SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Modeling Techniques for the Business Analyst

                                                                          Course Summary

Description

The business analyst has become a pivotal role for information technology projects, responsible for bridging the
gap between IT and the key business participants of any project. The business needs must be communicated in
a way that supports business user validation as well as providing the foundation for the technical staff to design
and build a successful solution. This class focuses on the many types of modeling techniques that are used by
the business analyst in system development and provide hands-on experience for attendees to learn how to
develop and interpret the models. Techniques taught are IIBA compliant.

Topics

      •      Overview of BA role
      •      Introduction to Modeling
      •      Overview of the most common system development methodologies (SDLCs)
      •      How modeling supports the SDLCs
      •      Business Process Improvement, Re-engineering and modeling
      •      Context Models
      •      Process Models
      •      Usage Models
      •      Data Models
      •      Design Models
      •      Tips for Success

Audience

This course is designed for:

      •      New business analysts, systems analysts and business architects
      •      Experienced business analysts looking to update their modeling skills or understanding the modeling
             skills required for the CBAP certification
      •      Project managers who incorporate business analysis roles in their projects

Duration

Four days




 Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational
   purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically

MODELINGTECHNIQUESFORTHEBUSINESSANALYST-110205092256-PHPAPP01.DOC
Modeling Techniques for the Business Analyst
                                                                             Course Outline

       I. Overview of BA role
                                                                                                              X. Design Models
      II. Introduction to Modeling                                                                              A.Techniques in common with business
                                                                                                               models
                                                                                                                B.Architecture or Network Diagram
     III. Overview of the most common system                                                                    C.System Structure Chart
          development methodologies (SDLCs)                                                                     D.System Flow Diagram
                                                                                                                E.Security Model (CRUD)
    IV. How modeling supports the SDLCs
                                                                                                              XI. Tips for Success
     V. Business Process Improvement, Re-
        engineering and modeling

    VI. Context Models

   VII. Process Models
      A.Business Rules
      B.Decision Trees / Tables
      C.Event and Trigger Identification
      D.SIPOC Business Models
      E.Functional Decomposition Diagram
      F.Workflow Models (As-Is, To-Be)
      G.Flowcharts and Activity Diagrams
      H.Sequence Diagrams
      I.State Models

  VIII. Usage Models
      A.User Profiles
      B.Use Case Modeling
      C.User Stories
      D.Storyboards
      E.Prototyping
      F.Screen Navigation and User Interface
    Design

     IX. Data Models
       A.Data Dictionaries
       B.Data Flow Diagrams
       C.Entity Relationship Diagrams
       D.Class Models
       E.Data Transformation and Mapping
       F.Metadata




 Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational
   purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically

MODELINGTECHNIQUESFORTHEBUSINESSANALYST-110205092256-PHPAPP01.DOC

Weitere ähnliche Inhalte

Andere mochten auch

Mcom Ba Training Module 2
Mcom Ba Training   Module 2Mcom Ba Training   Module 2
Mcom Ba Training Module 2
mcom
 
Introduction to Modeling Java and UML
Introduction to Modeling Java and UMLIntroduction to Modeling Java and UML
Introduction to Modeling Java and UML
Dang Tuan
 
Uml Activity Diagram
Uml Activity DiagramUml Activity Diagram
Uml Activity Diagram
Niloy Rocker
 
Introductory session on business analyst training1
Introductory session on business analyst training1Introductory session on business analyst training1
Introductory session on business analyst training1
Suprriya Nair
 
UML for Business Analysts
UML for Business AnalystsUML for Business Analysts
UML for Business Analysts
Yuriy Guts
 

Andere mochten auch (20)

Activity Diagram tutorial part 3
Activity Diagram tutorial part 3Activity Diagram tutorial part 3
Activity Diagram tutorial part 3
 
TD-635-03-PSBO
TD-635-03-PSBOTD-635-03-PSBO
TD-635-03-PSBO
 
Enhancement of Action Description Language for UML Activity Diagram Review
Enhancement of Action Description Language for UML Activity Diagram ReviewEnhancement of Action Description Language for UML Activity Diagram Review
Enhancement of Action Description Language for UML Activity Diagram Review
 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process Modeling
 
