Duration 1 Days 6 CPD hours This course is intended for Technical leaders Overview This course provides general overview of Blockchain technology and is specifically designed to answer the following questions:What is Blockchain? (What exactly is it?)Non-Technical Technology Overview (How does it work?)Benefits of Blockchain (Why should anyone consider this?)Use Cases (Where and for what apps is it appropriate?)Adoption (Who is using it and for what?)Implementation (How do I get started?)Future of Blockchain (What is its future?) This instructor-led 1 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms. What is Blockchain? A record keeping system Trust Decentralization Trustless environment How does Blockchain work? Announcements Blocks Nodes Chaining Verification Consensus Scalability Privacy Crypto Hashing Digital Fingerprinting PoW vs PoS Types of Blockchains Public vs Private Open vs closed Smart Contracts Blockchain as History Tokens / Coins Gas How is Blockchain different from what we have today? Decentralized Peer-to-peer architecture Software vs Firmware Database vs Blockchain Distributed database or other technology? Data Sovereignty Group Consensus What are Use Cases for Blockchain? Use Case Examples Currency Banking Services Voting Medical Records Supply Chain / Value Chain Content Distribution Verification of Software Updates (cars, planes, trains, etc) Law Enforcement Title and Ownership Records Social Media and Online Credibility Fractional asset ownership Cable Television billing High fault tolerance DDoS-proof Public or Private Blockchain? Who are the participants? What does a Blockchain app look like? DApp Resembles typical full stack web application Any internal state changes and all transactions are written to the blockchain Node.js IDE Public Blockchain visibility Private Blockchain solutions Oracles How do I design a Blockchain app? What does this solution need to let users do? Will the proposed solution reduce or remove the problems and pain points currently felt by users? What should this solution prevent users from doing? Do you need a solution ready for heavy use on day 1? Is your solution idea enhanced by the use of Blockchain? Does the use of Blockchain create a better end-user experience? If so, how? Has your business developed custom software solutions before? What level of support are you going to need? How big is the developer community? Does your vision of the future align with the project or platform's vision of the future? Does the platform aim to make new and significant contributions to the development space, or is it an efficiency / cost play? Should the solution be a public or private Blockchain? Should the solution be an open or closed Blockchain? Create a plan for contract updates and changes! Hybrid solutions Monetary exchanges? How do I develop a Blockchain app? AGILE approach pre-release Define guiding principles up front Software vs Firmware Announcements, not transactions! Classes, not contracts Link contracts to share functions Use calling contracts to keep contract address the same Hyperledger vs Ethereum CONSIDER No of Users * Avg No of Transactions (state changes) per User Should a Blockless solution be applied? Performance Security Anonymity Security Monolithic vs Modular Sandwich complexity model How do I test a Blockchain app? Recommend 5x to 10x traditional application testing time Security Networks Additional course details: Nexus Humans Blockchain - An Overview for Business Professionals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Blockchain - An Overview for Business Professionals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators Overview By the end of the course, you should be able to meet the following objectives: Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of intrusion detection and intrusion prevention systems Differentiate between Malware Prevention approaches Describe the VMware intrinsic security portfolio Implement Zero-Trust Security using VMware NSX segmentation Configure user and role management Configure and troubleshoot Distributed Firewall, Identity Firewall, and time-based policies Configure and troubleshoot Gateway Security Use VMware vRealize Log Insight⢠for NSX⢠and VMware vRealize Network Insight⢠to operate NSX firewalls Explain the security best practices related to grouping, tagging, and rule configuration Describe north-south and east-west service insertion Describe endpoint protection Configure and troubleshoot IDS/IPS Deploy NSX Application Platform Configure and troubleshoot NSX Malware Prevention Describe the capabilities of NSX Intelligence and NSX Network Detection and Response This five-day, hands-on training course provides you with the knowledge, skills, and tools to achieve competency in configuring, operating, and troubleshooting VMware NSX-T? Data Center for intrinsic security. In this course, you are introduced to all the security features in NSX-T Data Center, including Distributed Firewall and Gateway Firewall, Intrusion Detection and Prevention (IDS/IPS), NSX Application Platform, NSX Malware Prevention, VMware NSX© Intelligence?, and VMware NSX© Network Detection and Response?.In addition, you are presented with common configuration issues and given a methodology to resolve them. Course Introduction Introductions