Enterprise Architecture Training Courses

Enterprise Architecture Training

Enterprise Architecture, EA, courses

Subcategories

Enterprise Architecture Course Outlines

ID Name Duration Overview
463935 Applying SysML with MAGICDRAW 21 hours This is a 3-day training covering principles of modeling, UML, SysML and use of MagicDraw following a case study, which demonstrates a typical model-based systems engineering approach. The course: Includes lectures and hands-on practice in using MagicDraw for systems modeling using SysML; Explains major SysML concepts and diagrams; Provides hands-on experience building system model examples; Shows how to trace model elements in different views; Explains how to use MagicDraw features efficiently; Is based on a consistent modeling case study. Audience: System architects, system engineers, software architects and other stakeholders who will create and use models. Methods: Presentations, discussions, and case study-based practical assignments. Course Materials: Slides, case study model, and practical assignment descriptions. Certificates: Each participant receives No Magic and NobleProg certificates indicating that he attended the training. Introduction Trainer and Participant Introductions Introduction to modeling Introduction to SysML Introduction to MagicDraw A Case Study Definition Structural System Decomposition Package Diagram Notation Decomposing System into Packages Modeling Package Dependencies Practical Assignment: Modeling Package Structure Analyzing User Needs Use Case Diagram Notation Identifying Actors Identifying Use Cases Use Case Relationships Practical Assignment: Modeling Use Cases Defining System Requirements From Use Cases to System Requirements Requirements Diagram Notation Specifying Requirements Defining Requirements Structure Verifying Requirements with Test Cases Requirements Relationships Practical Assignment: Modeling Requirements Defining Structural Blocks (Black Box View) Block Definition Diagram Notation Structural Blocks Modeling Block Properties Defining Relationships between Blocks Defining System Data Dictionary Practical Assignment: Modeling Black Box View of a System Modeling Block Structure (White Box View) Internal Block Diagram Visualizing Block Parts Linking Parts with Connectors Defining Ports Defining Item Flows and Interface Blocks Practical Assignment: Modeling White Box View of a System Modeling System Constraints Defining Constraint Blocks Binding Constraint Properties with Value Properties Executing Parametrics Practical Assignment: Modeling Parametrics Designing State-Based System Behavior State Machine Diagram Notation Identifying States Defining State Transition Events Specifying Signals Specifying Effects Executing State Machines Practical Assignment: Modeling Statemachines Designing Control and Data Flows Activity Diagram Defining Activities Specifying Parameters Defining Actions Modeling Control Flows Modeling Data Flows Executing Activities Executing Activities in Combination with State Machines and Parametrics Practical Assignment: Modeling Activities Designing Communications Sequence Diagram Notation Modeling Lifelines Modeling Messages Decomposing Interactions Using References Applying Interaction Fragments Defining Timing Constraints Practical Assignment: Modeling Interactions Modeling Cross-Cutting Constructs Logical and Physical Architectures Allocation relationship Allocations Display Options Identifying Types of Allocations Allocation Matrix Practical Assignment: Building Allocation Matrix Wrap up Summarizing Training Discussing Remaining Questions
164957 Quality Assurance and Continuous Integration 14 hours Training is open to both developers, Scrum Masters, Product Owner and also some aspects of the business department. The purpose of training is to introduce topics Quality Assurance and Continuous Integration and their place in projects conducted agile methodologies. Participants will gain a broad perspective on the issues discussed as well as practical knowledge of the tools and processes of software development in line with the QA / CI. Representatives of business, will be able to know the benefits of implementing those tools and processes and translate into both the time and cost of software development. The issues presented are based on PHP or Java, depending on customer requirements. QA/CI What is QA? What is CI? The costs of software development, refactoring and fix errors Identifying and understanding the project Profit for the organization DDD Software development based on business requirements, assumptions DDD Problems in communication IT-Business Domain Model Best Practices KISS principle and DRY Coding standards Creating reusable code through OOP and design patterns Identifying and reducing cyclomatic complexity Software Metrics Weight Method per Class Response For a Class Depth of Inheritance Tree Coupling Between Objects Lack of Cohesion of Methods Number of Children Cyclomatic complexity Metrics class Model Metrics Metrics for use Software Testing What, when and how to test? The method of "white-box" and "black box" The role of testing in agile methodologies TDD only a potential increase in the cost of the project Unit testing with JUnit (Java), PHPUnit (PHP) Behavioral tests of JBehave (Java), Behat and Mink (PHP) Functional tests Refactoring What is refactoring? Debt technology Code smell Refactoring patterns Documentation The role of documentation in agile methodologies What to document? Types of documentation Documentation and agile methodologies, or you can call (Working software over comprehensive documentation)? Standard XMI Automatic generation of documentation from the Javadoc (Java), ApiGen (PHP) Tools and Environment CI Tools and Environment CI PMD (Java), phpmd (PHP) CPD (Java), phpcpd (PHP) Lines Of Code Counter (Java), phploc (PHP) UCDetector (Java), phpdcd (PHP) Jdepend (Java), phpdepend (PHP) Jenkins Continuous Integration Server Agile and CI/QA Planning and incremental development Embracing Change Short stages Interdisciplinary team Extreme Programming, Code Review Individuals and interactions over processes and tools Summation Discussion Questions How do you begin the process of implementation?
463699 Software Engineering 35 hours Software Engineering starts where programming stops. In this course you will learn a solid foundation in Software Engineering. It builds a bridge from programming to solid engineering practices. The course gives you an overview of basic concepts and vocabulary typically used in the field. During the course, you will learn to use many techniques to plan, implement and validate software projects and to evaluate and improve development processes. Audience: This course is intended for software developers with various backgrounds who know at least one programming language. Day 1: Process Introduction What is Systems Engineering? What is Software Engineering? Why is Software Engineering difficult? System requirements System modeling Software Engineering Processes What is a Software Development Process? Traditional Processes Agile Processes Processes for building High-Integrity Systems Standards & certification systems High-Integrity Systems What are High-Integrity Systems? The role of QM culture Reasons for errors Critical systems standard Reliability engineering Software Maintenance Day 2: Planning Requirements User requirements Elicitation/analysis of user requirements System requirements Software requirements Specification of software Requirements process Tools to manage requirements Software Design Conways Law Design patterns Textual modeling tools Principles of OO design Design tools Common architectures Modeling Planning an architecture UML graphical representations Non-UML graphical representations Day 3: Code Software Construction How to take a design into code Programming best practices Abstraction of code Programming workflow Configuration Management What is Configuration Management? Configuration Management in ISO9000 and CMMI CASE tools for planning, design & QA CASE tools for writing software Version control with SVN System Integration Code for High-Integrity Systems Preventing errors Catching errors Reducing the impact of errors Typical problems with code for High-Integrity Systems Code quality metrics Code size metrics Code complexity metrics Non-code metrics Static analysis Day 4: Verification & Validation Reviews Fundamentals of VV Independent Verification & Validation Design and requirement reviews Code inspections Software Walkthroughs Audits Other V & V methods Testing High-Integrity Systems Documents regarding safety Scenarios Argumentation for safety Reviews of High-Integrity Systems Predicting reliability Formal methods Costs of V + V Automated Testing Why test? Automatic vs manual tests Incremental testing Types of tests Testing tools Test Harnesses Day 5: Management Project Management What is Project Management? Customer handover Standards (PMP, PRINCE2) Time management Cost management Risk management Project documentation Process Evaluation The function of process evaluation Acting on the metric Process metrics Process evaluation standards & frameworks (CMMI, ISO 9001, TickIt+) Process evaluation meetings Summary and Conclusions
464014 REQB Foundation - przygotowanie do egzaminu 21 hours
15153 SOA 2.0 and EDA 14 hours Our ED-SOA training focuses on building and analysing an architecture framework that builds upon the SOA reference architecture. Services are used as event generators, signifying a problem or impending problem, an opportunity, a threshold, or a deviation. SOA and EDA The fusion of SOA and EDA into ED-SOA Combining events and services Business rule processing Transforming messages Solicit-Response Different ways of thinking about problem solving WS-Eventing Potential overlap between SOA and EDA Standardizing event processing rules Fundamental EDA Characteristics Decoupled interactions Publish/Subscribe messaging Many-to-many communications Event-based triggers Asynchronous interactions How does ED-SOA support faster responses? Event-driven Architecture Event processors Using a dashboard Event monitoring Event infrastructure Propagation of events Kicking off a business process SOA Action Framework Triggering actions Subscribing to an event The ESB and event propagation Complex event processing Event consumers Event producers Storing and forwarding events Facilitating system responsiveness Event processing Styles Simple processing Handling real-time flow of work Reducing lag time and cost Stream processing Real time flow of information Enabling in-time decision making Complex processing Inferring event occurrence Event correlation Sophisticated event interpreters Responding to business anomalies Enterprise Service Bus (ESB) Standard-based connectivity Transport services Message routing capabilities Message transformation features Event services Mediation capabilities Protocol mediation Content mediation Configuring a simple ESB solution Pervasive integration Reliable integration WS-Eventing Delivery modes Subscription managers Notations and terminology Subscription messages Notifications Faults Security considerations Message security Access control Complex Event Processing (CEP) CQL - Complex Query Language Event Attributes or properties Granularity of events Using timestamps Creation time and arrival time Event processing language (EPL) Event processing agents (EPA) Composite events Derived events Event source and event channel SOA event Patterns Discovering event patterns Commands Queries Event pattern monitoring Monitoring for control of process execution Event cascade When to use event patterns Event sourcing Structuring the event handler logic Reversing events SOA events and the SLA Importance of a Service level agreement Keeping services within the agreement Instances violating the SLA Priority for executing risk assessment steps Building autonomous processes Monitoring and event pattern triggering Dependence between events Software Platform for ED-SOA Software Tools for ED-SOA Event-optimized runtimes Supporting bulk application of rules Dynamic data-driven event definition Agents and streams Guaranteed pause times Sensors and event-processing agents Responders Conclusions Building of processes facilitated by ED-SOA ED-SOA constructed using BPM CEP principles as component of ED-SOA The increasing quest for control of BP Real time autonomous operation Gathering business intelligence from events
463931 System Engineering using SysML and UML 2 21 hours Objective: Helping Analysts and Designers of the System Engineering domain to understand how to efficiently gather requirements then go through the embedded software design implementation on the basis of system specifications using UML 2 and SysML. This 3 days training aims at assisting system analysts to express efficiently their needs and designers to make the appropriate architectural design of the system on the basis of these needs. The resulting system architecture provides a good level of agility to the embedded system software in face of changes as it allows a coherent traceability of the business rules encapsulated in system functions and those of the usage choices (use cases) of the end-users toward the software implementation level. Introduction The System Development Life Cycle with the Harmony Process (IBM/Telelogic) Overview of the UML/SysML diagrams used in requirements gathering, system analysis and design of the System Engineering domain A Method based Framework for requirement gathering, system analysis and design Gathering Requirements and Transforming them into System Specifications Making business and system requirements traceable using the SysML requirement diagram Define the scope of the system composed of functions and use cases that invoke these functions Model the Life Cycle of the System that orchestrates transitions between its states where functions are triggered Prepare test cases using scenarios that realize Use Cases and System Functions Case Study : Model the System Scope and the usage of the system functions on the basis of requirements Transforming System Specifications into Design Level Components Model the Block Diagram of the system and refine it using internal blocks Elaborate the Communication Architecture between Sub-System using Parts, Ports and Interfaces Case Study : Elaborate the block and Internal Block diagrams on the basis of system specifications and by considering design level choices Model the description of white box Interactions at the design level Case Study : Model interactions between blocks and Internal Blocks on the basis of design level choices Mapping of Operations on the Components (Parts) of Blocks Elaborate the Parametric Diagram of the System Functions Case Study : Update the Block and Internal Block Diagrams on the basis of design level scenarios Conclusion Steps of requirement analysis and system specifications in system engineering Traceability between requirements and the software System Integration and Acceptance Tests of the requirements Notice: The above training-mentoring sessions are conducted interactively using Requirement Engineering and Modeling tools like Enterprise Architect (EA) in order to ensure good level of traceability between requirements and underlying solutions. Concepts are explained first using basic examples and are then followed by solution drafts to your own problems. After this session, we can accompany you by reviewing and validating your solutions depending on your needs. Provided by GooBiz
464047 Introduction to Enterprise Architectures 14 hours Objective This training course aims at helping attendees to understand the most used Enterprise Architectures and rules to follow up in their construction to succeed with an appropriate architecture scenario for their organisation. Thanks to the selection of appropriate architecture layers, components and traceability links that are to be established from the business layer to the technical layer, the resulting enterprise architecture framework allows you a good impact analysis in the face of evolutions of the business decisions and anticipates mutations of the corresponding information system components. Why Architecting the Enterprise? Introduction : Current issues in the Enterprise and IT governance Legacy Systems and evolution needs Business Architecture and Enterprise Architecture : similarities and differences The fundamentals Architecting the Enterprise : the principles Strategic Alignment Business and IT Repository Logical Architectures n-tiers Application technologies : ERP, SCM, webportail, Integration architectures and Services Architectures : EAI and ESB Service Oriented Architectures : Roles of the BPM and BAM Enterprise Architecture Strategies and Methodologies "As is" and "To be" system cartographies : How to determine the roadmap ? Structures to better align IT with the Strategies ? What is the approach ? What are links with the development processes ? Enterprise Architecture Content Framework Identifying the business functions of the enterprise Cartography of the actors and business functions Aligning business strategies Patterns to architecting the IT system Zones, squares and blocks Identifying Exchanges using services and events Modeling inter-block exchanges and data objects to support business process realizations Building the repository and data architectures The Master Data Management (MDM) Granularity Management Modeling Languages Definition of the meta-model and architecture rules Elaborate the Enterprise Architecture Repository Architecture Cartography Reference Layers Business, Functional, Application and Technical Layers Links between the Strategic and Business Views Traceability between the Business and Functional Views Traceability between the Functional and Application Views Bridges with the Technical View Contribution of an 'Enterprise Architecture' to create value Contribution to the business value Best Practices The Enterprise Architecture Roadmap Perspectives Tools Business Process and Cartography Management tools Presentation on a case study Notice: The above training-mentoring sessions are conducted interactively using Business Modeling tools in order to ensure good level of traceability between business specifications and their execution. Concepts are first explained using basic examples and are then followed by solution drafts to your own problems. After this session, we can accompany you by reviewing and validating your solutions depending on your needs. The logos BMM, BPMN and UML referenced on this site are trademarks of the Object Management Group (OMG). The RUP and SOMA are rademarks of the IBM / Rational Software. TOGAF and Zachman are respectively trademarks of the Open Group and Zachman International
