Everyone has what it takes to become an effective leader, but first you must learn the skills needed to succeed in a position of responsibility. Our program will help people nurture the talent within and allow managers to lead confidently. Sometimes, working longer hours isn’t the right approach, as you risk burning out and abandoning the task at hand. Instead, effective leadership teaches you how to organise your workload, practice better time management and learn the power of delegation.
Total IP multicast training course description This training course provides an advanced three day hands on study of IP multicast technology focusing on architectures, applications and protocols. All aspects of IP multicasting are covered including PC, server and switch implementations. Design, configuration, support and troubleshooting are all covered in the course. Hands on sessions are used to reinforce the theory rather than teach specific implementations. What will you learn Design multicast networks. Explain how multicast networks work. Compare and contrast the different multicast routing protocols, such as DVMRP, PIM, MBGP and SSM. Configure PCs, servers, switches and routers for multicasting. Configure multicast routing protocols including: PIM Dense Mode. PIM Sparse Mode BGP SSM Troubleshoot multicast networks. Total IP multicast training course details Who will benefit: Technical staff working with IP multicasts. Prerequisites: TCP/IP Foundation for engineers Duration 3 days Total IP multicast training course contents Introduction What is multicasting? Why multicast? Why not multicast? Multicasting vs. multiple unicasts, Multicasting vs. broadcasts, multicasting applications, the use of unicast addressing for setting up multicast applications, multicast use within standard protocols such as OSPF. hands on Example multicast applications. Addressing Layer two multicast addresses, Class D addresses, mapping layer 3 addresses onto layer 2 multicast addresses. Multicast addresses on NBMAs, scoping multicast traffic, Multicast address blocks, GLOP, IPv6 and multicasting, anycasting. hands on Multicast addressing. Multicast architectures Where the different protocols are used, PC to router, router to router, how switches can get involved. hands on Analysing multicast packets. PC to router Configuring Class D addresses, IGMP, packet formats, queries, reports, maintaining groups, enhancements to IGMP (v2 and v3), Leaving a group, querier elections, hands on Analysing IGMP packets. Switches and multicasting Controlling multicast traffic with switches, VLANS, static bridge table entries, IGMP snooping, CGMP. hands on Configuring switches for multicast environments. Router to router MOSPF, DVMRP, PIM Sparse Mode, PIM Dense Mode, MBGP. hands on Simple router configuration for multicasting. Theory behind multicast routing protocols Distribution trees, source distribution trees, shared trees, core based trees. Reverse path forwarding, Multicast routing protocol types. PIM DM: Flooding, pruning, PIM designated routers, hands on configuring PIM DM. PIM Sparse mode Rendevous points, discovering RPs, hands on Configuring PIM SM, using different protocols for different groups. PIM SM with one RP, using multiple RPs, Auto RP. MBGP Multiprotocol routing, how does MBGP work? How MBGP carries multiple protocol information, MBGP and multicasts, MBGP and IPv6. hands on Configuring MBGP for multicasts. Internet multicasting The internet, ISPs, the MBone, tunnelling, Inter domain multicasting, the role of MBGP, Inter domain problem, MSDP, MSDP operation SSM, PIM-SM and shared trees, SSM, PIM-SSM operation, SSM benefits. hands on MSDP configuration. SSM configuration.
