Project Management: Fundamentals of Predictive and Adaptive Methods

This course teaches the fundamentals of project management and its underlying structure and elements, including project phases, project life cycles, stakeholders, and areas of expertise. These, coupled with the ability to identify the project management processes that are recognized industry wide as good practice, will help you to apply effective project management techniques to improve the efficiency of your projects and ensure their success. This course is designed to cover various project management approaches and is not intended to focus on a single methodology or framework.

Description

In this course, you will identify the elements of sound project management and apply the generally recognized project management practices to successfully manage or participate in projects. You will: Identify the key processes and requirements of project management. Initiate a project. Use a Predictive approach to plan for time and cost. Use an Adaptive approach to plan a project. Plan for project risks, communication, and change control. Manage the execution of a project. or close a project.

Prerequisites

To ensure your success in this course, you should have some basic computing skills. Some experience using Microsoft Office is desirable but not required. Having some on-the-job experience with project management either as a team member or project leader is helpful but not required.

View / Download Course Details

Similar events

Many organizations are incorporating different project management methodologies into their skill base. This course is designed for individuals who need to get started with agile concepts and practice. Basic planning is covered along with the various roles and responsibilities of customers and developers / practitioners. Learn about epics, stories, sprints, feature prioritization and value-driven delivery.

More Information

This course provides an introduction to Agile Service Management, the application, and integration of agile thinking into service management processes and process design projects. Agile thinking improves IT?s effectiveness and efficiency and enables IT to continue to deliver value in the face of changing requirements. This course prepares you for the Certified Agile Service Manager (CASM) certification.

More Information

Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team.

More Information

The Certified Information Privacy Professional/United States (CIPP/US) program, developed by the International Association of Privacy Professionals (IAPP) - the world?s largest comprehensive global information privacy community and resource, was the first professional certification ever to be offered in information privacy. The CIPP/US credential demonstrates a strong foundation in U.S. privacy laws and regulations and understanding of the legal requirements for the responsible transfer of sensitive personal data to/from the U.S., the EU and other jurisdictions.

More Information

Securing the organization’s information is a critical business objective in today’s business environment. The information that an organization depends on to be successful can be at risk from numerous sources. By effectively managing information security, you can address these risks and ensure the organization remains healthy and competitive in the marketplace.

More Information

This course explains the many aspects of DevOps engineering that leaders and practitioners can execute upon. While DevOps Foundation provides an overview of DevOps, this course will provide a closer look at the implementation process from an engineering perspective. It is an in depth view of the major aspects of engineering DevOps. An engineering approach is critical to DevOps journeys. This course provides the foundations of knowledge, principles and practices from a technical perspective needed to engineer a successful DevOps solution.

More Information

The DevSecOps Practitioner course is intended as a follow-on to the DevSecOps Foundation course. The course builds on previous understanding to dive into the technical implementation. The course aims to equip participants with the practices, methods, and tools to engage people across the organization involved in reliability through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as implementing DevSecOps practices to their organizational structure, building better pipelines in distributed systems, and having a common technological language. This course positions learners to successfully complete the DevSecOps Practitioner certification exam.

More Information

In this course, students will define cloud computing technology and describe its impact on IT scenario.

More Information

Welcome to Introduction to DAX for Power BI. This two-day instructor-led course is intended for business users who have been using Power BI and want to use DAX to create custom calculations in their data models. In this class, you will be introduced to using Data Analysis Expressions (DAX), which is the expression language that is used to create custom calculations in the Power BI Data model. The course covers some of the theoretical underpinnings of the data model and the DAX language, but the emphasis is on using DAX to solve common business problems. You will learn how to write your own calculated columns, measures, and tables, how to visualize the way Power BI computes DAX calculations, and how to troubleshoot custom code.

More Information

Network Defense Essentials (NDE) is a security program covering the fundamental concepts of network security.

More Information

Every career in project management has a beginning and that is the purpose of this course. You will learn the fundamentals of project management. This includes project performance, when to use the predictive or adaptive methodologies, business analysis domains, and frameworks, as well as the proper use of one of the various adaptive frameworks.

More Information

Project managers are always under severe pressure to complete projects on time and within budget. However, most projects fail to meet these demands, and, as a result, many projects are terminated early. Successful project management requires knowledge and experience. This course is designed to provide you with the generally recognized practices of project management to successfully manage projects.

More Information

In this course, students will identify effective project management practices and their related processes. They will examine the elements of sound project management and apply the generally recognized practices to successfully manage projects.

More Information

The skills and knowledge you gain in this course will help you avoid making costly mistakes and increase your competitive edge. In this course, you will apply the generally recognized practices of project management acknowledged by the Project Management Institute to successfully manage projects.

More Information

In this course, students learn to understand the basics of Scrum, effectively contribute to a Scrum project, and learn how to enable Scrum Team members to apply Scrum effectively in Scrum/Agile projects.

More Information

This course guides & teaches Scrum practices to everyone involved in the project; clears impediments for the team; and, ensures that Scrum processes are being followed. Successful candidates will be awarded the Scrum Master Certified (SMC) certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience.

More Information

Scrum Product Owner Certified (SPOC) certification exam is designed to confirm applicants practical and working knowledge of Scrum that equips them to handle the business aspects and stakeholders in a Scrum environment. Successful candidates will be awarded the Scrum Product Owner Certified (SPOC)certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience.

More Information

Agile relies on adaptive planning and iterative development and delivery. It focuses primarily on the value of people in getting the job done effectively. Successful candidates will be awarded the SCRUMstudy Agile Master Certified (SAMC) certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience.

More Information

The SRE (Site Reliability Engineering) Foundation course is an introduction to the principles & practices that enable an organization to reliably and economically scale critical services. Introducing a site-reliability dimension requires organizational re-alignment, a new focus on engineering & automation, and the adoption of a range of new working paradigms.

More Information

This course introduces a range of practices for advancing service reliability engineering through a mixture of automation, organizational ways of working and business alignment. Tailored for those focused on large-scale service scalability and reliability.

More Information

This course, SQL Querying: Fundamentals, will teach you to use SQL as a tool to retrieve the information you need from databases.

More Information

In this course you will learn how to identify and use advanced querying techniques. You might find that you need to modifying the structure of a table; inserting, updating, deleting data and indexing tables to optimize query performance..

More Information

Tableau® software is designed for data analysis and the creation of visualizations. Data analysts prepare data, perform initial analysis, and create visualizations that are then passed on to business data-driven decision makers. These decision makers can use Tableau's tools to explore the data, perform further analysis to find new insights, make decisions, and create customized reports to share their findings.

More Information

This fast paced hands-on course provides in-depth coverage of Tableau Server administration. The knowledge and skills acquired are best geared toward those who will be administering a Tableau Server installation, including managing content, users, and permissions.

More Information

The Value Stream Management Foundation course from Value Stream Management Consortium, and offered in partnership with DevOps Institute, is an introductory course taking learners through a value stream management implementation journey. It considers the human, process, and technology aspects of this way of working and explores how optimizing value streams for flow and realization positively impacts organizational performance.

More Information

Nintex is a leading workflow automation platform used to streamline business processes. Major vendors for this technology include Nintex itself, Microsoft, and Pega. It is employed across industries for efficient workflow automation, improving productivity, and reducing manual tasks.

More Information

Upon completing Python for Security Professionals certification training, an individual can acquire skills such as understanding Python language fundamentals, developing Python scripts for automation of tasks, performing network security analysis, implementing cybersecurity strategies and creating detection algorithms using Python. In addition, they would acquire knowledge on how Python is used for penetration testing, system analysis, and ethical hacking.

More Information