Categories

Summary

In the era of technological development and various prevalent means of storing and exchanging information; That is, the transmission of information on networks and from one site to another, it has become important to consider and monitor information and data security. Information security is the science applied to provide significant and adequate protection of information against any risks that may threaten or damage it through the necessary tools and means to protect information from internal or external risks. All standards and measures taken to prevent access to information by persons who are not permitted to access it through communications are used to ensure the correctness and authenticity of such communications.

Objectives and target group

Who should attend? 

  • Managers and business owners.
  • Managers of administrative departments in companies.
  • Managers of information systems centres in companies.
  • Managers of the information security and documentation department in companies.
  • Developers of computer security systems in the company.
  • Corporate information systems developers.
  • Employees working in organizations that use software systems.
  • Corporate managers who want to make private information for their companies.
  • Managers of software and technology departments in software companies.
  • Computer and software department supervisors in information technology companies.
  • Software department supervisors who want to develop their departments.
  • Students who wish to improve their abilities in information systems processing.

How attendees will benefit? 

After completion of the course, delegates will be able to: 

  • The business analyst definition and role.
  • Business process modelling, what and why?
  • Modelling methods and techniques.
  • Requirement engineering.
  • Stakeholder analysis.
  • Business Analysis deliverables.

Course Content

The course will cover, but not limited to, the following key topics:

  • Business analyst definition and role.
    • The importance of business analysis in a continuously evolving environment
    • Initial reflections on BA roles
  • Business Analysis scope and boundaries
    • Bridging the gap between business and IT
  • Business Analysis and Context
    • Business Analysis and Method/Approach
    • Underpinning models for Business Analysis
  • What make you a good business analyst?
  • Analysis: definitions, context, models, and techniques.
    • Internal environment analysis (e.g., MOST analysis)
    • External environment analysis (e.g., PESTLE analysis)
  • Strategy vs analysis
  • Key performance indicators
  • Stakeholders roles in business analysis processes
  • How to identify potential stakeholders (e.g., customers, suppliers, etc.)
  • Understanding stakeholders’ influence and roles.
  • Managing stakeholders
  • CATWOE and stakeholder positions
  • Business modelling
  • Business analysis process modelling phases
  • Business analysis requirements, objectives, steps and techniques
  • Interaction with context
    • Quantitative vs qualitative approaches
    • Workshops
    • Interviews
  • Sampling and dissemination
  • Reporting language and protocols
  • Modelling business processes
    • Capturing contexts
    • Drawing boundaries between businesses, organisations, cases, stakeholders, functional, etc.
  • As-Is Processes versus To-Be processes
    • Interventions from a To-Be perspective: what, why, and how?
    • Interventions from implementation perspectives
  • From Problem to Solution/Service
  • Gap analysis
  • Options paper
  • Business analysis, functions, capabilities and architecture
  • Business cases
    • Impact analysis
    • Risk management
  • Project feasibility
  • Conflict resolution
  • Products, services, solutions, components: what and why?
  • Requirement management/engineering across the lifecycle of projects (i.e., elicitation, analysis, reporting, validation) and their relationship to evaluation.
  • Establishing a protocol/common language to disseminate artefacts:
  • Representation
  • Structure
  • Requirement catalogue
  • Use cases
  • Business analysis and solution delivery
  • Service Lifecyle (i.e., DevOps, Waterfall, Agile, Iterative model)
  • Handling business and technical changes
  • Evaluation and testing

Course Date

2024-06-03

2024-09-02

2024-12-02

2025-03-03

Course Cost

Note / Price varies according to the selected city

Members NO. : 1
£3990 / Member

Members NO. : 2 - 3
£3192 / Member

Members NO. : + 3
£2473.8 / Member

Related Course

London
Approved

Information Systems (IS) Problems

2024-10-07

2025-01-06

2025-04-07

2025-07-07

£5040 £5040

New York
Approved

Information Systems Management (ISM) Bases

2024-11-11

2025-02-10

2025-05-12

2025-08-11

£5040 £5040

$data['course']