Total QoS training course description An advanced technical hands on course focusing on Quality of Service issues in IP networks. What will you learn Explain the difference between Integrated services and differentiated services. Explain how DiffServ works. Explain how RSVP works. Design networks supporting QoS. Total QoS training course details Who will benefit: Network administrators. Network operators. Prerequisites: TCP/IP Foundation for engineers Duration 3 days Total QoS training course contents What is QoS QoS and CoS, throwing bandwidth at the problem, Best effort services, Differentiated services, Integrated services, guarantees, the need for QoS, IETF working groups. Application issues Video, Voice, other applications, Jitter, delay, packet loss. Flows, per flow and per aggregate QoS, Stateful vs. stateless QoS, applications vs. network QoS. 'Traditional' IP QoS The TOS field and precedence, the obsolete OSPF use of the TOS field, TCP congestion avoidance. Queuing Where to use queuing, FIFO, Priority queuing, Custom queuing, Weighted Fair Queuing, CBWFQ, PQWFQ, LLQ, RED and WRED. DiffServ Architecture, DSCP, CU, packet classification and marking, meters and conditioners, Bandwidth brokers and COPS, Per Hop Behaviours, best effort PHB, Assured Forwarding PHB, Expedited forwarding PHB, Network Based Application Recognition (NBAR). Layer 2 issues Fragmentation and interleaving, compression (codecs, MPEG formats, header compressionâ¦), 802.1p, Subnet bandwidth management, Bandwidth allocators and requestor modules, the use of MPLS, traffic engineering, traffic shaping. RSVP What is RSVP? architectures, paths, path messages, reservations, traffic specifications, tear downs, guaranteed and controlled load, token buckets, Call Admission Control in voice networks, gatekeepers. Other issues Policy based routing, the Resource Allocation Protocol, QoS management tools, baselining networks, design issues, QoS in IPv6, QoS and multicasts.
Essential IMS training course description The IP Multimedia Core Network Subsystem (IMS) is defined by 3GPP as a new mobile infrastructure. This course studies the discreet elements in the IMS. What will you learn Describe the IMS. Describe the IMS architecture. Explain how charging, security and QoS is handled in the IMS. Explain how the IMS supports service enablers such as Push to talk and Presence. Essential IMS training course details Who will benefit: Telecommunications staff. Prerequisites: Mobile communications overview Duration 2 days Essential IMS training course contents Mobile communications review The role of IP in telecommunications. GSM to IMS. Enhanced multimedia services, Push To, convergence, conferencing, roaming. What is IMS? What it is, why IMS, standard bodies: 3GPP, IETF, OMA, IMS services. MMD comparison. IMS architecture blocks Overview, IMS functions, IMS interfaces, IMS protocols, IMS elements, IMS reference points. Access network, IMS in GSM, CDMA, WiFi & PSTN networks. Core network. Application, Control and Call planes. HSS - User database Identification. The user database, role of HSS, SLF and multiple HSSs. 'Normal' identities, IMPI, IMPU. IMS signalling: SIP What is SIP? SIP URI, contact address, UAs, Proxies, basic SIP call flow, SIP sessions. IMS other protocols Megaco, Diameter, XML, XCAP, COPS, RTP/RTCP, SDP, H.324M, IM and MSRP. Call/Session Control Call Session Control Functions (CSCF). Domains. Home networks, visited networks. CSCF and SIP. P-CSCF, P-CSCF discovery, P-CSCF functions. I-CSCF, DNS and I-CSCF. S-CSCF, S-CSCF functions, ENUM lookups. QoS. Example call flows. IMS services Open service platform, Application Servers, profiles, AS interface with S-CSCF. 'Normal' services (Caller ID, Call waiting, transferâ¦) Push to talk Over Cellular (PoC), IMS conferencing, Group management, IMS Presence, IMS Messaging. Other possible applications. Media servers. (MRFC, MRFP). Gateways IMS PSTN procedures, BGCF, PSTN interface. SGW, MGCF, MGW Charging Architecture, Offline, online and flow based charging, charging reference points, CCF, DIAMETER, ICID, IOI. IMS security IMS security architecture, identities, AAA, public and private user ID, service filters, Cx interface, RADIUS, Diameter protocol, 3GPP AKA, integrity, privacy, NDS, IPSEC, trust, assertion.
