Duration 3 Days 18 CPD hours This course is intended for This course is geared for anyone needing to interface with an Oracle database such as end users, business analysts, application developers and database administrators / DBAs. Overview Working within in a hands-on learning environment, guided by our expert team, attendees will develop a practical approach to Oracle Database Technology. Throughout the course participants will explore: Using PL/SQL programming language for database applications and development incorporating PL/SQL modules within the application architecture from the initial design and planning phase The essentials of building executable PL/SQL program units Each of the major segments of a working program and how these interact with each other during program execution Important error or exception handling capabilities of the language. How database-resident program units can be used as part of the overall database application architecture Applying these new skills to the development of PL/SQL packages. Advanced database programming capabilities and benefits How database triggers can be used as part of an advanced database application design Oracle 19c PL/SQL Fundamentals is a three-day, hands-on course that introduces Oracle database programming using the PL/SQL programming language. Throughout the course students will explore the core syntax, structure and features of the language. This course will also lay the foundation for the entire Oracle PL/SQL programming series, allowing one to progress from introductory topics to advanced application design and programming and finally onto writing complex high-performance applications. The course also explores applying the newly learned skills to the development of database applications. Participants will learn how to use database-resident stored program units such as procedures, functions, packages and database triggers. Students will also learn about the latest features in Oracle 19c. Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL *Plus Setup JDeveloper About BIND and Substitution Variables Using SQL Developer Using SQL *Plus Choosing a Database Programming Language What is Database Programming PL/SQL Programming PL/SQL Performance Advantages Integration with Other Languages PL/SQL Language Essentials PL/SQL Program Structure Language Syntax Rules Embedding SQL Writing Readable Code Generating Readable Code Generating Database Output SQL * Plus Input of Program Block DECLARE Section About the Declare Section Declare Primitive Types Declaration Options Not Null Constant Data Dictionary Integration % Type Declare Simple User-Defined Types Type ? Table Type ? Record Extended User Defined Types BEGIN Section About the Begin Section Manipulating Program Data Logic Control & Braching GOTO LOOP IF-THEN-ELSE CASE EXCEPTION Section About the Exception Section Isolating the Specific Exception Pragma Exception_INIT SQLCODE &SQLERRM Example SQL%ROWCOUNT & Select ? Into Beyond the Basics : Explicit Cursors About Explicit Cursors Extend Cursor Techniques For Update of Clause Where Current of Clause Using for ? Loop Cursors Introduction Database Resident Programming Units About Database ? Resident Programs Physical Storage & Execution Types of Stored Program Units Stored Program Unit Advantages Modular Design Principles Creating Stored Procedures and Functions Stored Procedures & Functions Create Procedure / Create Function Creating Procedures & Functions Raise_Salary() Procedure Salary_Valid() function The Parameter Specification Default Clause System & Object Privileges Using the Development Tools Executing Stored Procedures and Functions Calling Procedures & Functions Unit Testing with Execute Anonymous Block Unit Testing Specifying a Parameter Notation SQL Worksheet Unit Testing Calling Functions from SQL Maintaining Stored Programming Units Recompiling Programs Mass Recompilation Using UTL_RECOMP() Dropping Procedures & Functions Drop Procedures & Functions Drop Procedure / Function Data Dictionary Metadata Using USER_OBJECTS Using USER_SOURCE Using USER_ERRORS Using USER_OBJECT_SIZE Using USER_DEPENDENCIES Managing Dependencies Dependency Internals Tracking Dependencies The Dependency Tracking Utility SQL Developer Dependency Info Dependency Strategy Checklists Creating & Maintaining About Packages Creating Packages Maintaining Packages Performance Considerations Advanced Package Capabilities Definer & Invoker Rights