and course logistics Course objectives Security Basics Define information-security-related concepts Explain the different types of firewalls and their use cases Describe the operation of IDS/IPS Differentiate between Malware Prevention approaches VMware Intrinsic Security Define the VMware intrinsic security strategy Describe the VMware intrinsic security portfolio Explain how NSX-T Data Center aligns with the intrinsic security strategy Implementing Zero-Trust Security Define Zero-Trust Security Describe the five pillars of a Zero-Trust Architecture Define NSX segmentation and its use cases Describe the steps needed to enforce Zero-Trust with NSX segmentation User and Role Management Integrate NSX-T Data Center and VMware Identity Manager? Integrate NSX-T Data Center and LDAP Describe the native users and roles in NSX-T Data Center Create and assign custom user roles Distributed Firewall Configure Distributed Firewall rules and policies Describe the NSX Distributed Firewall architecture Troubleshoot common problems related to NSX Distributed Firewall Configure time-based policies Configure Identity Firewall rules Gateway Security Configure Gateway Firewall rules and policies Describe the architecture of the Gateway Firewall Identify and troubleshoot common Gateway Firewall issues Configure TLS Inspection to decrypt traffic for both internal and external services Configure URL filtering and identify common configuration issues Operating Internal Firewalls Use vRealize Log Insight for NSX and vRealize Network Insight to operate NSX firewalls Explain security best practices related to grouping, tagging, and rule configuration Network Introspection Explain network introspection Describe the architecture and workflows of north-south and east-west service insertion Troubleshoot north-south and east-west service insertion Endpoint Protection Explain endpoint protection Describe the architecture and workflows of endpoint protection Troubleshoot endpoint protection Intrusion Detection and Prevention Describe the MITRE ATT&CK framework Explain the different phases of a cyber attack Describe how NSX security solutions can be used to protect against cyber attacks Configure and troubleshoot Distributed IDS/IPS Configure and troubleshoot North-South IDS/IPS NSX Application Platform Describe NSX Application Platform and its use cases Identify the topologies supported for the deployment of NSX Application Platform Deploy NSX Application Platform Explain the NSX Application Platform architecture and services Validate the NSX Application Platform deployment and troubleshoot common issues NSX Malware Prevention Identify use cases for NSX Malware Prevention Identify the components in the NSX Malware Prevention architecture Describe the NSX Malware Prevention packet flows for known and unknown files Configure NSX Malware Prevention for east-west and north-south traffic NSX Intelligence and NSX Network Detection and Response Describe NSX Intelligence and its use cases Explain NSX Intelligence visualization, recommendation, and network traffic analysis capabilities Describe NSX Network Detection and Response and its use cases Explain the architecture of NSX Network Detection and Response in NSX-T Data Center Describe the visualization capabilities of NSX Network Detection and Response
Duration 5 Days 30 CPD hours This course is intended for Experienced VMware administrators, automation and orchestration specialists, system integrators, and private cloud and public cloud administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the features and benefits of integrating vRealize Orchestrator and vRealize Automation Describe the role of vRealize Orchestrator workflows and content elements in automation Use the vRealize Orchestrator client to access and navigate the vRealize Orchestrator platform Use the vRealize Orchestrator client to import and run vRealize Orchestrator library workflows Design, develop, and run custom reusable vRealize Orchestrator workflows Integrate vRealize Automation with vRealize Orchestrator to deliver custom IT services Use the vRealize Automation event broker service to trigger specific vRealize Orchestrator workflows or ABX Actions Leverage the event broker to extend IaaS (Infrastructure-as-a-Service) machine lifecycle processes Use XaaS to extend vRealize Automation into other enterprise systems Use VMware APIs to run vRealize Orchestrator workflows Use the vSphere Client Code Capture feature During this five-day course, you focus on using VMware vRealize© Orchestrator? to extend the functionality of VMware vRealize© Automation?. You learn how to provide XaaS (Anything as a Service) and implement Machine Lifecycle Extensibility using the VMware vRealize© Automation? Event Broker. You also learn how to create vRealize Orchestrator workflows and vRealize Automation ABX actions. You learn about various features, including basic scripting implementation along with logic processing to implement a variety of functions to use in your environment. This course teaches implementing debugging, loops, conditions, and user interactions in vRealize Orchestrator. The course introduces the new vRealize Orchestrator HTML 5 interface, along with API calls and REST functions, to give you the groundwork to implement a variety of plugins and scripts. This