296675 MoDAF/NAF Introduction 7 hours The course is aimed at business analysts, architects and systems engineers who want to understand how MODAF can be used in their organisation. Introduction to Enterprise Architecture in Defence EA Enablers: Frameworks, Tools, Meta-Models & Repositories Overview of MoDAF: what is it for, and how does it fit together Key MoDAF Views: Strategic, Operational, System Detail of MoDAF Views: The key views and how they're structured Developing Capability Models: Strategic Architectures The MoDAF System Views: Structure, Behaviour, Configuration Management Programmatic Views: Project Plans (AcV-2), Capability Planning (StV-3) Service Views: MoDAF interpretation of Services and SOA
464052 Software Engineering, Requirements Engineering and Testing 63 hours Software Engineering 5 days Day 1: Project Management Project versus line management and maintenance and support Project definition and project forms Management – general rules and project management Management styles What is special for IT projects? Basic project process Iterative, incremental, waterfall, agile and lean project process Project phases Project roles Project documentation and other artefacts Soft factors and peopleware PRINCE 2, PMBOK, PMI, IPMA and other project standards Day 2: Business Analysis and Requirements Engineering Fundamentals Defining business goals Business analysis, business process management, business process improvement The boundary between business and system analysis System stakeholders, system users, system context and system boudaries Why are requirements necessary? What us requirements engineering The boundary between requirements engineering and architectural design Where is requirements engineering often hidden? Requirements engineering in iterative, lean, and agile development and in continuous integration – FDD, DDD, BDD, TDD Basic requirements engineering process, roles and artefacts Standards and certifications: BABOK, ISO/IEEE 29148, IREB, BCS, IIBA Day 3: Architecture and Development Fundamentals Programming languages – structural and object-oriented paradigms Object-oriented development – how much is history, how much is the future Modularity, portability, maintainability and scalability of architectures Definition and type of software architectures Enterprise architecture and system architecture Programming styles Programming environments Programming mistakes and how to avoid and prevent them Modelling architecture and components SOA, Web Services and micro-services Automatic build and continuous integration How much architecture design is there on a project? Extreme programming, TDD and re-factoring Day 4: Quality Assurance and Testing Fundamentals Product quality: what is it? ISO 25010, FURPS etc. Product quality, user experience, Kano Model, customer experience management and integral quality User-centred design, personas and other ways to make quality individual Just-enough quality Quality Assurance and Quality Control Risk strategies in quality control The components of quality assurance: requirements, process control, configuration and change management, verification, validation, testing, static testing and static analysis Risk-based quality assurance Risk-based testing Risk-driven development Boehm’s curve in quality assurance and in testing The four testing schools – which suits your need? Day 5: Process Types, Maturity and Process Improvement The evolution of IT process: from Alan Turing through Big Blue to lean startup Process and process-oriented organization The history of processes in crafts and industries Process modelling: UML, BPMN and more Process management, process optimization, process re-engineering and process management systems Innovative process approaches: Deming, Juran, TPS, Kaizen Is (process) quality free? (Philip Crosby) The need and history of maturity improvement: CMMI, SPICE and other maturity scales Special types of maturity: TMM, TPI (for testing), Requirements Engineering Maturity (Gorschek) Process maturity versus product maturity: any correlation? any causal relationship? Process maturity versus business success: any correlation? any causal relationship? A forsaken lesson: Automated Defect Prevention and The Next Leap in Productivity Attempts: TQM, SixSigma, agile retrospectives, process frameworks Requirements Engineering - 2 days Day 1: Requirements Elicitation, Negotiation, Consolidation and Management Finding requirements: what, when and by whom Stakeholder classification Forgotten stakeholders Defining system context – defining requirements sources Elicitation methods and techniques Prototyping, personas, and requirements elicitation through testing (exploratory and otherwise) Marketing and requirements elicitation – MDRA (“Market-Driven Requirements Engineering”) Prioritising requirements: MoSCoW, Karl Wiegers and other techniques (including agile MMF) Refining requirements – agile “specification by example” Requirements negotiation: types of conflicts, conflict-solving methods Solving internal incongruence between some types of requirements (e.g. security versus ease of use) Requirements traceability – why and how Requirements status changes Requirements CCM, versioning and baselines Product view and project view on requirements Product management and requirements management in projects Day 2: Requirements Analysis, Modelling, Specification, Verification and Validation Analysis is the thinking and re-thinking you do between elicitation and specification Requirements process is always iterative, even in sequential projects Describing requirements in natural language: risks and benefits Requirements modelling: benefits and costs The rules for using natural language for requirements specification Defining and managing requirements glossary UML, BPMN and other formal and semi-formal modelling notations for requirements Using document and sentence templates for requirements description Verification of requirements – goals, levels and methods Validation – with prototyping, reviews and inspections, and testing Requirements validation and system validation Testing - 2 days Day 1: Test Design, Test Execution and Exploratory Testing Test design: after risk-based testing, choosing the optimum way to use the time and resources available Test design “from infinity to here” – exhaustive testing is not possible Test cases and test scenarios Test design on various test levels (from unit to system test level) Test design for static and for dynamic testing Business-oriented and technique-oriented test design (“black-box” and “white-box”) Attempting to break the system (“negative testing”) and supporting the developers (acceptance testing) Test design to achieve test coverage – various test coverage measures Experience-based test design Designing test cases from requirements and system models Test design heuristics and exploratory testing When to design test cases? – traditional and exploratory approach Describing test cases – how much detail? Test execution – psychological aspects Test execution – logging and reporting Designing tests for “non-functional” testing  Automatic test design and MBT (Model-Based Testing) Day 2: Test Organization, Management and Automation Test levels (or phases) Who does the testing, and when? – various solutions Test environments: cost, administration, access, responsibility Simulators, emulators and virtual test environment Testing in agile scrum Test team organization and role Test process Test automation – what can be automated? Test execution automation – approaches and tools
165046 Object-Oriented Analysis and Design using UML 21 hours This course is intended for analysts, designers, developers, testers and project managers. It is an introduction to system modeling using UML. Based on selected systems (case study) following phases of system modeling are presented: from modeling requirements, through business process modeling and documentation of functional and non-functional requirements, to the analytical model. The next step is the design phase - static and dynamic modeling using project classes and the interaction between the system components. Training can be the basis for a comprehensive process modeling in enterprise systems through the use of UML in all phases of software development. Introduction to UML A brief History of UML Overview of issues in the field of object-oriented modeling UML Specification (OMG) UML diagrams overview Requirements management Requirements Types Requirements Categories (FURPS) Methods for gathering requirements Modeling requirements using UML The relationship matrix for the requirements Creating a requirements specification Modeling business processes Activity Diagram Business process modeling in UML The definition of a business process Concurrent flows and decisions Exceptions and Exception Handling Partitions, path Modeling non-functional requirements Components and Deployment diagrams The initial architecture of the system - logical and physical Modeling requirements for security, performance, reliability, ... Modeling functional requirements Modeling functionality with the Use Case diagram Determining the scope of the system Actors and the relationships between them Identifying use cases Association "actor - use case" and its properties The relationship between use cases: include, extend, generalization Creating a use case scenarios and generate diagrams from them (activity, state machine) Analytical model of the system Using communication diagram to identify the main system objects The types of messages: asynchronous, synchronous, reply Specify the numbering sequence of messages Categories of objects: Boundary, Control and Entity Introduction to the project system Modeling the interaction Static Modeling Class Diagram and source code generation Association relationship and its characteristics. Other relationships: aggregation, composition, generalization, dependency, association class Forward/Reverse engineering Generating source code from the model Generating diagram based on the source code Synchronizing code and diagram Object Diagrams, Composite Structure Diagrams, and Package Diagrams Dynamic Modeling Verification of the static model Clarification of method signatures Verification of the class diagram The dynamic modeling at the level of method calls Diagrams: Sequence, State Machine, Timing, and Interaction
51818 Cloud Computing Overview 7 hours This course has been created for people who want to understand how to benefit from cloud computing. It uses Amazon EC2 example, but can be tailored to other providers. Short history of computing Virtualization Private Cloud vs Public Could Where to use or not to use cloud computing Could computing in action Workshops, where delegates will be entitled to start an instance (included in the course price) Starting and stopping instances Monitoring Changing hardware requirements EBS vs instance storage Auto-scaling Load balancing Spot instances Overview of cloud providers Eucalyptus Digital Ocean Azure Others
417010 SOA Architect 35 hours This 5 day course is designed to give an understanding of the mechanics of Service Oriented Architecture. It includes the technical design of SOA based architectures and service oriented solutions to business problems. Service Oriented Architecture and Computing Service Oriented Computing Terminology Service Oriented Analysis and Design Requirements and impact of adopting SOA Enterprise Service Bus Web Service and REST Services SOA Connection Points SOA Technology XML and XML Schema Web Services JAX-WS and WSDL REST Services JAX-RS and WADL Discovery and Service Registries Enterprise Service Bus (ESB) SOA Design and Architecture SOA Model Services and Service Capabilities WSDL first or code first design Principles of Service Orientation Service coupling Handling state Service discovery Advanced SOA Design and Architecture SOA Architecture types SOA Design Patterns Message types Data transformation SOA Workshop This hands on workshop consists of a number of individual and group exercises which allow the technologies and principles described in the previous modules to be applied. Participants can also bring real world problems to the workshop.
463929 Enterprise Architectures : Prepare your TOGAF 9.1 Certification 21 hours Enterprise Architecture using TOGAF 9.1 - Alternate Durations : Foundation Level : 3 days / Certified Level : 4 days Objective: This training course aims at helping attendees to understand how to execute Enterprise Architecture to meet the business goals using the Architecture Development Method (ADM) and techniques recommended by the Open Group's Architecture Framework. It also helps attendees to be prepared via sessions of questions and responses for taking the two level exams of TOGAF Certification. Concepts explained during the training course are reinforced by examples, exercises and a case study whose solutions are worked out and presented by groups of attendees. Abstract concepts are systematically concretized using illustrations via an EA tool. Introduction to TOGAF 9.1 for the Enterprise Architecture Issues in managing transformation and aligning IT with changing strategies Contribution to the business value Concepts and Terminology for TOGAF 9.1 "Foundation" and "Certification" Exams Managing Transformation Approach for managing transformation according to TOGAF 9.1 Structures and usage of the TOGAF 9.1 Frameworks Roadmap, Transition Architectures Architecture Development Method (ADM) : Scope, phases, objectives, approaches, inputs, outputs, steps Techniques and key deliverables of the ADM Cycle& Organization model, goals, principles, repositories, tools, request vs. statement for architecture work, stakeholder management, views and viewpoints, patterns, business scenarios, gaps, roadmap, migration planning, conformance reviews, etc. Recommendations for adapting the ADM Scope, architecture domains, timing, levels, iterations Architecture Content Framework: Content meta-model, architecture elements, deliverables, artifacts, building blocks Enterprise Continuum: Architecture partitioning, architecture repository, reuse, relationships with the phases of the ADM Reference Models: Architecture base, technical reference model (TRM), integrated information infrastructure reference model (III-RM). Architecture Capability Framework: Architecture governance, architecture board, architecture conformance reviews, architecture skills framework, maturity models. How Archimate 2 complements TOGAF 9.1? Support from Archimate 2.1 to TOGAF Phases, Modeling Elements of the Business, Application and Technology Architectures Viewpoints and inter-relationships between layers : Bridging Goals, Drivers, Requirements, ...toward Work Packages and Transition Architectures Increments Perspectives Tools Application through a case study is done by group members at the end of each appropriate chapter Different Concepts and their relationships are also systematically illustrated using an EA tool Delegates are prepared for their TOGAF Certification Exams using test questions Recap : Review of Concepts regarding TOGAF 9.1 Certification Exams : Levels L1 and L2 Provided by GooBiz
