CBAP
IIBA® Certified Business Analysis Professional (CBAP®) Course Outline Module
Module 1: Business Analysis Planning and Monitoring
- Plan Business Analysis Approach
- Plan Stakeholder Engagement
- Plan Business Analysis Governance
- Plan Business Analysis Information Management
- Identify Business Analysis Performance Improvements
Module 2: Elicitation and Collaboration
- Prepare for Elicitation
- Conduct Elicitation
- Confirm Elicitation Results
- Communicate Business Analysis Information
- Manage Stakeholder Collaboration
Module 3: Requirements Life Cycle Management
- Prepare for Elicitation
- Conduct Elicitation
- Confirm Elicitation Results
- Communicate Business Analysis Information
- Manage Stakeholder Collaboration
Module 4: Strategy Analysis
- Trace Requirements
- Maintain Requirements
- Prioritise Requirements
- Assess Requirements
- Approve Requirements
Module 5: Requirement Analysis and Design Definition
- Analysis and Design Definition
- Verify Requirements
- Validate Requirements
- Define Requirements Architecture
- Define Design Options
- Analyse Potential Value and Recommend Solution
Module 6: Solution Evaluation
- Measure Solution Performance
- Analyse Performance Measures
- Assess Solution Limitations
- Assess Enterprise Limitations
- Recommend Actions to Increase Solution Value
Courses:
- Introduction to
- Ethical Hacking
- Footprinting and
- Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS,
- Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web
- Applications
- SQL Injection
- Hacking Wireless
- Networks
- Hacking Mobile
- Platforms
- IoT Hacking
- Cloud Computing
- Cryptography
- CBAP