Business Analysis Fundamentals: In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals to pass the IIBA® Certification exam to become a Certified Business Analysis Professional (CBAP™). This course teaches participants the overall process of business analysis and where it fits in the bigger picture of the project life cycle and the business context. The course is interactive and combines discussion, active workshops, and demonstrations of techniques. The goal is bottom-line results that cut through the real-world problems facing people seeking to improve the way they operate to develop new and improved systems and products or otherwise deliver results through project performance. What you will Learn At the end of this program, you will be able to: Define the solution scope Work with the development team in the systems testing stage Ensure the solution is usable in the business environment Foundation Concepts Defining the business analyst (BA) function The role of the BA as change agent An introduction to the BABOK® Guide BA roles and relationships through the project life cycle (PLC) Business Analysis Planning and Monitoring Overview of business analysis planning and monitoring (BAP&M) Business analysis planning and monitoring - process and tools Business analysis planning and monitoring - roles and responsibilities Business analysis planning and monitoring - governance, information management, and performance improvement Elicitation and Collaboration Overview of elicitation and collaboration Elicitation and collaboration techniques Requirements Life Cycle Management Overview of requirements life cycle management Requirements life cycle management task details Strategy Analysis Overview of strategy analysis Analyze current state Define future state Assess risks Define change strategy Requirements Analysis and Design Definition Overview of requirements analysis and design definition (RA&DD) The anatomy of requirements RA&DD task descriptions RA&DD techniques Solution Evaluation Overview of solution evaluation Solution evaluation tasks Solution evaluation in development stages Underlying Competencies Overview of underlying competencies (UC) Underlying competencies
Project Management Fundamentals: In-House Training Many projects are performed by highly competent and effective people who have little or no project management training. They perform projects like process improvement, marketing campaign development, new product development, event planning and production, and other 'tasks' which are projects. Project Management Fundamentals (PMF) is designed to support those people who need a solid foundation in project management, without being unnecessarily burdened to learn it while on the job. The course offers practical skills, concepts, and principles that can be taken back to the workplace, along with insights needed to adapt them to specific project environments. In today's environment, that means possibly adapting to Agile / Iterative methods. So, we have recently added key Agile concepts to provide a basic understanding of shifting towards agility. Since PMF's course goal is to achieve quality performance by learning effective planning and control, the focus is on a process orientation and an analytical, systems-oriented approach. Together, these frameworks promote project-related problem solving and decision-making skills necessary for real world projects. They honor project needs for collaboration, clear communications among people, and interpersonal and relationship skills. Recognition of these needs are woven throughout PMF, but are highlighted in two specific areas: Module 2 - People and Projects Module 8 - Executing, Communicating, and Developing the Team What You Will Learn At the end of this program, you will be able to: Describe the value of strong project management Identify characteristics of a successful project and project manager Recognize how current agile / adaptive practices fit within project management Explore project management processes, including Initiating, Planning, Execution, Monitoring & Controlling, and Closing Utilize project management processes and tools, based on case studies and real-world situations Create an initial project plan Use standard project management terminology Foundation Concepts Project management and definitions Value and focus of PM Competing constraints and project success Project life cycles People and Projects People and projects overview The project manager The project team People and projects in organizations Initiating and Defining Requirements Initiating the project Developing the project charter Conducting stakeholder assessments Defining requirements Using the Work Breakdown Structure Defining the Work Breakdown Structure (WBS) Developing a usable WBS Using the WBS Managing Project Risk Making the case for risk management Overview to planning for risk Identifying risks Analyzing risks Planning responses to risks Implementing response and monitoring risks Considerations for adaptive environments Estimating Defining an estimate Estimating approaches Estimating practices Estimating cost Validating an estimate Scheduling Defining the scheduling process and related terminology Sequencing and defining dependencies Determining the critical path Considering schedule risks and optimizing the schedule Executing, Communicating, and Developing the Team From baseline to execution Project communications and stakeholder relationships High-performing teams Monitoring and Controlling Defining monitoring and controlling Viewing control through the competing demands lens Variance Analysis and corrective action (Earned Value) Considerations in adaptive environments Closing the Project Closing projects Focusing on project transition Focusing on post-project evaluations