White Lists & Accessible By Persistent Global Objects Defining Initilization Logic Object Orientation Support Advanced Cursor Techniques Using Cursor Variables Using SYS_REFCURSOR Using Cursor Expressions Using System Supplied Packages DBMS_OUTPUT() UTL_FILE() FOPEN() Example Database Trigger Concepts About Database Triggers DML Event Trigger Sub-Types Database Trigger Scenario Trigger Exhaustion Mechanisms Trigger within SQL Worksheet Creating Database Triggers Statement Level Triggers Using Raise Application_Error() Row-Level Triggers Examples of Triggers Employee_Salary_Check Example Employee_Journal Example Budget_Event Example Instead of Triggers Triggers within and Application Maintaining Database Triggers Call Syntax Trigger Maintenance Tasks Show Errors Trigger Drop Trigger Alter Trigger Multiple Triggers for a Table Handling Mutating Table Issues Implementing System Event Triggers What are System Event Triggers Defining the Scope Available System Events System Event Attributes
Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Support Engineer Technical Administrator Technical Consultant Overview Use Oracle Flashback Technologies to recover from human error Use Recovery Manager (RMAN) to create backups and perform recovery operations Use the Data Recovery Advisor to diagnose and repair failures Plan effective backup and recovery procedures Describe the Oracle Database architecture components related to backup and recovery operations Perform an encrypted database backup and restore Perform tablespace point-in-time recovery Configure the database for recoverability Describe Cloud Tooling for Backup and Recovery Describe Oracle Database backup methods and recovery operations that can be used to resolve database failure In this Oracle Database 12c R2: Backup and Recovery Workshop, students learn how to perform backup and recovery based on the related Oracle Database architecture components. Various backup, failure, restore, and recovery scenarios are provided so that students learn to evaluate their own recovery requirements and develop an appropriate strategy for backup and recovery procedures. This course includes an interactive workshop, with scenarios that provide participants with opportunities to diagnose and recover from several failure situations. Introduction Curriculum Context Assess your recovery requirements Categories of failures Oracle backup and recovery solutions Oracle Maximum Availability Architecture Oracle Secure Backup Benefits of using Oracle Data Guard Basic Workshop Architecture Getting Started Core Concepts of the Oracle Database, critical for Backup and Recovery Oracle DBA Tools for Backup and Recovery Connecting to Oracle Recovery Manager (RMAN) Configuring for Recoverablility RMAN commands Configuring and managing persistent settings Using the Fast Recovery Area (FRA) Control File Redo Log File Archiving Logs Using the RMAN Recovery Catalog Creating and Configuring the Recovery Catalog Managing Target Database Records in the Recovery Catalog Using RMAN Stored Scripts Maintaining and Protecting the Recovery Catalog Virtual Private Catalogs Backup Strategies and Terminology Backup Solutions Overview and Terminology Balancing Backup and Restore Requirements Backing Up Read-Only Tablespaces Data Warehouse Backup and Recovery: Best Practices Additional Backup Terminology Performing Backups RMAN Backup Types Incrementally Updated Backups Fast Incremental Backup Block Change Tracking Oracle-Suggested Backup Reporting on Backups Managing Backups Improving Your Backups Compressing Backups Using a Media Manager Backup and Restore for Very Large Files Creating RMAN Multi-section Backups, Proxy Copies, Duplexed Backup Sets and Backups of Backup Sets Creating and Managing Archival Backups Backing Up Recovery Files Backing Up the Control File to a Trace File Cataloging Additional Backup Files Using RMAN-Encrypted Backups Creating RMAN-Encrypted Backups Using Transparent-Mode Encryption Using Password-Mode Encryption Using Dual-Mode Encryption Diagnosing Failures Reducing Problem Diagnosis Time Automatic Diagnostic Repository Data Recovery Advisor Handling Block Corruption Restore and Recovery Concepts Restoring and Recovering Instance Failure and Instance/Crash Recovery Media Failure Complete Recovery (Overview) Point-in-Time Recovery (Overview) Recovery with the RESETLOGS Option Performing Recovery, Part I RMAN Recovery in NOARCHIVELOG Mode Performing Complete