bring significant value to the business. You will: Describe AI fundamentals. Identify the functions of AI in business. Implement business requirements for AI. Artificial intelligence (AI) is not just another technology or process for the business to consider?it is a truly disruptive force, one that delivers an entirely new level of results across business sectors. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI. This course is designed to help business professionals conquer and move beyond the basics of AI to apply AI concepts for the benefit of the business. It will give you the essential knowledge of AI you'll need to steer the business forward. Lesson 1: AI Fundamentals Topic A: A Brief History of AI Topic B: AI Concepts Lesson 2: Functions of AI in Business Topic A: Improve User Experiences Topic B: Segment Audiences Topic C: Secure Assets Topic D: Optimize Processes Lesson 3: Implementing Business Requirements for AI Topic A: Identify Design Requirements Topic B: Identify Data Requirements Topic C: Identify Risks in Implementing AI Topic D: Develop an AI Strategy
Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programs Overview It will show the world that students know privacy laws and regulations and how to apply them, and that students know how to secure your place in the information economy. When students earn a CIPP credential, it means they've gained a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.This course will provide you with a foundational understanding of broad global concepts of privacy and data protection law and practice, including: jurisdictional laws, regulations and enforcement models; essential privacy concepts and principals; legal requirements for handling and transferring data and more. Introduction to privacy Modern history of privacy Introduction to personal information Overview of data protection roles Summary of modern privacy frameworks Structure of U.S. law Structure and sources of U.S. law and relevant terms Governmental bodies having privacy and information security authority General Data Protection Regulation overview (GDPR) High-level overview of the GDPR Significance of the GDPR to U.S. organizations Roles and responsibilities outlined in the law California Consumer Privacy Act of 2018 (CCPA) High-level overview of the newly passed California Consumer Privacy Act of 2018 Scope Consumer rights Business obligations Enforcement Enforcement of U.S. privacy and security laws Distinguishing between criminal and civil liability Comparing federal and state authority Theories of legal liability Enforcement powers and responsibilities of government bodies, such as the FTC and state attorneys general Information management from a U.S. perspective Developing a privacy program Role of privacy professionals and accountability Employee training User preferences Managing vendors Data classification Federal versus state authority Differences between federal and state authority Preemption Healthcare Privacy laws in healthcare Major components of HIPAA Development of HITECH Privacy protections mandated by other significant healthcare laws Financial privacy Goals of financial privacy laws Key concepts of FCRA, FACTA and GLBA Red Flags Rule, Dodd-Frank and consumer protection laws Education Privacy rights and protections under FERPA Recent amendments provided by PPRA and NCLBA Telecommunications and marketing Rules and regulations of telecommunications entities Laws that govern marketing Addressing privacy in the digital advertising Law enforcement and privacy Privacy laws on intercepting communication Telecommunications industry and law enforcement Laws ensuring rights to financial privacy National security and privacy Rules and regulations on intercepting communication Evolution of the law Collaboration of government agencies and private companies to improve cybersecurity Civil litigation and privacy Privacy issues related to litigation Electronic discovery, redaction and protective orders U.S. discovery rules versus foreign laws Legal overview of workplace privacy Federal and state laws regulating and protecting employee privacy Federal laws prohibiting discrimination Privacy before, during and after employment Lifecycle of employee privacy Background screening Employee monitoring Investigating misconduct and termination Antidiscrimination laws ?Bring your own device? policies State data security laws State laws impacting data security Social Security number use regulation Laws governing data destruction Data breach notification laws Scope of state data breach notification law Nine elements of state data breach notification laws Major differences in state laws
Duration 5 Days 30 CPD hours This course is intended for Anyone whose position requires CCSP certificationIndividuals whose responsibilities involve procuring, securing, and managing cloud environments or purchased cloud services Overview In-depth coverage of the six domains required to pass the CCSP exam:Architectural concepts and design requirementsCloud data securityCloud platform and infrastructure securityCloud application securityOperationsLegal and compliance This course is the most comprehensive review of cloud security concepts and industry best practices covering the six domains of the CCSP Common Body of Knowledge (CBK). You will gain knowledge in identifying the types of controls necessary to administer various levels of confidentiality, integrity, and availability, with regard to securing data in the cloud. You will identify the virtual and physical components of the cloud infrastructure with regard to risk management analysis, including tools and techniques necessary for maintaining a secure cloud infrastructure. You will gain an understanding in cloud software assurance and validation, utilizing secure software, and the controls necessary for developing secure cloud environments. You will identify privacy issues and audit processes utilized within a cloud environment, including auditing controls, assurance issues, and the specific reporting attributes. Architectural Concepts and Design Requirements Cloud Data SecurityCloud Platform and Infrastucture Security Cloud Application SecurityOperations Legal and compliance