Activity diagram tutorial part 2
Activity diagram tutorial part 2Activity diagram tutorial part 2
Activity diagram tutorial part 2
 
Business Process Modeling
Business Process ModelingBusiness Process Modeling
Business Process Modeling
 
Activity Diagram Templates by Creately
Activity Diagram Templates by CreatelyActivity Diagram Templates by Creately
Activity Diagram Templates by Creately
 
Create Agile, Automated and Predictable IT Infrastructure in the Cloud
Create Agile, Automated and Predictable IT Infrastructure in the CloudCreate Agile, Automated and Predictable IT Infrastructure in the Cloud
Create Agile, Automated and Predictable IT Infrastructure in the Cloud
 
Uml for IT Business Analyst a practical guide
Uml for IT Business Analyst a practical guideUml for IT Business Analyst a practical guide
Uml for IT Business Analyst a practical guide
 
Business analyst (BA) Online Training and Placement @ Crescent IT Solutions
Business analyst (BA) Online Training and Placement @ Crescent IT SolutionsBusiness analyst (BA) Online Training and Placement @ Crescent IT Solutions
Business analyst (BA) Online Training and Placement @ Crescent IT Solutions
 
Business Analysis and IT Business Analyst – An Introduction
Business Analysis and IT Business Analyst – An IntroductionBusiness Analysis and IT Business Analyst – An Introduction
Business Analysis and IT Business Analyst – An Introduction
 
Mcom Ba Training Module 2
Mcom Ba Training   Module 2Mcom Ba Training   Module 2
Mcom Ba Training Module 2
 
The role of Business Analyst
The role of Business Analyst The role of Business Analyst
The role of Business Analyst
 
Introduction to Modeling Java and UML
Introduction to Modeling Java and UMLIntroduction to Modeling Java and UML
Introduction to Modeling Java and UML
 
Uml Activity Diagram
Uml Activity DiagramUml Activity Diagram
Uml Activity Diagram
 
Activity diagram model
Activity diagram modelActivity diagram model
Activity diagram model
 
Introductory session on business analyst training1
Introductory session on business analyst training1Introductory session on business analyst training1
Introductory session on business analyst training1
 
Business analyst training in india
Business analyst training in indiaBusiness analyst training in india
Business analyst training in india
 
Use case
Use   caseUse   case
Use case
 
UML for Business Analysts
UML for Business AnalystsUML for Business Analysts
UML for Business Analysts
 

Ähnlich wie Modeling techniques forthe business analyst

Business analysis for it professionals
Business analysis for it professionalsBusiness analysis for it professionals
Business analysis for it professionals
bestip
 
Kahn.theodore
Kahn.theodoreKahn.theodore
Kahn.theodore
NASAPMC
 

Ähnlich wie Modeling techniques forthe business analyst (20)

Process architecture vs modeling
Process architecture vs modelingProcess architecture vs modeling
Process architecture vs modeling
 
MDA Vs Web Ratio for Non It
MDA Vs Web Ratio for Non ItMDA Vs Web Ratio for Non It
MDA Vs Web Ratio for Non It
 
Enterprise architecture
Enterprise architectureEnterprise architecture
Enterprise architecture
 
Enterprise Architecture
Enterprise ArchitectureEnterprise Architecture
Enterprise Architecture
 
MIS.ppt
MIS.pptMIS.ppt
MIS.ppt
 
IIBA Multimodels
IIBA MultimodelsIIBA Multimodels
IIBA Multimodels
 
Sjaak Brinkkemper: Visual Business Modeling Techniques for the Software Industry
Sjaak Brinkkemper: Visual Business Modeling Techniques for the Software IndustrySjaak Brinkkemper: Visual Business Modeling Techniques for the Software Industry
Sjaak Brinkkemper: Visual Business Modeling Techniques for the Software Industry
 
Online Togaf 9.1 Training in USA
Online Togaf 9.1 Training in USAOnline Togaf 9.1 Training in USA
Online Togaf 9.1 Training in USA
 
Innovation in model driven software
Innovation in model driven softwareInnovation in model driven software
Innovation in model driven software
 
Innovation presentation
Innovation presentationInnovation presentation
Innovation presentation
 
Are You an Accidental or Intentional Architect?
Are You an Accidental or Intentional Architect?Are You an Accidental or Intentional Architect?
Are You an Accidental or Intentional Architect?
 