Recovery (of critical and noncritical data files) Restoring ASM Disk Groups Recovery with Image Files Performing Point-in-Time (PITR) or Incomplete Recovery Performing Recovery, Part II Recovery of Server Parameter File, Control File (One and All) Redo Log File Loss and Recovery Password Authentication File Re-creation Index, Read-Only Tablespace, and Temp file Recovery Restoring the Database to a New Host Disaster Recovery Restoring RMAN Encrypted Backups RMAN and Oracle Secure Backup Oracle Secure Backup Overview and Interface Options RMAN and OSB: Overview and Basic Process Flow Starting with Oracle Secure Backup Configuring Oracle Secure Backup for RMAN RMAN Backup and Restore Operations Oracle Secure Backup Jobs Displaying OSB log files and transcripts for RMAN activities Using Flashback Technologies Flashback Technology: Overview and Setup Using Flashback Technology to Query Data Flashback Table Flashback Transaction (Query and Back out) Flashback Drop and the Recycle Bin Flashback Data Archive Using Flashback Database Flashback Database Architecture Configuring Flashback Database Performing Flashback Database Best Practices for Flashback Database Transporting Data Transporting Data Across Platforms Transporting Data with Backup Sets Database Transport: Using Data Files Performing Point-in-Time Recovery When to use TSPITR TSPITR Architecture Performing RMAN TS Point-in-time Recovery Recovering Tables from Backups Duplicating a Database Using a Duplicate Database Duplicating Database with 'push' and 'pull' techniques Choosing Database Duplication Techniques Creating a Backup-up Based Duplicate Database Understanding the RMAN Duplication Operation RMAN Troubleshooting and Tuning Interpreting RMAN Message Output Tuning Principles Diagnosing Performance Bottlenecks RMAN Multiplexing Restore and Recovery Performance Best Practices Cloud Tooling for Backup and Recovery Backup Destinations Customize Backup Configuration On-Demand Backup and Recovery Oracle Backup Cloud Service Installing the Backup Module Backup and Recovery Workshop Workshop Structure and Approach Business Requirements for Database Availability and Procedures Diagnosing the Failures
Inclusive organizations are ones where members of the LGBTQAI+ community thrive. Providing a welcoming environment means ensuring that all employees have an understanding about respecting sexual identity. The acronym used to refer to this large segment of the population continues to grow to represent the identities of others. This video outlines the meaning behind 'LGBTQIA' and is intended to provide employees with further cultural competency. Length: 5:14 Learning Objectives Define and explain the components of the LGBTQIA+ acronym, including lesbian, gay, bisexual, transgender, queer, intersex, asexual, aromantic, agender, non-binary, and genderqueer identities.;Recognize the distinction between sexual orientation and gender identity, emphasizing the importance of respecting both aspects of an individual's identity.;Understand the significance of recognizing and supporting diverse gender and sexual identities, fostering inclusivity, and becoming an ally within the LGBTQIA+ community.
Respecting gender identity is an important part of creating an inclusive workplace environment. Because it is a new concept to some, it is helpful and even crucial to provide periodic training on the appropriate way to discuss the topic at work and how to prevent misunderstandings and even harassment. This video outlines what gender identity is, the importance of appropriate and respectful language, the harm caused by misgendering, and several best practices for creating a workplace that is respectful to people of all gender identities. Length: 4:39 Learning Objectives Distinguish between gender identity and sexual orientation, recognizing that gender identity pertains to a person's intrinsic sense of self within a gendered context, while sexual orientation relates to one's attraction to others.;Gain an understanding of the fluidity of gender identity, including concepts like transgender, gender-fluid, genderqueer, and non-binary, to appreciate the diverse ways individuals identify and express their gender.;Learn practical strategies to promote respect for gender identity in the workplace, such as using gender-neutral language, avoiding misgendering, and understanding the importance of names and pronouns in supporting individuals' gender identities.
