Business Intelligence Business Intelligence (BI) refers to a set of technology-based techniques, applications, and practices used to aggregate, analyze, and present business data. BI practices provide historical and current views of vast amounts of data and generate predictions for business operations. The purpose of Business Intelligence is the support of better business decision making. This course provides an overview of the technology and application of BI and how it can be used to improve corporate performance. What you will Learn You will learn how to: Specify a data warehouse schema Identify the data and visualization to be used for data mining and Business Intelligence Design a Business Intelligence user interface Getting Started Introductions Agenda Expectations Foundation Concepts The challenge of decision making What is Business Intelligence? The Business Intelligence value proposition Business Intelligence taxonomy Business Intelligence management issues Sources of Business Intelligence Data warehousing Data and information Information architecture Defining the data warehouse and its relationships Facts and dimensions Modeling, meta-modeling, and schemas Alternate architectures Building the data warehouse Extracting Transforming Loading Setting up the data and relationships Dimensions and the Fact Table Implementing many-to-many relationships in data warehouse Data marts Online Analytical Processing (OLAP) What is OLAP? OLAP and OLTP OLAP functionality Multi-dimensions Thinking in more than two dimensions What are the possibilities? OLAP architecture Cubism Tools OLAP variations - MOLAP, ROLAP, HOLAP BI using SOA Applications of Business Intelligence Applying BI through OLAP Enterprise Resource Planning and CRM Business Intelligence and financial information Business Intelligence User Interfaces and Presentations Data access Push-pull data access Types of decision support systems Designing the front end Presentation formats Dashboards Types of dashboards Common dashboard features Briefing books and scorecards Querying and Reporting Reporting emphasis Retrofitting Talking back Key Performance Indicators Report Definition and Visualization Typical reporting environment Forms of visualization Unconstrained views Data mining What is in the mine? Applications for data mining Data mining architecture Cross Industry Standard Process for Data Mining (CISP-DM) Data mining techniques Validation The Business Intelligence User Experience The business analyst role Business analysis and data analysis Five-step approach Cultural impact Identifying questions Gathering information Understand the goals The strategic Business Intelligence cycle Focus of Business Intelligence Design for the user Iterate the access Iterative solution development process Review and validation questions Basic approaches Building ad-hoc queries Building on-demand self-service reports Closed loop Business Intelligence Coming attractions - future of Business Intelligence Best practices in Business Intelligence
RESILIA™ Foundation AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
Classroom Asset Management course in London. This IAM Certificate course will be hosted in London UK from the 20th November 2023.
RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
Classroom/in-person IAM Diploma course in Central London UK. Get trained in Advanced Asset Management.
Business Relationship Management Professional (BRMP)® Business Relationship Management (BRM) embodies a set of competencies (knowledge, skills, and behaviors) to foster an effective business value-producing relationship between a service provider and its business partners. The BRM Discipline rests on solid research-based foundations verified and enhanced over a decade of successful implementations in leading organizations across the world. Proven to be equally effective for shared services including Human Resources, Finance, Legal, external service providers and others, BRM practices have enjoyed widespread adaptation in IT. The Business Relationship Management Professional (BRMP) training and certification program provides a foundational understanding of business relationship management (BRM) for individuals at every experience level, with the training and certification designed to provide a solid baseline level of knowledge. In other words, this course provides the 'why' and the 'what' - 'why' business relationship management is important to your organization and 'what' a BRM capability does to add value to your organization. This interactive course, with discussions, partnering activities, and periodic knowledge checks, will provide you with the opportunity to apply learning to your unique organizational situations, creating solutions that you can use immediately upon returning to your workplace. This practical knowledge will allow you to demonstrate immediate value in your role, as well as prepare you for the BRMP Certification exam. What You Will Learn This course provides a foundational understanding of Business Relationship Management. Upon completion of the BRMP® course, participant will be able to demonstrate their understanding: Explain what business relationship management is and the value it provides to an organization Articulate the need for an organization to move beyond traditional goals of profit and products to encompass those that are appropriate for a relationship-centered organization Describe the importance of integrating business relationship management into every element of their organization Define the importance of educating their organization that a mature BRM capability will evolve culture, build partnerships, drive value, and satisfy purpose Apply business relationship management to their organization's triple bottom line