Duration 3 Days 18 CPD hours This course is intended for Information System Owners Analysts Ethical Hackers ISSOs Cyber Security Managers IT Engineers Overview Upon completion, the Certified Vulnerability Assessor candidate will be able to competently take the exam. This course provides a solid understanding of the tools an IT engineer needs to review an Information System. In this course, you will learn the importance of vulnerability assessments and how they are used to prevent serious cyber break-ins. Lessons include understanding malware and viruses and how they can infiltrate an organization?s network. After you take this course, you will be able to assess a company?s security posture and perform a basic vulnerability test.ÿPlus, you will be able to generate reports to guide new security implementation. Course Outline Why Vulnerability Assessment Vulnerability Types Assessing the Network Assessing Web Servers and Applications Assessing Remote and VPN Services Vulnerability Assessments & Tools of the Trade Output Analysis
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course are System Administrators and System Architects. Overview Explain the architecture in SAP BusinessObjects Business Intelligence platformConfigure SAP BusinessObjects Business Intelligence platformPerform common server management and administrative tasks in SAP BusinessObjects Business Intelligence platform In this course, students learn how to explain the architecture in the SAP BusinessObjects Business Intelligence platform and perform common server management and administrative tasks in the SAP BusinessObjects Business Intelligence platform. SAP BusinessObjects Business Intelligence Platform Describing the SAP BusinessObjects Business Intelligence Platform Describing the SAP BusinessObjects Business Intelligence Platform Architecture Installation of SAP BusinessObjects Business Intelligence Platform Installing SAP BusinessObjects Business Intelligence Platform: Server-Side Installation Installing SAP BusinessObjects Business Intelligence Platform: Client-Side Installation Server Administration and Management Using the Central Management Console (CMC) Using the Central Configuration Manager (CCM) Web Application Servers Management Configuring Web Application Servers Central Management Server (CMS) Database Managing the Central Management Server (CMS) and System Database Configuring Auditing File Repository Server Management Managing the File Repository Server Using the Repository Diagnostic Tool Adaptive Servers Managing the Adaptive Job Server Managing the Adaptive Processing Server Crystal Reports Servers Demonstrating Information Flows in Crystal Reports Configuring Crystal Reports Managing Crystal Reports Servers Web Intelligence Server Managing Web Intelligence Document Schedules Viewing Web Intelligence Documents Configuring a Web Intelligence Processing Server Configuring a Connection Server Dashboard Servers Configuring Dashboard Servers Managing Dashboard Design Servers Explorer Servers Configuring Explorer Servers Managing Information Spaces Event Servers Configuring Event Servers Managing Event Servers SAP BusinessObjects Business Intelligence Platform 4.1 Monitoring Monitoring the SAP BusinessObjects Business Intelligence Platform 4.1 Using the SAP BusinessObjects Business Intelligence Platform 4.1 Monitoring Dashboard Additional course details: Nexus Humans BOE320 SAP BI Platform - Admin Servers (Win) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BOE320 SAP BI Platform - Admin Servers (Win) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network
Duration 3 Days 18 CPD hours This course is intended for This course is primarily for Developers, Developer Consultants, Help Desk/COE Support, Program/Project Manager, System Administrators, System Architects, and Technology Consultants. Overview Explaining scenarios and processes in SAP NetWeaver process integrationIdentify the technical communications modes and processesExplain business scenarios and the business hierarchy used by SAP In this course, students learn how to explain scenarios & processes in SAP NetWeaver process integration. They learn how to identify the technical communications modes & processes, as well as explain business scenarios & the business hierarchy used by SAP. Integration Basics Explaining Scenarios and Processes in SAP NetWeaver Process Integration Explaining Technical Communication Modes and Processes Explaining Business Scenarios Classical System-to-System Communication Communicating Between Two SAP Systems Communicating Between Two Non-SAP Systems Communicating Using Business Application Programming Interfaces (BAPIs) Communicating Using IDocs Processing IDocs Web Services Processing HTTP Requests Describing Simple Object Access Protocol (SOAP) Basics Analyzing Different Web Services Describing Inside-Out and Outside-In Web Services Explaining Service Oriented Architecture (SOA) Integration Technologies: On-Premise Process Integration (Design Time) Processing Integration Middleware Tools (PI Dual Stack) Installing Dual-Stack or Single-Stack Options Securing Objects Creating PI Objects Explaining Design Objects Modeling PI Scenarios Creating an Integration Scenario Configuring an Integration Scenario Displaying the Configuration Objects in the Integration Directory Integration Technologies: On-Premise Process Integration (Runtime) Connecting SAP NetWeaver PI with Proxies Creating File Adapters Executing Configuration Objects Monitoring Tools Integration Technologies: On-Premise Process Orchestration (PO) Explaining