• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

10 Business Information Technology courses delivered Live Online

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

In the past, popular thought treated artificial intelligence (AI) as if it were the domain of science fiction or some far-flung future. In the last few years, however, AI has been given new life. The business world has especially given it renewed interest. However, AI is not just another technology or process for the business to consider - it is a truly disruptive force.

AI For Leaders
Delivered in-person, on-request, onlineDelivered Online & In-Person in Loughborough
£50

Cybersecurity Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY * Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY * One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN * Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING * How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY * Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. ADDITIONAL COURSE DETAILS: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cybersecurity Essentials
Delivered on-request, onlineDelivered Online
Price on Enquiry

BA28 - Requirements Analysis and Use Cases

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course has been expressly designed for the Business Analyst, Business System Analyst, System Analyst, and/or Requirements Engineer. The Designer, Developer and Tester who are actively involved in utilizing use cases may also benefit from this workshop. Overview Employ use cases to elicit requirements, at a business, system or subsystem levelEmploy use cases to document the scope of a projectWrite use cases in a clear and unambiguous way.Model use cases with workflow diagramsPlan and divide up the project work based on your use casesManage a use case as it evolves over time and goes through many changes This course provides a strong foundation in the mechanics of use case diagramming and writing textual descriptions of use cases. In this highly interactive workshop, you will learn how to enhance and refine your use case skills, how to involve your stakeholders in the use case process, and how to develop use cases that provide valuable information to the designers and testers. Use cases that meet the needs of designers can be too technical and too detailed for other stakeholders. Use cases that satisfy business users are usually not very helpful to designers and testers. How do you satisfy these two disparate interests? And how do you handle the details like business rules, data validations and user interface specifications? INTRODUCTION * Course objectives * Understanding of business analysis * Knowledge areas of BABOK© Guide OVERVIEW OF USE CASES * Describe the purpose and value of a use case approach * Use case terminology * Introducing a use case approach NEEDS ASSESSMENT * Purpose of Needs Assessment * Needs Assessment and use cases * Defining and understanding the strategic goals and objectives * Understanding the business process * Identifying actors * Identifying business information * Analyzing locations and operations * Drawing the business use case diagram * Building the business architecture * Defining solution options DEFINING SYSTEM SCOPE * Product scope/project scope * System actors versus business actors * Analyzing the business process model * Analyzing business use cases * Identifying candidate use cases * Identifying scenarios * Diagramming use cases * Draw a use case diagram * Create a use case catalog EVALUATING, PRIORITIZING, AND PACKAGING USE CASES * Iterative nature of this work * Evaluating use cases * Use case priority * Use case risk * Use case complexity * Use case dependencies * Evaluate and Prioritize use cases * Dividing work up between releases * Packaging * A process for how to perform packaging WRITING THE MAIN SUCCESS SCENARIO * Use case descriptions * Primary and secondary goals * Assumptions * Pre-conditions * Triggers * Post-conditions * Scenario example * Main success scenario * Conditional execution * Use cases and requirements * Best practices for writing a use case description WRITING THE OTHER SCENARIOS * Scenarios and flows * Alternate scenarios and flows * Alternate vs. basic flow * Guidelines for alternate flows * Exception flows * Failed post conditions * Write alternate and exception flows PROCESS MODELING TO DESCRIBE USE CASE FLOWS * UML© Activity Diagram Notation * Sequencing activities * Developing an activity diagram * Facilitated sessions * Draw a UML© Activity Diagram USING ADVANCED DIAGRAMMING TECHNIQUES * Commonality * Dependency Relationships * Identify relationships * Comparing the different relationships DEVELOPING A REQUIREMENTS SPECIFICATION * Requirements and use cases * Detailed requirements * Common approaches to specifications * Non-functional requirements * Write non-functional requirements * User interface requirements * UI data descriptions * Business rules * Decision tables and inference rules * How to document simple calculations * Reporting requirements * Data requirements * Data accessibility requirements * Traceability COURSE SUMMARY * Wrap-up * Finding more information ADDITIONAL COURSE DETAILS: Nexus Humans BA28 - Requirements Analysis and Use Cases training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA28 - Requirements Analysis and Use Cases course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA28 - Requirements Analysis and Use Cases
Delivered on-request, onlineDelivered Online
Price on Enquiry

Trade secrets - the business perspective (In-House)