Use Cases for Business Analysis: In-House Training The use case is a method for documenting the interactions between the user of a system and the system itself. Use cases have been in the software development lexicon for over twenty years, ever since it was introduced by Ivar Jacobson in the late 1980s. They were originally intended as aids to software design in object-oriented approaches. However, the method is now used throughout the Solution Development Life Cycle from elicitation through to specifying test cases, and is even applied to software development that is not object oriented. This course identifies how business analysts can apply use cases to the processes of defining the problem domain through elicitation, analyzing the problem, defining the solution, and confirming the validity and usability of the solution. What you will Learn You'll learn how to: Apply the use case method to define the problem domain and discover the conditions that need improvement in a business process Employ use cases in the analysis of requirements and information to create a solution to the business problem Translate use cases into requirements Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Overview of use case modeling What is a use case model? The 'how and why' of use cases When to perform use case modeling Where use cases fit into the solution life cycle Use cases in the problem domain Use cases in the solution domain Use case strengths and weaknesses Use case variations Use case driven development Use case lexicon Use cases Actors and roles Associations Goals Boundaries Use cases though the life cycle Use cases in the life cycle Managing requirements with use cases The life cycle is use case driven Elicitation with Use Cases Overview of the basic mechanics and vocabulary of use cases Apply methods of use case elicitation to define the problem domain, or 'as is' process Use case diagrams Why diagram? Partitioning the domain Use case diagramming guidelines How to employ use case diagrams in elicitation Guidelines for use case elicitation sessions Eliciting the problem domain Use case descriptions Use case generic description template Alternative templates Elements Pre and post conditions Main Success Scenario The conversation Alternate paths Exception paths Writing good use case descriptions Eliciting the detailed workflow with use case descriptions Additional information about use cases Analyzing Requirements with Use Cases Use case analysis on existing requirements Confirming and validating requirements with use cases Confirming and validating information with use cases Defining the actors and use cases in a set of requirements Creating the scenarios Essential (requirements) use case Use case level of detail Use Case Analysis Techniques Generalization and Specialization When to use generalization or specialization Generalization and specialization of actors Generalization and specialization of use cases Examples Associating generalizations Subtleties and guidelines Use Case Extensions The <> association The <> association Applying the extensions Incorporating extension points into use case descriptions Why use these extensions? Extensions or separate use cases Guidelines for extensions Applying use case extensions Patterns and anomalies o Redundant actors Linking hierarchies Granularity issues Non-user interface use cases Quality considerations Use case modeling errors to avoid Evaluating use case descriptions Use case quality checklist Relationship between Use Cases and Business Requirements Creating a Requirements Specification from Use Cases Flowing the conversation into requirements Mapping to functional specifications Adding non-functional requirements Relating use cases to other artifacts Wire diagrams and user interface specifications Tying use cases to test cases and scenarios Project plans and project schedules Relationship between Use Cases and Functional Specifications System use cases Reviewing business use cases Balancing use cases Use case realizations Expanding and explaining complexity Activity diagrams State Machine diagrams Sequence diagrams Activity Diagrams Applying what we know Extension points Use case chaining Identifying decision points Use Case Good Practices The documentation trail for use cases Use case re-use Use case checklist Summary What did we learn, and how can we implement this in our work environment?
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional, consultant and/or those who work in network cabling system design, implementation and operation. Overview With few exceptions, enterprises today rely on IT for the delivery of business-critical services - often directly to the end consumer. It is therefore vital that the mission-critical data centre is designed, maintained and operated with high-availability and efficiency in mind. Among all the facilities, network cabling is the foundation for the network and one of the major contributors to the availability of the data center.CNCDP© is a 2-day course designed to expose participants to in-depth knowledge in designing and installing the data network cabling system which includes key subject matters such as; technical standards, designing of different cabling sub-systems, calculation of material requirements, architecture, installation, testing and acceptance. Introduction to Structured Cabling System (SCS) Brief history of SCS Basic copper and fibre transmission Copper and fibre cabling Single and multimode fibre Step/graded index multimode fibre Difference between Commercial Wiring and data centre cabling Development of standards Role of standards ANSI/TIA 568 standard Common