of people, purpose, and planet Explain the basic knowledge, skills, and mindsets of the business relationship management role Clarify the core business relationship management approaches, tools, and templates used to achieve results Illustrate the value and impact the BRM capability has on an organization by completing a draft of the BRM Capability Workbook BRM Introduction - The Bigger Picture Why BRM = why now? Relationship-centered organization Theory of 'relationshipism' Triple bottom line BRM defined Activity domains BRM challenges BRM Capability BRM capability framework Organizational purpose and strategy Now-to-new Evolve culture Build partnerships Drive value Satisfy purpose Limitless growth and improvement BRM Capability - Evolve culture Evolve culture framework Purposeful narrative Desired behaviors Influential relationships Personal growth BRM Capability - Build partnerships Build partnerships framework BRM role competency model Relationship maturity and quality Partnering mindsets Relationship discovery Relationship nurturing BRM Capability - Drive value What is value? Types of value Sources of value Drive value framework BRM role competency model Value discovery Value realization Value results BRM Capability - Satisfy purpose Satisfy purpose framework BRM role competency model Through the BRM capability Through the triple bottom line Social value BRM Capability - Wrap-up Evolve culture capability framework Build partnerships capability framework Drive value capability framework Satisfy purpose capability framework BRM Role Our purpose and what we believe Role clarity Single point of focus BRM Code of Ethics BRM Role Competency Model BRM mindset Scope of BRM role BRM role with organizational factors BRM Team Our purpose and what we believe BRM team definition BRM team purpose, mission, and vision Assessing the value of a BRM team Organizing a BRM team Leading a BRM team Transition management Coaching BRMs Closing - BRM Key Learnings Key learnings from each module Closing - BRMP Course Wrap-Up What to do in the next 30/60/90/365 days Digital badge After passing the exam Recap learning objectives Review learning objectives Review expectations Course feedback
Every organisation needs leaders who can think and act strategically. This program will help you clarify: Why you exist (strategic purpose) Where you are now (strategic assessment) Where you want to go (strategic development) How to get there (strategic execution)
Overview This course has been created to help safely navigate attendees through the minefield of absence management, paying attention to issues of systems, procedures and organisational culture along the way. Using a selection of exercises, activities and sample documents, the course examines some traditional methods of management as well as some more contemporary and innovative ways of keeping a lid on casual absence. Attendees will take away a number of practical tools and ideas to enable them to target performance improvement when back at their desks. Description It’s estimated that absence from work costs the UK economy over £13 billion per year, with the ‘average’ employee taking around seven days off sick annually. The need for managers, HR people and leaders to control absenteeism is critical if a company is to survive and prosper. But just what is ‘absence’? And how do we go about managing it and reducing it wherever we can, without falling foul of employment law? As well as the usual training material, attendees on this course also receive several useful handouts and exercises relating to absence management. Topics covered: An Absence Management Model – this section identifies a simple model for managers to apply when dealing with absenteeism Defining Absence – the text book definition will help learners clearly understand what is meant by absence Types of Absence – unravelling the different types of absence and distinguishing between absence and leave Classifying Absence – by classifying types of absence, the learner can begin to get a steer on how to manage it Statistics – identifying the real cost of absence and looking at regional and sector differences Reasons for Absence – considering the high-level issues that have an impact on absence, like culture and job design Causes of Sickness – here the national league tables of sickness causes are discussed, giving the learner the chance to reflect on their own team or company Absence Management – Stage 1 – contracts, policies, procedures and legal entitlements are all examined here, to allow learners to get a grasp of what they have to know to Absence Management – Stage 2 – record keeping, costing absence and benchmarking provide the chance for analysis and understanding in the context of the learner’s own organisation Absence Management – Stage 3 – setting out the skills and interventions that managers need to apply in the effective management of absence, including: communication, professional advice, workplace issues and return to work interviews Traditional Approaches – an examination of performance management, sick pay, discipline, recruitment and selection and how these can lend themselves to effective absence management Reducing Absenteeism – through less traditional approaches, looking at ‘carrots and sticks’, targets, employee assistance, unusual initiatives and organisational culture. Recent Developments – considering the impact of ‘fit notes’ and potential pandemics. Who should attend This course has been designed for anyone that deals with absence or needs to have an awareness of the absence management process. This could include; Team leaders, supervisors, managers, HR professionals and anyone else involved in the management of people or organisations. Requirements for Attendance None.