Is your team ready for a technology upgrade? When we talk about digital transformation or technology upgrades, we usually think about changes in corporate processes, the development of a new business model, or streamlining. However, we don't usually think about how the workforce will respond. It is important that a team is supportive of an organization's digital transformation as it often means learning new ways of doing things. This microlearning video will outline ways to communicate with your teams about the benefits of new ways of doing things. This video is great for managers, IT leaders, and human resource departments. Length: 3:06 This video is great for managers, IT leaders, and human resource departments. Length: 3:06 Learning Objectives Comprehend how the introduction of digital technologies can trigger cultural shifts within an organization, including the division between digital enthusiasts and those resistant to change.;Recognize the positive outcomes that result from fostering a digital corporate culture, including enhanced collaboration, increased autonomy, innovation, and a workforce aligned with technology trends.;Highlight the significance of leadership in setting a corporate vision that promotes digitalization and cultural change, emphasizing the need for a united digital platform to achieve long-term success.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for those responsible for the installation, configuration, maintenance, or troubleshooting of PGP Universal Server or PGP Desktop. Overview This course provides instruction on PGP Universal Server 3.2 and PGP Desktop 10.2.At the completion of the course, you will be able to: Describe the features, concepts, components, and terminology of both the PGP Universal Server 3.2 and PGP Desktop 10.2products. Install PGP Universal Server 3.2 and complete setup using the most commonly configured options. Install a managed and customized PGP Desktop 10.2 client. Configure, complete administration tasks for, and use PGP Whole Disk Encryption and other PGP Desktop features. Configure policy-based messaging security for internal and external recipients. Create and modify users, user policies, and groups using either manual or directory integration methods. Combine two or more PGP Universal Servers into a cluster. This is designed to provide you with the fundamental knowledge a nd hands-on lab experience to install, administer, and troubleshoot the PGP Universal Management Server and primary client product. Cryptography Essentials Cryptography defined Caesar cipher Symmetric-Key Cryptography Public-Key Cryptography PGP Public-Key Cryptography Digital Signatures Trust Models Keys, Key Signatures and Key properties Verifying keys with key fingerprints Passphrases Certificates PGP Product Information PGP Universal Server PGP Desktop PGP Command Line PGP Support Package for BlackBerry PGP Mobile PGP iOS Viewer Installing PGP Universal Server PGP Universal Server overview Installation tasks and options Completing the PGP Universal Server Setup Assistant Administrative Keys A review of trust and verification The Organization Key The Organization Certificate Configuration and usage of the Additional Decryption Key Other certificates used for trust on PGP Universal Server Ignition key types and features Consumers and Groups Consumers and Groups PGP product user definition Consumer groups Introduction to consumer policy How users, groups, and policy work together Server Messaging Learn Mode In-depth look at Mail Proxy configuration Description of server mail flow and typical configurations Monitoring and Reporting Server monitoring and logging Updates, backups, and restoring Mail Policy Definition of policy chains and rules Rule conditions, actions, and key searches Default mail flow and message policy Adding custom chains to mail flow Overview of various types of policy chains Demonstration and detailed explanation of adding a rule Special messaging actions and dictionaries Key Not Found Problems that require a Key Not Found policy Introduction to Key Not Found configuration Web Messenger Definition of Web Messenger Description of functionality Demonstration of end-user inbox creation Inbox and service administration Inbox replication and backup Customization templates Regular Email option for Web Messenger PDF Messenger statement and certified delivery How the Out of Mail Stream Consumer Policy option functions PGP public key directories Smart Trailer invitation option overview PGP Desktop / S/MIME option overview PGP Universal Satellite overview Preparing Universal Server for PGP Desktop Clients Introduction to directory synchronization High-level overview of LDA P How the server uses a directory to add and assign users to groups Configuring PGP Universal Server Directory Synchronization Keys Managed key configuration Key modes Subkeys Key usage flags Smart card Introduction to key management services Installing PGP Desktop System requirements Citrix and TS compatibility Downloading a custom PGP Desktop installer Modifying installed components Configuring Client Enrollment Definition of enrollment Email, LDA P, and Silent enrollment type overview General PGP Desktop Policy General PGP Desktop Policy Options on the General Card of the PGP Desktop settings of a consumer policy Licensing managed PGP Desktop clients Updating settings for managed installations PGP Desktop Messaging How PGP Desktop affects messaging infrastructure Options on the Messaging Card of the PGP Desktop settings of a consumer policy MAPI encrypt and sign buttons and offline mail processing Configuring PGP Whole Disk Encryption What is Whole Dis k Encryption Configuring WDE PGP Whole Disk Encryption for Windows PGP Whole Disk Encryption for Mac OSX PGP w hole Disk Encryption for Linux PGP Whole Disk Encryption Management and Recover The pgpwd command-line tool Logon failure and reporting The WDE-ADMIN group for large-scale administration PGP Whole Disk Encryption in the PGP Desktop settings of a consumer policy, including authentication methods and user per missions Recovery options PGP NetShare Defining PGP NetShare Encrypted folder creation Configuration of the PGP Universal Server Consumer Policy options for NetShare, including automated folder protection and application-based file protection Client-side administration features for PGP NetShare Miscellaneous compatibility and feature information about PGP NetShare Active Directory Group integration and PGP NetShare usage demonstrations Other PGP Desktop Utilities PGP Zip file and folder protection Securely erasing information using PGP Shredder and the Shred Free Space features PGP Virtual Disk secure volumes Usage cases and PGP Portable definition Clustering How PGP Universal Server Clustering works Using the DMZ Clustering Zone Cluster failover Web Messenger inbox replication Demonstration of cluster creation
Join this webinar discussing how therapeutic laser and shockwave therapy can be combined to deliver excellent outcomes. Discover how to integrates these approaches into treatment pathways, and learn more about the science and practical applications of laser and shockwave therapies.