164999 UML in Enterprise Architect (workshops) 21 hours The course is designed for analysts, designers, developers, testers and project managers. The workshop presents a problem analysis, design and documentation systems using UML and Enterprise Architect of Sparx Systems. During the training will be presented to the advanced capabilities of the program (such as MDA, profiles, XMI), and best practices that can greatly simplify and accelerate modeling. The training method: Lecture 10%, 90% workshop Create and configure EAP file Create and save a Enterprise Architect project file File structure of the project Types of views Program interface: menus, toolbars, Toolbox, Project Browser and other windows Docking and hiding windows Working with a model, diagram Predefined models Packages (views) and diagrams Adding elements to the model and diagram Different ways of removing the items and their consequences Saving diagrams Requirements Management Methods of requirements gathering FURPS requirements categories Requirements Diagram Relationships between requirements aggregation dependency realization How to improve the appearance of a diagram? layout diagram colour status requirements enable / disable the package names Create and manage a matrix relationship Documenting requirements HTML pages printable version Advanced requirement management  custom types of requirements custom requirements status tracking requirements requirements documenting Business process modeling, architecture Activity Diagram Compound activities Control flows, object flows Handling exceptions, interrupt flow Partitions Concurrent flows and decision-making How to improve the appearance of a diagram? different levels of detail reducing the amount of detail complexity of the process Components and Deployment diagrams The initial architecture of the system - logical and physical nested components delegation and assembly port, part interface communication paths Security, performance, reliability of the system requirements modelling Non-standard implementation of stereotypes in diagrams stereotypes graphic library adding the library to the project custom graphics stereotypes Use Cases and their documentation Functional requirements modeling  Scope of the system Actors and the relationships between them Identifying use cases Association "actor - use case" and its properties Relationship between use cases: include, extend, generalization Auto names Use Case scenarios and diagrams generated based on them them (activity, state machine, sequence) Use Case scenarios from external files Documentation generation Document Templates Domain model Main classes/objects of a system Communication Diagram message types: asynchronous, synchronous, return messages numbering stereotypes: Boundary, Control and Entity System design introduction  Static model Class Diagram Class diagram and source code generation association and its characteristics other relationships: aggregation, composition, generalization, dependency, association class naming  convention for classes and their elements show/hide classes Forward/Reverse engineering source code generating from the diagram diagram generation from source code source code and diagram synchronization Object Diagrams Dynamic Model Static model verification clarify the method signatures verification of the class diagram Dynamic modeling at the level of method calls (sequence diagram) based on use cases and static analysis model How to improve the appearance of a diagram? reducing the number of modeled scenarios reducing the number of lifelines avoiding complex nested blocks hiding details State Machine diagram states and sub-states transitions between states - trigger, condition and action internal actions (entry, do, exit) How to improve the appearance of a diagram? line style state decomposition Patterns and profiles "Gang of Four" patterns Patterns defined in the project Collaboration User patterns Importing profiles from XML files MDA, source code Class Diagram to database schema transformation SQL script generation based on class diagram Source code generation - available options Group work Enterprise Architect package versioning Differences in the versions of the project, documentation Using a repository to store the model Collaboration tools
118127 Model MapReduce and Apache Hadoop 14 hours The course is intended for IT specialist that works with the distributed processing of large data sets across clusters of computers. Data Mining and Business Intelligence Introduction Area of application Capabilities Basics of data exploration Big data What does Big data stand for? Big data and Data mining MapReduce Model basics Example application Stats Cluster model Hadoop What is Hadoop Installation Configuration Cluster settings Architecture and configuration of Hadoop Distributed File System Console tools DistCp tool MapReduce and Hadoop Streaming Administration and configuration of Hadoop On Demand Alternatives
464042 SOA Design using TOGAF, BPM and SoaML 21 hours Objective: Helping Business Analysts, architects and designers to understand how to efficiently specify and realize a Service Oriented Architecture on the basis of their business goals and align it to changing business and user requirements. This 3 day training course aims at helping business analysts, architects and designers to learn how to specify and realize a featured Service Oriented Architecture to better deal with changes on the business and user requirements (changing objectives, strategies, tactics, rules, user interactions,...) while capitalizing on the business capabilities. Introduction Pros and Cons of the current development methodologies to support the Business Agility, Objectives of the SOA, Connections between Business Architecture, TOGAF, BPM and SOA, Service Definition and Categories, Service Provider and Consumer Components, Service Contract, Metrics Data Transfer Objects vs. Persistence, Service orchestration, Role of the ESB, Top-Down and Bottom-Up approaches, The Layered Logical Architecture The TOGAF Reference Architecture for SOA, Structure and Typology of Services, Architecture Layers (business, functional, application, technique) in the SOA, Presentation of the main components by layer and traceabilities, Steps for aligning IT to changing business requirements, Business Layer Components of the business layer : objectives Traceability in the Business Modeling using BMM, BPMN and UML standards, From the business goals toward processes using Business Capabilities- the IBM's RUP for SOMA, Alignment of business processes and entities on the changing goals, Service Identification on the basis of Business Capabilities, Case Study : Refinement from the Business Vision toward Processes using goal-driven business capabilities, Language Structures of the BPMN : Good practices, Case Study : BPMN Modeling of the previous business process, From the Business to functional layer : Prepare the Architecture to deal with change using reusable and traceable components, Case Study : Elaborate the business architecture backbone of the Goal-Driven SOA, Functional Layer The role of the functional architecture, Service components of the functional layer : objectives Blocks of an urbanized functional architecture : (zone, square, block) Unit Business Services vs. Composite Services, Service Specification using SoaML « services points » and « request points », Identification and specification of use cases (UC) on the basis of services, Case Study : Complete the business architecture backbone of the Goal-Driven SOA using functional components, Invocation of service and UC components from business process actions, The role of the data transfer objects, Case Study : Propagate change from Business Goals till Components of the Functional Layer, From the functional to application layer, Application Layer Service components of the application layer Building application components on the basis of functional ones, The Business Process Execution Language, BPMN / BPEL Mapping, WebServices: Definition, Soap, WSDL, UDDI, standards XSD generation on the basis of Data Models, WSDL generation on the basis of Service Interfaces, Module and Component Assembly, Case Study : Design Application Use case and Service components on the basis of functional ones, ESB features in SOA, JBI, Services Mix and Integration Patterns, Case Study : Integrate use case and service behaviours into the architecture backbone. Horizontal Aspects QoS, Administration and Supervision, Business Activity Monitoring (BAM), Security and Performance, Agility using SOA Agility: factors and impact analysis, Refactoring, reuse and mutualization (advantages and constraints), Versioning, Governance by Objectives , Benefices of the Goal-Driven SOA, Agility : The Goal-Driven Structure of the SOA to support changes, From the business to IT system capitalizing on Business Objects and Capabilities, Impact of the Changes on Processes and Business Objects, Projection on the IT System : Services and Use Cases to be impacted by the changes, Description of the impact of changes on the Use case and Application Service Component behaviours, Integration of behaviours into the backbone of the Goal-Driven SOA and tests. Conclusion Agility and SOA : synthesis Overview on the steps of the Goal-Driven SOA, Traceability from the BMM's business model structures to IT structures to better deal with changes. Overview on the market products Open Source Products (Service Mix, Mule, Open ESB…), Commercial Products Notice: The above training-mentoring sessions are conducted interactively using Business and IT Modeling tools in order to ensure good level of traceability between business specifications and their execution. Concepts are first explained using basic examples and are then followed by solution drafts to your own problems. After this session, we can accompany you by reviewing and validating your solutions depending on your needs. Provided by GooBiz
464048 Business and IT System Agility using Standards 7 hours This introduction seminar provides you with an overview on the business and enterprise architectures as well as methodologies that are used worldwide by the organizations to increase their business and IT System agility. In particular, this seminar aims at helping you to understand frameworks that are used across the world to align ITs with the changing decisions and allows you to evaluate appropriate techniques to apply in your own organization. Introduction Pros and Cons of the current development methodologies to support the Business and IT Agility, Business Architecture : "The missing link between the business strategy and the business architecture" (OMG), Connections between the Enterprise Architectures (TOGAF, Zachman), Business Architectures, BPM, IT and System Engineering Architectures. The "Goal-Driven" structures of the Business Motivation Model (business vision, goals, objectives, missions, strategies, tactics, business rules) and their relationships toward business processes, Refinement from the Enterprise Vision toward Business Processes, Steps to align IT to the evolutions of the business needs. Gaining Agility : From the Business to IT and System layers capitalizing on Capabilities Preparing the Enterprise and IT System Architectures to support changes : The Goal-Driven Structures from the Business to the IT System layers, The Backbone of the Service Architecture structured by capabilities and functions, How to model evolutions on goals, strategies and principles, How to propagate changes from business requirements toward IT components (examples are given on the presentation case study). Impact of the changes upon the Business Processes and Business Objects (Ressources) The BPM : Aligning business processes, responsibilities of their participants and business objects in coherence with strategic changes, Integration of these modifications into components of the business process cartography. Impacts on the IT System Components The Goal-Driven Structures of the System backbone to support changes, How to identify Services (or System functions) and Use Cases that have to be impacted by the changes, How to describe impacts of the change on the behaviours of Service (or System functions) and Use case components, Integration of these evolutions into the SOA (or System Functions) backbone to prepare test cases (examples given on the same case study). Conclusion Steps of an efficient Agile Enterprise / System Architecture Development Methodology, Traceability of the business requirements toward IT System structures in order to better govern them in face of change. Notice : The above training-mentoring sessions are conducted interactively using Business and IT Modeling tools in order to ensure good level of traceability between business and IT specifications. Concepts are explained first using case study examples and may then be followed by solution drafts to your own problems during or after these sessions. We also can accompany you by reviewing and validating your solutions depending on your needs. Minor changes may be brought to their contents depending on the evolutions of these standards and commercial strategies.
164958 REST API - a pattern of exchange of information between sites 14 hours The course is designed for developers, web applications, aims to provide opportunities offered by the REST architectural pattern by which you can communicate between sites. REST - base The need for the exchange of information between sites HTTP POST / GET / PUT / DELETE Services such MushUp and popular applications Services using REST Conventions Rest Mapping CRUD operations on HTTP calls Conventions API URL structure Passing Parameters Return Values HTTP statuses JSON - a universal format for the exchange of information Using the API services - customer Examples of the popular API Create a REST API - Server Gathering requirements and identify functionality Design and API documentation Installing the required libraries Business Object - mapping the class Controller methods Representation of a business object as JSON HTTP Headers - as metadata Testing the API using cURL Authentication mechanisms
209766 Big Data Business Intelligence for Telecom and Communication Service Providers 35 hours Overview Communications service providers (CSP) are facing pressure to reduce costs and maximize average revenue per user (ARPU), while ensuring an excellent customer experience, but data volumes keep growing. Global mobile data traffic will grow at a compound annual growth rate (CAGR) of 78 percent to 2016, reaching 10.8 exabytes per month. Meanwhile, CSPs are generating large volumes of data, including call detail records (CDR), network data and customer data. Companies that fully exploit this data gain a competitive edge. According to a recent survey by The Economist Intelligence Unit, companies that use data-directed decision-making enjoy a 5-6% boost in productivity. Yet 53% of companies leverage only half of their valuable data, and one-fourth of respondents noted that vast quantities of useful data go untapped. The data volumes are so high that manual analysis is impossible, and most legacy software systems can’t keep up, resulting in valuable data being discarded or ignored. With Big Data & Analytics’ high-speed, scalable big data software, CSPs can mine all their data for better decision making in less time. Different Big Data products and techniques provide an end-to-end software platform for collecting, preparing, analyzing and presenting insights from big data. Application areas include network performance monitoring, fraud detection, customer churn detection and credit risk analysis. Big Data & Analytics products scale to handle terabytes of data but implementation of such tools need new kind of cloud based database system like Hadoop or massive scale parallel computing processor ( KPU etc.) This course work on Big Data BI for Telco covers all the emerging new areas in which CSPs are investing for productivity gain and opening up new business revenue stream. The course will provide a complete 360 degree over view of Big Data BI in Telco so that decision makers and managers can have a very wide and comprehensive overview of possibilities of Big Data BI in Telco for productivity and revenue gain. Course objectives Main objective of the course is to introduce new Big Data business intelligence techniques in 4 sectors of Telecom Business (Marketing/Sales, Network Operation, Financial operation and Customer Relation Management). Students will be introduced to following: Introduction to Big Data-what is 4Vs (volume, velocity, variety and veracity) in Big Data- Generation, extraction and management from Telco perspective How Big Data analytic differs from legacy data analytic In-house justification of Big Data -Telco perspective Introduction to Hadoop Ecosystem- familiarity with all Hadoop tools like Hive, Pig, SPARC –when and how they are used to solve Big Data problem How Big Data is extracted to analyze for analytics tool-how Business Analysis’s can reduce their pain points of collection and analysis of data through integrated Hadoop dashboard approach Basic introduction of Insight analytics, visualization analytics and predictive analytics for Telco Customer Churn analytic and Big Data-how Big Data analytic can reduce customer churn and customer dissatisfaction in Telco-case studies Network failure and service failure analytics from Network meta-data and IPDR Financial analysis-fraud, wastage and ROI estimation from sales and operational data Customer acquisition problem-Target marketing, customer segmentation and cross-sale from sales data Introduction and summary of all Big Data analytic products and where they fit into Telco analytic space Conclusion-how to take step-by-step approach