D-Link switches training course description A hands on course covering the product specifics of D-Link switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. What will you learn Install D-Link switches. Use the command line interface and the web based interface to manage D-Link switches. Configure and troubleshoot D-Link switches. Perform software upgrades and maintain configurations using TFTP. D-Link switches training course details Who will benefit: Anyone working with D-Link switches. Particularly aimed at engineers and technicians supporting D-Link switches. Prerequisites: None. Duration 2 days D-Link switches training course content Introduction How Ethernet works with hubs, How Ethernet works with switches. Installing D-link switches. Hands on Building a network with a hub, building a network with a D-Link switch. Basic troubleshooting The D-Link switch range, LEDs, cabling issues, factory resets, default settings. Hands on Building a network with multiple D-link switches. Configuration methods Managed vs. unmanaged switches, Console port access, telnet, web based access, SNMP, saving configurations, NVRAM, switch stacks. Hands on Accessing the switch using the CLI, IP address configuration, telnet. Command line interface Users, privileges, the CLI, online help. Hands on Basic commands, user accounts, displaying the switch configuration. Web based interface Getting started, basic format. Hands on Configuring the switch using the web interface. Port configuration Common port configuration tasks, link aggregation. Hands on Configuring ports. STP configuration What is STP? 802.1D vs. 802.1W (RSTP), configuring STP. Hands on Enabling and disabling STP, changing STP versions, configuring STP. VLAN configuration What are VLANS? 802.1Q, tagged/untagged, creating VLANS, applying VLANS. Hands on Setting up VLANS, setting up 802.1Q, Inter VLAN traffic. Housekeeping TFTP, upload download, updating firmware, updating configuration files, BOOTP/DHCP for IP addresses. Hands on Using TFTP to configure a D-Link switch. SNMP Switch configuration, D-View, other NMS's. Hands on Using SNMP to manage a D-link switch putting it all together: troubleshooting.
Ansible training course description The course focusses on the use of ansible for network devices instead of its usual server use case. The course progresses from the basics of ansible and playbooks onto using network specific modules including NAPALM. The use Jinja2 templating with ansible is also studied. Hands on sessions with ansible configuring routers and switches follow all major sections. What will you learn Automate tasks with ansible. Write ansible playbooks. Configure network devices with ansible. Troubleshoot network devices with ansible. Use ansible network modules. Use jinja2 templates with ansible. Ansible training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 2 days Ansible training course contents What is ansible? The language, the engine, the framework. Uses of ansible, orchestration. Hands on Installing ansible, enabling SSH on network devices. Ansible architecture How ansible 'normally' works, Agentless, SSH, ansible and Python, modules, how ansible work on network devices, Configuration management, inventories, playbooks, modules, ansible.cfg. Hands on Getting started, running ad hoc commands. Playbooks ansible-playbook, users, YAML, plays, tasks, modules. ansible-vault. Hands on Running playbooks. More playbooks Handlers, variables, environmental variables, playbook variables, inventory variables, variable scope and precedence, accessing variables, facts, ansible vault. Conditionals, wait_for. Hands on Using variables and conditions in playbooks. Inventories /etc/ansible/hosts, inventory variables, static inventories, dynamic inventories. Hands on Inventories and variables. Ansible network modules Built in modules, custom modules, return values. ansible-doc -l. connection: local, Cisco modules, Juniper module, Hands on Using modules for your network devices. Ansible templatings The template module, the assemble module, jinja2 templates, for, if else. Hands on Configuring network devices from templates. Roles and includes Dynamic includes, Handler includes, playbook includes. Roles, role parts: handlers, files, templates, cross platform roles, ansible galaxy. Hands on includes example, building roles. Ansible and NAPALM Installation, napalm-ansible, NAPALM modules: napalm_diff-yang, napalm_get_facts, napalm_install_config, napalm_parse_yang, napalm_ping, napalm_translate_yang, napalm_validate. Hands on Using NAPALM modules in ansible.
