Enterprise Architecture Training Courses

Enterprise Architecture Training

Enterprise Architecture, EA, courses

Client Testimonials

Software Engineering

Kristian (the trainer) was very well prepared and anticipated potential changes in the course content ( we had varying levels of experience). He also integrated information specific to our company in a professional and dynamic way.

Maell Cullen - Altran UK

Software Engineering

Kristian (the trainer) was very well prepared and anticipated potential changes in the course content ( we had varying levels of experience). He also integrated information specific to our company in a professional and dynamic way.

Maell Cullen - Altran UK

Software Engineering

Kristian (the trainer) was very well prepared and anticipated potential changes in the course content ( we had varying levels of experience). He also integrated information specific to our company in a professional and dynamic way.

Maell Cullen - Altran UK

Software Engineering

Kristian (the trainer) was very well prepared and anticipated potential changes in the course content ( we had varying levels of experience). He also integrated information specific to our company in a professional and dynamic way.

Maell Cullen - Altran UK

Software Engineering

Kristian (the trainer) was very well prepared and anticipated potential changes in the course content ( we had varying levels of experience). He also integrated information specific to our company in a professional and dynamic way.

Maell Cullen - Altran UK

Software Engineering

The trainer was excellent, the only reason I have not indicated all sixes was that there were some subjects that I was less interested in but this is just due to personal taste and career path.

There were computer based activities e.g writing code and using existing programs.

Mel Irfan - Altran UK

Software Engineering

The trainer was excellent, the only reason I have not indicated all sixes was that there were some subjects that I was less interested in but this is just due to personal taste and career path.

There were computer based activities e.g writing code and using existing programs.

Mel Irfan - Altran UK

Software Engineering

The trainer was excellent, the only reason I have not indicated all sixes was that there were some subjects that I was less interested in but this is just due to personal taste and career path.

There were computer based activities e.g writing code and using existing programs.

Mel Irfan - Altran UK

Software Engineering

The trainer was excellent, the only reason I have not indicated all sixes was that there were some subjects that I was less interested in but this is just due to personal taste and career path.

There were computer based activities e.g writing code and using existing programs.

Mel Irfan - Altran UK

Software Engineering

The trainer was excellent, the only reason I have not indicated all sixes was that there were some subjects that I was less interested in but this is just due to personal taste and career path.

There were computer based activities e.g writing code and using existing programs.

Mel Irfan - Altran UK

Software Engineering

Enthusiastic and interesting trainer.

Adrian Turner - Altran UK

Software Engineering

Enthusiastic and interesting trainer.

Adrian Turner - Altran UK

Software Engineering

Enthusiastic and interesting trainer.

Adrian Turner - Altran UK

Software Engineering

Enthusiastic and interesting trainer.

Adrian Turner - Altran UK

Software Engineering

Enthusiastic and interesting trainer.

Adrian Turner - Altran UK

Software Engineering

I liked the refresher of what we had learnt at the end of each day and at other regular intervals. Kristian (the trainer) seemed to have anticipated questions that we asked and had presentations and knowledge to help answer these questions.

Ashley Day - Altran UK

Software Engineering

I liked the refresher of what we had learnt at the end of each day and at other regular intervals. Kristian (the trainer) seemed to have anticipated questions that we asked and had presentations and knowledge to help answer these questions.

Ashley Day - Altran UK

Software Engineering

I liked the refresher of what we had learnt at the end of each day and at other regular intervals. Kristian (the trainer) seemed to have anticipated questions that we asked and had presentations and knowledge to help answer these questions.

Ashley Day - Altran UK

Software Engineering

I liked the refresher of what we had learnt at the end of each day and at other regular intervals. Kristian (the trainer) seemed to have anticipated questions that we asked and had presentations and knowledge to help answer these questions.

Ashley Day - Altran UK

Software Engineering

I liked the refresher of what we had learnt at the end of each day and at other regular intervals. Kristian (the trainer) seemed to have anticipated questions that we asked and had presentations and knowledge to help answer these questions.