to introduce Big Data Business Intelligence in your organization Target Audience Network operation, Financial Managers, CRM managers and top IT managers in Telco CIO office. Business Analysts in Telco CFO office managers/analysts Operational managers QA managers Breakdown of topics on daily basis: (Each session is 2 hours) Day-1: Session -1: Business Overview of Why Big Data Business Intelligence in Telco. Case Studies from T-Mobile, Verizon etc. Big Data adaptation rate in North American Telco & and how they are aligning their future business model and operation around Big Data BI Broad Scale Application Area Network and Service management Customer Churn Management Data Integration & Dashboard visualization Fraud management Business Rule generation Customer profiling Localized Ad pushing Day-1: Session-2 : Introduction of Big Data-1 Main characteristics of Big Data-volume, variety, velocity and veracity. MPP architecture for volume. Data Warehouses – static schema, slowly evolving dataset MPP Databases like Greenplum, Exadata, Teradata, Netezza, Vertica etc. Hadoop Based Solutions – no conditions on structure of dataset. Typical pattern : HDFS, MapReduce (crunch), retrieve from HDFS Batch- suited for analytical/non-interactive Volume : CEP streaming data Typical choices – CEP products (e.g. Infostreams, Apama, MarkLogic etc) Less production ready – Storm/S4 NoSQL Databases – (columnar and key-value): Best suited as analytical adjunct to data warehouse/database Day-1 : Session -3 : Introduction to Big Data-2 NoSQL solutions KV Store - Keyspace, Flare, SchemaFree, RAMCloud, Oracle NoSQL Database (OnDB) KV Store - Dynamo, Voldemort, Dynomite, SubRecord, Mo8onDb, DovetailDB KV Store (Hierarchical) - GT.m, Cache KV Store (Ordered) - TokyoTyrant, Lightcloud, NMDB, Luxio, MemcacheDB, Actord KV Cache - Memcached, Repcached, Coherence, Infinispan, EXtremeScale, JBossCache, Velocity, Terracoqua Tuple Store - Gigaspaces, Coord, Apache River Object Database - ZopeDB, DB40, Shoal Document Store - CouchDB, Cloudant, Couchbase, MongoDB, Jackrabbit, XML-Databases, ThruDB, CloudKit, Prsevere, Riak-Basho, Scalaris Wide Columnar Store - BigTable, HBase, Apache Cassandra, Hypertable, KAI, OpenNeptune, Qbase, KDI Varieties of Data: Introduction to Data Cleaning issue in Big Data RDBMS – static structure/schema, doesn’t promote agile, exploratory environment. NoSQL – semi structured, enough structure to store data without exact schema before storing data Data cleaning issues Day-1 : Session-4 : Big Data Introduction-3 : Hadoop When to select Hadoop? STRUCTURED - Enterprise data warehouses/databases can store massive data (at a cost) but impose structure (not good for active exploration) SEMI STRUCTURED data – tough to do with traditional solutions (DW/DB) Warehousing data = HUGE effort and static even after implementation For variety & volume of data, crunched on commodity hardware – HADOOP Commodity H/W needed to create a Hadoop Cluster Introduction to Map Reduce /HDFS MapReduce – distribute computing over multiple servers HDFS – make data available locally for the computing process (with redundancy) Data – can be unstructured/schema-less (unlike RDBMS) Developer responsibility to make sense of data Programming MapReduce = working with Java (pros/cons), manually loading data into HDFS Day-2: Session-1.1: Spark : In Memory distributed database What is “In memory” processing? Spark SQL Spark SDK Spark API RDD Spark Lib Hanna How to migrate an existing Hadoop system to Spark Day-2 Session -1.2: Storm -Real time processing in Big Data Streams Sprouts Bolts Topologies Day-2: Session-2: Big Data Management System Moving parts, compute nodes start/fail :ZooKeeper - For configuration/coordination/naming services Complex pipeline/workflow: Oozie – manage workflow, dependencies, daisy chain Deploy, configure, cluster management, upgrade etc (sys admin) :Ambari In Cloud : Whirr Evolving Big Data platform tools for tracking ETL layer application issues Day-2: Session-3: Predictive analytics in Business Intelligence -1: Fundamental Techniques & Machine learning based BI : Introduction to Machine learning Learning classification techniques Bayesian Prediction-preparing training file Markov random field Supervised and unsupervised learning Feature extraction Support Vector Machine Neural Network Reinforcement learning Big Data large variable problem -Random forest (RF) Representation learning Deep learning Big Data Automation problem – Multi-model ensemble RF Automation through Soft10-M LDA and topic modeling Agile learning Agent based learning- Example from Telco operation Distributed learning –Example from Telco operation Introduction to Open source Tools for predictive analytics : R, Rapidminer, Mahut More scalable Analytic-Apache Hama, Spark and CMU Graph lab Day-2: Session-4 Predictive analytics eco-system-2: Common predictive analytic problems in Telecom Insight analytic Visualization analytic Structured predictive analytic Unstructured predictive analytic Customer profiling Recommendation Engine Pattern detection Rule/Scenario discovery –failure, fraud, optimization Root cause discovery Sentiment analysis CRM analytic Network analytic Text Analytics Technology assisted review Fraud analytic Real Time Analytic Day-3 : Sesion-1 : Network Operation analytic- root cause analysis of network failures, service interruption from meta data, IPDR and CRM: CPU Usage Memory Usage QoS Queue Usage Device Temperature Interface Error IoS versions Routing Events Latency variations Syslog analytics Packet Loss Load simulation Topology inference Performance Threshold Device Traps IPDR ( IP detailed record) collection and processing Use of IPDR data for Subscriber Bandwidth consumption, Network interface utilization, modem status and diagnostic HFC information Day-3: Session-2: Tools for Network service failure analysis: Network Summary Dashboard: monitor overall network deployments and track your organization's key performance indicators Peak Period Analysis Dashboard: understand the application and subscriber trends driving peak utilization, with location-specific granularity Routing Efficiency Dashboard: control network costs and build business cases for capital projects with a complete understanding of interconnect and transit relationships Real-Time Entertainment Dashboard: access metrics that matter, including video views, duration, and video quality of experience (QoE) IPv6 Transition Dashboard: investigate the ongoing adoption of IPv6 on your network and gain insight into the applications and devices driving trends Case-Study-1: The Alcatel-Lucent Big Network Analytics (BNA) Data Miner Multi-dimensional mobile intelligence (m.IQ6) Day-3 : Session 3: Big Data BI for Marketing/Sales –Understanding sales/marketing from Sales data: ( All of them will be shown with a live predictive analytic demo ) To identify highest velocity clients To identify clients for a given products To identify right set of products for a client ( Recommendation Engine) Market segmentation technique Cross-Sale and upsale technique Client segmentation technique Sales revenue forecasting technique Day-3: Session 4: BI needed for Telco CFO office: Overview of Business Analytics works needed in a CFO office Risk analysis on new investment Revenue, profit forecasting New client acquisition forecasting Loss forecasting Fraud analytic on finances ( details next session ) Day-4 : Session-1: Fraud prevention BI from Big Data in Telco-Fraud analytic: Bandwidth leakage / Bandwidth fraud Vendor fraud/over charging for projects Customer refund/claims frauds Travel reimbursement frauds Day-4 : Session-2: From Churning Prediction to Churn Prevention: 3 Types of Churn : Active/Deliberate , Rotational/Incidental, Passive Involuntary 3 classification of churned customers: Total, Hidden, Partial Understanding CRM variables for churn Customer behavior data collection Customer perception data collection Customer demographics data collection Cleaning CRM Data Unstructured CRM data ( customer call, tickets, emails) and their conversion to structured data for Churn analysis Social Media CRM-new way to extract customer satisfaction index Case Study-1 : T-Mobile USA: Churn Reduction by 50% Day-4 : Session-3: How to use predictive analysis for root cause analysis of customer dis-satisfaction : Case Study -1 : Linking dissatisfaction to issues – Accounting, Engineering failures like service interruption, poor bandwidth service Case Study-2: Big Data QA dashboard to track customer satisfaction index from various parameters such as call escalations, criticality of issues, pending service interruption events etc. Day-4: Session-4: Big Data Dashboard for quick accessibility of diverse data and display : Integration of existing application platform with Big Data Dashboard Big Data management Case Study of Big Data Dashboard: Tableau and Pentaho Use Big Data app to push location based Advertisement Tracking system and management Day-5 : Session-1: How to justify Big Data BI implementation within an organization: Defining ROI for Big Data implementation Case studies for saving Analyst Time for collection and preparation of Data –increase in productivity gain Case studies of revenue gain from customer churn Revenue gain from location based and other targeted Ad An integrated spreadsheet approach to calculate approx. expense vs. Revenue gain/savings from Big Data implementation. Day-5 : Session-2: Step by Step procedure to replace legacy data system to Big Data System: Understanding practical Big Data Migration Roadmap What are the important information needed before architecting a Big Data implementation What are the different ways of calculating volume, velocity, variety and veracity of data How to estimate data growth Case studies in 2 Telco Day-5: Session 3 & 4: Review of Big Data Vendors and review of their products. Q/A session: AccentureAlcatel-Lucent Amazon –A9 APTEAN (Formerly CDC Software) Cisco Systems Cloudera Dell EMC GoodData Corporation Guavus Hitachi Data Systems Hortonworks Huawei HP IBM Informatica Intel Jaspersoft Microsoft MongoDB (Formerly 10Gen) MU Sigma Netapp Opera Solutions Oracle Pentaho Platfora Qliktech Quantum Rackspace Revolution Analytics Salesforce SAP SAS Institute Sisense Software AG/Terracotta Soft10 Automation Splunk Sqrrl Supermicro Tableau Software Teradata Think Big Analytics Tidemark Systems VMware (Part of EMC)
463937 OpenStack Administration - Intermediate 14 hours The course is dedicated to IT engineers and architects who are looking for a solution to host private or public IaaS (Infrastructure as a Service) cloud. Course goal: manual OpenStack cluster installation and configuration Basic Environment: Manual installation and configuration of basic environment Keystone: Manual Keystone Installation Manual Keystone Configuration & Administration Glance: Manual Glance Installation Manual Glance Configuration & Administration Nova: Manual Nova Installation Manual Nova Configuration & Administration Neutron: Manual Neutron Installation Manual Neutron Configuration & Administration Horizon: Manual Horizon Installation Manual Horizon Configuration & Administration Cinder: Manual Cinder Installation Manual Cinder Configuration & Administration Swift: Manual Swift Installation Manual Swift Configuration & Administration Heat: Manual Heat Installation Manual Hetat Configuration & Administration Ceilometer: Manual Ceilometer Installation Manual Ceilometer Configuration & Administration
464045 Business Modeling for an Agile Enterprise 14 hours Objective: Helping Business Analysts to understand how to efficiently model and validate their business processes and resources in order to increase business agility of their organization on the basis of their target architecture and changing market needs. This 2 day training course aims at helping delegates to learn how to model their business processes and resources in order to adapt them to changes of their goals, strategies and impacted capabilities as part of the target architecture. On the basis of the key elements of business performance (strategies, tactics, KPI, business capabilities, etc...), delegates learn there how to elaborate a vision centric business process and resource cartography. Then, only using the appropriate BPMN and UML notation adapted to their language, they understand how to adapt them to changing strategies, tactics and policies. Introduction Definition of an Agile Enterprise and its Enterprise Architecture Comparison of the enterprise architecture’s purposes of Zachman, US FEAF /CISR and TOGAF Elements of the Business Architecture for an Agile Enterprise Business Architecture : the missing link between business strategy and enterprise architecture Connections between the Business Architecture, BPM and SOA Business Motivation Model (BMM) vs Enterprise Business Motivation Model (EBMM) and other Business Models, The core structures and relationships in the Business Motivation Model (SWOT analysis, business vision, goals, objectives, missions, strategies, tactics,... ) toward business processes Guiding the Operating Enterprise using Balanced Score Cards, The Business Architecture Views of the OMG : From the Strategy View to the Organizational View throughout Business Capabilities and Processes Process Modeling : Essential elements, best practices Process Modeling with BPMN adapted to the language of business owners and analysts : Basics, Process, Sub-process, Activity, Task, Pool, Lane, Detailed Events and Gateway typology, Synchronization, Connectors, Message Flows, Compensations, Good practices Overview on the Process Modeling, Execution and Monitoring tools Using BPMN and UML to model Business Processes and Business Objects (Resources) Case Study : Refinement of Goals from the Business Vision toward Business Processes and Resources Gaining Agility with Business Process using BPMN and UML 2 How to model business processes to render the underlying IT system more reactive to changes according to TOGAF Architecture Layers ? BPMN, UML and SoaML to support changes on the business process and business object models Updating Target Architecture business models by changing strategies capitalizing on Business Capabilities Case Study : Elaborating an agile process and resource model easy to maintain in face of changes Adapting "business models" to changes of the business requirements Modeling changes on goals, strategies, tactics and business rules How to adapt processes and resources in coherence to such evolutions ? Case Study : Adapting business processes and resources to changing business requirements and rules Conclusion Steps of an efficient Agile Process and Resource Modeling Frameworks for tracing business requirements from the Business Motivation Model elements toward IT structures in order to better govern them in face of change. Notice: In case of "on-site" delivery of such a workshop session, we may also adapt its content and case studies to your needs and business case in order to provide you with a good starting point and roadmap. After this workshop, we can also accompany you through review sessions for validating your architecture solutions conformance to your business needs. Provided by GooBiz
164941 Create OpenStack cloud infrastructure 14 hours The course helps to understand and implement cloud infrastructure based on OpenStack. The participant learns the architecture and capabilities of OpenStack and a variety of installation scenarios. Introduction OpenStack Architecture Core services Additional services Environment Planning implementation Preparing the environment Identity service Installing Keystone Architecture Authentication Image service Installing Glance Architecture Adding images Compute service Installing Nova Architecture Adding compute nodes Network service Installing Neutron Architecture Creating a simple network Block storage service Installing Cinder Architecture Administration Creating users and projects Creating and destroying instances Creating and attaching volumes Configuration tools