course is designed to give you the tools to craft custom solutions in the product. Course Introduction Introductions and course logistics Course objectives Overview of vRealize Automation and vRealize Orchestrator Define the purpose of vRealize Automation Outline the purpose of vRealize Orchestrator Describe the main components of vRealize Automation Describe the main components of vRealize Orchestrator Creating Schema Elements Invoking JavaScript from a vRealize Orchestrator workflow Invoking a vRealize Orchestrator Workflow from a vRealize Orchestrator workflow Invoking an action from a vRealize Orchestrator workflow Using vRealize Orchestrator workflows both synchronously and asynchronously Working with Variables Defining inputs, outputs, and variables in vRealize Orchestrator workflows Binding variables in vRealize Orchestrator workflows Wrapping vRealize Orchestrator workflows Using APIs and the API Explorer Creating actions in vRealize Orchestrator Using vRealize Orchestrator input forms Handling user interactions in vRealize Orchestrator Handling Exceptions, Logging, and Debugging Handling exceptions in vRealize Orchestrator workflows Using logs in vRealize Orchestrator workflows Debugging vRealize Orchestrator workflows Branching and Looping Using branching in vRealize Orchestrator workflows Using loops in vRealize Orchestrator workflows Working with Assets Using configuration elements in vRealize Orchestrator Using resources in vRealize Orchestrator Using packages in vRealize Orchestrator Working with Plug-Ins Downloading and installing Plug-Ins Using the SSH plug-In in vRealize Orchestrator Using the REST plug-in in vRealize Orchestrator Using the vRealize Automation plug-in in vRealize Orchestrator Using the PowerShell plug-in in vRealize Orchestrator Working with Versioning and Git Using versioning in vRealize Orchestrator Using Git in vRealize Orchestrator Scheduling, Sleeping, and Waiting Using scheduling in vRealize Orchestrator Using sleeping in vRealize Orchestrator Using waiting in vRealize Orchestrator Introduction to vRealize Automation Extensibility Introduction to extensibility Using ABX actions Using Python Using Nodejs Using PowerShell Using vRealize Automation Lifecycle Extending vRealize Automation with Event Broker Overview of vRealize Automation Event Broker Creating vRealize Automation subscriptions Data exchange between vRealize Automation and vRealize Orchestrator Using ABX Actions Overview of Action Based Extensibility (ABX) Comparison of vRealize Orchestrator and ABX Creating ABX Actions scripts, REST, and flows Using Day-2 Actions in vRealize Automation Describe the visualization capabilities of NSX Network Detection and Response Working with Services, Custom Resources, and Resource Actions Using vRealize Orchestrator as a content source in vRealize Automation Creating custom resources in vRealize Automation Creating resource actions in vRealize Automation Using Day-2 Actions in vRealize Automation Using vSphere Client Code Capture Enabling vSphere Client code capture Using vSphere Client code capture to capture code in vRO, Javascript, PowerCLI or other languages. Using the captured code in vRealize Orchestrator workflows or actions.
Duration 5 Days 30 CPD hours This course is intended for Channel Partner / Reseller Customer Employee Overview At course completion students will be able to: - Explain the need for QoS, describe the fundamentals of QoS policy, and identify and describe the different models that are used for ensuring QoS in a network - Explain the use of MQC and AutoQoS to implement QoS on the network and describe some of the mechanisms used to monitor QoS implementations - Given a converged network and a policy defining QoS requirements, classify and mark network traffic to implement the policy - Use Cisco QoS queuing mechanisms to manage network congestion - Use Cisco QoS congestion avoidance mechanisms to reduce the effects of congestion on the network - Use Cisco QoS traffic policing and traffic shaping mechanisms to effectively limit the rate of network traffic - Given a low speed WAN link, use Cisco link efficiency mechanisms to improve the badwidth efficiency of the link - Describe the recommended best practices and methods used for end-to-end QoS deployment in the enterprise This course provides students with knowledge of IP QoS requirements, conceptual models such as best effort, IntServ, and DiffServ, and the implementation of QoS on Cisco platforms. Introduction to QoS Review Converged Networks Understand QoS Describe Best-Effort and Integrated Services Models Describe the Differentiated Services Model Module Summary Module Self-Check Implement and Monitor QoS MQC Introduction Monitor QoS Define Campus AutoQoS Define WAN AutoQoS Module Summary Module Self-Check Lab 2-1: IP SLA Setup and QoS Baseline Measurement Lab 2-2: Configuring QoS with Cisco AutoQoS Classification and Marking Classification and Marking Overview Case Study 3-1: Classification and Marking MQC for Classification and Marking NBAR for Classification Use of QoS Preclassify Campus Classification and Marking Module Summary Module Self-Check Lab 3-1: Classification and Marking Using MQC Lab 3-2: Using NBAR for Classification Lab 3-3: Configuring QoS Preclassify Lab 3-4: Campus Classification and Marking Using