Ashley Day - Altran UK

Subcategories

Enterprise Architecture Course Outlines

ID Name Duration Overview
2571 It is all about Cloud: Key Concepts, Players, and Technologies 21 hours Audience IT architects, mid-level IT managers, IT consultants Format of the course Currently 100% lectures. 1.Introduction to Cloud Computing How did we get here -  From application hosting to SaaS to public & private cloud Cloud definition Chose your flavor: IaaS, PaaS, SaaS A cloud reference architecture Typical cloud usage scenarios SaaS vs. traditional enterprise computing The programmable Web: an API in the cloud Moving into the cloud Better utilization through resource virtualization Cloud management for elasticity: automated, on-demand provisioning of resources Evolving the economy of scale through shared infrastructure and applications Cloud benefits and challenges 2.Infrastructure as a Service (IaaS) IaaS architecture and key features What to look for when selecting an IaaS provider? Overview of major IaaS providers IaaS examples Microsoft Windows Azure Web Roles & Worker Roles Scalability, load balancing, fail over Amazon Web Services (AWS) Elastic Compute Cloud (EC2) & Amazon Machine Images (AMI) IaaS+: AWS Application Services and Marketplace Regions & Availability Zones Networking & security Monitoring, Auto Scaling, & Load Balancing Building scalable and fault-tolerant applications The big AWS outage & how to protect yourself Management interfaces 3.Private & Hybrid Cloud Private cloud: drivers & challenges Defining the requirements A Methodology for building a private cloud How to manage the private cloud Who can help: vendor overview VMware Abiquo Amazon Virtual Private Cloud Hybrid clouds Use cases Product example: Eucalyptus How to select a private cloud model 4.PaaS: Key Concepts & Major Players PaaS defined A complete PaaS stack Where to draw the line: IasS+ or pure-PaaS or custom-SaaS? What functionality do we need to build applications for the cloud? Multi-Tenancy What is a multi-tenant system? Evolving the economy of scale Customizing the application for a tenant Considerations for multi-tenant applications: Stability, SLA, legal & regulatory, security, maintenance, 3rd-party components A detailed look at major PaaS providers: Microsoft Windows Azure Google App Engine Force.com Outlook: the future of PaaS 5.Synergy of SOA and Cloud Computing Services and SOA defined Service Layer Model & the concept of loose coupling SOA + Event Driven Architecture (EDA) = e-SOA What is REST and why is it important for the cloud? Synergy of SOA and Cloud - the industry view SOA / SaaS synergy SOA / PaaS synergy Approaches to meet demand Applying SOA principles to the cloud: loose coupling, encapsulation, asynchronous services Building multi-tenancy applications based on SOA Migrating legacy systems into the cloud SOA / IaaS synergy Service-Oriented Infrastructure (SOI) Service virtualization vs. server virtualization Automated, on-demand resource provisioning 6.Cloud Integration The need for cloud integration and its challenges How SOA can help: focus on integration From application integration to Service Oriented Integration (SOI) The need for (inter)mediation Mediation functionality Enterprise Service Bus (ESB) reference architectures What are the particular requirements for cloud integration? From ESB to “Internet Service Bus” Product Examples: Windows Azure AppFabric IBM Cast Iron Fiorano 7.Standards and Open Source Software Cloud standards Portability & interoperability: problem statement Distributed Management Task Force, Inc. (DMTF) Open Virtualization Format (OVF) Open Cloud Standards Incubator Apache Libcloud Open Source Software (OSS) OpenStack 8.Securing the Cloud The evolution to Cloud Security From traditional Web applications to SOA to Cloud Public cloud vs. on-premise datacenter Cloud security is a multi-dimensional problem Dimension 1: IaaS, PaaS, SaaS Dimension 2: Network, VM, application, data Dimension 3: CSP, tenant Identity, Entitlement & Access Management (IdEA) Authentication & Access Control SAML, XACML, and Policy Enforcement Point (PEP) Security across on-premise systems & multiple Clouds Cloud Security Alliance standards Cloud Controls Matrix, Consensus Assessments Initiative, Cloud Audit, Cloud Trust Protocol Security, Trust, and Assurance Registry 9.Governance for Cloud-based Services Business vs. IT vs. EA vs. SOA vs. Cloud Governance Why SOA governance can (should) be the basis for Cloud governance SOA governance frameworks, standards, technologies Open Group’s Service Integration Maturity Model (OSIMM) Open Group SOA Governance Reference Model (SGRM) SOA Governance Vitality Method (SGVM) Cloud governance Similarities and differences to SOA governance Delineating responsibilities: cloud provider vs. cloud customer Switching cloud providers – the worst case test for your governance A Cloud governance methodology Technologies for implementing governance 10.Outlook and Conclusions Outlook and usage for cloud computing Hadoop – gaining popularity in the Cloud Cloud Return on Investment (ROI) Total Cost of Ownership (TCO)
2435 System Modelling with SysML 21 hours This course is offered in two variants to provide a practical understanding of how systems can be modelling using the OMG's Systems Modelling Language (SysML) version 1.2 or 1.3. The notation and underlying semantics of SysML are explained in a way that allows students to apply what they learn to any suitable system modelling method or tool. Introduction to System Modelling What is a system model? The four pillars of system modelling Model centric vs document centric What is SysML? Relationship between SysML and UML The five pillars of SysML Common and Crosscutting Constructs Profiles, stereotypes and tags Diagram frames Comments Allocations Package Diagrams What is a package? Structuring the model with packages Package containment Package dependencies Representing the model structure Views and viewpoints Use Case Diagrams The system as a black box Identifying the system boundary with actors Use cases as system services Behind the use case diagram Use case structure · Nominal and alternative scenarios Handling common behaviour Extended and specialised behaviour Sequence Diagrams Interaction-based behaviour Simple sequences Synchronous vs asynchronous Fragment nodes Interaction use nodes System Modelling with SysML Activity Diagrams Modelling flow-based logic Actions vs activities Understanding token flow Control flow vs object flow Modelling decisions · Modelling concurrency Swimlanes and responsibility State Machine Diagrams States and their syntax Transitions between states Pseudo state notation (initial, decision, history, end) Decomposing states Modelling concurrent states Block Definition Diagrams What is a block? Block features Modelling types Modelling system hierarchy Generalising system elements Internal Block Diagrams Parts revisited Flow ports, flow specifications and item flow (SysML 1.2 only) Standard ports and interfaces (SysML 1.2 only) Proxy ports and interface blocks (SysML 1.3 only) Full ports (SysML 1.3 only) Parametric Diagrams What is a constraint block? Constraining system properties Requirement Diagrams What is a requirement? Modelling atomic requirements Requirement traceability System Modelling Resources and Further Reading Suggested web resources Recommended literature
2625 Model MapReduce and Apache Hadoop 14 hours The course is intended for IT specialist that works with the distributed processing of large data sets across clusters of computers. Data Mining and Business Intelligence Introduction Area of application Capabilities Basics of data exploration Big data What does Big data stand for? Big data and Data mining MapReduce Model basics Example application Stats Cluster model Hadoop What is Hadoop Installation Configuration Cluster settings Architecture and configuration of Hadoop Distributed File System Console tools DistCp tool MapReduce and Hadoop Streaming Administration and configuration of Hadoop On Demand Alternatives
2490 Practical aspects of UML 21 hours The course extends possessed knowledge of UML. During the training, we focus on the practical use of the language of the UML object-oriented analysis. Best Practices Software crisis Best Practices in Software Development Iterative development Management requirements Component-based architecture Visual modeling Verification of quality Change management RUP Characteristics of RUP Two dimensions of RUP UML for RUP Create an object model UML 2 as a way to represent the model The object model Methods of describing the model Practical analysis of the specification of the use cases Actor A use case Association Relations include, extend Some object-oriented concepts in practice Abstraction Encapsulation Generalization Polymorphism The system architecture Mapping the structure and behavior of the system Two categories of UML diagrams Modeling the relationship between structure and behavior Different levels of modeling behavior Mapping class analytical design elements Relations refine Building strong relationships between the results of the analysis phase and the design phase Modeling design classes Class Association Enumeration Forward/reverse engineering Subsystem Design Component The relationship of the delegation Connector Assembly Description of the aspects of concurrency in the system architecture Examples of activity diagrams, sequence and state machine Description of the aspects of the architecture of the dispersion The different perspectives of architecture description