By The In House Training Company

Trade barriers are going up across the globe. And cybercrime is on the increase. The link between the two? The value of trade secrets. As countries become increasingly protectionist as regards international trade, so their IP law has been changing, with the result that companies that previously would have sought protection through patents are opting to go down the trade secret route instead. But is this a high-risk strategy? Technology is changing and this is having an impact on forms of commercial co-operation. Collaborative or open forms of innovation by their very nature involve the sharing of intellectual property (IP), and in many instances this IP is in the form of valuable confidential business information (ie, trade secrets). Little surprise, then, that trade secrets disputes have increased accordingly. At the same time, the changes in technology make trade secrets more vulnerable to attack, misappropriation, theft. So just how effective are the legal protections for trade secrets? How can organisations safeguard the value in their IP (increasingly, the single biggest line in their balance sheets)? This programme is designed to help you address these issues. Note: this is an indicative agenda, to be used as a starting point for a conversation between client and consultant, depending on the organisation's specific situation and requirements. This session is designed to give you a deeper understanding of: * Emerging trends in trade secrets protection and exploitation * The current situation in key jurisdictions * Recent case law * How leading companies are responding * The importance of trade secret metadata * Different external stakeholders and their interests * Key steps for effective protection of trade secrets Note: this is an indicative agenda, to be used as a starting point for a conversation between client and consultant, depending on the organisation's specific situation and requirements. 1 WHAT ARE TRADE SECRETS? * Definitions * Examples * Comparison with other forms of IP (patents, confidential information, know-how, copyright) 2 CURRENT TRENDS * The various changes taking place affecting trade secrets - legal changes, trade wars, cybercrime, technology, commercial practice * The current position in the UK, Europe, USA, China, Japan, Russia * Corporate best practice 3 TRADE SECRET DISPUTES - HOW TO AVOID THEM * Trade secret policies, processes and systems * Administrative, legal and technical protection mechanisms * The role of employees * The sharing of trade secrets with others 4 TRADE SECRET DISPUTES - HOW TO MANAGE THEM * Causes * Anatomy of a trade secret court case * 'Reasonable particularity' 5 RELATED ISSUES * Insurance * Tax authorities and investigations * Investor relations 6 TRADE SECRET ASSET MANAGEMENT ROADMAP * Maturity ladder * First steps * Pilot projects

Trade secrets - the business perspective (In-House)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Harpenden
Price on Enquiry

Business Transformation with Google Cloud

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Business decision-makers: directors (managers of managers), managers of individual contributors (ICs) or ICs working in non-IT functions/divisions (such as finance, marketing, sales, HR, product design) interested in understanding the applications of Google?s cloud technology for business improvement opportunities and transformational project(s). Through this interactive training, you?ll learn about core cloud business drivers?specifically Google?s cloud?and gain the knowledge/skills to determine if business transformation is right for you and your team, and build short and long-term projects using the ?superpowers? of cloud accordingly. You?ll also find several templates, guides, and resource links through the supplementary student workbook to help you build a custom briefing document to share with your leadership, technical teams or partners. WHY CLOUD TECHNOLOGY IS REVOLUTIONIZING BUSINESS * This module introduces cloud technology as a paradigm shift and explains how it?s irrevocably transforming business globally. It defines the fundamental building blocks of cloud technology?compute power and data?and what they mean for you and your business. And finally, it reveals how these building blocks help to create five superpowers using concrete use cases of their transformative abilities for business, education, and government sectors. FOSTER AN INNOVATION CULTURE * Cloud is not just about a technological transformation; it's a business and cultural transformation, too. This module explores how the superpowers of the cloud are brought to life through people. It looks specifically at how to organically create and scale innovation through culture and business practices. It offers key principles, drawing examples from Google?s success and real world scenarios, that you can apply in your day-to-day operations. DEFINE THE IDEAL BUSINESS TRANSFORMATION CHALLENGE * Previous modules describe the journey with cloud technology to include business and cultural changes as well. This module sets the groundwork to build a transformational solution using cloud technology for your role or your business. This process starts with distinguishing between scaled improvements and transformations. Next, the module demonstrates how to write an ideal challenge question and use insights generated from a data ecosystem to address the challenge. Finally, it introduces a framework that you can use to assess and refine your challenge ideas, preparing you to build a business case in a later module. BUILD TRUST WITH AVAILABILITY, SECURITY, AND COMPLIANCE * This module addresses common concerns about data privacy and security when migrating to the cloud. It defines key terms - privacy, security, compliance, and reliability - and reveals today?s top cybersecurity challenges and threats. It discusses how data security and compliance can be maintained when data is in the cloud, as illustrated by the Shared Responsibility Model. And finally, it uses a concrete example to explain how learners can build a high-level security program in their own organization. BUILD A BUSINESS CASE FOR YOUR TRANSFORMATION CHALLENGE * This module explains how to identify the most transformative solution for your business challenge. It then breaks down steps to achieve the transformational solution through creating smaller projects and plotting them onto a transformation roadmap. It describes how to use the data ecosystem you mapped in a previous module to support your overall project. Finally, it explains step by step how to build a business case and gives tips to help you pitch your project idea to gain buy-in from leadership, teams, and technical partners. ADDITIONAL COURSE DETAILS: Nexus Humans Business Transformation with Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Transformation with Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Transformation with Google Cloud
Delivered on-request, onlineDelivered Online
Price on Enquiry

