Differential Diagnosis of Neck Pain Aims to Welcome to our webinar on "Differential Diagnosis of the Neck"! The neck is a complex region of the body that houses numerous vital structures, including the spinal cord, blood vessels, and the thyroid gland. Neck pain and other symptoms can arise from a variety of causes, ranging from benign conditions to serious medical emergencies. In this webinar, we will explore the differential diagnosis of neck disorders, including common and uncommon causes of neck pain, stiffness, and other symptoms. We will discuss various diagnostic approaches and tools that can be used to differentiate between these conditions, as well as the importance of accurate diagnosis and appropriate treatment. Whether you are a healthcare professional or someone dealing with neck issues, this webinar will provide valuable insights into the differential diagnosis of the neck. Learning Objective Identify and Differentiate Causes: After completing this webinar, participants will be able to identify and differentiate between common and uncommon causes of neck pain, stiffness, and other related symptoms. This knowledge will assist in accurate diagnosis and treatment planning. Discuss Diagnostic Approaches: Participants will learn about various diagnostic approaches and tools used in clinical practice to accurately diagnose neck disorders. They will gain insights into the latest diagnostic methods and technologies that can aid in making precise assessments. Emphasize Accurate Diagnosis: The course will stress the importance of accurate diagnosis and its direct impact on patient outcomes for neck disorders. Participants will understand how precise diagnosis can lead to more effective treatment strategies and better overall patient care. Who Should Enroll Physiotherapist Occupational Therapist COTA CPD Credit Hours Duration: Approx 1 hour Resources 1 month Access to Learning Resources Downloadable Course Material CPD Certificate Author Dr. Rina Pandya Dr Rina Pandya PT DPT Course Instructor Dr. Rina’s physical therapy career spans over 23 years, through the UK, the USA and the Middle East. She has worked in Nationalized Healthcare Services, American health care and self pay services in acute care, in-patient rehab, skilled nursing facility, home healthcare and outpatient clinic. In addition to being a clinician she has developed specialty programs based on evidence-based practice in her role as a project manager. She has also managed the Physical Therapy department in the capacity of Head of Department in a premier private hospital in Oman. Rina is an internationally published webinar presenter; many of her courses are highlighted on Physiopedia/ Physio Plus. Her pocket books are now available on Amazon titled-- Orthopedic Assessments made easy Dr. Pandya graduated from Manipal University, India in 2000 as well as University of Michigan, in 2018 with a Doctor of Physical Therapy. Rina conducts live webinars and is part of the continuing professional development teaching community with courses published in the UK, US, South Africa, Ireland and Australia. Rina is a member of APTA, HCPC-UK and OAP-Oman.
Overview of HR System Selection Essentials In today’s changing workplace, HR systems play a big role in helping organisations grow and succeed. The HR System Selection Essentials course comes at the right time, as more UK businesses are putting money into HR technology. In fact, the HR tech market in the UK is expected to reach £1.2 billion by 2026. A well-chosen HR system makes everyday tasks easier, helps employees have a better experience at work, and gives useful data to support smart decisions. The HR System Selection Essentials course helps learners understand what to look for when choosing the right HR system. It covers the basic parts of HR systems and how they can help with hiring, keeping good staff, and supporting employee growth. With many businesses trying hard to keep top talent, knowing how to choose a system that supports these goals gives professionals an advantage. This course also shows how to use data to help with planning and decision-making in HR. Whether you're working in HR or planning to, the HR System Selection Essentials course builds the knowledge needed for today’s digital workplace. It also teaches how to set clear goals for system selection and manage the setup process well. By taking the HR System Selection Essentials course, you’ll learn how to support your team better through smart technology choices. By the end of the HR System Selection Essentials course, you will be able to: Understand the main parts of today’s HR systems Check if system reports meet your company’s needs Look at the kind of HR data needed for good decision-making Build a clear checklist to choose the right HR system Plan how to set up a new HR system in your workplace Measure how well the system is working using real results Who is this course for The HR System Selection Essentials course is perfect for: HR professionals who want to improve their HR technology and know how to pick the right system IT team members who work with HR on setting up or connecting systems Managers who help make decisions about HR technology Business analysts who review what HR systems can and should do Operations leaders who want to make HR processes smoother and more effective Process of Evaluation After studying the HR System Selection Essentials Course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the HR System Selection Essentials Course, you can order your CPD Accredited Digital / PDF Certificate for £5.99. (Each) Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. (Each) Shipping Charges: Inside the UK: £3.99 International: £10.99 Requirements You don't need any educational qualification or experience to enrol in the HR System Selection Essentials course. Career Path After completing the HR System Selection Essentials course, you could work in roles such as: HR Systems Manager – £45K to £65K per year HR Technology Consultant – £50K to £75K per year HRIS Analyst – £35K to £55K per year HR Project Manager – £40K to £60K per year HR Data Analyst – £38K to £58K per year Course Curriculum HR System Selection Essentials Lesson 01: Introduction 00:04:00 Lesson 02: Elements of HR System 00:10:00 Lesson 03: Reporting and Analytics 00:00:00 Lesson 04: Selecting an HR System 00:18:00 Lesson 05: Implementing the New System 00:15:00