About this Training Course Time is money in the oil business. Drilling time is big money. Whether in a technical, managerial or supporting role, you are a valuable asset to ensuring that project delivery targets are met and profits are realised. As drilling activities continue, professionals like you must grasp the language and technology of drilling operations in order to maximise expenditures throughout the producing life of a well. Drilling equipment and procedures have a unique language that must be conquered for maximum benefit. Clear and understandable explanations of drilling rig equipment, procedures, and their complex interactions provide an excellent foundation for smooth communication and increased efficiency in inter-department project team efforts. Drilling Essentials will help you de-mystify activities around the rig and well planning. It will explain the fundamentals of drilling with an emphasis on key areas such as logistical considerations, costing, and analysis of drilling contracts. Understand the urgency of drilling requests, know more about the cost implications of drilling-related problems, and understand the risks involved in a drilling contract. With the course director's drilling knowledge and skills, this is your opportunity to explore and understand important drilling concepts, principles, and technology which are presented in a reader-friendly format and illustrated with examples. As a non-drilling professional, you too can grow with the drilling industry with a deeper understanding of the critical role you play in contributing to its success! Training Objectives By attending this industry fundamentals Virtual Instructor Led Training (VILT) course, you will be better able to: Understand drilling terminology & drilling processes for completing onshore & offshore wells Appreciate major cost components of drilling operations and its impact for better project planning and management Better visualise major drilling equipment and their technical functions to promote a deeper understanding of the logistical and technical considerations Gain valuable insights on the drilling industry with a synopsis of recent technology developments that impact the drilling process Target Audience This Virtual Instructor Led Training (VILT) course has been developed for new engineers and forward-looking executives in the following fields who are interested in enhancing their knowledge and awareness of the drilling process for increased productivity & contribution to the team they're supporting: Accounting Commercial Finance & Administration General Management Logistics Procurement Tender Contract Administration E & P IT Finance Joint Ventures Materials Planning Sourcing Training Business Development Estimation & Proposal HSE Legal Planning & Budgeting Supply Chain Drilling Fluids Organisational Impact Your expert course leader has over 45 years of experience in the Oil & Gas industry. During that time, he has worked exclusively in the well engineering domain. After being employed in 1974 by Shell, one of the major oil & gas producing operators, he worked as an apprentice on drilling rigs in the Netherlands. After a year, he was sent for his first international assignment to the Sultanate of Oman where he climbed up the career ladder from Assistant Driller, to Driller, to wellsite Petroleum Engineer and eventually on-site Drilling Supervisor, actively engaged in the drilling of development and exploration wells in almost every corner of this vast desert area. At that time, drilling techniques were fairly basic and safety was just a buzz word, but such a situation propels learning and the fruits of 'doing-the-basics' are still reaped today when standing in front of a class. After some seven years in the Middle East, a series of other international assignments followed in places like the United Kingdom, Indonesia, Turkey, Denmark, China, Malaysia, and Russia. Apart from on-site drilling supervisory jobs on various types of drilling rigs (such as helicopter rigs) and working environments (such as jungle and artic), he was also assigned to research, to projects and to the company's learning centre. In research, he was responsible for promoting directional drilling and surveying and advised on the first horizontal wells being drilled, in projects, he was responsible for a high pressure drilling campaign in Nigeria while in the learning centre, he looked after the development of new engineers joining the company after graduating from university. He was also involved in international well control certification and served as chairman for a period of three years. In the last years of his active career, he worked again in China as a staff development manager, a position he nurtured because he was able to pass on his knowledge to a vast number of new employees once again. After retiring in 2015, he has delivered well engineering related courses in Australia, Indonesia, Brunei, Malaysia, China, South Korea, Thailand, India, Dubai, Qatar, Kuwait, The Netherlands, and the United States. The training he provides includes well control to obtain certification in drilling and well intervention, extended reach drilling, high pressure-high temperature drilling, stuck pipe prevention and a number of other ad-hoc courses. He thoroughly enjoys training and is keen to continue taking classes as an instructor for some time to come. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
BGP training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. BGP training course details Who will benefit: Anyone who will be working with BGP. Prerequisites: TCP/IP Foundation for engineers Definitive IP routing for engineers. Duration 5 days BGP training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.