CertNexus Artificial Intelligence for Business Professionals (AIBIZ) (AIZ-210)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This course is primarily designed for business leaders, consultants, product and project managers, and other decision-makers who are interested in growing the business by leveraging the power of AI. Other individuals who wish to explore basic AI concepts are also candidates for this course. This course is also designed to assist students in preparing for the CertNexus AIBIZ™ (Exam AIZ-210) credential. Overview In this course, you will identify ways in which AI can bring significant value to the business. You will: Describe AI fundamentals. Identify the functions of AI in business. Implement business requirements for AI. Artificial intelligence (AI) is not just another technology or process for the business to consider?it is a truly disruptive force, one that delivers an entirely new level of results across business sectors. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI. This course is designed to help business professionals conquer and move beyond the basics of AI to apply AI concepts for the benefit of the business. It will give you the essential knowledge of AI you'll need to steer the business forward. LESSON 1: AI FUNDAMENTALS * Topic A: A Brief History of AI * Topic B: AI Concepts LESSON 2: FUNCTIONS OF AI IN BUSINESS * Topic A: Improve User Experiences * Topic B: Segment Audiences * Topic C: Secure Assets * Topic D: Optimize Processes LESSON 3: IMPLEMENTING BUSINESS REQUIREMENTS FOR AI * Topic A: Identify Design Requirements * Topic B: Identify Data Requirements * Topic C: Identify Risks in Implementing AI * Topic D: Develop an AI Strategy

CertNexus Artificial Intelligence for Business Professionals (AIBIZ) (AIZ-210)
Delivered on-request, onlineDelivered Online
Price on Enquiry

IBM Sterling B2B Integrator Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Consultants, Support, System Administrators Overview Upon completion of the course, students will be able to: Run a business process. Create a business process using the Graphical Process Modeler. Explain how to create a service configuration. Explain how to track an executable business process. Discuss the basics of Sterling B2B Integrator. This course teaches students techniques, tools, and recommended practices that can be used to run a business process, create a business process using the Graphical Process Modeler, explain how to create a service configuration, explain how to track an executable business process, and discuss the basics of Sterling B2B Integrator through a combination of lecture and hands-on labs. ABOUT IBM STERLING B2B INTEGRATOR * High level overview of the Admin Console with an exercise to start the application XML AND XPATH BASICS * Review the basics of XML and XPath which is heavily used in the application BASIC BUSINESS PROCESS CONCEPTS * Reviewing what XML and XPath components are used to build business processes * Reviewing how to manually execute a business process within the application TRACKING AND TROUBLESHOOTING BUSINESS PROCESSES * Exercises to demonstrate how to work with business process instances GRAPHICAL PROCESS MODELER (GPM) * Overview of the Graphical Process Modeler * Exercises to walk through the development of a business process in the GPM * Exercises for checking in, executing, and modifying business processes INTRODUCTION TO SERVICE MANAGEMENT * Several exercises showcasing specific services/adapters and other functionality BEST PRACTICES * Covers specific business process development methods that are best practice MAPPING * Introduction to the Map Editor and Standards * Exercises to build and use an XML Encoder Map TYPING MAP * Exercises to build and use a Typing Map CASE STUDY * Exercise to build an end-to-end solution using what was learned in previous exercises TRACKING SYSTEM HEALTH * Review of archiving, migrating, and deleting business processes ADDITIONAL COURSE DETAILS: Nexus Humans IBM Sterling B2B Integrator Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the IBM Sterling B2B Integrator Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

IBM Sterling B2B Integrator Fundamentals
Delivered on-request, onlineDelivered Online
Price on Enquiry

