Summary |
In the era of technological development and various prevalent means of storing and exchanging information; That is, the transmission of information on networks and from one site to another, it has become important to consider and monitor information and data security. Information security is the science applied to provide significant and adequate protection of information against any risks that may threaten or damage it through the necessary tools and means to protect information from internal or external risks. All standards and measures taken to prevent access to information by persons who are not permitted to access it through communications are used to ensure the correctness and authenticity of such communications. |
Course Content |
The course will cover, but not limited to, the following key topics:
- Business analyst definition and role.
- The importance of business analysis in a continuously evolving environment
- Initial reflections on BA roles
- Business Analysis scope and boundaries
- Bridging the gap between business and IT
- Business Analysis and Context
- Business Analysis and Method/Approach
- Underpinning models for Business Analysis
- What make you a good business analyst?
- Analysis: definitions, context, models, and techniques.
- Internal environment analysis (e.g., MOST analysis)
- External environment analysis (e.g., PESTLE analysis)
- Strategy vs analysis
- Key performance indicators
- Stakeholders roles in business analysis processes
- How to identify potential stakeholders (e.g., customers, suppliers, etc.)
- Understanding stakeholders’ influence and roles.
- Managing stakeholders
- CATWOE and stakeholder positions
- Business modelling
- Business analysis process modelling phases
- Business analysis requirements, objectives, steps and techniques
- Interaction with context
- Quantitative vs qualitative approaches
- Workshops
- Interviews
- Sampling and dissemination
- Reporting language and protocols
- Modelling business processes
- Capturing contexts
- Drawing boundaries between businesses, organisations, cases, stakeholders, functional, etc.
- As-Is Processes versus To-Be processes
- Interventions from a To-Be perspective: what, why, and how?
- Interventions from implementation perspectives
- From Problem to Solution/Service
- Gap analysis
- Options paper
- Business analysis, functions, capabilities and architecture
- Business cases
- Impact analysis
- Risk management
- Project feasibility
- Conflict resolution
- Products, services, solutions, components: what and why?
- Requirement management/engineering across the lifecycle of projects (i.e., elicitation, analysis, reporting, validation) and their relationship to evaluation.
- Establishing a protocol/common language to disseminate artefacts:
- Representation
- Structure
- Requirement catalogue
- Use cases
- Business analysis and solution delivery
- Service Lifecyle (i.e., DevOps, Waterfall, Agile, Iterative model)
- Handling business and technical changes
- Evaluation and testing
|