About this Virtual Instructor Led Training (VILT) Governments, regulators and energy companies are pursuing CO2 storage technologies to meet their net-zero carbon commitments as well as targets set by the international Paris Agreement on climate change. For successfully executing Carbon Capture & Storage (CCS) projects, various technical, operational, economic and environmental risks and associated stakeholders need to be managed. In this 5 half-day Virtual Instructor Led Training (VILT) course, the methods for managing risk in CCS projects are addressed with a focus on CO2 injection and storage. The VILT course will also demonstrate how to assess storage capacity of a potential CO2 storage reservoir, model framing techniques, and well injectivity issues related to CO2 injection. The potential leak paths will be discussed such as reservoir seals, leakage along faults and aspects of well integrity. In the VILT course, the design of a monitoring programme will also be discussed. The VILT course will be supported by various case studies. This VILT course will cover the following modules: CCS projects in an international context Site selection and site characterization Storage capacity assessment Injectivity assessment Containment assessment Measurement, monitoring & verification Training Objectives On completion of this VILT course, participants will be able to: Uncover the functions and associated components required to capture, transport and store CO2 in subsurface aquifers and (depleted) hydrocarbon reservoirs Find a systematic and integrated approach to risk identification and assessment for CO2 storage projects (maturation) Appreciate the requirements (physics modelling) and uncertainties to assess the CO2 storage capacity of a selected site. Understand the challenges, data and methods to assess CO2 well injectivity and well integrity Identify the leakage pathways of a selected storage site, and understand the assessment methods and associated uncertainties Learn how to design a monitoring program Target Audience This VILT course is intended for all surface and subsurface engineers such as facility engineers, geologists, geophysicists, reservoir engineers, petrophysicists, production technologists/engineers, well engineers and geomechanical specialists. Also, (sub)surface team leads, project managers, business opportunity managers, decision executives, and technical risk assessment & assurance specialists will benefit from this VILT course as it provides a common framework and workflow to develop a CCS project. For each class, it is highly recommended that a mix of disciplines mentioned above are represented to facilitate discussions from different perspectives. Course Level Basic or Foundation Training Methods This VILT course is built around cases in which teams work to identify and assess CO2 storage site issues using a systematic thought approach in this course. In addition, exercises are used to practise the aspects of the CCS risk assessment process. The VILT course provides a venue for discussion and sharing of good practices as well as opportunities to practise multi-discipline co-operation and facilitation. Participants are encouraged to bring their own work issues and challenges and seek advice from the expert course leaders and other participants about all aspects of CCS. This VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. Trainer Trainer 1: Your expert course leader has more than 36 years of experience in the oil & gas industry with Shell. He gained broad experience in petroleum engineering, with expertise in integrated production systems from subsurface, wells and surface. He has had assignments in Production Technology, R&D, Production Chemistry, Rock Mechanics and Reservoir Engineering cEOR, with a proven track record in technology screening, development and deployment, field development planning, conceptual well design and Production System Optimization (PSO) of gas and oil fields as well as preparing Well, Reservoir & Facility Management (WRFM) strategies and plans. He had also worked on assignments in NAM and did fieldwork in Oman, Gabon and Shell Nigeria. He is a skilled workshop facilitator. He discovered his passion for teaching following an assignment in Shell Learning. During his time in Shell, he developed and taught technical courses to Shell professionals via blended learning. Trainer 2: Your second expert course leader has over 30 years of experience identifying, assessing and mitigating technical risks with Shell. The main focal point of his experience is in subsurface and Geomechanical risks. He is the the founding father of various innovations in how we assess risks by tool development (for bore hole stability, 3D geomechanical field evaluations and probabilistic assessment). He also developed an eye for people motivation, change management and facilitation. He was also responsible for the Geomechanical competence framework, and associated virtual and classroom training programme in Shell for 10 years. Trainer 3: Your third expert course leader has more than 30 years of experience in Shell, focusing on research and development in drilling and offshore systems. His areas of expertise is in project management, finance, business planning, investment, development studies and economics models. In 2021, he worked on a project that looked into the economic evaluation of P18A field complex for CO2 storage. He has an MSc in Mechanical Engineering (M.E.) TU Delft Netherlands (Hons) and a baccalaureate from Erasmus University Rotterdam. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Use Cases for Business Analysis: In-House Training The use case is a method for documenting the interactions between the user of a system and the system itself. Use cases have been in the software development lexicon for over twenty years, ever since it was introduced by Ivar Jacobson in the late 1980s. They were originally intended as aids to software design in object-oriented approaches. However, the method is now used throughout the Solution Development Life Cycle from elicitation through to specifying test cases, and is even applied to software development that is not object oriented. This course identifies how business analysts can apply use cases to the processes of defining the problem domain through elicitation, analyzing the problem, defining the solution, and confirming the validity and usability of the solution. What you will Learn You'll learn how to: Apply the use case method to define the problem domain and discover the conditions that need improvement in a business process Employ use cases in the analysis of requirements and information to create a solution to the business problem Translate use cases into requirements Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Overview of use case modeling What is a use case model? The 'how and why' of use cases When to perform use case modeling Where use cases fit into the solution life cycle Use cases in the problem domain Use cases in the solution domain Use case strengths and weaknesses Use case variations Use case driven development Use case lexicon Use cases Actors and roles Associations Goals Boundaries Use cases though the life cycle Use cases in the life cycle Managing requirements with use cases The life cycle is use case driven Elicitation with Use Cases Overview of the basic mechanics and vocabulary of use cases Apply methods of use case elicitation to define the problem domain, or 'as is' process Use case diagrams Why diagram? Partitioning the domain Use case diagramming guidelines How to employ use case diagrams in elicitation Guidelines for use case elicitation sessions Eliciting the problem domain Use case descriptions Use case generic description template Alternative templates Elements Pre and post conditions Main Success Scenario The conversation Alternate paths Exception paths Writing good use case descriptions Eliciting the detailed workflow with use case descriptions Additional information about use cases Analyzing Requirements with Use Cases Use case analysis on existing requirements Confirming and validating requirements with use cases Confirming and validating information with use cases Defining the actors and use cases in a set of requirements Creating the scenarios Essential (requirements) use case Use case level of detail Use Case Analysis Techniques Generalization and Specialization When to use generalization or specialization Generalization and specialization of actors Generalization and specialization of use cases Examples Associating generalizations Subtleties and guidelines Use Case Extensions The <> association The <> association Applying the extensions Incorporating extension points into use case descriptions Why use these extensions? Extensions or separate use cases Guidelines for extensions Applying use case extensions Patterns and anomalies o Redundant actors Linking hierarchies Granularity issues Non-user interface use cases Quality considerations Use case modeling errors to avoid Evaluating use case descriptions Use case quality checklist Relationship between Use Cases and Business Requirements Creating a Requirements Specification from Use Cases Flowing the conversation into requirements Mapping to functional specifications Adding non-functional requirements Relating use cases to other artifacts Wire diagrams and user interface specifications Tying use cases to test cases and scenarios Project plans and project schedules Relationship between Use Cases and Functional Specifications System use cases Reviewing business use cases Balancing use cases Use case realizations Expanding and explaining complexity Activity diagrams State Machine diagrams Sequence diagrams Activity Diagrams Applying what we know Extension points Use case chaining Identifying decision points Use Case Good Practices The documentation trail for use cases Use case re-use Use case checklist Summary What did we learn, and how can we implement this in our work environment?