85064 Big Data Business Intelligence for Telecom and Communication Service Providers 35 hours Overview Communications service providers (CSP) are facing pressure to reduce costs and maximize average revenue per user (ARPU), while ensuring an excellent customer experience, but data volumes keep growing. Global mobile data traffic will grow at a compound annual growth rate (CAGR) of 78 percent to 2016, reaching 10.8 exabytes per month. Meanwhile, CSPs are generating large volumes of data, including call detail records (CDR), network data and customer data. Companies that fully exploit this data gain a competitive edge. According to a recent survey by The Economist Intelligence Unit, companies that use data-directed decision-making enjoy a 5-6% boost in productivity. Yet 53% of companies leverage only half of their valuable data, and one-fourth of respondents noted that vast quantities of useful data go untapped. The data volumes are so high that manual analysis is impossible, and most legacy software systems can’t keep up, resulting in valuable data being discarded or ignored. With Big Data & Analytics’ high-speed, scalable big data software, CSPs can mine all their data for better decision making in less time. Different Big Data products and techniques provide an end-to-end software platform for collecting, preparing, analyzing and presenting insights from big data. Application areas include network performance monitoring, fraud detection, customer churn detection and credit risk analysis. Big Data & Analytics products scale to handle terabytes of data but implementation of such tools need new kind of cloud based database system like Hadoop or massive scale parallel computing processor ( KPU etc.) This course work on Big Data BI for Telco covers all the emerging new areas in which CSPs are investing for productivity gain and opening up new business revenue stream. The course will provide a complete 360 degree over view of Big Data BI in Telco so that decision makers and managers can have a very wide and comprehensive overview of possibilities of Big Data BI in Telco for productivity and revenue gain. Course objectives Main objective of the course is to introduce new Big Data business intelligence techniques in 4 sectors of Telecom Business (Marketing/Sales, Network Operation, Financial operation and Customer Relation Management). Students will be introduced to following: Introduction to Big Data-what is 4Vs (volume, velocity, variety and veracity) in Big Data- Generation, extraction and management from Telco perspective How Big Data analytic differs from legacy data analytic In-house justification of Big Data -Telco perspective Introduction to Hadoop Ecosystem- familiarity with all Hadoop tools like Hive, Pig, SPARC –when and how they are used to solve Big Data problem How Big Data is extracted to analyze for analytics tool-how Business Analysis’s can reduce their pain points of collection and analysis of data through integrated Hadoop dashboard approach Basic introduction of Insight analytics, visualization analytics and predictive analytics for Telco Customer Churn analytic and Big Data-how Big Data analytic can reduce customer churn and customer dissatisfaction in Telco-case studies Network failure and service failure analytics from Network meta-data and IPDR Financial analysis-fraud, wastage and ROI estimation from sales and operational data Customer acquisition problem-Target marketing, customer segmentation and cross-sale from sales data Introduction and summary of all Big Data analytic products and where they fit into Telco analytic space Conclusion-how to take step-by-step approach to introduce Big Data Business Intelligence in your organization Target Audience Network operation, Financial Managers, CRM managers and top IT managers in Telco CIO office. Business Analysts in Telco CFO office managers/analysts Operational managers QA managers Breakdown of topics on daily basis: (Each session is 2 hours) Day-1: Session -1: Business Overview of Why Big Data Business Intelligence in Telco. Case Studies from T-Mobile, Verizon etc. Big Data adaptation rate in North American Telco & and how they are aligning their future business model and operation around Big Data BI Broad Scale Application Area Network and Service management Customer Churn Management Data Integration & Dashboard visualization Fraud management Business Rule generation Customer profiling Localized Ad pushing Day-1: Session-2 : Introduction of Big Data-1 Main characteristics of Big Data-volume, variety, velocity and veracity. MPP architecture for volume. Data Warehouses – static schema, slowly evolving dataset MPP Databases like Greenplum, Exadata, Teradata, Netezza, Vertica etc. Hadoop Based Solutions – no conditions on structure of dataset. Typical pattern : HDFS, MapReduce (crunch), retrieve from HDFS Batch- suited for analytical/non-interactive Volume : CEP streaming data Typical choices – CEP products (e.g. Infostreams, Apama, MarkLogic etc) Less production ready – Storm/S4 NoSQL Databases – (columnar and key-value): Best suited as analytical adjunct to data warehouse/database Day-1 : Session -3 : Introduction to Big Data-2 NoSQL solutions KV Store - Keyspace, Flare, SchemaFree, RAMCloud, Oracle NoSQL Database (OnDB) KV Store - Dynamo, Voldemort, Dynomite, SubRecord, Mo8onDb, DovetailDB KV Store (Hierarchical) - GT.m, Cache KV Store (Ordered) - TokyoTyrant, Lightcloud, NMDB, Luxio, MemcacheDB, Actord KV Cache - Memcached, Repcached, Coherence, Infinispan, EXtremeScale, JBossCache, Velocity, Terracoqua Tuple Store - Gigaspaces, Coord, Apache River Object Database - ZopeDB, DB40, Shoal Document Store - CouchDB, Cloudant, Couchbase, MongoDB, Jackrabbit, XML-Databases, ThruDB, CloudKit, Prsevere, Riak-Basho, Scalaris Wide Columnar Store - BigTable, HBase, Apache Cassandra, Hypertable, KAI, OpenNeptune, Qbase, KDI Varieties of Data: Introduction to Data Cleaning issue in Big Data RDBMS – static structure/schema, doesn’t promote agile, exploratory environment. NoSQL – semi structured, enough structure to store data without exact schema before storing data Data cleaning issues Day-1 : Session-4 : Big Data Introduction-3 : Hadoop When to select Hadoop? STRUCTURED - Enterprise data warehouses/databases can store massive data (at a cost) but impose structure (not good for active exploration) SEMI STRUCTURED data – tough to do with traditional solutions (DW/DB) Warehousing data = HUGE effort and static even after implementation For variety & volume of data, crunched on commodity hardware – HADOOP Commodity H/W needed to create a Hadoop Cluster Introduction to Map Reduce /HDFS MapReduce – distribute computing over multiple servers HDFS – make data available locally for the computing process (with redundancy) Data – can be unstructured/schema-less (unlike RDBMS) Developer responsibility to make sense of data Programming MapReduce = working with Java (pros/cons), manually loading data into HDFS Day-2: Session-1.1: Spark : In Memory distributed database What is “In memory” processing? Spark SQL Spark SDK Spark API RDD Spark Lib Hanna How to migrate an existing Hadoop system to Spark Day-2 Session -1.2: Storm -Real time processing in Big Data Streams Sprouts Bolts Topologies Day-2: Session-2: Big Data Management System Moving parts, compute nodes start/fail :ZooKeeper - For configuration/coordination/naming services Complex pipeline/workflow: Oozie – manage workflow, dependencies, daisy chain Deploy, configure, cluster management, upgrade etc (sys admin) :Ambari In Cloud : Whirr Evolving Big Data platform tools for tracking ETL layer application issues Day-2: Session-3: Predictive analytics in Business Intelligence -1: Fundamental Techniques & Machine learning based BI : Introduction to Machine learning Learning classification techniques Bayesian Prediction-preparing training file Markov random field Supervised and unsupervised learning Feature extraction Support Vector Machine Neural Network Reinforcement learning Big Data large variable problem -Random forest (RF) Representation learning Deep learning Big Data Automation problem – Multi-model ensemble RF Automation through Soft10-M LDA and topic modeling Agile learning Agent based learning- Example from Telco operation Distributed learning –Example from Telco operation Introduction to Open source Tools for predictive analytics : R, Rapidminer, Mahut More scalable Analytic-Apache Hama, Spark and CMU Graph lab Day-2: Session-4 Predictive analytics eco-system-2: Common predictive analytic problems in Telecom Insight analytic