Writing and Managing Requirements Documents: In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA™ Certification exam to become a Certified Business Analysis Professional (CBAP™). Learn more at www.iil.com/bacp. Once a business analyst has completed the information gathering and analysis to produce the solution to a business problem, the results must be documented for all stakeholders to see and understand. This course will enhance the skill set needed for writing and managing the complex readership that business analysts interact with on a day-to-day basis. What you will Learn Upon completion, participants will be able to: Write an understood requirements document that is approvable and acceptable Validate a requirements document Manage the changes to requirements documents through the SDLC Foundation Concepts The role of the business analyst An introduction to the BABOK® Guide The business analyst and the product/project life cycle The requirements documentation process Planning for Effective Requirements Documentation Overview of requirements planning Planning for validation Planning for verification: well-formed criteria Planning for verification: understood and usable criteria Writing Effective Requirements Documents Overview of writing requirements documents Using a standard structure / template Applying formatting techniques Meeting the challenge of writing non-functional requirements Baselining Requirements Documents Overview of the requirements baseline process Validation Verification Approval Managing Requirements Change through the Product Life Cycle Overview of requirements change management Establishing a formal change management process Tracing requirements through design and development (build, test, and implementation) Following through to post-implementation (transition and early production)
Lawful Intercept training course description Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture. What will you learn Recognise the legal and regulatory obligations to provide LI and DR. Identify the components of the handover architecture for each of LI and DR. Identify the preferred location of points of interception and points of retention in the IP network. Map intercepted material to handover protocols. Understand the data mapping defined in the available standards for both LI and DR. Lawful Intercept training course details Who will benefit: Technical and managerial staff needing to implement public networks. Prerequisites: TCP/IP Foundation Duration 1 day Lawful Intercept training course contents What is meant by LI and DR? Review of regulation: Data protection Directive; Data Retention Directive; RIPA. LI architectures Handover and Interception: ETSI standards ES 201 671 and TS 102 232. LI handover protocol IRI and CC handover; correlation; manual interfaces. DR architectures Handover of query results; points of retention. DR query command set Retrieval of retained records. Security concerns Operation privacy; target privacy; storage and transmission integrity. Implementation Identifying PoI and PoR for provided services. LI and DR wrap up Interaction with other services, storage obligations (volume, time, availability).
Gain a comprehensive understanding of positive behavior support principles, strategies, and techniques with our course. Ideal for educators, caregivers, and professionals working with individuals with developmental disabilities, mental health issues, or behavioral challenges.
Total sFlow training course description A comprehensive hands on course covering sFlow. The course starts with the basics of flows moving swiftly onto configuring sFlow and studying the information it provides. What will you learn Describe sFlow. Use Nmap. Recognise how sFlow can be used. Describe the issues in using sFlow. Compare SFlow with SNMP and NetFlow. Total sFlow training course details Who will benefit: Technical staff working with sFlow. Prerequisites: TCP/IP foundation for engineers. Duration 1 day Total sFlow training course content What is SFlow? Where to monitor traffic. Packet based sampling, Time based sampling. Adaptive sampling. Flow samples, Counter samples. Hands on Wireshark flow analysis. Getting started with sFlow sFlow configuration. Enabling sFlow. Per interface. Hands on Accessing sFlow data using the CLI. sFlow architecture SFlow agents and collectors. When flows are exported. Distributed sFlow architecture, subagents. sFlow reporting products. SolarWinds. Hands on Collector software. sFlow features and benefits Troubleshooting with sFlow, controlling congestion, security and audit trail analysis. Hands on Using sFlow. sFlow versus other technologies Flows. sFlow impact and scalability. sFlow versus SNMP and RMON, SFlow versus NetFlow/IPFIX. Hands on Advanced sFlow configuration.