Start an IT Asset Department Course Overview This course provides a comprehensive introduction to starting and managing an IT Asset Department. Designed to equip learners with the knowledge required to establish and streamline IT asset management (ITAM) processes, it covers the key components and strategies for setting up the department, from understanding the department's purpose to maintaining accurate asset records. Learners will gain a solid understanding of the essential skills required to effectively manage IT assets, ensuring proper tracking, reporting, and operations. By the end of the course, learners will have a clear blueprint for setting up their own IT asset department, ready to implement best practices and improve operational efficiency. Course Description The course delves into the fundamental aspects of starting an IT Asset Department, starting with an overview of the department’s critical role within an organisation. Learners will explore the various functions and responsibilities of the IT Asset Management (ITAM) team, the tools needed to track assets, and how to populate and manage a central database. The course will also cover daily operations, including generating reports and ensuring compliance with industry standards. Learners will leave with the skills necessary to build a structured IT asset management department that can oversee asset tracking, database management, and reporting, ensuring better decision-making and efficiency in the management of IT resources. Start an IT Asset Department Curriculum Module 01: Introduction to the Course Module 02: The Missing Department Module 03: ITAM Team and Activities Module 04: Asset Tracking Tool Module 05: Populating the Database Module 06: Daily Operations and Reports Module 07: Was it a Boring Job? (See full curriculum) Who is this course for? Individuals seeking to develop skills in IT asset management. Professionals aiming to establish or optimise an IT asset management department. Beginners with an interest in IT operations and resource management. Managers looking to improve efficiency in IT asset tracking. Career Path IT Asset Manager IT Operations Specialist IT Procurement Manager Asset Tracking Coordinator IT Project Manager
Success = Value + People + Process With innovation happening more than ever, the new agile project economy requires more and more people across organisations to manage projects successfully, leading to many of us quietly slipping into the role of the unofficial project manager! The problem is very few people receive formal training on how to do it. Stakeholders, scope creep, limited training, and a lack of process all combine to raise the probability of project failure costing organisations time, money, and employee morale Is it any wonder 65% of all projects fail* each year! The good news is—unofficial project managers can build confidence to lead high-value projects and engage teams in a way that inspires them to volunteer their best efforts. Source: *Nieto-Rodriguez, A. (2021). “The Project Economy Has Arrived.” Harvard Business Review; Nov/Dec 21. Outcomes Project Management for the Unofficial Project Manager™ combines best practices from agile and waterfall project management to equip learners with the mindset, skillset, and toolset to engage and inspire team members. Success starts with the core agile principle of value—a project must deliver value to Noble! Once value is established, it is people who make projects successful through a consistent process. Project management isn’t just about managing logistics and hoping the project team is ready to play to win. The skills of “informal authority” are more important than ever before, so team members are inspired to contribute to project success! This course will help learners: Build strong informal authority that inspires project teams to consistently volunteer their best efforts. Utilise a consistent process to start and finish high-value projects on time and with quality. Influence and engage others to define a clear project scope, including clear deliverables and risk strategies. Model openness and agility to apply proactive change management and deliver high-value projects. Project Management Framework The Project Management Framework guides you through five distinct elements in the life of any project. Coupled with the foundational behaviours taught in the programme, this framework can help you deliver highly successful projects again and again. Who Should Attend? This programme is for anyone who finds themselves leading projects at work, regardless of whether or not their job title says, Project Manager! It is NOT a deep dive into project management processes, nor is it a qualification based programme. Whilst it would be helpful to either be involved in or to be leading a project, during the programme, this is clearly not essential. However, it is advisable that the participants have had some experience, whether as a project member or as the person who is leading the project (officially or not)! Project Management Institute (PMI) FranklinCovey is a member of the Project Management Institute (PMI) Authorised Training Partners (ATP) Programme and this course has been designed to satisfy the project management education requirement for PMI Certifications as well as Professional Development Education units (PDUs) needed by PMI credential holders.