Visualization analytic Structured predictive analytic Unstructured predictive analytic Customer profiling Recommendation Engine Pattern detection Rule/Scenario discovery –failure, fraud, optimization Root cause discovery Sentiment analysis CRM analytic Network analytic Text Analytics Technology assisted review Fraud analytic Real Time Analytic Day-3 : Sesion-1 : Network Operation analytic- root cause analysis of network failures, service interruption from meta data, IPDR and CRM: CPU Usage Memory Usage QoS Queue Usage Device Temperature Interface Error IoS versions Routing Events Latency variations Syslog analytics Packet Loss Load simulation Topology inference Performance Threshold Device Traps IPDR ( IP detailed record) collection and processing Use of IPDR data for Subscriber Bandwidth consumption, Network interface utilization, modem status and diagnostic HFC information Day-3: Session-2: Tools for Network service failure analysis: Network Summary Dashboard: monitor overall network deployments and track your organization's key performance indicators Peak Period Analysis Dashboard: understand the application and subscriber trends driving peak utilization, with location-specific granularity Routing Efficiency Dashboard: control network costs and build business cases for capital projects with a complete understanding of interconnect and transit relationships Real-Time Entertainment Dashboard: access metrics that matter, including video views, duration, and video quality of experience (QoE) IPv6 Transition Dashboard: investigate the ongoing adoption of IPv6 on your network and gain insight into the applications and devices driving trends Case-Study-1: The Alcatel-Lucent Big Network Analytics (BNA) Data Miner Multi-dimensional mobile intelligence (m.IQ6) Day-3 : Session 3: Big Data BI for Marketing/Sales –Understanding sales/marketing from Sales data: ( All of them will be shown with a live predictive analytic demo ) To identify highest velocity clients To identify clients for a given products To identify right set of products for a client ( Recommendation Engine) Market segmentation technique Cross-Sale and upsale technique Client segmentation technique Sales revenue forecasting technique Day-3: Session 4: BI needed for Telco CFO office: Overview of Business Analytics works needed in a CFO office Risk analysis on new investment Revenue, profit forecasting New client acquisition forecasting Loss forecasting Fraud analytic on finances ( details next session ) Day-4 : Session-1: Fraud prevention BI from Big Data in Telco-Fraud analytic: Bandwidth leakage / Bandwidth fraud Vendor fraud/over charging for projects Customer refund/claims frauds Travel reimbursement frauds Day-4 : Session-2: From Churning Prediction to Churn Prevention: 3 Types of Churn : Active/Deliberate , Rotational/Incidental, Passive Involuntary 3 classification of churned customers: Total, Hidden, Partial Understanding CRM variables for churn Customer behavior data collection Customer perception data collection Customer demographics data collection Cleaning CRM Data Unstructured CRM data ( customer call, tickets, emails) and their conversion to structured data for Churn analysis Social Media CRM-new way to extract customer satisfaction index Case Study-1 : T-Mobile USA: Churn Reduction by 50% Day-4 : Session-3: How to use predictive analysis for root cause analysis of customer dis-satisfaction : Case Study -1 : Linking dissatisfaction to issues – Accounting, Engineering failures like service interruption, poor bandwidth service Case Study-2: Big Data QA dashboard to track customer satisfaction index from various parameters such as call escalations, criticality of issues, pending service interruption events etc. Day-4: Session-4: Big Data Dashboard for quick accessibility of diverse data and display : Integration of existing application platform with Big Data Dashboard Big Data management Case Study of Big Data Dashboard: Tableau and Pentaho Use Big Data app to push location based Advertisement Tracking system and management Day-5 : Session-1: How to justify Big Data BI implementation within an organization: Defining ROI for Big Data implementation Case studies for saving Analyst Time for collection and preparation of Data –increase in productivity gain Case studies of revenue gain from customer churn Revenue gain from location based and other targeted Ad An integrated spreadsheet approach to calculate approx. expense vs. Revenue gain/savings from Big Data implementation. Day-5 : Session-2: Step by Step procedure to replace legacy data system to Big Data System: Understanding practical Big Data Migration Roadmap What are the important information needed before architecting a Big Data implementation What are the different ways of calculating volume, velocity, variety and veracity of data How to estimate data growth Case studies in 2 Telco Day-5: Session 3 & 4: Review of Big Data Vendors and review of their products. Q/A session: AccentureAlcatel-Lucent Amazon –A9 APTEAN (Formerly CDC Software) Cisco Systems Cloudera Dell EMC GoodData Corporation Guavus Hitachi Data Systems Hortonworks Huawei HP IBM Informatica Intel Jaspersoft Microsoft MongoDB (Formerly 10Gen) MU Sigma Netapp Opera Solutions Oracle Pentaho Platfora Qliktech Quantum Rackspace Revolution Analytics Salesforce SAP SAS Institute Sisense Software AG/Terracotta Soft10 Automation Splunk Sqrrl Supermicro Tableau Software Teradata Think Big Analytics Tidemark Systems VMware (Part of EMC)
287852 Software Engineering 35 hours Software Engineering starts where programming stops. In this course you will learn a solid foundation in Software Engineering. It builds a bridge from programming to solid engineering practices. The course gives you an overview of basic concepts and vocabulary typically used in the field. During the course, you will learn to use many techniques to plan, implement and validate software projects and to evaluate and improve development processes. Audience: This course is intended for software developers with various backgrounds who know at least one programming language. Day 1: Process Introduction What is Systems Engineering? What is Software Engineering? Why is Software Engineering difficult? System requirements System modeling Software Engineering Processes What is a Software Development Process? Traditional Processes Agile Processes Processes for building High-Integrity Systems Standards & certification systems High-Integrity Systems What are High-Integrity Systems? The role of QM culture Reasons for errors Critical systems standard Reliability engineering Software Maintenance Day 2: Planning Requirements User requirements Elicitation/analysis of user requirements System requirements Software requirements Specification of software Requirements process Tools to manage requirements Software Design Conways Law Design patterns Textual modeling tools Principles of OO design Design tools Common architectures Modeling Planning an architecture UML graphical representations Non-UML graphical representations Day 3: Code Software Construction How to take a design into code Programming best practices Abstraction of code Programming workflow Configuration Management What is Configuration Management? Configuration Management in ISO9000 and CMMI CASE tools for planning, design & QA CASE tools for writing software Version control with SVN System Integration Code for High-Integrity Systems Preventing errors Catching errors Reducing the impact of errors Typical problems with code for High-Integrity Systems Code quality metrics Code size metrics Code complexity metrics Non-code metrics Static analysis Day 4: Verification & Validation Reviews Fundamentals of VV Independent Verification & Validation Design and requirement reviews Code inspections Software Walkthroughs Audits Other V & V methods Testing High-Integrity Systems Documents regarding safety Scenarios Argumentation for safety Reviews of High-Integrity Systems Predicting reliability Formal methods Costs of V + V Automated Testing Why test? Automatic vs manual tests Incremental testing Types of tests Testing tools Test Harnesses Day 5: Management Project Management What is Project Management? Customer handover Standards (PMP, PRINCE2) Time management Cost management Risk management Project documentation Process Evaluation The function of process evaluation Acting on the metric Process metrics Process evaluation standards & frameworks (CMMI, ISO 9001, TickIt+) Process evaluation meetings Summary and Conclusions
1937 Analysis and Design with SoaML 14 hours This course explains the OMG SoaML standards and shows how to model the SOA landscape. It introduces the language and then shows how to discover, design and implement services and infrastructure for SOA. This course always covers the newest version of the SoaML specification. Motivation behind SoaML Standards before SoaML Vendors standards and Open Source standards The IT and the business perspective on SOA Contracts and Interfaces Top-down and bottom-up approaches Service classification Compliance Level for SoaML SoaML UML Profile Specification Agent Attachment Capability Consumer Collaboration Collaboration Use Expose MessageType Milestone Participant Port Property Provider Request ServiceChannel ServiceContract ServiceInterface Service ServiceArchitecture Categorization Catalog Categorization Category CategoryValue RAS Placeholders BMM Integration MotivationElement MotivationRealziation SoaML Metamodel