Eliminate bad relationship and dating behaviour Improve confidence Understand people better Effective communication skills training Eliminate regressive dating patterns Address poor dating habits Introspection in your character and behavioural patterns Be a better partner 1 month Course 1 hr once a week Dating advice for singles https://relationshipsmdd.com/product/improve-my-relationship-behaviour-package/
Develop true Digital Marketing Strategy expertise with DMI Specialist. Learn digital communications, analytics, marketing automation and budget & strategy formulation from Industry Skills Experts. Course Overview This dynamic online Diploma in Digital Strategy & Planning course covering topics in digital communications, analytics, marketing automation and budget & strategy formulation giving you the skills, know-how, strategy and techniques to be that change. Here is power. The power to influence. To speak to billions of people. Specialization is for when you don’t just want to play the digital marketing game anymore, you want to drive it. To change it. the DMI SPECIALIST online Digital Strategy and Planning certification is perfect for you to become an online digital marketer. Become a member and connect to the industry and white-hot opportunities. Here is power. The power to influence. To speak to billions of people. What’s New? Develop true Digital Marketing Strategy expertise with DMI Specialist. Learn digital communications, analytics, marketing automation and budget & strategy formulation from Industry Skills Experts. Learn every aspect of Digital Marketing Strategy across 9 modules of interactive learning to give you a highly relevant and deep knowledge of digital strategy, all wrapped up with the world’s most recognized digital marketing certification on completion. Program learning outcomes and content: WHAT WILL I LEARN? We give you the thinking and tools to become a leading player on the digital stage. Create powerful and dynamic digital strategy. See it manifest into real world, business-changing action. The modules are building blocks – of knowledge, of your vision, of the leading Certified Digital Marketing Specialist – Digital Strategy & Planning that is you. Here is what you need to know. Course Content: Introduction: We bring science to thought. We have created the 3i Framework which is designed to help you select the best digital strategy for your organisation and make it happen. The 3i is smart and rigorous. It’s transformative. And you shall be impressed. This module introduces this nifty piece of brainwork. Later modules expand on it. • The fundamental concepts underpinning the DMI 3i Methodology. • The how-to’s of business strategy development. • Key components in an effective digital strategy. • Strategic management, a long-sighted look at lasting, growing success Traditional Communications: In this model, we explore how the marketing classics still anchor any campaign – yet the contemporary digital campaign is a far more fantastical vessel. We look deep into how our tech is changing the consumer experience, and how we must respond. Digital Communications: We are living through extraordinary times. The opportunities are as big, sprawling and diverse as the World Wide Web. The challenge too is bigger. Markets are sophisticated and fragmented. Now, more than ever, thy most know thy consumer (and thy digital channels). Here we look at: the fundamentals of digital communications planning, improving ROI, understanding your audience. Where can they be found? How to engage them? Budgeting for your digital strategy and effective resources reviewing, measuring, and analysing your digital strategy. Digital Channels: Facebook, Linkedin, Instagram, Twitter, Snapchat and so on. They multiply and they proliferate. Yet in this great distraction and fragmentation, there is also great opportunity. This module covers: inbound and outbound strategies, cross media planning, the digital channel mix, and mobile marketing social media marketing. Content marketing that is relevant, timely and riveting the what, how and why of search engine marketing email marketing, affiliate marketing, and marketing automation display and video advertising best practice. Because we have eyes to see. Marketing Automation: Automation doesn’t beat inspiration but it sure makes a marketeer’s life easier and more exciting. Here is superpower, working quieting and perfectly under your orders, night and day. See how smart businesses are sharpening their edge with CRM software for better sales enablement, lead nurturing and way more. Budget & Resourcing: Money makes marketing go round. But value is where it’s at. This model goes deep on how to hit max ROI for any given budget. Then some consideration for that other precious resource, human talent. Explore: • Key factors to consider when planning a marketing budget. • Setting that marketing budget. • How to monitor and optimize a budget during campaign, execution. • The human element. • Recruit, train and keep top people. Big Data & Analytics: The Big Data & Analytics module will provide you with a broad understanding of Big Data, Advanced Analytics and Artificial Intelligence. You will learn the fundamental frameworks and understand how cutting-edge analytics tools are being used to help businesses succeed wildly. Digital Leadership: We are living in extraordinary times, which call for extraordinary leaders. That means you. You shall lead the transition from the remnants of traditional marketing and into the brave, new digital marketing world which you are helping to invent. And you shall lead with razor-sharp thought and strategy. You shall take your brand and your organisation to places yet undreamed of. Strategy Formulation & Plan: By now, you’ll have come a long way. You are (almost) ready to go forth, carve out new and unexplored neural pathways and digital markets. You are standing on the very edge of the leading-edge, and you are just about ready to spread those new digital super-wings and soar. But first, the ultimate strategy module; the ultimate in strategy. DURATION 8-10 Weeks WHATS INCLUDED Course Material Case Study Experienced Lecturer Refreshments Certificate
DDOS demystified training course description This course covers DDOS attacks and how to defend against them. The course starts by studying DOS attacks and then DDOS attack. Reflectors, booters and stressers are followed by reflection and amplification. Once the various DDOS attacks have been covered we then study the ways to defend against DDOS attacks. What will you learn Describe DDOS. Explain how DDOS attacks work. Recognise DDOS attack types. Describe how to defend DDOS attacks. DDOS demystified training course details Who will benefit: Anyone involved in network security. Prerequisites: Network fundamentals Duration 1 day DDOS demystified training course contents What is DOS? Denial Of Service, outages, Attackers, Command and control, Bots. Why DOS? What is DDOS? Distributed, reflectors, botnets, botnet topologies, amplification, attack bandwidth, attack vectors, booters, stressers, backscatter, DirtJumper, XOR. RUDY. High and Low orbit Ion Cannon. Attack types Application layer attacks, HTTP flood, protocol attacks, SYN floods, teardrop, volumetric attacks, slowloris, DNS cachebusting, fraggle, smurf. IP address spoofing. Reflectors Reflector attacks, amplification attacks, quotients, embedded devices, DNS, NTP, SSDP. DDOS defence Protecting devices from becoming bots. Onsite, outsourced scrubbing, Defending self, defending the Internet, Black hole routing, rate limiting, intelligent application firewalls, anycast, IPS, upstream filtering, BCP38, BCP 140. uRPF.