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for any individual who might need to perform project management activities in their job role on either a formal or informal basis, or any individual who wants to build upon their current project management knowledge to be more productively involved on a project team. This course is not specifically designed for students who are seeking project management-related certification. Rather, it is designed to introduce a structure to help students more effectively manage projects as well as participate fully on a project team. Overview In this course, you will apply recognized practices of project management to manage a project from start to finish. You will: - Identify the basic concepts of project management. - Launch a project. - Estimate project work. - Create a project schedule. - Plan project costs. - Plan for project risks. - Plan for project quality and compliance. - Manage human and physical resources for the project. - Manage project procurements. - Plan for change management and monitor the project scope. - Monitor and optimize project schedule and cost. - Monitor the quality of the project work and the risks involved. - Plan communication strategies and manage stakeholder relationships. - Close a project. If you are taking this course, you probably have some exposure to managing projects, or you may be considering embarking on a career as a professional project manager. Your ability as a project manager to demonstrate best practices in project management on the job is becoming the standard to compete in today's fast-paced and highly technical workplace. In this course, you will apply the generally recognized practices of project management to successfully manage projects. Project managers are always under severe pressure to complete projects on time and within budget. However, most projects fail to meet these demands, and, as a result, many projects are terminated early. Successful project management requires knowledge and experience. This course is designed to provide you with the skills needed to be a successful project manager in today's rapidly changing world. The skills and knowledge you gain in this course will help you avoid making costly mistakes and increase your competitive edge in the project management profession. Getting Started with Project Management Define Project Management Basics Identify Influencing Factors Define Project Management Certifications Launching Projects How Organizations Choose the Right Project Identify Project Stakeholders and Their Expectations Authorize a Project Identify the Project Scope Estimating Project Work Develop a WBS Identify the Relationships Between Work Packages Identify Resources Estimate Time Creating a Project Schedule Develop a Project Schedule Create a Schedule Baseline Planning Project Costs Establish Project Costs Establish the Cost Baseline Reconcile Funding and Costs Planning for Risk Create a Risk Management Plan Identify Risks and Their Causes Analyze Risks Develop a Risk Response Plan Planning for Quality and Compliance Deliver the Desired Project Results Verify Compliance Requirements Managing the Project Team Plan Your Project Team Assemble the Team Develop the Team Manage the Team Managing Project Procurements Plan for Project Procurements Obtain Responses from Vendors Select the Right Vendor Manage Vendors and Procurements Managing Change During Project Execution Prepare for Project Execution Manage Project Changes Monitor the Project Scope Monitoring and Controlling Project Schedule and Cost Monitor and Control the Project Schedule Optimize the Project Schedule Monitor and Control Project Cost Monitoring and Controlling Risk and Quality Monitor and Control Risks Put Quality Plans into Action Control Project Quality Communicating and Reporting Communicate During a Project Distribute Project Information Manage Stakeholder Relationships and Expectations Report on Project Performance Closing the Project Deliver the Final Product Close Project Procurements Close the Project
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Solutions Architects and Engineers who perform cloud migrations IT Project Managers who are involved in projects related to migrating existing workloads to the AWS Cloud Overview This course is designed to teach you how to: Explain the various cloud migration strategies Assess cloud migration readiness Discover your portfolio and plan for migration Plan and design your application migration strategy Perform and validate application migration to the cloud Optimize your applications and operations after migrating to the cloud Migrating to AWS focuses on planning and migrating existing workloads to the AWS Cloud. The course covers various cloud migration strategies with a detailed discussion on each phase of the migration process, including portfolio discovery, application migration planning and design, migration execution, and post-migration validation and application optimization. This course is designed for Solutions Architects and Engineers who perform cloud migrations, have an understanding of core AWS services and design patterns covered in Architecting on AWS. This course is also available to IT project managers involved in the planning of those migrations who have completed AWS Technical Essentials Module 1: Migrating to AWS ? Overview Migration process 'Mental Model' Cloud Migration Strategies Comparing Cloud Migration Strategies Cloud Center of Excellence (CoE) Cloud Migration Readiness Assessment AWS Cloud Migration Process Group activity: Creating a high-level migration plan Module 2: Discovery and analysis Migration Process Roadmap AWS Migration Methodology AWS Application Discovery Service Portfolio Analysis Hands-on lab 1: Performing discovery Module 3: Migration planning and design (part I) AWS Migration Hub Pricing and Availability Process Group activity: Creating a detailed migration plan Module 3: Migration planning and design (continued) Application migration ordering Application prioritization criteria Defining success criteria Migration methodology Designing for migration Module 4: Migration, integration, and validation Migration considerations Data migration AWS Snow Services AWS Data Migration Service (DMS) Server migration Demonstration: Server migration service Hands-on lab 2 : Migrating databases to AWS EC2 Hands-on lab 3 : Migrating databases to Amazon Aurora Module 5: Operations and optimization On premises vs. cloud IT operations Optimizing in the AWS Cloud Case study: Optimizing an application