209771 IoT (Internet of Things) for Entrepreneurs, Managers and Investors 21 hours Estimates for Internet of Things or IoT market value are massive, since by definition the IoT is an integrated and diffused layer of devices, sensors, and computing power that overlays entire consumer, business-to-business, and government industries. The IoT will account for an increasingly huge number of connections: 1.9 billion devices today, and 9 billion by 2018. That year, it will be roughly equal to the number of smartphones, smart TVs, tablets, wearable computers, and PCs combined. In the consumer space, many products and services have already crossed over into the IoT, including kitchen and home appliances, parking, RFID, lighting and heating products, and a number of applications in Industrial Internet. However the underlying technologies of IoT are nothing new as M2M communication existed since the birth of Internet. However what changed in last couple of years is the emergence of number of inexpensive wireless technologies added by overwhelming adaptation of smart phones and Tablet in every home. Explosive growth of mobile devices led to present demand of IoT. Due to unbounded opportunities in IoT business, a large number of small and medium sized entrepreneurs jumped on a bandwagon of IoT gold rush. Also due to emergence of open source electronics and IoT platform, cost of development of IoT system and further managing its sizable production is increasingly affordable. Existing electronic product owners are experiencing pressure to integrate their device with Internet or Mobile app. This training is intended for a technology and business review of an emerging industry so that IoT enthusiasts/entrepreneurs can grasp the basics of IoT technology and business. Course objectives Main objective of the course is to introduce emerging technological options, platforms and case studies of IoT implementation in home & city automation (smart homes and cities), Industrial Internet, healthcare, Govt., Mobile Cellular and other areas. Basic introduction of all the elements of IoT-Mechanical, Electronics/sensor platform, Wireless and wireline protocols, Mobile to Electronics integration, Mobile to enterprise integration, Data-analytics and Total control plane M2M Wireless protocols for IoT- WiFi, Zigbee/Zwave, Bluetooth, ANT+ : When and where to use which one? Mobile/Desktop/Web app- for registration, data acquisition and control –Available M2M data acquisition platform for IoT-–Xively, Omega and NovoTech, etc. Security issues and security solutions for IoT Open source/commercial electronics platform for IoT-Raspberry Pi, Arduino , ArmMbedLPC etc Open source /commercial enterprise cloud platform for IoT-Ayla, iO Bridge, Libellium, Axeda, Cisco frog cloud Studies of business and technology of some of the common IoT devices like Home automation, Smoke alarm, vehicles, military, home health etc Target Audience Investors and IoT entrepreneurs Managers and Engineers whose company is venturing into IoT space Business Analysts & Investors Pre-requisites Should have basic knowledge of business operation, devices, electronics systems and data systems Must have basic understanding of software and systems Basic understanding of Statistics ( in Excel levels) 1. Day 1, Session 1 — Business Overview of Why IoT is so important Case Studies from Nest, CISCO and top industries IoT adaptation rate in North American & and how they are aligning their future business model and operation around IoT Broad Scale Application Area Smart House and Smart City Industrial Internet Smart Cars Wearables Home Healthcare Business Rule Generation for IoT 3 layered architecture of Big Data — Physical (Sensors), Communication, and Data Intelligence 2. Day 1, Session 2 — Introduction of IoT: All about Sensors – Electronics Basic function and architecture of a sensor — sensor body, sensor mechanism, sensor calibration, sensor maintenance, cost and pricing structure, legacy and modern sensor network — all the basics about the sensors Development of sensor electronics — IoT vs legacy, and open source vs traditional PCB design style Development of sensor communication protocols — history to modern days. Legacy protocols like Modbus, relay, HART to modern day Zigbee, Zwave, X10,Bluetooth, ANT, etc. Business driver for sensor deployment — FDA/EPA regulation, fraud/tempering detection, supervision, quality control and process management Different Kind of Calibration Techniques — manual, automation, infield, primary and secondary calibration — and their implication in IoT Powering options for sensors — battery, solar, Witricity, Mobile and PoE Hands on training with single silicon and other sensors like temperature, pressure, vibration, magnetic field, power factor etc. 3. Day 1, Session 3 — Fundamental of M2M communication — Sensor Network and Wireless protocol What is a sensor network? What is ad-hoc network? Wireless vs. Wireline network WiFi- 802.11 families: N to S — application of standards and common vendors. Zigbee and Zwave — advantage of low power mesh networking. Long distance Zigbee. Introduction to different Zigbee chips. Bluetooth/BLE: Low power vs high power, speed of detection, class of BLE. Introduction of Bluetooth vendors & their review. Creating network with Wireless protocols such as Piconet by BLE Protocol stacks and packet structure for BLE and Zigbee Other long distance RF communication link LOS vs NLOS links Capacity and throughput calculation Application issues in wireless protocols — power consumption, reliability, PER, QoS, LOS Hands on training with sensor network PICO NET- BLE Base network Zigbee network-master/slave communication Data Hubs : MC and single computer ( like Beaglebone ) based datahub 4. Day 1, Session 4 — Review of Electronics Platform, production and cost projection PCB vs FPGA vs ASIC design-how to take decision Prototyping electronics vs Production electronics QA certificate for IoT- CE/CSA/UL/IEC/RoHS/IP65: What are those and when needed? Basic introduction of multi-layer PCB design and its workflow Electronics reliability-basic concept of FIT and early mortality rate Environmental and reliability testing-basic concepts Basic Open source platforms: Arduino, Raspberry Pi, Beaglebone, when needed? RedBack, Diamond Back 5. Day 2, Session 1 — Conceiving a new IoT product- Product requirement document for IoT State of the present art and review of existing technology in the market place Suggestion for new features and technologies based on market analysis and patent issues Detailed technical specs for new products- System, software, hardware, mechanical, installation etc. Packaging and documentation requirements Servicing and customer support requirements High level design (HLD) for understanding of product concept Release plan for phase wise introduction of the new features Skill set for the development team and proposed project plan -cost & duration Target manufacturing price 6. Day 2, Session 2 — Introduction to Mobile app platform for IoT Protocol stack of Mobile app for IoT Mobile to server integration –what are the factors to look out What are the intelligent layer that can be introduced at Mobile app level ? iBeacon in IoS Window Azure Linkafy Mobile platform for IoT Axeda Xively 7. Day 2, Session 3 — Machine learning for intelligent IoT Introduction to Machine learning Learning classification techniques Bayesian Prediction-preparing training file Support Vector Machine Image and video analytic for IoT Fraud and alert analytic through IoT Bio –metric ID integration with IoT Real Time Analytic/Stream Analytic Scalability issues of IoT and machine learning What are the architectural implementation of Machine learning for IoT 8. Day 2, Session 4 — Analytic Engine for IoT Insight analytic Visualization analytic Structured predictive analytic Unstructured predictive analytic Recommendation Engine Pattern detection Rule/Scenario discovery — failure, fraud, optimization Root cause discovery 9. Day 3, Session 1 — Security in IoT implementation Why security is absolutely essential for IoT Mechanism of security breach in IOT layer Privacy enhancing technologies Fundamental of network security Encryption and cryptography implementation for IoT data Security standard for available platform European legislation for security in IoT platform Secure booting Device authentication Firewalling and IPS Updates and patches 10. Day 3, Session 2 — Database implementation for IoT : Cloud based IoT platforms SQL vs NoSQL-Which one is good for your IoT application Open sourced vs. Licensed Database Available M2M cloud platform Axeda Xively Omega NovoTech Ayla Libellium CISCO M2M platform AT &T M2M platform Google M2M platform 11. Day 3, Session 3 — A few common IoT systems Home automation Energy optimization in Home Automotive-OBD IoT-Lock Smart Smoke alarm BAC ( Blood alcohol monitoring ) for drug abusers under probation Pet cam for Pet lovers Wearable IOT Mobile parking ticketing system Indoor location tracking in Retail store Home health care Smart Sports Watch 12. Day 3, Session 4 — Big Data for IoT 4V- Volume, velocity, variety and veracity of Big Data Why Big Data is important in IoT Big Data vs legacy data in IoT Hadoop for IoT-when and why? Storage technique for image, Geospatial and video data Distributed database Parallel computing basics for IoT
463938 OpenStack Administration - Basic 14 hours The course is dedicated to IT engineers and architects who are looking for a solution to host private or public IaaS (Infrastructure as a Service) cloud. Course goal: gaining basic knowledge regarding OpenStack design, installation and administration automated OpenStack cluster installation and configuration Introduction: What is OpenStack? Foundations of Cloud Computing Virtualization vs clustering OpenStack evolution OpenStack distributions OpenStack releases OpenStack deployment solutions OpenStack services OpenStack competitors   OpenStack Administration: Basic terms IaaS model Supported hypervisors Supported image formats Basic architecture Design concerns Installation concerns Configuration concerns Administration concerns Automation concerns Growth planning High Availability concerns Automated OpenStack installation with PackStack How to download and execute RC files How to create an external network in Neutron How to upload an image to Glance How to create a new flavor in Nova How to update default Nova and Neutron quotas How to create a new tenant in Keystone How to create a new user in Keystone How to manage roles in Keystone How to create a tenant network in Neutron How to create a router in Neutron How to manage router’s interfaces in Neutron How to update security groups in Neutron How to upload RSA key-pair to the project How to allocate floating IPs to the project How to launch an instance from image in Nova How to associate floating IPs with instances How to create a new volume in Cinder How to attach the volume to the instance How to take a snapshot of the instance How to take a snapshot of the volume How to launch an instance from snapshot in Nova How to create a volume from snapshot in Cinder How to create a container in Swift How to upload data to the container in Swift   Basic Environment: Prerequisites Nodes and networks AMQP Keystone: Objects API concerns Components Backends Authentication process   Glance: Components Backends   Nova: Components Flavors Instances launching and termination process Schedulers awareness Remote access   Neutron: Components Network virtualization Virtual network devices L2 agent OVS ML2 Bringing it all together - Compute Bringing it all together - Networker Virtual networks L3 agent DHCP agent   Horizon: Backends Cinder: Volumes Components Backends   Swift: What is object storage? Replication Structure Data addressing Modified consistent hashing ring Data placement Metadata placement Part power Ring internals Ring builder Components Backends   Heat: Use cases Components Templates “Hello World” template   Ceilometer: Use cases Basic concepts Components Polling agents Backends   Adding Compute Node: Manual addition of a Compute Node  
464046 Leveraging Business Agility - TOGAF 9.1 and ArchiMate 2 in Practice 14 hours Designing your Enterprise Architecture using TOGAF 9.1 and ArchiMate 2 in Practice (2 or 3 days for TOGAF Certified Architects or people that are interested in putting TOGAF in practice using an EA Framework) Objective: This course aims at helping attendees understand how to applyTOGAF 9.1 and ArchiMate 2 in practice to meet the enterprise business goals and strategies. Concepts and techniques explained during the course are progressively applied by the attendees using a case study and different exercises on it. Essential concepts of TOGAF (Reminder) and Introduction to ArchiMate 2 Enterprise Architecture Frameworks, The Architecture Development Method (ADM) of TOGAF and its phases, The Architecture Repository and its evolution on the basis of the ADM phases, Drivers, Strategies, Capabilities, Principles and ViewPoints in TOGAF, Enterprise Continuum to structure the repository and other tools of TOGAF, Governance of the programs and projects: The Architecture Capability Framework, The Enterprise Architecture Governance and its role in the enterprise transformation, TOGAF Corporate EA, IT, SOA and security governance, Architecture and enterprise strategy, Engagement and contracts of the architecture, Realizing Strategies on a Capability basis, Elements of the Architecture Content Framework, Introduction to the ArchiMate modeling language, its meta-models and viewpoints, Case Study: Presentation of the Case Study - an enterprise transformation issue (current state, target state). High-Level organization of the enterprise architecture, Business Transformation : From Drivers, Goals and Objectives to the Architecture Vision Re-formulating the enterprise strategy and its activity domains, Assigning new responsibilities to existing capabilities, Horizontal and vertical impact analysis to ensure coherent deployment of the Target Architecture, Managing the performance level of target capabilities, A tentative impact analysis to elaborate target functions using UML, The business architecture with ArchiMate, its meta-model and motivation viewpoints, Determining business functions using ArchiMate Viewpoints, Risk factors and Mitigation Actions upon business functions, Exercise on the Case Study On the basis of strategies and baseline capabilities, assign responsibilities to existing capability components, make the impact analysis to ensure a coherent future deployment of the target architecture, Plan risk mitigation actions related to business functions. Structuring Capabilities to mitigate risks and analyze Impacts throughout Architecture Layers The application & technology architecture of ArchiMate, their meta-model and viewpoints, Structure Capabilities to track risk mitigation by function, adapt them to changing goals, Align the SOA backbone of the Target Architecture with emerging business functions, underlying services and SLAs, Adapting related Business Process Models to strategic changes, Impact Analysis of changing capabilities until the technology layer, Exercise on the Case Study Structure Capabilities to mitigate risks, Elaborate SLAs for Services exposed by Business Functions, Assess Impacts of changing capabilities from Business till the Technology layer. Modeling the Roadmap, Transition Architectures to Coordinate Implementation Projects Identify components of the potential architecture roadmap : gaps between initial and target technical architecture, consolidated RoadMap to reach the Target Architecture, Transition Architectures and matrices for incremental architecture definitions, Capability Increments for Transition Architectures, Work packages by consolidating gaps, potential solutions and dependencies, Work Packages of Actions to implement capability increments, Management of projects portfolio for assessing business values of the projects on the basis of risks, Coordinating’ Implementation Projects using RoadMap Modeling, Exercise on the Case Study On the basis of the enterprise target architectures previously elaborated, establish the consolidated gap & dependencies matrix and define the work packages, Coordinate Implementation Projects on the basis of business values and appropriate transition architectures to meet constraints of the consolidated target architecture. Plugging Solution Building Blocks into Capability Based SOA Backbone From the Functional Architecture to Service Oriented Architecture, Architecture and solution building blocks, Information flows between services, Constraints upon service components of the technical architecture, Determining expected behaviors from Solution Building Blocks, Plugging Solution Building Blocks into the Capability Based SOA Backbone, Exercise on the Case Study Define the architecture backbone of the SOA building blocks on the basis of capabilities and services Use them to prepare the « plug-in » of solution building blocks components Conclusion Recap on the steps of the Architecture Development Process, a panorama Best Practices for efficient usage of ArchiMate and UML Diagrams throughout TOGAF ADM Provided by GooBiz
165106 Analysis and Design with SoaML 14 hours This course explains the OMG SoaML standards and shows how to model the SOA landscape. It introduces the language and then shows how to discover, design and implement services and infrastructure for SOA. This course always covers the newest version of the SoaML specification. Motivation behind SoaML Standards before SoaML Vendors standards and Open Source standards The IT and the business perspective on SOA Contracts and Interfaces Top-down and bottom-up approaches Service classification Compliance Level for SoaML SoaML UML Profile Specification Agent Attachment Capability Consumer Collaboration Collaboration Use Expose MessageType Milestone Participant Port Property Provider Request ServiceChannel ServiceContract ServiceInterface Service ServiceArchitecture Categorization Catalog Categorization Category CategoryValue RAS Placeholders BMM Integration MotivationElement MotivationRealziation SoaML Metamodel