Service Oriented & Model Driven Architectures
Service Oriented & Model Driven ArchitecturesService Oriented & Model Driven Architectures
Service Oriented & Model Driven Architectures
 
Session 4 & 5
Session 4 & 5Session 4 & 5
Session 4 & 5
 
Togaf online training
Togaf online trainingTogaf online training
Togaf online training
 
A Summary of TOGAF's Architecture Capability Framework
A Summary of TOGAF's Architecture Capability FrameworkA Summary of TOGAF's Architecture Capability Framework
A Summary of TOGAF's Architecture Capability Framework
 
2009-dec-10 Architectuur en HL7
2009-dec-10 Architectuur en HL72009-dec-10 Architectuur en HL7
2009-dec-10 Architectuur en HL7
 
Business analysis for it professionals
Business analysis for it professionalsBusiness analysis for it professionals
Business analysis for it professionals
 
Kahn.theodore
Kahn.theodoreKahn.theodore
Kahn.theodore
 
EclipseCon BPM Day Ludwigsburg - Roundtrip Modelling with Eclipse Stardust
EclipseCon BPM Day Ludwigsburg - Roundtrip Modelling with Eclipse StardustEclipseCon BPM Day Ludwigsburg - Roundtrip Modelling with Eclipse Stardust
EclipseCon BPM Day Ludwigsburg - Roundtrip Modelling with Eclipse Stardust
 
Are You an Accidental or Intention Software Architect
Are You an Accidental or Intention Software ArchitectAre You an Accidental or Intention Software Architect
Are You an Accidental or Intention Software Architect
 

Mehr von bestip

Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1
bestip
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2
bestip
 
6294 a planning and managing windows 7 desktop deployments and environments
6294 a planning and managing windows 7 desktop deployments and environments6294 a planning and managing windows 7 desktop deployments and environments
6294 a planning and managing windows 7 desktop deployments and environments
bestip
 
Lab view daq signal conditioniing
Lab view daq signal conditioniingLab view daq signal conditioniing
Lab view daq signal conditioniing
bestip
 
Lab view instrument control
Lab view instrument controlLab view instrument control
Lab view instrument control
bestip
 
Lab view core 2 outline
Lab view core 2 outlineLab view core 2 outline
Lab view core 2 outline
bestip
 
Lab view core 1 outline
Lab view core 1 outlineLab view core 1 outline
Lab view core 1 outline
bestip
 
Deploying cisco asa firewall features
Deploying cisco asa firewall featuresDeploying cisco asa firewall features
Deploying cisco asa firewall features
bestip
 
6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6
bestip
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010
bestip
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010
bestip
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse
bestip
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010
bestip
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1
bestip
 
Ms 5050
Ms 5050Ms 5050
Ms 5050
bestip
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications
bestip
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
bestip
 
Network+
Network+Network+
Network+
bestip
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...
bestip
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...
bestip
 

Mehr von bestip (20)

Cipt1 implementing cisco unified communications ip telephony part 1
Cipt1   implementing cisco unified communications ip telephony part 1Cipt1   implementing cisco unified communications ip telephony part 1
Cipt1 implementing cisco unified communications ip telephony part 1
 
Cipt2 implementing cisco unified communications ip telephony part 2
Cipt2   implementing cisco unified communications ip telephony part 2Cipt2   implementing cisco unified communications ip telephony part 2
Cipt2 implementing cisco unified communications ip telephony part 2
 
6294 a planning and managing windows 7 desktop deployments and environments
6294 a planning and managing windows 7 desktop deployments and environments6294 a planning and managing windows 7 desktop deployments and environments
6294 a planning and managing windows 7 desktop deployments and environments
 
Lab view daq signal conditioniing
Lab view daq signal conditioniingLab view daq signal conditioniing
Lab view daq signal conditioniing
 
Lab view instrument control
Lab view instrument controlLab view instrument control
Lab view instrument control
 
Lab view core 2 outline
Lab view core 2 outlineLab view core 2 outline
Lab view core 2 outline
 
Lab view core 1 outline
Lab view core 1 outlineLab view core 1 outline
Lab view core 1 outline
 
Deploying cisco asa firewall features
Deploying cisco asa firewall featuresDeploying cisco asa firewall features
Deploying cisco asa firewall features
 