Business Process Management (BPM) Explaining Process Orchestration (PO) Explaining Advanced Adapter Engine Extended (AEX) Explaining Business Rules Management (BRM) Integration Technologies: On Demand Explaining SAP HANA Cloud Integration (HCI) Describing Eclipse-Based Access Using the Web UI to Access HCI SAP NetWeaver Gateway Explaining the SAP NetWeaver Gateway Scenario Explaining the SAP NetWeaver Gateway Development View Accessing an Open Data (OData) Service Additional course details: Nexus Humans BIT100 SAP NetWeaver Integration Technology Overview training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BIT100 SAP NetWeaver Integration Technology Overview course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Designed for individuals interested in obtaining information about the CBAP and CCBA exam process especially potential exam candidates interested in pursuing business analysis certification from IIBA in the next 3 to 6 months. Overview Review the 6 Knowledge Areas of the BABOK Guide and discuss the business analysis tasks performed in each. Understand the relationships between the business analysis processes and how each defines an important aspect of the business analysis discipline. Review key terms, business analysis techniques, and competencies important to business analysis. Discuss the 5 business analysis Perspectives presented in BABOK Guide, v3. Complete simulated exam questions to assess personal readiness for taking the exam. Obtain key tips and techniques for effectively preparing for and successfully completing the CBAP or CCBA exam. This course provides you with a clear and detailed understanding of the concepts covered within the CBAP© and CCBA© exams. You will gain valuable tips and techniques to help prepare, study, and assess your personal readiness. In addition, you will earn valuable professional development hours toward meeting the exam criteria. CBAP© and CCBA© Overview Discuss the benefits of professional certification Present the CBAP©/CCBA© eligibility requirements Explain the exam process Discuss the exam blueprints Understand the recertification process Introduction to BABOK© Guide v3 Define the purpose of A Guide to the Business Analysis Body of Knowledge© (BABOK© Guide) Present the structure/components of the BABOK© Guide Identify the six business analysis Knowledge Areas Discuss the supporting areas of the BABOK© Guide BABOK© Guide Key Concepts Define key concepts from the BABOK© Guide Present the Business Analysis Core Concept Model? Discuss the requirements classification scheme Explain Requirements and Designs Present the 5 Business Analysis Perspectives Business Analysis Planning and Monitoring Identify the 5 tasks in Business Analysis Planning and Monitoring Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Elicitation and Collaboration Identify the 5 tasks in Elicitation and Collaboration Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Requirements Life Cycle Management Identify the 5 tasks in Requirements Life Cycle Management Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Strategy Analysis Identify the 5 tasks in Strategy Analysis Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Requirements Analysis and Design Definition Identify the 6 tasks in Requirements Analysis and Design Definition Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Solution Evaluation Identify the 6 tasks in Solution Evaluation Understand the work performed in each of these tasks Explain the significance of the outputs produced within this knowledge area Underlying Competencies Describe and understand the importance of the underlying competencies (UCs) Understand how to prepare for questions about UCs on the exam Business Analysis Techniques More clearly understand the 50 techniques presented in the BABOK© Guide Understand how to study techniques for the exam Assess Your Readiness 1 hour mock-exam to assess personal readiness Strategies for Success Utilize 8 strategies for preparing for the CBAP© or CCBA© certification exams Develop study tools and a plan to assist you in preparing for the exams Understand the tools and resources available to help you be successful Wrap-up Take Your Questions Next Steps Additional course details: Nexus Humans BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BACP02 - Certified Business Analysis Professional (CBAP) Exam Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is designed for the Business Analyst professional who is involved with testing the functionality of technology projects. Overview Develop an understanding about basic concepts associated with User Acceptance TestingSee how UAT applies to the Software Development Lifecycle (SDLC)Recognize benefits of improved quality of deployed software using User Acceptance TestingIdentify the key roles, activities and deliverables which make up User Acceptance Testing Use a Business Use Case to define scenarios for testingCreate a UAT test plan and write UAT test cases with associated test dataUnderstand the process for testing functional and non-functional requirementsIdentify the challenges of testing vendor-supplied applications This course looks at the issues which drive the need for a UAT process & describes the components of the process. It is designed to help Business Analysts to develop an understanding of their role, the process, and the deliverables associated with UAT. Day 1 Software Testing - the Basics Understanding the Tester?s Terminology The UAT Planning Process Day 2 UAT Test Coverage Creating & Executing the UAT Test Cases Verifying the Test Results Testing Vendor-Supplied Applications Additional course details: Nexus Humans BA29 - User Acceptance Testing for Business Analysts training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA29 - User Acceptance Testing for Business Analysts course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.