417046 It is all about Cloud: Key Concepts, Players, and Technologies 21 hours Audience IT architects, mid-level IT managers, IT consultants Format of the course Currently 100% lectures. 1.Introduction to Cloud Computing How did we get here -  From application hosting to SaaS to public & private cloud Cloud definition Chose your flavor: IaaS, PaaS, SaaS A cloud reference architecture Typical cloud usage scenarios SaaS vs. traditional enterprise computing The programmable Web: an API in the cloud Moving into the cloud Better utilization through resource virtualization Cloud management for elasticity: automated, on-demand provisioning of resources Evolving the economy of scale through shared infrastructure and applications Cloud benefits and challenges 2.Infrastructure as a Service (IaaS) IaaS architecture and key features What to look for when selecting an IaaS provider? Overview of major IaaS providers IaaS examples Microsoft Windows Azure Web Roles & Worker Roles Scalability, load balancing, fail over Amazon Web Services (AWS) Elastic Compute Cloud (EC2) & Amazon Machine Images (AMI) IaaS+: AWS Application Services and Marketplace Regions & Availability Zones Networking & security Monitoring, Auto Scaling, & Load Balancing Building scalable and fault-tolerant applications The big AWS outage & how to protect yourself Management interfaces 3.Private & Hybrid Cloud Private cloud: drivers & challenges Defining the requirements A Methodology for building a private cloud How to manage the private cloud Who can help: vendor overview VMware Abiquo Amazon Virtual Private Cloud Hybrid clouds Use cases Product example: Eucalyptus How to select a private cloud model 4.PaaS: Key Concepts & Major Players PaaS defined A complete PaaS stack Where to draw the line: IasS+ or pure-PaaS or custom-SaaS? What functionality do we need to build applications for the cloud? Multi-Tenancy What is a multi-tenant system? Evolving the economy of scale Customizing the application for a tenant Considerations for multi-tenant applications: Stability, SLA, legal & regulatory, security, maintenance, 3rd-party components A detailed look at major PaaS providers: Microsoft Windows Azure Google App Engine Force.com Outlook: the future of PaaS 5.Synergy of SOA and Cloud Computing Services and SOA defined Service Layer Model & the concept of loose coupling SOA + Event Driven Architecture (EDA) = e-SOA What is REST and why is it important for the cloud? Synergy of SOA and Cloud - the industry view SOA / SaaS synergy SOA / PaaS synergy Approaches to meet demand Applying SOA principles to the cloud: loose coupling, encapsulation, asynchronous services Building multi-tenancy applications based on SOA Migrating legacy systems into the cloud SOA / IaaS synergy Service-Oriented Infrastructure (SOI) Service virtualization vs. server virtualization Automated, on-demand resource provisioning 6.Cloud Integration The need for cloud integration and its challenges How SOA can help: focus on integration From application integration to Service Oriented Integration (SOI) The need for (inter)mediation Mediation functionality Enterprise Service Bus (ESB) reference architectures What are the particular requirements for cloud integration? From ESB to “Internet Service Bus” Product Examples: Windows Azure AppFabric IBM Cast Iron Fiorano 7.Standards and Open Source Software Cloud standards Portability & interoperability: problem statement Distributed Management Task Force, Inc. (DMTF) Open Virtualization Format (OVF) Open Cloud Standards Incubator Apache Libcloud Open Source Software (OSS) OpenStack 8.Securing the Cloud The evolution to Cloud Security From traditional Web applications to SOA to Cloud Public cloud vs. on-premise datacenter Cloud security is a multi-dimensional problem Dimension 1: IaaS, PaaS, SaaS Dimension 2: Network, VM, application, data Dimension 3: CSP, tenant Identity, Entitlement & Access Management (IdEA) Authentication & Access Control SAML, XACML, and Policy Enforcement Point (PEP) Security across on-premise systems & multiple Clouds Cloud Security Alliance standards Cloud Controls Matrix, Consensus Assessments Initiative, Cloud Audit, Cloud Trust Protocol Security, Trust, and Assurance Registry 9.Governance for Cloud-based Services Business vs. IT vs. EA vs. SOA vs. Cloud Governance Why SOA governance can (should) be the basis for Cloud governance SOA governance frameworks, standards, technologies Open Group’s Service Integration Maturity Model (OSIMM) Open Group SOA Governance Reference Model (SGRM) SOA Governance Vitality Method (SGVM) Cloud governance Similarities and differences to SOA governance Delineating responsibilities: cloud provider vs. cloud customer Switching cloud providers – the worst case test for your governance A Cloud governance methodology Technologies for implementing governance 10.Outlook and Conclusions Outlook and usage for cloud computing Hadoop – gaining popularity in the Cloud Cloud Return on Investment (ROI) Total Cost of Ownership (TCO)
463966 OpenStack Administration - Advanced 14 hours The course is dedicated to IT engineers and architects who are looking for a solution to host private or public IaaS (Infrastructure as a Service) cloud. Course goal: gaining advanced knowledge regarding OpenStack installation and administration Introduction Nova: Migrations and evacuations How to migrate an instance offline How to migrate an instance in real time How to evacuate an instance Host aggregates and availability zones How to create a host aggregate How to assign compute nodes to the host aggregate How to expose the host aggregate via availability zone How to expose the host aggregate via flavor Neutron: Awareness of advanced network architectures Intra-tenant and inter-tenant routing How to provide an intra-tenant routing How to provide an inter-tenant routing LBaaS agent Manual LBaaS agent installation Manual LBaaS agent configuration How to create a LB pool How to create a LB pool monitor How to assign members to the LB pool How to expose the LB pool via VIP Testing LBaaS FWaaS agent Manual FWaaS agent installation Manual FWaaS agent configuration How to create firewall rules How to create firewall policies How to create firewalls How to associate firewalls with routers Testing FWaaS VPNaaS agent Manual VPNaaS agent installation Manual VPNaaS agent configuration How to create VPN services How to create VPN policies How to create VPN connections Cinder: Advanced instances launching options How to boot an instance on a volume How to boot an instance from the volume Multiple backends How to configure a NFS-based backend How to configure multiple backends How to indicate which backend to use when creating a volume Backups How to configure a NFS-based backup storage How to create a backup of the volume How to create a volume from the backup Migrations and transfers How to migrate a volume from one backend to the other How to transfer a volume from one project to the Rother Trove: Use cases Basic concepts Components Backends Configuration & administration Manual Trove installation Manual Trove configuration How to launch Trove instancje Sahara: Use cases Basic concepts Components Supported plugins Configuration & administration Manual Sahara installation Manual Sahara configuration How to launch Sahara cluster How to decommission a compute node
206169 Nato Architecture Framework (NAF) 35 hours This course gives a solid understanding across all aspects of Nato Architecture Framework. It does not focus on a specific view or function, but allows the delegates to easily find more information in the documentation and easily understand it. During the course the delegates will do simple exercises, answer questions, etc... Sparx Enterprise Architect is usually used during the course, but any other tools can be used instead. Background NATO C3 NATO C3 Organisation Mission NAF goals Framework Documentation Structure What is inside the NAF How NAF works NATO Network Enabled Capability What is an Enterprise Architecture? How to describe the architecture? Why Architecture Matters? Architecture is a language EA and decisions Types of NATO Architectures Quiz: Which architecture is described by the sentences below? Overarching Architecture (OA) Reference Architectures (RA) Target Architectures (TA) Baseline Architecture NATO Architecture Views NATO All View (NAV) NATO Capability View (NCV) NATO Operational View (NOV) NATO Service-Oriented View (NSOV) NATO Systems View (NSV) NATO Technical View (NTV) NATO Programme View (NPV) Stakeholders Communities of Interest Life-cycle management in NAF How NAF align stakeholders interest with the architecture? Identification of Stakeholders Identification of Communities of Interest (CoIs) Example CoIs Relation between Stakeholders and CoI’s Requirements Analysis of CoIs Description of CoI Interests CoI’s Architecture Interests and Impacts Requirements of Architecture Views
417009 Cloud Architect 35 hours Day 1 - provides end-to-end coverage of fundamental cloud computing topics as they relate to both technology and business. The module is divided into a series of sections, each of which is accompanied by a hands-on exercise. Day 2 - explores technology-related topics that relate to cloud computing platforms. It does not get into implementation or programming details, but instead keeps coverage at a conceptual level, focusing on topics that address cloud service architecture, cloud security threats and technologies, virtualization and data processing. Day 3 - provides a technical insight into foundational cloud computing platforms. Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) environments are explored as compound patterns, comprised of unique and shared building blocks. This module is structured as a guided tour through these architectural layers, describing primary components, highlighting shared components and explaining how building blocks can be assembled and implemented via cloud computing mechanisms and practices Day 4 - builds upon Day 3 to provide a deep dive into elastic, resilient and multitenant technology architectures, as well as specialized solution architectures, such as cloud bursting and cloud balancing. Through the study of architectural mechanisms, industry technologies and design patterns, both core and extended components are described that combine to realize elasticity, resiliency and multitenancy as primary characteristics of cloud platforms. By leveraging these native and enhanced scalability and failover-related feature-sets, specialized solution architectures are described to enable bursting between clouds and on-premise and cloud environments, as well as the balancing of runtime loads across clouds for performance and failover purposes. Day 5 - presents participants with a series of exercises and problems that are designed to test their ability to apply their knowledge of topics covered previously. Day 1 - Fundamental Cloud Computing Fundamental Cloud Computing Terminology and Concepts Basics of Virtualization Specific Characteristics that Define a Cloud Understanding Elasticity, Resiliency, On-Demand and Measured Usage Benefits, Challenges and Risks of Contemporary Cloud Computing Platforms and Cloud Services Cloud Resource Administrator and Cloud Service Owner Roles Cloud Service and Cloud Service Consumer Roles Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) Cloud Delivery Models Combining Cloud Delivery Models Public Cloud, Private Cloud, Hybrid Cloud and Community Cloud Deployment Models Business Cost Metrics and Formulas for Comparing and Calculating Cloud and On-Premise Solution Costs Service Level Agreements (SLAs) for Cloud-based IT Resources Formulas for Calculating and Rating SLA Quality of Service Characteristics Cloud Technology Concepts Cloud Computing Mechanisms that Establish Architectural Building Blocks Virtual Servers, Ready-Made Environments, Failover Systems, and Pay-for-Use Monitors Cloud Balancing and Cloud Bursting Architectures Common Risks, Threats and Vulnerabilities of Cloud-based Services and Cloud-hosted Solutions Cloud Security Mechanisms Used to Counter Threats and Attacks Understanding Cloud-Based Security Groups and Hardened Virtual Server Images Cloud Service Implementation Mediums (including Web Services and REST Services) Cloud Storage Benefits and Challenges Cloud Storage Services, Technologies and Approaches Non-Relational (NoSQL) Storage Compared to Relational Storage Cloud Service Testing Considerations and Testing Types Day 3 - Fundamental Cloud Architecture Technology Architectural Layers of Cloud Environments Public and Private Cloud Technology Architecture laaS, PaaS and SaaS Technology Architecture Cloud Computing Mechanisms as part of Platform and Solution Technology Architectures Bare-Metal and Elastic Disk Provisioning Multipath Resource Access, Broad Access and Intelligent Automation Engines Usage and Pay-as-You-Go Monitoring Platform Provisioning and Rapid Provisioning Resource Management and Realtime Resource Availability Shared Resources, Resource Pools and Resource Reservation Self-Service and Usage and Administration Portals Workload Distribution and Service State Management Other technology architecture topics pertaining to cloud platforms, cloud-based solutions and services may also be explored. Advanced Cloud Architecture Elastic Environment Resilient Environment Multitenant Environment Direct I/O Access and Direct LUN Access Dynamic Data Normalization Zero Downtime and Storage Maintenance Window Load Balanced Virtual Servers Burst In, Burst Out and Cloud Bursting Cloud Balancing Redundant Storage and Storage Workload Management Elastic Disk Provisioning, Elastic Resource Capacity and Elastic Network Capacity Intra-Storage and Cross-Storage Device Vertical Tiering Redundant Physical Connections for Virtual Servers and Persistent Virtual Network Configurations Load Balanced Virtual Switches and Service Load Balancing Hypervisor Cluster Dynamic Failure and Recovery Synchronized Operating State Resource Reservation Other technology architecture topics pertaining to cloud platforms, cloud-based solutions and services may also be explored. Day 5 - Cloud Architecture Lab As a hands-on lab, this module provides a set of detailed exercises, that require participants to solve a number of inter-related problems, with the ultimate goal of evaluating, designing and correcting technology architectures to fulfill specific sets of solution and business automation requirements.
463967 OpenStack Administration - Expert 14 hours The course is dedicated to IT engineers and architects who are looking for a solution to host private or public IaaS (Infrastructure as a Service) cloud. Course goal: gaining expert knowledge regarding OpenStack installation and administration. Introduction Keystone: Tokens Authentication process Integration of the identity backend with LDAP Integration of the assignment backend with LDAP Glance: Direct images download Images cache How to configure Glance cache How to manage Glance cache Horizon: Customization How to change site colors How to change logo on login screen How to change help URL Heat: AutoScaling - basic concepts Integration of AutoScaling with Neutron LBaaS agent How to launch Heat stack How to launch AutoScaling stack Testing AutoScaling stack Ceilometer: How to create alarms How to monitor and manage alarms Ironic: Use cases Components Architecture High Availability: Statefull vs stateless services Active/Passive vs Active/Active architecture Manually install, configure and manage MariaDB Galera Cluster Manually install, configure and manage HAProxy Manually install, configure and manage Corosync Manually install, configure and manage Pacemaker Testing High Availability
209794 Service-Oriented Architecture: Strategy, Technology and Methodology 35 hours This course is intended for Post Graduate (or equivalent) level students and will be a combination of lectures and lab sessions (theory and practice). At the end of the course the student should be able to: Knowledge and Understanding. Understand the principles and business advantage of systems developed around services. Become fully aware of the major protocols and technologies involved in the web services standard, and understand how these technologies fit together. Your knowledge will extend to leading-edge and emerging aspects of web services as well as the more established elements of the standard. Understand in depth the technology used to enable systems based on a widely used programming language to both use and provide Web Services. Intellectual Skills: Identify where the service oriented approach and in particular web services are appropriate for particular business scenarios. Consider the most effective design for a web services solution Acquire, in the future, knowledge and understanding of emerging aspects of the rapidly evolving web services standard Practical Skills: Operate with current technologies associated with Web Services that are platform neutral – XML, SOAP, WSDL Write and expose web services in a widely used programming language and write client code in that language to invoke web services. The overall approach to design of systems based on services XML The RESTful approach to web services and the SOAP standard The Web Services Definition Language (WSDL) and other standards for the specification of services. Advanced web service standards to ensure such features as security and reliability BPEL, the Business Process Execution Language Web services in the cloud and the use of web services by mobile devices.