6010 java programming version 6
6010 java programming version 66010 java programming version 6
6010 java programming version 6
 
10264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 201010264 developing web applications with microsoft visual studio 2010
10264 developing web applications with microsoft visual studio 2010
 
10266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 201010266 developing data access solutions with microsoft visual studio 2010
10266 developing data access solutions with microsoft visual studio 2010
 
7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse7806 java 6 programming essentials using helios eclipse
7806 java 6 programming essentials using helios eclipse
 
10265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 201010265 developing data access solutions with microsoft visual studio 2010
10265 developing data access solutions with microsoft visual studio 2010
 
Spf1v10 microsoft windows share point foundation 2010 - level 1
Spf1v10   microsoft windows share point foundation 2010 - level 1Spf1v10   microsoft windows share point foundation 2010 - level 1
Spf1v10 microsoft windows share point foundation 2010 - level 1
 
Ms 5050
Ms 5050Ms 5050
Ms 5050
 
10232 designing and developing microsoft share point server 2010 applications
10232   designing and developing microsoft share point server 2010 applications 10232   designing and developing microsoft share point server 2010 applications
10232 designing and developing microsoft share point server 2010 applications
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Network+
Network+Network+
Network+
 
5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...5178 implementing and maintaining audio visual conferencing and web conferenc...
5178 implementing and maintaining audio visual conferencing and web conferenc...
 
5177 implementing and maintaining instant messaging using microsoft office ...
5177   implementing and maintaining instant messaging using microsoft office ...5177   implementing and maintaining instant messaging using microsoft office ...
5177 implementing and maintaining instant messaging using microsoft office ...
 

Modeling techniques forthe business analyst

  • 1. Modeling Techniques for the Business Analyst Course Summary Description The business analyst has become a pivotal role for information technology projects, responsible for bridging the gap between IT and the key business participants of any project. The business needs must be communicated in a way that supports business user validation as well as providing the foundation for the technical staff to design and build a successful solution. This class focuses on the many types of modeling techniques that are used by the business analyst in system development and provide hands-on experience for attendees to learn how to develop and interpret the models. Techniques taught are IIBA compliant. Topics • Overview of BA role • Introduction to Modeling • Overview of the most common system development methodologies (SDLCs) • How modeling supports the SDLCs • Business Process Improvement, Re-engineering and modeling • Context Models • Process Models • Usage Models • Data Models • Design Models • Tips for Success Audience This course is designed for: • New business analysts, systems analysts and business architects • Experienced business analysts looking to update their modeling skills or understanding the modeling skills required for the CBAP certification • Project managers who incorporate business analysis roles in their projects Duration Four days Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically MODELINGTECHNIQUESFORTHEBUSINESSANALYST-110205092256-PHPAPP01.DOC
  • 2. Modeling Techniques for the Business Analyst Course Outline I. Overview of BA role X. Design Models II. Introduction to Modeling A.Techniques in common with business models B.Architecture or Network Diagram III. Overview of the most common system C.System Structure Chart development methodologies (SDLCs) D.System Flow Diagram E.Security Model (CRUD) IV. How modeling supports the SDLCs XI. Tips for Success V. Business Process Improvement, Re- engineering and modeling VI. Context Models VII. Process Models A.Business Rules B.Decision Trees / Tables C.Event and Trigger Identification D.SIPOC Business Models E.Functional Decomposition Diagram F.Workflow Models (As-Is, To-Be) G.Flowcharts and Activity Diagrams H.Sequence Diagrams I.State Models VIII. Usage Models A.User Profiles B.Use Case Modeling C.User Stories D.Storyboards E.Prototyping F.Screen Navigation and User Interface Design IX. Data Models A.Data Dictionaries B.Data Flow Diagrams C.Entity Relationship Diagrams D.Class Models E.Data Transformation and Mapping F.Metadata Due to the nature of this material, this document refers to numerous hardware and software products by their trade names. References to other companies and their products are for informational purposes only, and all trademarks are the properties of their respective companies. It is not the intent of ProTech Professional Technical Services, Inc. to use any of these names generically MODELINGTECHNIQUESFORTHEBUSINESSANALYST-110205092256-PHPAPP01.DOC