85066 IoT (Internet of Things) for Entrepreneurs, Managers and Investors 21 hours Estimates for Internet of Things or IoT market value are massive, since by definition the IoT is an integrated and diffused layer of devices, sensors, and computing power that overlays entire consumer, business-to-business, and government industries. The IoT will account for an increasingly huge number of connections: 1.9 billion devices today, and 9 billion by 2018. That year, it will be roughly equal to the number of smartphones, smart TVs, tablets, wearable computers, and PCs combined. In the consumer space, many products and services have already crossed over into the IoT, including kitchen and home appliances, parking, RFID, lighting and heating products, and a number of applications in Industrial Internet. However the underlying technologies of IoT are nothing new as M2M communication existed since the birth of Internet. However what changed in last couple of years is the emergence of number of inexpensive wireless technologies added by overwhelming adaptation of smart phones and Tablet in every home. Explosive growth of mobile devices led to present demand of IoT. Due to unbounded opportunities in IoT business, a large number of small and medium sized entrepreneurs jumped on a bandwagon of IoT gold rush. Also due to emergence of open source electronics and IoT platform, cost of development of IoT system and further managing its sizable production is increasingly affordable. Existing electronic product owners are experiencing pressure to integrate their device with Internet or Mobile app. This training is intended for a technology and business review of an emerging industry so that IoT enthusiasts/entrepreneurs can grasp the basics of IoT technology and business. Course objectives Main objective of the course is to introduce emerging technological options, platforms and case studies of IoT implementation in home & city automation (smart homes and cities), Industrial Internet, healthcare, Govt., Mobile Cellular and other areas. Basic introduction of all the elements of IoT-Mechanical, Electronics/sensor platform, Wireless and wireline protocols, Mobile to Electronics integration, Mobile to enterprise integration, Data-analytics and Total control plane M2M Wireless protocols for IoT- WiFi, Zigbee/Zwave, Bluetooth, ANT+ : When and where to use which one? Mobile/Desktop/Web app- for registration, data acquisition and control –Available M2M data acquisition platform for IoT-–Xively, Omega and NovoTech, etc. Security issues and security solutions for IoT Open source/commercial electronics platform for IoT-Raspberry Pi, Arduino , ArmMbedLPC etc Open source /commercial enterprise cloud platform for IoT-Ayla, iO Bridge, Libellium, Axeda, Cisco frog cloud Studies of business and technology of some of the common IoT devices like Home automation, Smoke alarm, vehicles, military, home health etc Target Audience Investors and IoT entrepreneurs Managers and Engineers whose company is venturing into IoT space Business Analysts & Investors Pre-requisites Should have basic knowledge of business operation, devices, electronics systems and data systems Must have basic understanding of software and systems Basic understanding of Statistics ( in Excel levels) 1. Day 1, Session 1 — Business Overview of Why IoT is so important Case Studies from Nest, CISCO and top industries IoT adaptation rate in North American & and how they are aligning their future business model and operation around IoT Broad Scale Application Area Smart House and Smart City Industrial Internet Smart Cars Wearables Home Healthcare Business Rule Generation for IoT 3 layered architecture of Big Data — Physical (Sensors), Communication, and Data Intelligence 2. Day 1, Session 2 — Introduction of IoT: All about Sensors – Electronics Basic function and architecture of a sensor — sensor body, sensor mechanism, sensor calibration, sensor maintenance, cost and pricing structure, legacy and modern sensor network — all the basics about the sensors Development of sensor electronics — IoT vs legacy, and open source vs traditional PCB design style Development of sensor communication protocols — history to modern days. Legacy protocols like Modbus, relay, HART to modern day Zigbee, Zwave, X10,Bluetooth, ANT, etc. Business driver for sensor deployment — FDA/EPA regulation, fraud/tempering detection, supervision, quality control and process management Different Kind of Calibration Techniques — manual, automation, infield, primary and secondary calibration — and their implication in IoT Powering options for sensors — battery, solar, Witricity, Mobile and PoE Hands on training with single silicon and other sensors like temperature, pressure, vibration, magnetic field, power factor etc. 3. Day 1, Session 3 — Fundamental of M2M communication — Sensor Network and Wireless protocol What is a sensor network? What is ad-hoc network? Wireless vs. Wireline network WiFi- 802.11 families: N to S — application of standards and common vendors. Zigbee and Zwave — advantage of low power mesh networking. Long distance Zigbee. Introduction to different Zigbee chips. Bluetooth/BLE: Low power vs high power, speed of detection, class of BLE. Introduction of Bluetooth vendors & their review. Creating network with Wireless protocols such as Piconet by BLE Protocol stacks and packet structure for BLE and Zigbee Other long distance RF communication link LOS vs NLOS links Capacity and throughput calculation Application issues in wireless protocols — power consumption, reliability, PER, QoS, LOS Hands on training with sensor network PICO NET- BLE Base network Zigbee network-master/slave communication Data Hubs : MC and single computer ( like Beaglebone ) based datahub 4. Day 1, Session 4 — Review of Electronics Platform, production and cost projection PCB vs FPGA vs ASIC design-how to take decision Prototyping electronics vs Production electronics QA certificate for IoT- CE/CSA/UL/IEC/RoHS/IP65: What are those and when needed? Basic introduction of multi-layer PCB design and its workflow Electronics reliability-basic concept of FIT and early mortality rate Environmental and reliability testing-basic concepts Basic Open source platforms: Arduino, Raspberry Pi, Beaglebone, when needed? RedBack, Diamond Back 5. Day 2, Session 1 — Conceiving a new IoT product- Product requirement document for IoT State of the present art and review of existing technology in the market place Suggestion for new features and technologies based on market analysis and patent issues Detailed technical specs for new products- System, software, hardware, mechanical, installation etc. Packaging and documentation requirements Servicing and customer support requirements High level design (HLD) for understanding of product concept Release plan for phase wise introduction of the new features Skill set for the development team and proposed project plan -cost & duration Target manufacturing price 6. Day 2, Session 2 — Introduction to Mobile app platform for IoT Protocol stack of Mobile app for IoT Mobile to server integration –what are the factors to look out What are the intelligent layer that can be introduced at Mobile app level ? iBeacon in IoS Window Azure Linkafy Mobile platform for IoT Axeda Xively 7. Day 2, Session 3 — Machine learning for intelligent IoT Introduction to Machine learning Learning classification techniques Bayesian Prediction-preparing training file Support Vector Machine Image and video analytic for IoT Fraud and alert analytic through IoT Bio –metric ID integration with IoT Real Time Analytic/Stream Analytic Scalability issues of IoT and machine learning What are the architectural implementation of Machine learning for IoT 8. Day 2, Session 4 — Analytic Engine for IoT Insight analytic Visualization analytic Structured predictive analytic Unstructured predictive analytic Recommendation Engine Pattern detection Rule/Scenario discovery — failure, fraud, optimization Root cause discovery 9. Day 3, Session 1 — Security in IoT implementation Why security is absolutely essential for IoT Mechanism of security breach in IOT layer Privacy enhancing technologies Fundamental of network security Encryption and cryptography implementation for IoT data Security standard for available platform European legislation for security in IoT platform Secure booting Device authentication Firewalling and IPS Updates and patches 10. Day 3, Session 2 — Database implementation for IoT : Cloud based IoT platforms SQL vs NoSQL-Which one is good for your IoT application Open sourced vs. Licensed Database Available M2M cloud platform Axeda Xively Omega NovoTech Ayla Libellium CISCO M2M platform AT &T M2M platform Google M2M platform 11. Day 3, Session 3 — A few common IoT systems Home automation Energy optimization in Home Automotive-OBD IoT-Lock Smart Smoke alarm BAC ( Blood alcohol monitoring ) for drug abusers under probation Pet cam for Pet lovers Wearable IOT Mobile parking ticketing system Indoor location tracking in Retail store Home health care Smart Sports Watch 12. Day 3, Session 4 — Big Data for IoT 4V- Volume, velocity, variety and veracity of Big Data Why Big Data is important in IoT Big Data vs legacy data in IoT Hadoop for IoT-when and why? Storage technique for image, Geospatial and video data Distributed database Parallel computing basics for IoT