standards The new usage of cabling to support Smart building Horizontal and Administration - Commercial Building Standard diagram recap: ANSI/TIA-568 Functional elements and example Scenario A: Determine the number of work areas Scenario B: Determine the number of user locations Zone wiring Administration: Interconnect and cross-connect Angled and flat panels Creating a cabling schematic design Convert schematic into physical layout Calculating the material list Horizontal and Administration - Data Centre Standard diagram recap: TIA-942 Basic/Reduced/Typical data centre setup Traditional 3 layers network design/ Spine and Leaf network design Select termination hardware Administration design ToR/EoR/Spine & Leaf cabling design Network and cabling resiliency Create cabling schematic design for ToR/EoR Convert into patch panel/rack layout Calculate the material list for ToR/EoR Building Backbone - Commercial Building Backbone diagram Calculate the copper backbone requirements per Telecom Room (TR) Calculate the fibre backbone requirements per Telecom Room Summarize the building backbone requirements Recognised cables Backbone Patch panels The maximum backbone distances Create cabling schematic design Converting the schematic design into patch panel/ rack layout Building Backbone - Data Centre TIA-942 based backbone topology TIA-942 backbone requirements Recognised backbone cable ToR/EoR/Spine and Leaf Backbone distance estimation Resiliency of backbone cable routes Creating cabling schematic design Converting the schematic design into patch panel/ rack layout Field and Fusion Termination for fibre connectors Pre-terminated fibre trunk and copper cables Architectural Considerations ANSI/TIA569-D Cable pathway and spaces Common requirements for the rooms Definition of the rooms Entrance Room/Demarcation Ceiling and floor pathways types Cable trays/basket/ladder/conduit Inner duct/sleeve/slot Calculating of pathway size Cable run best practices Cable management/AIM Grounding and bonding Separation distance requirements for copper cabling to power cabling Fire stopping Fire rated barrier Fire rated jacket cable Campus / Outdoor Backbone Common campus cable installation and cable types : Aerial cable / Direct-buried / Underground in-conduit Outdoor cable installation planning Lightning / surge protection Approved ground for surge protector Creating a schematic diagram Converting a schematic into a physical layout Site Inspection and Testing Visual site inspection notes Installation common issues Copper testing standard Permanent link / Channel / Patch cord / MPTL testing configuration Fibre connectors Fibre testing standard Tier 1 & 2 certification Fibre link definition Fibre testing steps Fibre inspection and cleaning Calibrating the test sets - 3 methods Setting up mandrel for testing Fibre loss budget calculation G.657 Bend insensitive fibre Optical Time-Domain Reflectometer (OTDR) Exam - Certified Network Cabling Design Professional (CNCDP©) The exam is a 60-minute closed book exam, with 40 multiple-choice questions. The candidate requires a minimum of 27 correct answers to pass the exam. Additional course details: Nexus Humans Certified Network Cabling Design Professional (CNCDP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Network Cabling Design Professional (CNCDP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Earn up to 85k as a 'Cyber Security Analyst' or Your 100% Money Back Are you concerned about the rising threat of cybercrime? In the UK alone, cyberattacks cost businesses an estimated £3.1 billion annually, and the demand for skilled cybersecurity professionals is booming. With an average salary of £45,000, a career in cybersecurity offers promising opportunities for those seeking stability and growth. Are you looking to join the high-demand field of cyber security and earn a handsome salary? Our Network and Cyber Security Traineeship Program is here to guide you all the way until you get the job you want. This Network and Cyber Security Traineeship Program is your all-in-one solution to learn cyber security from scratch and also secure a job in this exciting industry. With our unique blend of comprehensive courses and career support, your dream job is within reach. We understand the challenges of transitioning into a new field, which is why our program is tailored to guide you every step of the way - from mastering core skills to landing your first job as a Cyber Security Analyst. By choosing our Cyber Security Job Guarantee Programme, you're not just gaining skills; you're gaining a lifelong career partner. Our mission is simple - to be your trusted partner every step of the way, from training to employment. In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring Programmers, so we can help you get your foot in the door. If you are not happy with our service, we also offer a 100% money-back guarantee. So what are you waiting for? Enrol in our Cyber Security Job Guarantee Programme today and start your journey to become successful in Cyber Security field! Why Choose Us? So, what sets us apart from other programs? Let's dive into the exceptional benefits you'll experience when you join our Certified Cyber Security Job Guarantee Programme: Personalised Guidance: We believe in the power of individual attention. Our experienced mentors will provide one-on-one counselling sessions tailored to your specific needs. Whether you're a beginner or have some Cyber Security experience, we will guide you towards honing your skills and developing a strong foundation in Cyber Security. One-On-One Consultation: Gain invaluable insights and guidance from seasoned professionals who have thrived in the Cyber Security