Introduction to SAP Business Technology Platform (BTP) Administration

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Database Administrator Enterprise Architect System Administrator System Architect Technology Consultant Overview This course will prepare you to: Understand the concepts of SAP BTP Understand the tasks of an SAP BTP administrator Administrate accounts, services, and users in SAP BTP Manage connections, databases, and monitoring in SAP BTP This course will prepare you to:Understand the concepts of SAP BTPUnderstand the tasks of an SAP BTP administratorAdministrate accounts, services, and users in SAP BTPManage connections, databases, and monitoring in SAP BTP SAP STRATEGY * RISE with SAP and Intelligent, Sustainable Enterprise * SAP BTP Use Cases ARCHITECTURES * Account Model and Services * ABAP, Cloud Foundry, and Kyma Runtime Environments * Cloud Development Concept CONFIGURATION * Discovery Center and Boosters * Command Line Interface CONNECTIVITY * Destinations * Cloud Connector USER MANAGEMENT * Account User Management * SAP Cloud Identity Services DATABASE OFFERINGS * SAP HANA Cloud APPLICATION LIFECYCLE MANAGEMENT * Product Portfolio MONITORING * SAP Application Logging Service * SAP Cloud ALM Interface Channel SAP CLOUD TRANSPORT MANAGEMENT SERVICE * SAP Cloud Transport Management Service ADDITIONAL COURSE DETAILS: Nexus Humans Introduction to SAP Business Technology Platform (BTP) Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to SAP Business Technology Platform (BTP) Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to SAP Business Technology Platform (BTP) Administration
Delivered on-request, onlineDelivered Online
Price on Enquiry

CertNexus Internet of Things for Business Professionals (IoTBIZ)

By Nexus Human

Duration 0.5 Days 3 CPD hours This course is intended for This 4-hour course is intended for business leads in project management, marketing and sales who are seeking to grow their organization through IoT technology solutions. This course prepares students for taking the CertNexus IoTBIZ Credential (IOZ-110). Overview This course and associated credential (IOZ-110) will validate your knowledge of IoT terminology and your ability to understand the components of IoT infrastructure, help you uncover challenges for consideration and understand the impact that IoT has on your organization. This includes being able to identify what IoT can do for your organization and the various business and technical challenges that you must address. The Internet of Things (IoT) allows organization to collect an extraordinary volume of data and new analysis tools can enable you to use this data to make well-informed decisions to be made quickly. But before you can successfully plan and implement an IoT solution, you must understand the various factors that will drive your decisions. Putting IoT systems into place can be a complicated proposition with unique considerations distinctly different from traditional IT solutions. This course will familiarize you with IoT components, understand the challenges that you may face, and make design decisions about your IoT projects. Course includes an exam voucher for the IoTBIZ exam (exam IOZ-110). PLANNING AN IOT IMPLEMENTATION * Defining IoT * IoT Infrastructure * Identify Benefits and Challenges of IoT UNDERTAKING AN IOT PROJECT * Identify Real World Applications for IoT * The IoT Development Lifecycle ADDITIONAL COURSE DETAILS: Nexus Humans CertNexus Internet of Things for Business Professionals (IoTBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Internet of Things for Business Professionals (IoTBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Internet of Things for Business Professionals (IoTBIZ)
Delivered on-request, onlineDelivered Online
Price on Enquiry

6F87G IBM Sterling B2B Integrator Fundamentals

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for EDI End Users, Connect: End Users, Web Developers, as well as System Administrators. Overview After completing this course, students should be able to: Run a business process. Create a business process using the Graphical Process Modeler. Explain how to create a service configuration. Explain how to track an executable business process. Discuss the basics of Sterling B2B Integrator. This course provides students with a detailed examination of Sterling B2B Integrator, which provides end-to-end enterprise integration server for dynamic real-time and near-real time business collaboration and commerce automation.This course teaches students techniques, tools and recommended practices that can be used to run a business process, create a business process using the Graphical Process Modeler, explain how to create a service configuration, explain how to track an executable business process, and discuss the basics of Sterling B2B Integrator through a combination of lecture and hands-on labs. ABOUT IBM STERLING B2B INTEGRATOR * Exercise. About Sterling B2B Integrator BASIC BPML CONCEPTS * Exercise. Basic BPML Concepts XPATH BASICS * Exercise. XPath Basics GRAPHICAL PROCESS MODELER (GPM) * Exercise. Graphical Process Modeler (GPM) USING THE GPM * Exercise. Using the GPM TROUBLESHOOTING A BUSINESS PROCESS * Exercise. Troubleshooting a Business Process INTRODUCTION TO SERVICE MANAGEMENT * Exercise. Introduction to Service Management * Case Study STERLING B2B INTEGRATOR MAPPING * Exercise. Sterling B2B Integrator Mapping TYPING MAP * Exercise. Typing Map TRACKING SYSTEM HEALTH * Exercise. Tracking System Health BEST PRACTICES * Exercise. Best Practices * Case Study * Course Wrap Up

6F87G IBM Sterling B2B Integrator Fundamentals
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "Business Information Technology"

Show all 64