463698 Linux Cluster and Storage Management on CentOS 6 & 7 35 hours Created Linux Administrators and developers who are interested with getting involved in Clustering or require knowledge of Clustering based on Linux system. Even beginners, who have the basic skill and knowledge on Linux, can catch up with this course just if you follow the instructor's lab and explanation in detail. This course is intended to practice enough clustering technology and to show it is very easy to understand the clustering technology on Linux system. This course will be delivered to audience with 40% lectures, 50% labs and 10% Q&A. This five-day course strongly emphasizes lab-based activities. You'll learn how to deploy and manage shared storage and server clusters that provide highly available network services to a mission-critical enterprise environment. It can be deliver on any distribution (CentOS and Ubuntu are commonly used) This course covers these kinds of topics: Chapter 01 Linux Cluster Introduction Chapter 02 Data Storage and Cluster Configuration Considerations Chapter 03 iSCSI Configuration Chapter 04 Device Mapper and Multipath Chapter 05 Linux Cluster Configuration with Conga Chapter 06 Linux Cluster Configuration with CCS Chapter 07 Fencing and Failover Domain Chapter 08 Quorum and Quorum Disk Chapter 09 Cluster Logical Volume Management Chapter 10 Global File System 2 Chapter 11 Samba Cluster Chapter 12 Apache Cluster with Conga and CCS Chapter 13 Database Cluster with MySQL Chapter 14 Linux Cluster using Pacemaker Chapter 15 Apache Cluster using Pacemaker Chapter 16 Linux Cluster using PCSD Web UI Chapter 17 Database Cluster with MariaDB
464017 OpenStack Architecture Design 14 hours The course is dedicated to IT engineers and architects who are looking for a solution to host private or public IaaS (Infrastructure as a Service) cloud. Course goal: gaining expert knowledge regarding OpenStack architecture design Introduction Security and legal requirements General concepts Compute architecture design Storage architecture design Network architecture design Multi-site architecture design Hybrid architecture design Massively scalable architecture design Specialized cases
226133 Department of Defense Architecture Framework (DoDAF) Overview 21 hours The Department of Defense Architecture Framework (DoDAF) is an architecture framework for the United States Department of Defense, that provides structure for a specific stakeholder concern through viewpoints organized by various views. DoDAF defines a set of views that act as mechanisms for visualizing, understanding, and assimilating the broad scope and complexities of an architecture description through tabular, structural, behavioral, ontological, pictorial, temporal or graphical means. It is especially suited to large systems with complex integration and interoperability challenges, and is apparently unique in its use of operational views detailing the external customer's operating domain in which the developing system will operate. DoDAF Architecture Framework Introduction DoDAF Architecture Vision DoDAF Architecture Resources Relationships to Other Architecture Frameworks DoDAF Architecture Background Architecture Development Methodologies DoDAF View points and Models DM2 - DoDAF Meta-Model DoDAF Roles - Manager, Architect, Developer
463781 Cloud, SaaS, IaaS - pratical overview of available options 35 hours This course is created for people who face choices which solution to choose for a specific problem. IT Managers, Solution Architects, Test Managers, System Administrators and Developers can benefit from this course by understanding the benefits and costs of available Cloud/SaaS/Iaas solutions. Overview of Cloud Virtalization (e.g. VirtualBox, WMware, KVM...) Hardware support for virtalization (sharing networki interfaces, etc...) Share nothing storage (S3, Ceph, Glacier) Mixed model (Bare Metal + Cloud) Public Cloud Providers Amazon Azure Google Aliyun UnitedStack Private Cloud Solutions OpenStack Amazon EC2 Ohters Software as a Service Benefits over deployable software Constomer isoaltion Legal aspects influencing solution Redunancy Availability Managing upgrades, versionsing, etc... Deployment options (BeanStalk, etc...) Redundant Databases NoSQL (e.g. MongoDB) SQL/NewSQL (e.g. Galera Cluster) Automate redundancy management with RDS Pros vs Cons Dealing with transactioons and consistency Hadoop Redundant WebServers Loadbalacing DNS load balacing (roundrobin, geo-proximity, etc..., e.g. Route53) Session handling Virtual Image Management (Appliances) Image formats Transfering images between zones Image interoperability between clouds
464018 OpenStack in Multi-Site Environment 14 hours The course is dedicated to IT engineers and architects who are looking for a solution to host private or public IaaS (Infrastructure as a Service) cloud. Course goal: gaining knowledge regarding OpenStack design, installation and configuration in multi-site environment Introduction OpenStack hierarchy Use cases Geo-redundant replication Geo-redundant load balancing Multi-site architecture How to install OpenStack in multi-site environment How to configure OpenStack in multi-site environment How to use OpenStack in multi-site environment How to manage OpenStack in multi-site environment
226137 MOD Architecture Framework (MODAF) Overview 21 hours MODAF is an internationally recognised enterprise architecture framework developed by the MOD to support Defence planning and change management activities. It does this by enabling the capture and presentation of information in a rigorous, coherent and comprehensive way that aids the understanding of complex issues. The audience: Enterprise Architects, the principal customers for MODAF views, who need to both correctly interpret standard MODAF views provided to them and to specify and control the tasks required to create new views Architectural modellers who need guidance on the creation and interchange of MODAF views (including for example: architecting principles, view coherence rules and tool selection criteria) Tool developers and engineers who are implementing architectural data repositories for storing and manipulating MODAF Architecture data elements Trainers and educators who require reference material in order to appropriately train and support the previous types of MODAF users MODAF users who wish to contribute to the development of MODAF Managers who need to understand what views are required to answer their particular questions Introduction Purpose Background Overview of MODAF MODAF Framework MODAF Viewpoints Relationship Between MODAF Viewpoints Key Supporting Elements to MODAF Ensuring Architectures are MODAF compliant MODAF Documentation Suite Benefits of Developing MODAF Architectures Quantifying MODAF Benefits Benefits to MOD communities of Interest Approach to developing MODAF Architectures General Approach to Developing MODAF Architectures Practical Applications of General Approach to MODAF Architectures COI-Specific Architecture Processes
463936 OpenStack Administration - Basic + Intermediate (Certified System Administrator for OpenStack) 28 hours The course is dedicated to IT engineers and architects who are looking for a solution to host private or public IaaS (Infrastructure as a Service) cloud. Course goal: gaining basic knowledge regarding OpenStack design, installation and administration, preparation to the EX210 (Red Hat Certified System Administrator in Red Hat OpenStack) exam, automated and manual OpenStack cluster installation and configuration. Introduction: What is OpenStack? Foundations of Cloud Computing Virtualization vs clustering OpenStack evolution OpenStack distributions OpenStack releases OpenStack deployment solutions OpenStack services OpenStack competitors EX210 exam OpenStack Administration: Basic terms IaaS model Supported hypervisors Supported image formats Basic architecture Design concerns Installation concerns Configuration concerns Administration concerns Automation concerns Growth planning High Availability concerns Automated OpenStack installation with PackStack How to download and execute RC files How to create an external network in Neutron How to upload an image to Glance How to create a new flavor in Nova How to update default Nova and Neutron quotas How to create a new tenant in Keystone How to create a new user in Keystone How to manage roles in Keystone How to create a tenant network in Neutron How to create a router in Neutron How to manage router’s interfaces in Neutron How to update security groups in Neutron How to upload RSA key-pair to the project How to allocate floating IPs to the project How to launch an instance from image in Nova How to associate floating IPs with instances How to create a new volume in Cinder How to attach the volume to the instance How to take a snapshot of the instance How to take a snapshot of the volume How to launch an instance from snapshot in Nova How to create a volume from snapshot in Cinder How to create a container in Swift How to upload data to the container in Swift Basic Environment: Prerequisites Nodes and networks AMQP Manual installation and configuration of basic environment Keystone: Objects API concerns Components Backends Authentication process Manual Keystone Installation Manual Keystone Configuration & Administration Glance: Components Backends Manual Glance Installation Manual Glance Configuration & Administration Nova: Components Flavors Instances launching and termination process Schedulers awareness Remote access Manual Nova Installation Manual Nova Configuration & Administration Neutron: Components Network virtualization Virtual network devices L2 agent OVS ML2 Bringing it all together - Compute Bringing it all together - Networker Virtual networks L3 agent DHCP agent Manual Neutron Installation Manual Neutron Configuration & Administration Horizon: Backends Manual Horizon Installation Manual Horizon Configuration & Administration   Cinder: Volumes Components Backends Manual Cinder Installation Manual Cinder Configuration & Administration Swift: What is object storage? Replication Structure Data addressing Modified consistent hashing ring Data placement Metadata placement Part power Ring internals Ring builder Components Backends Manual Swift Installation Manual Swift Configuration & Administration Heat: Use cases Components Templates “Hello World” template Manual Heat Installation Manual Hetat Configuration & Administration Ceilometer: Use cases Basic concepts Components Polling agents Backends Manual Ceilometer Installation Manual Ceilometer Configuration & Administration Adding Compute Node: Manual addition of a Compute Node
164996 Practical aspects of UML 21 hours The course extends possessed knowledge of UML. During the training, we focus on the practical use of the language of the UML object-oriented analysis. Best Practices Software crisis Best Practices in Software Development Iterative development Management requirements Component-based architecture Visual modeling Verification of quality Change management RUP Characteristics of RUP Two dimensions of RUP UML for RUP Create an object model UML 2 as a way to represent the model The object model Methods of describing the model Practical analysis of the specification of the use cases Actor A use case Association Relations include, extend Some object-oriented concepts in practice Abstraction Encapsulation Generalization Polymorphism The system architecture Mapping the structure and behavior of the system Two categories of UML diagrams Modeling the relationship between structure and behavior Different levels of modeling behavior Mapping class analytical design elements Relations refine Building strong relationships between the results of the analysis phase and the design phase Modeling design classes Class Association Enumeration Forward/reverse engineering Subsystem Design Component The relationship of the delegation Connector Assembly Description of the aspects of concurrency in the system architecture Examples of activity diagrams, sequence and state machine Description of the aspects of the architecture of the dispersion The different perspectives of architecture description
226151 Overview of Unified Profile for DoDAF/MODAF (UPDM) 21 hours UPDM is an Object Management Group (OMG) initiative to develop a modeling standard that supports both the USA Department of Defense Architecture Framework (DoDAF) and the UK Ministry of Defence Architecture Framework (MODAF). The modeling standard is called the Unified Profile for DoDAF and MODAF (UPDM). Introduction to UPDM Compliance Normative References Terms and Definitions Symbols and Acronyms Additional Information Additional Materials Overview of this Specification Acknowledgements Language Architecture Introduction Philosophy Core Principles Profile Structure Representing Stereotype Constraints UML Constraint Representation Important Areas of the Architecture UPDM Profile DoDAF Class Library UPDM L1 ActualProject
464015 AWS Architect Certification Training 14 hours On demand AWS Architect Certification training course is designed to help professionals to become cloud-enabled using Amazon Web Services. This course is taught with real life examples, helps participants understand the practical application of concepts such as fundamentals of cloud computing, Amazon Web services (AWS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Private Clouds and Cloud programming. After this course participants will be able to have their own implementations on cloud using EC2 instances, S3 buckets etc. Introduction to Cloud Computing Amazon EC2 and Amazon EBS  Amazon Storage Services : S3, RRS, CloudWatch Scaling and Load Distribution in AWS AWS VPC & Route 53 Identity and Access Management Techniques (IAM) and Amazon Managed Relational Database (RDS) Multiple AWS Services and Managing the Resources' Lifecycle AWS Architecture and Design Migrating to Cloud & AWS Case Study
417051 Introduction to Enterprise Architect 7 hours This Introduction to Enterprise Architect training course is designed for all persons who wish to use Sparx Systems’ UML modelling tool, Enterprise Architect, for their modelling activities yet are unfamiliar with the features, functions and use of Enterprise Architect. High Level Principles of UML Business Use Case modelling Process Business Modelling (Activity Diagrams) Sparx EA 9.3 (professional) Printing Publishing models on the Server - HTML
464016 OpenStack Overview 7 hours The course is dedicated to IT engineers and architects who are looking for a solution to host private or public IaaS (Infrastructure as a Service) cloud. This is also great opportunity for IT managers to gain knowledge owerview about possibilities which could be enabled by OpenStack. Before You spend a lot of money on OpenStack implementation, You could consider all pros and cons by attending on our course. This topic is also avaliable as individual consultancy. Course goal: gaining basic knowledge regarding OpenStack Introduction: What is OpenStack? Foundations of Cloud Computing OpenStack vs VMware OpenStack evolution OpenStack distributions OpenStack releases OpenStack deployment solutions OpenStack competitors OpenStack Services: Underpinning services Keystone Glance Nova Neutron Cinder Horizon Swift Heat Ceilometer Trove Sahara Ironic Zaqar Manila Designate Barbican OpenStack Architecture: Node roles High availability Scalability Segregation Backup Monitoring Self service portal Interfaces Quotas Workflows Schedulers Migrations Load balancing Autoscaling Demonstration: How to download and execute RC files How to create an external network in Neutron How to upload an image to Glance How to create a new flavor in Nova How to update default Nova and Neutron quotas How to create a new tenant in Keystone How to create a new user in Keystone How to manage roles in Keystone How to create a tenant network in Neutron How to create a router in Neutron How to manage router’s interfaces in Neutron How to update security groups in Neutron How to upload RSA key-pair to the project How to allocate floating IPs to the project How to launch an instance from image in Nova How to associate floating IPs with instances How to create a new volume in Cinder How to attach the volume to the instance How to take a snapshot of the instance How to take a snapshot of the volume How to launch an instance from snapshot in Nova How to create a volume from snapshot in Cinder