Frame Relay training course description A comprehensive look at Frame Relay, particularly with reference to a IP routed environment. Note this course is run as a workshop and therefore the contents are flexible. What will you learn Recognise the issues of using Frame Relay Describe Frame Relay. Configure a Cisco router to use Frame relay. Frame Relay training course details Who will benefit: Anyone working with Frame Relay. Prerequisites: Intro to data communications & networking Duration 1 day Frame Relay training course contents Introduction Packet switched networks, PVCs, SVCs. Topologies, Full mesh, partial mesh, Hub and spoke. Basics DLCI, CIR, LMI, the local loop. Configuring routers for Frame Relay Inverse ARP, static mappings, subinterfaces More Frame Relay Burst rates, FECN, BECN, the DE bit, Traffic shaping. Voice Over Frame Relay
Definitive SRv6 course description This one day SRv6 training course is a condensed, intensive program designed to provide network professionals with a fast-track introduction to SRv6 (Segment Routing over IPv6). SRv6 is a revolutionary networking technology that combines the power of IPv6 with the flexibility of Segment Routing, enabling efficient and scalable network operations. In just one day, participants will gain essential knowledge and practical skills to understand, configure, and work with SRv6 in modern network environments. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Explain packet paths when implementing SLB. Explain how SRv6 works. Explain the difference between SR and SRv6. Implement SRv6. Troubleshoot SRv6. Definitive SRv6 course details Who will benefit: Network engineers, architects, and administrators who want to quickly grasp the fundamentals of SRv6 and its practical applications in their network. Prerequisites: Definitive Segment Routing for engineers Duration 1 day Definitive SRv6 course contents Introduction to SRv6 What is SRv6? Source based routing, difference between SR-MPLS and SRv6. IPv6 headers review, routing headers. SRv6 simplified solution. Hands on Enabling IPv6 in the legacy network. SRv6 transport Segment Routing Extension Header. SRv6 segment identifiers. End SID, End.X SID. ISIS distribution of SIDs. Header processing in a SRv6 topology. Locators. Hands on Configuring SRv6 transport. Analysing SRv6 operation. SRv6 services End.DT4 SID, End.DT6 SID. SRH encapsulation modes: Insert and Encap modes. SRv6 TE policy. Hands on Migrating to SRv6, TI-LFA protection. Micro loop avoidance. SRv6 integration with 'older' technologies MPLS. The role of iBGP and eBGP v6 sessions. Hands on Integration with legacy network. Troubleshooting SRv6 SRv6 ping and traceroute. Hands on: Used throughout the course during exercises.
Jenkins training course description An introduction to Continuous Integration and development (CI/CD) in network automation using Jenkins. The course focusses specifically on the network Devops case of using Jenkins. What will you learn Explain how Jenkins can help with network automation. Configure Jenkins for network Devops. Use Jenkins for network automation. Jenkins training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 1 day Jenkins training course contents What is Jenkins? DevOps, CI/CD, version control systems, git, automating execution of tasks, Jenkins job, Jenkins pipeline, Jenkins plugins, CI server. Hands on Installing Jenkins. Example pipeline for network automation YAML, GitHub, Jenkins, ansible, network devices. Hands on Investigating a workflow: Auto deploying network configurations. Configuring Jenkins Code repository, build triggers, gerrit and reviews, build environment. A Jenkins job, build step, post build actions, running a Jenkins job, build log, home directory. Hands on Configuring Jenkins. CI using Jenkins Branches, pipeline, git, the git plugin. Hands on A Jenkins job to poll, build and unit test network configurations.