2121 Nato Architecture Framework (NAF) 35 hours This course gives a solid understanding across all aspects of Nato Architecture Framework. It does not focus on a specific view or function, but allows the delegates to easily find more information in the documentation and easily understand it. During the course the delegates will do simple exercises, answer questions, etc... Sparx Enterprise Architect is usually used during the course, but any other tools can be used instead. Background NATO C3 NATO C3 Organisation Mission NAF goals Framework Documentation Structure What is inside the NAF How NAF works NATO Network Enabled Capability What is an Enterprise Architecture? How to describe the architecture? Why Architecture Matters? Architecture is a language EA and decisions Types of NATO Architectures Quiz: Which architecture is described by the sentences below? Overarching Architecture (OA) Reference Architectures (RA) Target Architectures (TA) Baseline Architecture NATO Architecture Views NATO All View (NAV) NATO Capability View (NCV) NATO Operational View (NOV) NATO Service-Oriented View (NSOV) NATO Systems View (NSV) NATO Technical View (NTV) NATO Programme View (NPV) Stakeholders Communities of Interest Life-cycle management in NAF How NAF align stakeholders interest with the architecture? Identification of Stakeholders Identification of Communities of Interest (CoIs) Example CoIs Relation between Stakeholders and CoI’s Requirements Analysis of CoIs Description of CoI Interests CoI’s Architecture Interests and Impacts Requirements of Architecture Views
287819 Cloud Architect 35 hours Day 1 - provides end-to-end coverage of fundamental cloud computing topics as they relate to both technology and business. The module is divided into a series of sections, each of which is accompanied by a hands-on exercise. Day 2 - explores technology-related topics that relate to cloud computing platforms. It does not get into implementation or programming details, but instead keeps coverage at a conceptual level, focusing on topics that address cloud service architecture, cloud security threats and technologies, virtualization and data processing. Day 3 - provides a technical insight into foundational cloud computing platforms. Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) environments are explored as compound patterns, comprised of unique and shared building blocks. This module is structured as a guided tour through these architectural layers, describing primary components, highlighting shared components and explaining how building blocks can be assembled and implemented via cloud computing mechanisms and practices Day 4 - builds upon Day 3 to provide a deep dive into elastic, resilient and multitenant technology architectures, as well as specialized solution architectures, such as cloud bursting and cloud balancing. Through the study of architectural mechanisms, industry technologies and design patterns, both core and extended components are described that combine to realize elasticity, resiliency and multitenancy as primary characteristics of cloud platforms. By leveraging these native and enhanced scalability and failover-related feature-sets, specialized solution architectures are described to enable bursting between clouds and on-premise and cloud environments, as well as the balancing of runtime loads across clouds for performance and failover purposes. Day 5 - presents participants with a series of exercises and problems that are designed to test their ability to apply their knowledge of topics covered previously. Day 1 - Fundamental Cloud Computing Fundamental Cloud Computing Terminology and Concepts Basics of Virtualization Specific Characteristics that Define a Cloud Understanding Elasticity, Resiliency, On-Demand and Measured Usage Benefits, Challenges and Risks of Contemporary Cloud Computing Platforms and Cloud Services Cloud Resource Administrator and Cloud Service Owner Roles Cloud Service and Cloud Service Consumer Roles Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) Cloud Delivery Models Combining Cloud Delivery Models Public Cloud, Private Cloud, Hybrid Cloud and Community Cloud Deployment Models Business Cost Metrics and Formulas for Comparing and Calculating Cloud and On-Premise Solution Costs Service Level Agreements (SLAs) for Cloud-based IT Resources Formulas for Calculating and Rating SLA Quality of Service Characteristics Cloud Technology Concepts Cloud Computing Mechanisms that Establish Architectural Building Blocks Virtual Servers, Ready-Made Environments, Failover Systems, and Pay-for-Use Monitors Cloud Balancing and Cloud Bursting Architectures Common Risks, Threats and Vulnerabilities of Cloud-based Services and Cloud-hosted Solutions Cloud Security Mechanisms Used to Counter Threats and Attacks Understanding Cloud-Based Security Groups and Hardened Virtual Server Images Cloud Service Implementation Mediums (including Web Services and REST Services) Cloud Storage Benefits and Challenges Cloud Storage Services, Technologies and Approaches Non-Relational (NoSQL) Storage Compared to Relational Storage Cloud Service Testing Considerations and Testing Types Day 3 - Fundamental Cloud Architecture Technology Architectural Layers of Cloud Environments Public and Private Cloud Technology Architecture laaS, PaaS and SaaS Technology Architecture Cloud Computing Mechanisms as part of Platform and Solution Technology Architectures Bare-Metal and Elastic Disk Provisioning Multipath Resource Access, Broad Access and Intelligent Automation Engines Usage and Pay-as-You-Go Monitoring Platform Provisioning and Rapid Provisioning Resource Management and Realtime Resource Availability Shared Resources, Resource Pools and Resource Reservation Self-Service and Usage and Administration Portals Workload Distribution and Service State Management Other technology architecture topics pertaining to cloud platforms, cloud-based solutions and services may also be explored. Advanced Cloud Architecture Elastic Environment Resilient Environment Multitenant Environment Direct I/O Access and Direct LUN Access Dynamic Data Normalization Zero Downtime and Storage Maintenance Window Load Balanced Virtual Servers Burst In, Burst Out and Cloud Bursting Cloud Balancing Redundant Storage and Storage Workload Management Elastic Disk Provisioning, Elastic Resource Capacity and Elastic Network Capacity Intra-Storage and Cross-Storage Device Vertical Tiering Redundant Physical Connections for Virtual Servers and Persistent Virtual Network Configurations Load Balanced Virtual Switches and Service Load Balancing Hypervisor Cluster Dynamic Failure and Recovery Synchronized Operating State Resource Reservation Other technology architecture topics pertaining to cloud platforms, cloud-based solutions and services may also be explored. Day 5 - Cloud Architecture Lab As a hands-on lab, this module provides a set of detailed exercises, that require participants to solve a number of inter-related problems, with the ultimate goal of evaluating, designing and correcting technology architectures to fulfill specific sets of solution and business automation requirements.
2140 Enterprise Architecture Overview 14 hours This course is for everyone involved in planning, analysing, implementing, executing, maintaining or improving Enterprise Architectures. It shows comprehensive perspective of tools used to describe and implement the EA. Introduction to Enterprise Architecture What is architecture Enterprise Architecture (EA) Why do we need EA IT Enterprise Architecture Business Enterprise Architecture Enterprise Architecture Description vs EA Implementation Enterprise Architecture Methods, Frameworks, Concepts and Paradigms EA, Governance and Strategic Planning Strategic Management, Strategic Planning OMG Business Motivation Model Strategy Execution (EFQM) Quality Management(Six Sigma, TQM, ISO 9001) IT Governance IT Service Delivery and Support (ITIL) IT Implementation (CMM and CMMI) Methods and Frameworks IEEE Standards Zachman Framework TOGAF MDA SOA Nato Architecture Framework, MoDAF, DoDAF, UPDM Description Languages IDEF BPMN Testbed SoaML UML ArchiMate Architecture Description Languages Suitability for EA Enterprise Architecture Modelling Modelling Process Readability and Usability of Models Viewpoints and Visualisation Architecture Analysis Analysis Techniques Quantitative Analysis Functional Analysis Other Architecture Alignment Tool Support