field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and expertise. Extensive Job Opportunities: We have established partnerships with numerous companies actively seeking Certified Cyber Security Job Guarantee Programme. Through our network, we'll connect you with exclusive job openings that are not easily accessible elsewhere. Interview Preparation: No more stress over unexpected interview questions. We provide you with access to a comprehensive database of potential interview questions curated over years of industry experience. Walk into your interviews confident, well-prepared, and ready to impress. Courses we will provide once you enrol in the program: Course 01: Cyber Security Programming Course 02: Cyber Security Advanced Training Course 03: Cyber Security Incident Handling and Incident Response Course 04: IT Support Technician Course 05: General Data Protection Regulation (GDPR) & Cyber Security Management Course 06: CompTIA Security+ (SY0-601) Course 07: CompTIA A+ (220-1001) Course 08: CompTIA A+ (220-1002) Course 09: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 10: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 11: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 12: CompTIA Network+ Certification (N10-007) Course 13: Diploma in CompTIA Network+ Training at QLS Level 7 Course 14: CompTIA PenTest+ (Ethical Hacking) Course 15: Cisco ASA Firewall Training Course 16: Cryptography Course 17: IT Administration and Networking Course 18: IGCSE ICT: Network Essentials Course 19: Cyber Security Law Course 20: Cyber Security Awareness Training How Can We Offer Job Guarantees? HF Online provides consultancy, professional and educational services to many of the companies in the UK. During our intense exclusive training program, you will not just gain and complete the industry valuable certification but will gain industry experience as well, which is imperative to get your 1st job in the sector. The Network and Cyber Security Traineeship Program Programme is completed in 9 easy steps: Step 1: Enrol in the Programme Begin your exciting journey with us by enrolling in the Cyber Security Job Guarantee Programme. Complete your registration and make a secure online payment. Remember, we offer a 14-day money-back guarantee if you're not completely satisfied. After you enrol in the Program, you will get lifetime access to 20 Premium Courses related to Cyber Security Job Guarantee Programme. These courses will teach you the knowledge and skills required to become successful in Cyber Security field. Our customer service team will help you and keep in contact with you every step of the way. So you won't have to worry about a thing! Step 2: Initial One-On-One Counselling Session Once enrolled, you will be paired with a dedicated career mentor. Schedule your first one-on-one session to discuss your career aspirations, skills, experience, and any areas for potential growth. This conversation will shape your learning and development path. Step 3 - Certification upon Course Completion After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping Our team of professionals will build you a compelling CV and LinkedIn profile. We'll ensure it presents your skills and qualifications effectively and is tailored to the needs and expectations of the programming/development industry. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. We will also make connections with many high-profile individuals and companies through your LinkedIn profile. Step 6: Interview Preparation With your CV ready, we'll move on to interview preparation. Gain exclusive access to our database of potential interview questions. Through simulated interviews with your mentor, you'll practice your responses and receive valuable feedback to further refine your skills. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure job interviews for you. We'll ensure you get the opportunity to showcase your skills to potential employers and get the dream job you want. Step 8: Post-Interview Support Post-interview, we'll provide a debriefing session to reflect on your performance and identify areas of improvement for future interviews if necessary. Remember, our commitment extends until you land your dream job. Step 9: Celebrate Your New Job! Once you've secured your dream job in Cyber Security, it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. We're excited to accompany you on this journey to success. Enrol today, and let's get started! Your path to a successful career in Cyber Security field begins with us. CPD 1000 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Cyber Security Job Guarantee Programme Course is suitable for: Beginners with no prior programming experience who are looking to enter the world of coding. Intermediate programmers who wish to expand their skills and explore Cyber Security's extensive usage. IT professionals seeking to diversify their skill sets and stay relevant in today's tech-driven market. Data analysts and scientists who want to leverage Cyber Security's powerful libraries for their data processing needs. Students and recent graduates looking to enhance their employability in the thriving tech industry. Entrepreneurs who wish to understand and utilise Cyber Security to automate tasks and analyse data for their businesses. Anyone with a keen interest in Cyber Security and a desire to delve into its applications in diverse fields like web development, data science, machine learning, and more. Requirements No experience required. Just enrol & start learning. Career path Cyber Security Analyst: £35,000 - £85,000 annually Incident Response Specialist: £40,000 - £90,000 annually IT Support Technician: £25,000 - £55,000 annually GDPR Compliance Officer: £30,000 - £70,000 annually Cloud Security Architect: £50,000 - £120,000 annually Ethical Hacker/Penetration Tester: £35,000 - £95,000 annually Network Security Engineer: £40,000 - £100,000 annually Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included Student ID Card Digital certificate - Included