226139 System Modelling with SysML 21 hours This course is offered in two variants to provide a practical understanding of how systems can be modelling using the OMG's Systems Modelling Language (SysML) version 1.2 or 1.3. The notation and underlying semantics of SysML are explained in a way that allows students to apply what they learn to any suitable system modelling method or tool. Introduction to System Modelling What is a system model? The four pillars of system modelling Model centric vs document centric What is SysML? Relationship between SysML and UML The five pillars of SysML Common and Crosscutting Constructs Profiles, stereotypes and tags Diagram frames Comments Allocations Package Diagrams What is a package? Structuring the model with packages Package containment Package dependencies Representing the model structure Views and viewpoints Use Case Diagrams The system as a black box Identifying the system boundary with actors Use cases as system services Behind the use case diagram Use case structure · Nominal and alternative scenarios Handling common behaviour Extended and specialised behaviour Sequence Diagrams Interaction-based behaviour Simple sequences Synchronous vs asynchronous Fragment nodes Interaction use nodes System Modelling with SysML Activity Diagrams Modelling flow-based logic Actions vs activities Understanding token flow Control flow vs object flow Modelling decisions · Modelling concurrency Swimlanes and responsibility State Machine Diagrams States and their syntax Transitions between states Pseudo state notation (initial, decision, history, end) Decomposing states Modelling concurrent states Block Definition Diagrams What is a block? Block features Modelling types Modelling system hierarchy Generalising system elements Internal Block Diagrams Parts revisited Flow ports, flow specifications and item flow (SysML 1.2 only) Standard ports and interfaces (SysML 1.2 only) Proxy ports and interface blocks (SysML 1.3 only) Full ports (SysML 1.3 only) Parametric Diagrams What is a constraint block? Constraining system properties Requirement Diagrams What is a requirement? Modelling atomic requirements Requirement traceability System Modelling Resources and Further Reading Suggested web resources Recommended literature
417092 Enterprise Architecture Overview 14 hours This course is for everyone involved in planning, analysing, implementing, executing, maintaining or improving Enterprise Architectures. It shows comprehensive perspective of tools used to describe and implement the EA. Introduction to Enterprise Architecture What is architecture Enterprise Architecture (EA) Why do we need EA IT Enterprise Architecture Business Enterprise Architecture Enterprise Architecture Description vs EA Implementation Enterprise Architecture Methods, Frameworks, Concepts and Paradigms EA, Governance and Strategic Planning Strategic Management, Strategic Planning OMG Business Motivation Model Strategy Execution (EFQM) Quality Management(Six Sigma, TQM, ISO 9001) IT Governance IT Service Delivery and Support (ITIL) IT Implementation (CMM and CMMI) Methods and Frameworks IEEE Standards Zachman Framework TOGAF MDA SOA Nato Architecture Framework, MoDAF, DoDAF, UPDM Description Languages IDEF BPMN Testbed SoaML UML ArchiMate Architecture Description Languages Suitability for EA Enterprise Architecture Modelling Modelling Process Readability and Usability of Models Viewpoints and Visualisation Architecture Analysis Analysis Techniques Quantitative Analysis Functional Analysis Other Architecture Alignment Tool Support
464020 IoT (Internet of Things) - Technology Overwiev 7 hours
417107 UML Analysis and Design 21 hours This course has been created for software architects, programmers, software developers, project managers, analysts and anyone interested in understanding analysis and designing in UML. The course shows how to analyse clients' needs, formalize them in UML diagrams, create a model and ultimately design the implementation of the software. This is a general course covering all aspects of UML. Please browse our catalogue to see more specific courses. This course uses the newest version of the standard (http://www.omg.org/spec/UML) and is taught by an OMG Certified UML Professional (OCUP) trainer. There are no specific tools for this course, each of the delegates can use their favourite tool. By default, Sparx Enterprise Architect is used. Introduction to Modelling Models and Modelling Idea of meta-modelling UML documentation Inheritance Analysis and Design Actors and Use Cases Class and Object Diagrams Classes, objects, types of relations Object and Class Relationships Association, Aggregation, Composition Inheritance Dependency Interaction Communication diagram Interaction overview diagram Sequence diagram Timing diagrams Activity Diagrams State Diagrams Packages Component and Deployment Workshop From Analysis to Implementation Introduction to design patterns
463934 Applying NAF with MAGICDRAW 21 hours This is a 3-day training covering principles of modeling, NAF, UPDM and use of MagicDraw following a case study, which demonstrates a typical defense architecture approach. The course: Includes lectures and hands-on practice in using MagicDraw for NAF modeling using UPDM; Explains NAF views, sub-views and concepts; Explains UPDM concepts and diagrams; Provides hands-on experience building models; Shows how to trace model elements in different views; Explains how to use MagicDraw features efficiently; Is based on a consistent modeling case study. Audience:  Enterprise architects,  system architects,  system engineers,  software architects and other stakeholders who will create and use models Methods: Presentations, discussions, and case study-based practical assignments. Course Materials: Slides, case study model, and practical assignment descriptions. Certificates: Each participant receives No Magic and NobleProg certificate indicating that he attended the training. Introduction Trainer and Participant Introductions Introduction to NAF Introduction to UPDM Introduction to MagicDraw A Case Study Definition Managing Capability Portfolio Capability View Sub-views for Capability View Practical Assignment Defining Operational Scenarios Operational View Sub-views for Operational View Practical Assignment Defining Capability Configurations Systems View Sub-views for Systems View Practical Assignment SOA Service-Oriented View Sub-views for Service-Oriented View Incorporating Services into Operational and Systems Views Managing Project Portfolio Programme View Sub-views for Programme View Practical Assignment Applying Standards Technical View Sub-views for Technical View Describing Architecture All View Sub-views for All View Practical Assignment Establishing Traceability Specifying and analyzing traces between different architecture Views Wrap up Summarizing Training Discussing Remaining Questions Identifying Further Action Points
110938 Introduction to Domain Driven Design 14 hours What Is Domain-Driven Design (DDD) Building Domain Knowledge The Ubiquitous Language The Need for a Common Language Creating the Ubiquitous Language The Building Blocks Of A Model-Driven Design Layered Architecture Entities Value Objects Services Modules Aggregates Factories Repositories Refactoring Toward Deeper Insight Continuous Refactoring Bring Key Concepts Into Light Preserving Model Integrity Bounded Context Continuous Integration Context Map Shared Kernel Customer-Supplier Conformist Anticorruption Layer Separate Ways Open Host Service Distillation
417097 UML for the IT Business Analyst 21 hours One of the fastest growing roles in the IT industry is the IT Business Analyst. Business Analysts are found in almost organizations and are important members of any IT team whether in the private or public sector. This course provides a clear, step-by-step guide to how the Business Analyst can perform his or her role using state-of-the-art object-oriented technology. Overview of Software Development Process and Modelling Methodologies and their impact on the work of a Business Analyst Waterfall steps Analysis, Design, Implementation, Testing, Maintenance Agile approach to business analysis Who Are Business Analysts? Perspective on the BA Role The Dynamic (Behavioral) Model The Static (Structural) Model Structured Analysis The BA’s Perspective on Object Orientation Object Oriented Programming and its impact on modelling The UML Standard Cognitive Psychology and OO? Objects Attributes and Operations Operations and Methods Encapsulation Classes Relationships Generalization Association Aggregation Composition Polymorphism Use Cases and Scenarios Business and System Use Cases An Overview of Business Object-Oriented Modeling (B.O.O.M.) B.O.O.M. and SDLCs The B.O.O.M. Steps Sequencing the Steps What Do You Define First—Attributes or Operations? Analyzing End-to-End Business Processes Interviews During the Initiation, Analysis, and Test Phases Step 1: Initiation Business Requirements Document Template Step 1a: Model Business Use Cases Step 1a i: Identify Business Use Cases (Business Use-Case Diagram) Putting Theory into Practice Note to Rational Rose Users Case Study D1: Business Use-Case Diagrams Step 1a ii: Scope Business Use Cases (Activity Diagram) Case Study D2: Business Use-Case Activity Diagram with Partitions Scoping the IT Project with System Use Cases Step 1b: Model System Use Cases Case Study E1: Role Map Step 1b ii: Identify System Use-Case Packages (System Use-Case Diagram) Case Study E2: System Use-Case Packages Step 1b iii: Identify System Use Cases (System Use-Case Diagram) Case Study E3: System Use-Case Diagrams Step 1c: Begin Static Model (Class Diagrams for Key Business Classes) Step 1d: Set Baseline for Analysis (BRD/Initiation) Storyboarding the User’s Experience Step 2: Analysis The Use-Case Description Template Documenting the Basic Flow Use-Case Writing Guidelines Basic Flow Example: CPP System Review Case Report Documenting Alternate Flows Documenting Exception Flows Guidelines for Conducting System Use-Case Interviews Activity Diagrams for System Use Cases Related Artifacts Decision Tables Case Study F1: Decision Table Decision Trees Case Study F2: Decision Tree Condition/Response Table Business Rules Advanced Use-Case Features Case Study F3: Advanced Use-Case Features Life Cycle Requirements for Key Business Objects What Is a State Machine Diagram? Step 2a ii: 1. Identify States of Critical Objects Case Study G1: States Step 2a ii: 2. Identify State Transitions Case Study G2: Transitions Step 2a ii: 3. Identify State Activities Case Study G3: State Activities Step 2a ii: 4. Identify Composite States Case Study G4: Composite States Step 2a ii: 5. Identify Concurrent States Gathering Across-the-Board Rules with Class Diagrams Step 2b: Static Analysis Step 2b i: Identify Entity Classes Case Study H1: Entity Classes Step 2b ii: Model Generalizations Case Study H2: Generalizations Step 2b iii: Model Transient Roles Case Study H3: Transient Roles Step 2b iv: Model Whole/Part Relationships The Composite Structure Diagram Case Study H4: Whole/Part Relationships Step 2b v: Analyze Associations Case Study H5: Associations Step 2b vi: Analyze Multiplicity Case Study H6: Multiplicity Optimizing Consistency and Reuse in Requirements Documentation Step 2b vii: Link System Use Cases to the Static Model Case Study I1: Link System Use Cases to the Static Model Case Study I1: Results Step 2b viii: Add Attributes Meta-Attributes Case Study I2: Add Attributes Step 2b ix: Add Look-Up Tables Case Study I5: Analyze Look-Up Tables Step 2b x: Add Operations Case Study I7: Distribute Operations Step 2b xi: Revise Class Structure Case Study I8: Revise Structure Designing Test Cases and Completing the Project Step 2c: Specify Testing Structured Walkthroughs Decision Tables for Testing Case Study J1: Deriving Test Cases from Decision Tables Boundary Value Analysis Case Study J2: Select Test Data Using Boundary Value Analysis System Tests Beyond the System Tests Step 2d: Specify Implementation Plan Step 2e: Set Baseline for Development What Developers Do with Your Requirements Object Oriented Design Patterns Visibility Control Classes Boundary Classes Sequence Diagrams Communication Diagrams Other Diagrams Layered Architecture Interfaces Mix-Ins Implementing OO Using an OO Language Implementing OOA Using Procedural Languages Implementing a Database from OOA Using a RDBMS
165099 Business Process Analysis with UML and BPMN 14 hours Course Audience: Managers who want to understand BPMN diagrams, Business Consultants, Business Analysts, Business Process Engineers, System Analysts and anyone who is involved in analyzing and planning Business Processes using standardized, unified modelling notation. Course Goals: Produce high-quality process diagrams Model in the BPMN process notation Capture as-is process information Implement optimized process flows for people-intensive processes Simplify complex process definitions and break them into more manageable pieces UML Business use case diagrams UML activity diagrams detailing the use case Business Entities definitions depicted with Class Diagrams Map the model into system use cases BPMN BPMN modelling techniques BPMN modelling shape overview Swimlane generation and viewing BPMN text objects, data objects, annotations, and attributions Basic Process optimization Process design best practices

Course Discounts

Course Venue Course Date Course Price [Remote/Classroom]
Praktyka testowania Katowice Thu, 2016-05-26 09:30 3162PLN / 2762PLN
Programming in C# 5.0 with Visual Studio 2012 Poznan, Garbary Mon, 2016-05-30 09:00 2685PLN / 1822PLN
Introduction to Machine Learning Wrocław, ul.Ludwika Rydygiera 2a/22 Mon, 2016-05-30 09:00 2730PLN / 1940PLN
Adobe Captivate Kielce Tue, 2016-05-31 09:00 1318PLN / 1127PLN
Excel and VBA Programming for Audit and Finance Professionals Szczecin Tue, 2016-05-31 09:00 1913PLN / 1513PLN
Programming in WPF 4.5 Warszawa, ul. Złota 3/11 Tue, 2016-05-31 09:00 2359PLN / 1355PLN
SQL Fundamentals Warszawa, ul. Złota 3/11 Wed, 2016-06-01 09:00 1358PLN / 853PLN
MS Excel - poziom średniozaawansowany Łódź, ul. Tatrzańska 11 Wed, 2016-06-01 09:00 1044PLN / 840PLN
SQL language in MSSQL Toruń, ul. Żeglarska 10/14 Wed, 2016-06-01 09:00 1568PLN / 1198PLN
Bezpieczeństwo aplikacji internetowych Katowice Wed, 2016-06-01 09:30 3606PLN / 2531PLN
Test Automation with Selenium Kraków Mon, 2016-06-06 09:00 3200PLN / 2433PLN
Test Automation with Selenium Katowice Tue, 2016-06-07 09:30 3431PLN / 2469PLN
MS Excel - poziom średniozaawansowany Katowice Wed, 2016-06-08 09:00 700PLN / 771PLN
Programming in C++ Olsztyn, ul. Kajki 3/1 Mon, 2016-06-13 09:00 2936PLN / 2395PLN
Container management with Docker Trójmiasto Tue, 2016-06-14 09:00 4360PLN / 2774PLN
Excel Advanced Katowice Mon, 2016-06-20 09:00 775PLN / 933PLN
Test Automation with Selenium Warszawa, ul. Złota 3/11 Mon, 2016-06-20 09:00 3431PLN / 2327PLN
PostgreSQL Administration Lublin Mon, 2016-06-20 09:30 4025PLN / 3134PLN
Introduction to R Warszawa, ul. Złota 3/11 Tue, 2016-06-21 09:00 3058PLN / 2123PLN
Creating and managing Web sites Wrocław, ul.Ludwika Rydygiera 2a/22 Mon, 2016-06-27 09:00 3410PLN / 2555PLN
Programming in C Gdynia Mon, 2016-06-27 09:00 1590PLN / 1143PLN
Distributed Messaging with Apache Kafka Katowice Mon, 2016-06-27 09:30 4998PLN / 3288PLN
Design Patterns in C# Wrocław, ul.Ludwika Rydygiera 2a/22 Wed, 2016-06-29 09:00 1865PLN / 1392PLN
Visual Basic for Applications (VBA) for Analysts Poznan, Garbary Mon, 2016-07-04 09:00 1912PLN / 1278PLN
Debian Administration Poznan, Garbary Mon, 2016-07-04 09:00 3157PLN / 2083PLN
A Practical Guide to Successful Pricing Strategies Poznan, Garbary Wed, 2016-07-06 09:00 1427PLN / 1093PLN
Excel and VBA Programming for Audit and Finance Professionals Warszawa, ul. Złota 3/11 Mon, 2016-07-11 09:00 1913PLN / 1441PLN
Machine Learning Fundamentals with R Warszawa, ul. Złota 3/11 Mon, 2016-07-18 09:00 2523PLN / 1828PLN
Building Web Apps using the MEAN stack Szczecin Mon, 2016-07-18 09:00 5538PLN / 3351PLN
Microsoft Access - download the data Poznan, Garbary Wed, 2016-07-20 09:00 1117PLN / 856PLN
Python Programming Warszawa, ul. Złota 3/11 Mon, 2016-08-01 09:00 5790PLN / 3753PLN
Programming in WPF 4.5 Warszawa, ul. Złota 3/11 Mon, 2016-09-05 09:00 2359PLN / 1355PLN
BPMN 2.0 for Business Analysts Wrocław, ul.Ludwika Rydygiera 2a/22 Tue, 2016-09-27 09:00 3110PLN / 2337PLN

Upcoming Courses

Weekend Enterprise Architecture courses, Evening Enterprise Architecture training, Enterprise Architecture boot camp, Enterprise Architecture instructor-led , Enterprise Architecture instructor, Enterprise Architecture classes, Enterprise Architecture coaching, Enterprise Architecture on-site, Evening Enterprise Architecture courses,Weekend Enterprise Architecture training, Enterprise Architecture private courses, Enterprise Architecture trainer , Enterprise Architecture training courses

Some of our clients