We deliver forklift training to both individuals and companies. Courses are delivered onsite at our training centre or arrangements can be made to deliver at a company’s premises.
Duration 5 Days 30 CPD hours This course is intended for This section specifies the primary and secondary target audiences of this course by job roles and notes the relevance to each job role. Collaboration Engineers and Administration Primary audiences: Collaboration engineers involved in the design, implementation, and troubleshooting of Cisco collaboration core technologies. Secondary audiences: Administration involved in support and troubleshooting of Cisco collaboration technologies. Overview Upon completing this course, you will be able to meet these objectives: Describe the Cisco Expressway - C features and functionality within the collaboration architecture Configure and troubleshoot Cisco Unified Communications Manager and Cisco expressway Series integration Describe the Cisco Expressway - C additional features Configure and troubleshoot Cisco Collaboration solutions for B2B calls Describe how to secure B2B communication with Cisco Expressway Series Describe the MRA feature Describe the Cisco Expressway MRA security and integration options, including integration with Cisco Unity Connection and Cisco IM&P Configure Cisco Webex Hybrid Services This course provides students knowledge about Cisco Expressway Series solutions, such as B2B calls, Cisco Mobile and Remote Access for remote workers, authentication options, and additional Cisco Expressway Series features. Configuring and Troubleshooting the Cisco Expressway Series Cisco Expressway Series Architecture Discovery 1: Deploy virtualized Cisco Expressway Discovery 2: Perform the initial Cisco Expressway series configuration Describe SIP and H.323 in the Cisco Expressway series Describe interworking in the Cisco Expressway series Discovery 3: Register endpoints on Cisco Expressway series Zones Digital string manipulation Search rules Transforms Discovery 4: Call search history and registrations Troubleshoot call processing on Cisco Expressway series Discovery 5: Troubleshooting tools Backup and restore Rerference Configuring Cisco Expressway Additional Freatures Describe bandwidth management Hardening local endpoint registrations Discovery 6: Configure Cisco Expressway series bandwidth management and registration restrictions Discovery 7: Troubleshoot Cisco Expressway series endpoint registration and local dial plan Describe Cisco Expressway security and clustering features Discovery 8: Configure Cisco Expressway series security features Configuring and Troubleshooting Cisco Unified Communications Manager and Cisco Expressway Series Cisco unified communications manager and Cisco Expressway-C integration overview Dian plan overview Call policy Discovery 9: Configure Cisco unified communications manager to connect with Cisco Expressway-C Troubleshooting options for Cisco unified communications manager and Cisco Expressway-C intergration Discovery 10: Troubleshoot Cisco unified communications manager and Cisco Expressway series integration Discovery 11: Configure and troubleshoot Cisco unified communications manager and Cisco Expressway series integration (practice activity) References Configuring and Troubleshooting Cisco Collaboration Solutions for Bussiness-to-Bussiness Describe supported services for B2B collaboration Describe prerequisites for business to business collaboration Call flow including Cisco unified communications manager endpoints Network address translation in a collaboration environment Discovery 12: Implement a B2B Cisco collaboration solution Cisco Expressway series B2B call troubleshooting Discovery 13: Troubleshoot B2B calls on the Cisco Expressway series References Discovery 14: Troubleshoot B2B calls on the Cisco Expressway series (practice activity) Securing Business-Business Communication Firewall Traversal Secure media Secure media between Cisco unified communications manager and Cisco Expressway series Toll fraud prevention Discovery 15: Secure a B2B Cisco collaboration communication Refrences Configuring and Troubleshooting Mobile and Remote Access Describe prerequisites for mobile and remote access Describe service discovery Explore Expressway settings for MRA Certificates HTTP proxy Cisco jabber registration procedure Cisco jabber registration procedure in Hybrid deployment Cisco jabber configuration file Discovery 16: Configure MRA on the Cisco Expressway series MRA troubleshooting Discovery 17: Troubleshoot MRA on the Cisco Expressway series Integrating and Securing Mobile and Remote Access Secure Cisco unified communications integration Cisco unity connection integration Cisco MRA access control options Additional Cisco MRA features Discovery 18: Configure MRA with additional application integrations References Configuring Cisco Webex Hybrid Services Cisco Webex teams Describe Cisco Webex control hub Describe Cisco Webhex hybrid media services Describe Cisco Expressway requirements for using hybrid call service connect Explore Cisco Expressway requirements for using