MQC Congestion Management Queuing Introduction Configure WFQ Configure CBWFQ and LLQ Configure Campus Congestion Management Module Summary Module Self-Check Lab 4-1: Configuring Fair Queuing Lab 4-2: Configuring LLQ-CBWFQ Lab 4-3: Configuring Campus-Based Queuing Mechanisms Congestion Avoidance Congestion Avoidance Introduction Configure Class-Based WRED Case Study 5-1: WRED Traffic Profiles Configure ECN Describe Campus-Based Congestion Avoidance Module Summary Module Self-Check Lab 5-1: Configuring DSCP-Based WRED Lab 5-2: Configuring WTD Thresholds Traffic Policing and Shaping Traffic Policing and Shaping Overview Configure Class-Based Policing Campus Policing Configure Class-Based Shaping Configure Class-Based Shaping on Frame Relay Interfaces Configure Frame Relay Voice-Adaptive Traffic Shaping and Fragmentation Module Summary Module Self-Check Lab 6-1: Configuring Class-Based Policing Lab 6-2: Configuring Class-Based Shaping Link Efficiency Mechanisms Link Efficiency Mechanisms Overview Configure Class-Based Header Compression Configure LFI Module Summary Module Self-Check Lab 7-1: Configuring Class-Based Header Compression Lab 7-2: Configuring LFI Deploying End-to-End QoS Apply Best Practices for QoS Policy Design End-to-End QoS Deployments Module Summary Module Self-Check Lab 8-1: Mapping Enterprise QoS Policy to the Service Provider Policy Additional course details: Nexus Humans Cisco Implementing Cisco Quality of Service v2.5 (QOS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Quality of Service v2.5 (QOS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Developers and architects who will be developing applications for iOS devices. In this course you'll be shown a complete introduction to iPhone and iPad development, emphasizing the newest technologies and best practices for iOS. Introduction & Setup Start Here Joining the Apple iOS Developer Program Installing Xcode and the iOS SDK A Guided Tour of Xcode An Introduction to Xcode Playgrounds Swift Programming Language Swift Data Types, Constants, and Variables Swift Operators and Expressions Swift Flow Control The Swift Switch Statement An Overview of Swift Functions The Basics of Object Oriented Programming in Swift An Introduction to Swift Subclassing and Extensions Working with Array and Dictionary Collections in Swift Understanding Error Handling in Swift Views, Layouts, & Storyboards iOS Application and Development Architecture Creating an Interactive iOS App Understanding Views, Windows and the View Hierarchy An Introduction to Auto Layout in iOS Working with iOS Auto Layout Constraints in Interface Builder Implementing iOS Auto Layout Constraints in Code Implementing Cross-Hierarchy Auto Layout Constraints in iOS Understanding the iOS Auto Layout Visual Format Language Using Trait Variations to Design Adaptive User Interfaces Using Storyboards in Xcode An Overview of iOS Table Views Using Xcode Storyboards to Build Dynamic TableViews Implementing TableView Navigation Working with the iOS Stack View Class A Guide to Multitasking in iOS Implementing a Page based iOS Application using UIPageViewController Data Storage with Files, iCloud, & Databases Working with Directories in Swift on iOS Working with Files in Swift on iOS Preparing an iOS App to use iCloud Storage Managing Files using the iOS UIDocument Class Using iCloud Storage in an iOS Application Synchronizing iOS Key-Value Data using iCloud iOS Database Implementation using SQLite Working with iOS Databases using Core Data CloudKit Data Storage on iOS Touch, Taps, & Gestures An Overview of iOS Multitouch, Taps and Gestures An Example iOS Touch, Multitouch and Tap Application Detecting iOS Touch Screen Gesture Motions Identifying Gestures using iOS Gesture Recognizers iOS 3D Touch Implementing TouchID Authentication in iOS Apps Advanced View Options Drawing iOS 2D Graphics with Core Graphics Interface Builder Live Views and iOS Embedded Frameworks Using Core Graphics and Core Image iOS Animation using UIViewPropertyAnimator iOS UIKit Dynamics iOS Sprite Kit Programming iOS Multitasking, Background Transfer Service and Fetching iOS Application State Preservation and Restoration Integrating Maps into iOS Applications Getting Location Information using the iOS Core Location Framework Extensions An Introduction to Extensions in iOS An iOS Today Extension Widget Tutorial Creating an iOS Photo Editing Extension Creating an iOS Action Extension Receiving Data from an iOS Action Extension Building iOS Message Apps Using Event Kit to Create Date and Location Based Reminders Multimedia and Social Media Accessing the iOS Camera and Photo Library iOS Video Playback using AVPlayer and AVPlayerViewController An iOS Multitasking Picture in Picture Tutorial Playing Audio on iOS using AVAudioPlayer Recording Audio on iOS with AVAudioRecorder iOS Speech Recognition Introduction to SiriKit Integrating Twitter and Facebook into iOS Applications The App Store Making Store Purchases with SKStoreProductViewController Class Building In-App Purchasing into iOS Applications Configuring and Creating App Store Hosted Content for iOS In-App Purchases Preparing and Submitting an iOS Application to the App Store Additional course details: Nexus Humans iOS App Development Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the iOS App