287851 Linux Cluster and Storage Management on CentOS 6 & 7 35 hours Created Linux Administrators and developers who are interested with getting involved in Clustering or require knowledge of Clustering based on Linux system. Even beginners, who have the basic skill and knowledge on Linux, can catch up with this course just if you follow the instructor's lab and explanation in detail. This course is intended to practice enough clustering technology and to show it is very easy to understand the clustering technology on Linux system. This course will be delivered to audience with 40% lectures, 50% labs and 10% Q&A. This five-day course strongly emphasizes lab-based activities. You'll learn how to deploy and manage shared storage and server clusters that provide highly available network services to a mission-critical enterprise environment. It can be deliver on any distribution (CentOS and Ubuntu are commonly used) This course covers these kinds of topics: Chapter 01 Linux Cluster Introduction Chapter 02 Data Storage and Cluster Configuration Considerations Chapter 03 iSCSI Configuration Chapter 04 Device Mapper and Multipath Chapter 05 Linux Cluster Configuration with Conga Chapter 06 Linux Cluster Configuration with CCS Chapter 07 Fencing and Failover Domain Chapter 08 Quorum and Quorum Disk Chapter 09 Cluster Logical Volume Management Chapter 10 Global File System 2 Chapter 11 Samba Cluster Chapter 12 Apache Cluster with Conga and CCS Chapter 13 Database Cluster with MySQL Chapter 14 Linux Cluster using Pacemaker Chapter 15 Apache Cluster using Pacemaker Chapter 16 Linux Cluster using PCSD Web UI Chapter 17 Database Cluster with MariaDB
2145 Overview of Unified Profile for DoDAF/MODAF (UPDM) 21 hours UPDM is an Object Management Group (OMG) initiative to develop a modeling standard that supports both the USA Department of Defense Architecture Framework (DoDAF) and the UK Ministry of Defence Architecture Framework (MODAF). The modeling standard is called the Unified Profile for DoDAF and MODAF (UPDM). Introduction to UPDM Compliance Normative References Terms and Definitions Symbols and Acronyms Additional Information Additional Materials Overview of this Specification Acknowledgements Language Architecture Introduction Philosophy Core Principles Profile Structure Representing Stereotype Constraints UML Constraint Representation Important Areas of the Architecture UPDM Profile DoDAF Class Library UPDM L1 ActualProject
287934 AWS Architect Certification Training 14 hours On demand AWS Architect Certification training course is designed to help professionals to become cloud-enabled using Amazon Web Services. This course is taught with real life examples, helps participants understand the practical application of concepts such as fundamentals of cloud computing, Amazon Web services (AWS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), Private Clouds and Cloud programming. After this course participants will be able to have their own implementations on cloud using EC2 instances, S3 buckets etc. Introduction to Cloud Computing Amazon EC2 and Amazon EBS  Amazon Storage Services : S3, RRS, CloudWatch Scaling and Load Distribution in AWS AWS VPC & Route 53 Identity and Access Management Techniques (IAM) and Amazon Managed Relational Database (RDS) Multiple AWS Services and Managing the Resources' Lifecycle AWS Architecture and Design Migrating to Cloud & AWS Case Study
2146 MOD Architecture Framework (MODAF) Overview 21 hours MODAF is an internationally recognised enterprise architecture framework developed by the MOD to support Defence planning and change management activities. It does this by enabling the capture and presentation of information in a rigorous, coherent and comprehensive way that aids the understanding of complex issues. The audience: Enterprise Architects, the principal customers for MODAF views, who need to both correctly interpret standard MODAF views provided to them and to specify and control the tasks required to create new views Architectural modellers who need guidance on the creation and interchange of MODAF views (including for example: architecting principles, view coherence rules and tool selection criteria) Tool developers and engineers who are implementing architectural data repositories for storing and manipulating MODAF Architecture data elements Trainers and educators who require reference material in order to appropriately train and support the previous types of MODAF users MODAF users who wish to contribute to the development of MODAF Managers who need to understand what views are required to answer their particular questions Introduction Purpose Background Overview of MODAF MODAF Framework MODAF Viewpoints Relationship Between MODAF Viewpoints Key Supporting Elements to MODAF Ensuring Architectures are MODAF compliant MODAF Documentation Suite Benefits of Developing MODAF Architectures Quantifying MODAF Benefits Benefits to MOD communities of Interest Approach to developing MODAF Architectures General Approach to Developing MODAF Architectures Practical Applications of General Approach to MODAF Architectures COI-Specific Architecture Processes
2062 Introduction to Domain Driven Design 14 hours What Is Domain-Driven Design (DDD) Building Domain Knowledge The Ubiquitous Language The Need for a Common Language Creating the Ubiquitous Language The Building Blocks Of A Model-Driven Design Layered Architecture Entities Value Objects Services Modules Aggregates Factories Repositories Refactoring Toward Deeper Insight Continuous Refactoring Bring Key Concepts Into Light Preserving Model Integrity Bounded Context Continuous Integration Context Map Shared Kernel Customer-Supplier Conformist Anticorruption Layer Separate Ways Open Host Service Distillation
2147 Department of Defense Architecture Framework (DoDAF) Overview 21 hours The Department of Defense Architecture Framework (DoDAF) is an architecture framework for the United States Department of Defense, that provides structure for a specific stakeholder concern through viewpoints organized by various views. DoDAF defines a set of views that act as mechanisms for visualizing, understanding, and assimilating the broad scope and complexities of an architecture description through tabular, structural, behavioral, ontological, pictorial, temporal or graphical means. It is especially suited to large systems with complex integration and interoperability challenges, and is apparently unique in its use of operational views detailing the external customer's operating domain in which the developing system will operate. DoDAF Architecture Framework Introduction DoDAF Architecture Vision DoDAF Architecture Resources Relationships to Other Architecture Frameworks DoDAF Architecture Background Architecture Development Methodologies DoDAF View points and Models DM2 - DoDAF Meta-Model DoDAF Roles - Manager, Architect, Developer
2471 Quality Assurance and Continuous Integration 14 hours Training is open to both developers, Scrum Masters, Product Owner and also some aspects of the business department. The purpose of training is to introduce topics Quality Assurance and Continuous Integration and their place in projects conducted agile methodologies. Participants will gain a broad perspective on the issues discussed as well as practical knowledge of the tools and processes of software development in line with the QA / CI. Representatives of business, will be able to know the benefits of implementing those tools and processes and translate into both the time and cost of software development. The issues presented are based on PHP or Java, depending on customer requirements. QA/CI What is QA? What is CI? The costs of software development, refactoring and fix errors Identifying and understanding the project Profit for the organization DDD Software development based on business requirements, assumptions DDD Problems in communication IT-Business Domain Model Best Practices KISS principle and DRY Coding standards Creating reusable code through OOP and design patterns Identifying and reducing cyclomatic complexity Software Metrics Weight Method per Class Response For a Class Depth of Inheritance Tree Coupling Between Objects Lack of Cohesion of Methods Number of Children Cyclomatic complexity Metrics class Model Metrics Metrics for use Software Testing What, when and how to test? The method of "white-box" and "black box" The role of testing in agile methodologies TDD only a potential increase in the cost of the project Unit testing with JUnit (Java), PHPUnit (PHP) Behavioral tests of JBehave (Java), Behat and Mink (PHP) Functional tests Refactoring What is refactoring? Debt technology Code smell Refactoring patterns Documentation The role of documentation in agile methodologies What to document? Types of documentation Documentation and agile methodologies, or you can call (Working software over comprehensive documentation)? Standard XMI Automatic generation of documentation from the Javadoc (Java), ApiGen (PHP) Tools and Environment CI Tools and Environment CI PMD (Java), phpmd (PHP) CPD (Java), phpcpd (PHP) Lines Of Code Counter (Java), phploc (PHP) UCDetector (Java), phpdcd (PHP) Jdepend (Java), phpdepend (PHP) Jenkins Continuous Integration Server Agile and CI/QA Planning and incremental development Embracing Change Short stages Interdisciplinary team Extreme Programming, Code Review Individuals and interactions over processes and tools Summation Discussion Questions How do you begin the process of implementation?