hybrid call service connect Describe Cisco Webex video mesh Discovery 19: Prepare for Cisco Webex teams integration Discovery 20: Configure Cisco Webex hybrid services Additional course details: Nexus Humans Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Collaboration Cloud and Edge Solutions v1.0 (CLCEI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Anyone with the need to understand how business analysis is performed to support agile projects or who must transition their existing business analysis skills and practices from waterfall to agile. Overview In this course, students will: Understand the fundamentals of agile delivery and agile business analysis Compare and contrast business analysis on waterfall and agile projects Explain the value proposition for agile product development Define the 4 main types of project life cycles Complete an in-depth walkthrough of the agile delivery life cycle Explain the major flavors of agile Understand the major standards available to assist in transition of skills Define business analysis tailoring and understand how to apply it Learn over 20 business analysis techniques commonly used on agile projects In this course, students will gain an understanding about agile business analysis. Students will learn how business analysis on an agile project is ?the same? and ?different? than business analysis performed on waterfall projects. Students will understand how the business analysis role changes on an agile team. A number of business analysis techniques suited for supporting agile teams will be introduced as will the various standards available to the community to help teams and organizations transition. Since few organizations are pure agile, students will also learn about delivery approaches that use a combination of practices from waterfall and agile and will also be introduced to the important concept of business analysis tailoring ? the key skill used to adapt business analysis skills to all environments ? regardless of the delivery life cycle selected. Introduction What is agile The Agile Manifesto Agile principles Agile benefits Hands-on activity Learning and course objectives The current state of agile Agile trends Agile skills Value proposition The business case for agile The BA role changes on an agile project Hands-on activity Understanding project life cycles Project life cycle Product life cycle Incremental versus Iterative Hybrid approaches to delivery Choosing a project life cycle An in-depth look at Agile The agile development life cycle A sequence of iterations Essential concepts Inside each iteration Iteration goal Iteration planning Sequence of tasks Work period Testing End of iteration activities Evaluation and feedback Structured walkthroughs Evaluation guidelines The BA role in structured walkthroughs Scripting scenarios Defect list Retrospectives Hands-on exercise Type of Agile Delivery Approaches The flavors of agile Scrum Scrum roles Extreme Programming (XP) Dynamic System Development Method (DSDM) Feature Driven Development (FDD) Testing Best practices used by FDD Kanban Kanban Boards Agile Unified Process Scaling Frameworks Introduction to Agile Business Analysis What is business analysis? What is agile business analysis? Framework for agile business analysis Business analysis components International Institute of Business Analysis (IIBA©) Project Management Institute (PMI©) Context to business analysis Our industry BA standards Our industry Agile BA standards Product Owners What stays the same What is expected to change Agile requirements deliverables Lightweight documentation Requirements repository Where business analysis fits in The BA workload Hands-on exercise Business Analysis Tailoring Business analysis tailoring (defined) Tailoring considerations What tailoring looks like The PMI Guide to Business Analysis Determining the ?best? BA approach Methodology vs Standard Why use methodologies Determining your methodology Business analysis impacts Tools and techniques for agile business analysis Agile BA techniques Backlog refinements Behavior Driven Development (BDD) Burndown chart Collaborative games Definition of done Definition of ready INVEST Iteration planning Kanban board Minimum marketable features (MMF) Minimum viable product (MVP) MoSCoW Narrative writing Persona analysis Product roadmap Progressive Elaboration Prototyping Purpose alignment model Retrospectives Story slicing Hands-on Exercise Prioritization Techniques Requirements prioritization Prioritizing on agile projects Prioritization criteria Business benefit MoSCoW Pair-choice comparison Setting priorities with multi-voting Cost to acquire and operate Determining business value Story point estimating Planning poker Project velocity Hands-on activity Course wrap-up Making the transition to agile How my role will be different Course summary Retrospective Questions Additional course details: Nexus Humans BA08 - Agile for Business Analysts training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA08 - Agile for Business Analysts course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.