Business Process Modeling: Virtual In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA® Certification exam to become a Certified Business Analysis Professional (CBAP®). Learn more at www.iil.com/bacp A process model is a description of a process in terms of its steps or actions, the data flowing between them and participants in the process, machines, systems, and organizations involved. Modeling is a critical business analysis skill. It applies graphical and text communication techniques to describe the actions, objects, and relationships acted upon in the process and the steps that act upon them. This course teaches the technique of process modeling and ties together the core methods of process, behavior, and data modeling to enable business analysts to fully describe business processes in levels of detail from multiple perspectives. What you will Learn Upon completion, participants will be able to: Identify business processes and their components Work with UML diagrams Use process modeling in business diagramming Diagram and model business processes Foundation Concepts The role of the business analyst The IIBA® BABOK® Knowledge Areas Business Process Modeling (BPM) and the business analyst A practical approach to business process modeling The Context for Modeling Business Processes Overview of context for business process modeling Analyzing stakeholder information Modeling best practices Critical inputs for BPM: Business Rules Critical inputs for BPM: Context Diagrams Data Models Overview of data modeling Entity relationship diagrams Object-oriented approach Class diagrams Other data models Process Models - Part I (Non-UML) Overview of process modeling Data flow diagrams Workflow diagrams Flowcharts Process Models - Part II (UML) Overview of UML Process Models UML Activity Diagrams UML Sequence Diagrams Usage Models - Part I (Non-UML) Overview of usage modeling Prototyping options Static prototyping and storyboards Dynamic prototyping User Interface Design and user stories Usage Models - Part II (UML Use Cases) Overview of Use Cases Use Case diagrams Use Case descriptions Use Cases and the product life cycle Integrating the Models Overview of integrating the models General analysis best practices Specific analysis techniques summary Best practices for transition to design Summary and Next Steps What did we learn and how can we implement this in our work environments?
Course description Figma is an industry leading web-based design tool that allows you to create user interfaces for any screen type or size, collaborate on those designs in real-time and build interactive prototypes suitable for user testing. Figma is a visual design tool so there’s no coding involved. Design is achieved by adding, combining and styling shapes, text and images on a canvas or ‘Frame’. We run 2 consecutive Figma training days, the second day building on the practical activities from the first. You can attend just the first day. Attending just the second day is only recommended if you’re already very comfortable with the Figma interface. Day 1: Basic Figma design and collaboration For beginners with no prior experience with Figma who want to understand the basics, be able to create their own designs, share, collaborate and even iterate on the designs of others. You will learn: How to navigate the Figma interface. How to create your own designs by: Setting up a design file. Setting up the screen type you want to design and add grids and guides. Adding and modifying basic shapes and text to create user interface elements. How to save text and colour styles for reuse. How to create reusable components. How to use the ‘auto layout’ feature to promote tidy, consistent and usable design. How to collaborate on designs by sharing screens and commenting on designs. A brief introduction to prototyping: What’s possible. What’s not. Day 2: Component variants, design systems and prototyping This session will cover the more sophisticated aspects of Figma use such as: How to use component variants to create: Interaction styles such as hover and mouse down states ‘Flavours’ of a widget such as primary and secondary button styles. Toggleable elements within a widget such as buttons or bullets within a product card. How to turn a collection of components into a basic design system. Prototyping fundamentals: How to make journeys clickable. How to introduce animations. Tips and tricks for effective user testing. The limitations of Figma prototyping Is it for you? With no experience of Figma necessary, this course is suitable if: If you’re involved with creating or curating digital experiences. if you want to turn your design ideas into something tangible. If you work with Figma designers and want to understand the ‘art of the possible’. If you want to collaborate with your team on Figma projects. Learning objectives After completing day 1 you will be able to: Understand the Figma user interface. Create mobile and desktop interface designs. Effectively collaborate remotely. Share designs and gather feedback. Use auto layout to promote consistent and usable designs. Understand Figma’s role in user experience design, and its limitations. After day 2 you will be able to: Understand how design systems are set up and used. Create component variants for use in your own design system. Use that design system to efficiently create a user journey. Create a prototype suitable for user testing.