Duration 2 Days 12 CPD hours This course is intended for Agile professionals, Project Managers and aspiring Project Managers who want to be able to combine PRINCE2 and Agile in the most effective way when using PRINCE2, Agile behaviours, concepts, frameworks, and techniques Other key delivery team staff, including Product Owners, Scrum Masters, and Developers Business professionals with an interest in iterative and incremental project delivery by collaborating working Overview At the end of this course, you will be able to: Understand the key concepts relating to PRINCE2. Understand the key concepts relating to projects and PRINCE2 Agile. Understand how PRINCE2 principles, themes, processes and management products are tailored and applied in an Agile context. Understand the agile ways of working, key terms and techniques. Understand the focus areas in an Agile context. PRINCE2 Agile is the world?s most complete project management solution, combining the flexibility and responsiveness of Agile with the clearly defined framework of PRINCE2©. As a PRINCE2© Accredited Training Organization of PeopleCert, all students attending this training will be provided with the exam voucher as a part of delivery. Course Outline Course Introduction and Agile Overview PRINCE2 Summary Culture Blending PRINCE2 and Agile Combining PRINCE2 and Agileÿ Combining PRINCE2 and Agile (Contd.) Homework Day 1ÿ PRINCE2 Agile Themes PRINCE2 Agile Processes Agile frameworks, Concepts, and Techniques Agile Focus Areas Mock Exam PRINCE2© is a registered trademark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. Additional course details:Notes New Horizons is an Authorised Training Organisation (ATO) for Peoplecert for ITIL4 and PRINCE2 Nexus Humans PRINCE2 Agile Foundation with Exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PRINCE2 Agile Foundation with Exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options
Duration 2 Days 12 CPD hours This course is intended for This course is designed for all project managers and project team leaders. Overview At course completion, students will be able to identify, analyze, respond to, and control project risks. This course focuses on improving the project manager?s risk management expertise, from initial planning through project closure. Participants will apply all course principles to a work-related case study taken directly from their work environment. Risk Management Overview Risk Management Benefit and Uses Project Risk Management Project Management Life Cycle Initiating Process Group Initiating Process Group Overview Develop Project Charter Identify Stakeholders Project Selection Criteria ROI Analysis ROI Methods Risk Complexity Index Project Selection Planning Process Group Planning Process Group Overview Scope Risks Schedule Risks Resource Risks Plan Risk Management Identify Risks Delphi Technique Subject Matter Expert Input Brainstorming Fishbone Diagrams Process Analysis Five Whys Influence Diagrams Risk Breakdown Structure (RBS) Risk Register Perform Qualitative Risk Analysis Probability and Impact Assessment Probability and Impact Chart Perform Quantitative Risk Analysis Three point estimates PERT Triangular Distributions Outlier Considerations Geometric Mean Normal Distributions Methods Tornado Diagrams Expected Monetary Value (EMV) Monte Carlo Plan Risk Responses Risk Response Strategies Overall Project Risk Checklists Executing, Monitoring and Controlling Process Groups Executing Process Group Overview Monitoring and Controlling Process Group Overview Control Risks Project Monitoring Longer Projects Closing Process Group Closing Process Group Overview Close Project or Phase Risk Activities During Closing Process Group Post-Project Risk Assessment
Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders engaged in improving the delivery of products and services that meet user needs through the use of Microsoft SharePoint; Anyone who wants to improve their Business Analysis skills; Project stakeholders concerned with SharePoint requirements. Overview Plan, manage and close requirements for a project in reduced time using good business analysis practices Minimize project uncertainty and risk by applying good techniques Ensure your project delivers required functionality and adds value to the business Create an environment of self-management for your team that will be able to continuously align the delivered product or services with desired business needs, easily adapting to changing requirements throughout the process. Requirements can change frequently during a SharePoint project, and therefore projects need a streamlined, flexible approach to requirements change management. SharePoint professionals want to develop systems and services which are both high-quality and high-value, and the easiest way to achieve this is to implement the highest priority requirements first. This enables the projects to maximize value for their stakeholders. Introduction ? Roles involved in a SharePoint project The opportunities and challenges of a SharePoint project The business analysis process BA role vs. project manager role BA / PM competencies Case Study Exercise Understanding SharePoint Requirements Business, User, Functional, Quality-of-service and implementation requirements Requirements vs. specifications Requirements vs. business rules Risk management and risk response strategies Analyzing requirements Characteristics of effective requirements Case Study Exercise SharePoint Requirements Modeling Identify high level scope Identify initial requirements stack Identify an architectural vision Plan your iteration Iteration modeling Model storming Test driven development Case Study Exercise The Change Management Process Managing the Solution Scope and Requirements Capturing the Requirements Traceability Maintaining the Requirements for re-use Managing Requirements Conflicts Preparing the Requirements Package Building the Requirements communications plan Case Study Exercise Assessing & Validating Requirements Validating and verifying SharePoint Requirements Creating a master test plan Create test scenarios and test cases Case Study Exercise Additional Information Useful books and links on managing requirements and projects for SharePoint initiatives