Development Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course has been expressly designed for the Business Analyst, Business System Analyst, System Analyst, and/or Requirements Engineer. The Designer, Developer and Tester who are actively involved in utilizing use cases may also benefit from this workshop. Overview Employ use cases to elicit requirements, at a business, system or subsystem levelEmploy use cases to document the scope of a projectWrite use cases in a clear and unambiguous way.Model use cases with workflow diagramsPlan and divide up the project work based on your use casesManage a use case as it evolves over time and goes through many changes This course provides a strong foundation in the mechanics of use case diagramming and writing textual descriptions of use cases. In this highly interactive workshop, you will learn how to enhance and refine your use case skills, how to involve your stakeholders in the use case process, and how to develop use cases that provide valuable information to the designers and testers. Use cases that meet the needs of designers can be too technical and too detailed for other stakeholders. Use cases that satisfy business users are usually not very helpful to designers and testers. How do you satisfy these two disparate interests? And how do you handle the details like business rules, data validations and user interface specifications? Introduction Course objectives Understanding of business analysis Knowledge areas of BABOK© Guide Overview of Use Cases Describe the purpose and value of a use case approach Use case terminology Introducing a use case approach Needs Assessment Purpose of Needs Assessment Needs Assessment and use cases Defining and understanding the strategic goals and objectives Understanding the business process Identifying actors Identifying business information Analyzing locations and operations Drawing the business use case diagram Building the business architecture Defining solution options Defining System Scope Product scope/project scope System actors versus business actors Analyzing the business process model Analyzing business use cases Identifying candidate use cases Identifying scenarios Diagramming use cases Draw a use case diagram Create a use case catalog Evaluating, Prioritizing, and Packaging Use Cases Iterative nature of this work Evaluating use cases Use case priority Use case risk Use case complexity Use case dependencies Evaluate and Prioritize use cases Dividing work up between releases Packaging A process for how to perform packaging Writing the Main Success Scenario Use case descriptions Primary and secondary goals Assumptions Pre-conditions Triggers Post-conditions Scenario example Main success scenario Conditional execution Use cases and requirements Best practices for writing a use case description Writing the Other Scenarios Scenarios and flows Alternate scenarios and flows Alternate vs. basic flow Guidelines for alternate flows Exception flows Failed post conditions Write alternate and exception flows Process Modeling to Describe Use Case Flows UML© Activity Diagram Notation Sequencing activities Developing an activity diagram Facilitated sessions Draw a UML© Activity Diagram Using Advanced Diagramming Techniques Commonality Dependency Relationships Identify relationships Comparing the different relationships Developing a Requirements Specification Requirements and use cases Detailed requirements Common approaches to specifications Non-functional requirements Write non-functional requirements User interface requirements UI data descriptions Business rules Decision tables and inference rules How to document simple calculations Reporting requirements Data requirements Data accessibility requirements Traceability Course Summary Wrap-up Finding more information Additional course details: Nexus Humans BA28 - Requirements Analysis and Use Cases training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA28 - Requirements Analysis and Use Cases course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Why Agile Practices Haven't Taken Over the World Yet Agile practices are without a doubt the most optimal way to handle any project, so why are organizations still dithering and trying to incorporate hybrid solutions? This video will help you understand the 5 major impediments that are preventing your organization from embracing Agile practices. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.
Why Agile Practices Haven't Taken Over the World Yet Agile practices are without a doubt the most optimal way to handle any project, so why are organizations still dithering and trying to incorporate hybrid solutions? This video will help you understand the 5 major impediments that are preventing your organization from embracing Agile practices. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.
Developing Predictable Agile Roadmaps When will this project be done? This is the million dollar question agile teams and organizations often grapple with when communicating with stakeholders. Attendees will learn how to build realistic road maps in order to have meaningful conversations with leadership teams, allowing them to confidently predict, set expectations, and facilitate organizational decision making. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.