Effective Presentation Skills: In-House Training In today's results-oriented, global working environment, the ability to create and deliver presentations effectively is a necessary skill set for people at all levels of an organization. Regardless of your role, it's important to know how to synthesize your ideas into a coherent and focused narrative, add visuals that support and reinforce your message, and deliver it in a way that resonates with your audience. In this highly interactive course, we will unpack and practice some of the tools and techniques used by top speakers and influencers all over the world. In this engaging two-day course, you will plan, write, refine, practice, and deliver a presentation to the class. Your presentation will be filmed on both days, and you will leave the course with a flash-drive copy of your videos; participants of the virtual classroom workshop should be prepared to present via webcam. In addition to discovering and enhancing your own personal delivery style, you will learn how to create an overarching goal for your presentation and then organize and structure it for maximum impact. You'll gain insight into how to anticipate your audience's needs and tailor the content and delivery in a way that connects with them and sustains their attention and engagement. You will also learn skills that will help you control nervous energy, remain focused on and attuned to your audience, improvise under pressure, deal effectively with questions, and build a compelling call to action. What you will Learn At the end of this program, you will be able to: Construct an effective presentation goal statement, opening, body, and closing that connect with an audience Analyze an audience's needs and style preferences, including relevant DiSC®-related elements Deliver a complete criteria-based presentation that will persuade others Align usage of visuals as well as verbal and non-verbal techniques to maximize the impact of your presentation Getting Started Introductions and social agreements Course structure Course goals and objectives Opening activities Planning and Organizing Video: 'The Art of Misdirection' Setting your presentation goal Writing a goal statement Analyzing your audience Applying the 'reality' test Creating and strengthening supports Structuring your presentation 5 components of an effective opening Presentation body Presentation closing Write your presentation opening Audience Analysis Video: 'How to Tie Your Shoes' Everything DiSC® introduction Audience DiSC® Styles Analyzing your audience Further audience analysis Effective Delivery Delivery challenges: virtual and in-person Keeping your audience engaged Your body as your instrument Verbal / paraverbal elements Body stance and nonverbal communication What are your 'tells?' Controlling nervousness Staying attuned to your audience Responding to questions Review and edit your opening Deliver your opening Visuals and Enriching Elements Using images in your presentation Guidelines for visual composition Using questions to engage your audience The power of the pause Practicing and Applying What You've Learned Preparation Delivery Feedback Opportunity to put into practice the program content and receive a video copy Summary and Next Steps What did we learn and how can we implement this in our work environment? Your personal action plan
This one-day course introduces the field of user experience and provides an excellent entry point to our other specialised training courses. UX processes and practices have become a central component of product design, service design and web design.
Facilitation Skills for Business Analysts: Virtual In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA® Certification exam to become a Certified Business Analysis Professional (CBAP™). Business analysts are communicators who bridge the gap between people with business needs and knowledge and the people who will provide solutions. Business analysts are continuously involved in communications with stakeholders and developers as they create the solution to business problems. They participate in information-gathering sessions including interviewing, joint requirements definition, and Joint Application Design (JAD) workshops which are used to streamline information gathering and get immediate validation from user representatives. The business analyst is also involved with negotiating the solution with the stakeholders, upper-level management, and the developers, mediating among the groups when disagreements take place, and influencing the results of decisions during the solution cycle. This course teaches the methods needed to organize and run information-gathering events. It combines the basics of graphic decision making and modeling with facilitation, communication, and meeting management skills. What you will Learn At the end of this program, you will be able to: Identify the major touch points between key BABOK® Guide knowledge areas and business analysis communication Describe the facilitation skills that are most supportive of those intersections Improve your ability to apply these skills in the context of your business analyst functions Foundation Concepts The role of the Business analyst (BA) An Introduction to the BABOK® Guide Business analyst roles and the product / project life cycle (PLC) Facilitation skills for the business analyst The BABOK® Guide and Communication An introduction to the communication process Addressing basic communications challenges Planning business analysis communication Communication and BABOK® Guide tasks Targeted Elicitation Techniques Synergy between communication and targeted elicitation techniques Preparing for elicitation Cornerstone targeted technique: interviews Other targeted elicitation techniques Related general communication skills Group Elicitation Techniques Synergy between requirements communication and group elicitation techniques Cornerstone group elicitation technique - requirements workshops Other group elicitation techniques Related general communication skills - meeting management best practices Related general communication skills - facilitating best practices Process / Model-Based Elicitation Techniques Synergy between requirements communication and process / model-based elicitation techniques Process / model-based elicitation techniques Related interpersonal skills - problem solving and decision making Investigative Elicitation Techniques Synergy between requirements communication and investigative elicitation techniques Cornerstone investigative elicitation technique - document analysis Other investigative elicitation techniques Summary of elicitation techniques by usage in the requirements process Using Presentations, Structured Walkthroughs, and Influencing Structured walkthroughs, presentations, and influencing within BABOK® Guide tasks Cornerstone technique - structured walkthroughs General communication skill - presenting Related interpersonal skill - influencing Special Facilitation Skills - Negotiating and Mediating Negotiating Mediating