2434 Service-Oriented Architecture: Strategy, Technology and Methodology 35 hours This course is intended for Post Graduate (or equivalent) level students and will be a combination of lectures and lab sessions (theory and practice). At the end of the course the student should be able to: Knowledge and Understanding. Understand the principles and business advantage of systems developed around services. Become fully aware of the major protocols and technologies involved in the web services standard, and understand how these technologies fit together. Your knowledge will extend to leading-edge and emerging aspects of web services as well as the more established elements of the standard. Understand in depth the technology used to enable systems based on a widely used programming language to both use and provide Web Services. Intellectual Skills: Identify where the service oriented approach and in particular web services are appropriate for particular business scenarios. Consider the most effective design for a web services solution Acquire, in the future, knowledge and understanding of emerging aspects of the rapidly evolving web services standard Practical Skills: Operate with current technologies associated with Web Services that are platform neutral – XML, SOAP, WSDL Write and expose web services in a widely used programming language and write client code in that language to invoke web services. The overall approach to design of systems based on services XML The RESTful approach to web services and the SOAP standard The Web Services Definition Language (WSDL) and other standards for the specification of services. Advanced web service standards to ensure such features as security and reliability BPEL, the Business Process Execution Language Web services in the cloud and the use of web services by mobile devices.
287762 MoDAF/NAF Introduction 7 hours The course is aimed at business analysts, architects and systems engineers who want to understand how MODAF can be used in their organisation. Introduction to Enterprise Architecture in Defence EA Enablers: Frameworks, Tools, Meta-Models & Repositories Overview of MoDAF: what is it for, and how does it fit together Key MoDAF Views: Strategic, Operational, System Detail of MoDAF Views: The key views and how they're structured Developing Capability Models: Strategic Architectures The MoDAF System Views: Structure, Behaviour, Configuration Management Programmatic Views: Project Plans (AcV-2), Capability Planning (StV-3) Service Views: MoDAF interpretation of Services and SOA
2458 Create OpenStack cloud infrastructure 14 hours The course helps to understand and implement cloud infrastructure based on OpenStack. The participant learns the architecture and capabilities of OpenStack and a variety of installation scenarios. Introduction OpenStack Architecture Core services Additional services Environment Planning implementation Preparing the environment Identity service Installing Keystone Architecture Authentication Image service Installing Glance Architecture Adding images Compute service Installing Nova Architecture Adding compute nodes Network service Installing Neutron Architecture Creating a simple network Block storage service Installing Cinder Architecture Administration Creating users and projects Creating and destroying instances Creating and attaching volumes Configuration tools
287820 SOA Architect 35 hours This 5 day course is designed to give an understanding of the mechanics of Service Oriented Architecture. It includes the technical design of SOA based architectures and service oriented solutions to business problems. Service Oriented Architecture and Computing Service Oriented Computing Terminology Service Oriented Analysis and Design Requirements and impact of adopting SOA Enterprise Service Bus Web Service and REST Services SOA Connection Points SOA Technology XML and XML Schema Web Services JAX-WS and WSDL REST Services JAX-RS and WADL Discovery and Service Registries Enterprise Service Bus (ESB) SOA Design and Architecture SOA Model Services and Service Capabilities WSDL first or code first design Principles of Service Orientation Service coupling Handling state Service discovery Advanced SOA Design and Architecture SOA Architecture types SOA Design Patterns Message types Data transformation SOA Workshop This hands on workshop consists of a number of individual and group exercises which allow the technologies and principles described in the previous modules to be applied. Participants can also bring real world problems to the workshop.
2464 REST API - a pattern of exchange of information between sites 14 hours The course is designed for developers, web applications, aims to provide opportunities offered by the REST architectural pattern by which you can communicate between sites. REST - base The need for the exchange of information between sites HTTP POST / GET / PUT / DELETE Services such MushUp and popular applications Services using REST Conventions Rest Mapping CRUD operations on HTTP calls Conventions API URL structure Passing Parameters Return Values HTTP statuses JSON - a universal format for the exchange of information Using the API services - customer Examples of the popular API Create a REST API - Server Gathering requirements and identify functionality Design and API documentation Installing the required libraries Business Object - mapping the class Controller methods Representation of a business object as JSON HTTP Headers - as metadata Testing the API using cURL Authentication mechanisms
1319 SOA 2.0 and EDA 14 hours Our ED-SOA training focuses on building and analysing an architecture framework that builds upon the SOA reference architecture. Services are used as event generators, signifying a problem or impending problem, an opportunity, a threshold, or a deviation. SOA and EDA The fusion of SOA and EDA into ED-SOA Combining events and services Business rule processing Transforming messages Solicit-Response Different ways of thinking about problem solving WS-Eventing Potential overlap between SOA and EDA Standardizing event processing rules Fundamental EDA Characteristics Decoupled interactions Publish/Subscribe messaging Many-to-many communications Event-based triggers Asynchronous interactions How does ED-SOA support faster responses? Event-driven Architecture Event processors Using a dashboard Event monitoring Event infrastructure Propagation of events Kicking off a business process SOA Action Framework Triggering actions Subscribing to an event The ESB and event propagation Complex event processing Event consumers Event producers Storing and forwarding events Facilitating system responsiveness Event processing Styles Simple processing Handling real-time flow of work Reducing lag time and cost Stream processing Real time flow of information Enabling in-time decision making Complex processing Inferring event occurrence Event correlation Sophisticated event interpreters Responding to business anomalies Enterprise Service Bus (ESB) Standard-based connectivity Transport services Message routing capabilities Message transformation features Event services Mediation capabilities Protocol mediation Content mediation Configuring a simple ESB solution Pervasive integration Reliable integration WS-Eventing Delivery modes Subscription managers Notations and terminology Subscription messages Notifications Faults Security considerations Message security Access control Complex Event Processing (CEP) CQL - Complex Query Language Event Attributes or properties Granularity of events Using timestamps Creation time and arrival time Event processing language (EPL) Event processing agents (EPA) Composite events Derived events Event source and event channel SOA event Patterns Discovering event patterns Commands Queries Event pattern monitoring Monitoring for control of process execution Event cascade When to use event patterns Event sourcing Structuring the event handler logic Reversing events SOA events and the SLA Importance of a Service level agreement Keeping services within the agreement Instances violating the SLA Priority for executing risk assessment steps Building autonomous processes Monitoring and event pattern triggering Dependence between events Software Platform for ED-SOA Software Tools for ED-SOA Event-optimized runtimes Supporting bulk application of rules Dynamic data-driven event definition Agents and streams Guaranteed pause times Sensors and event-processing agents Responders Conclusions Building of processes facilitated by ED-SOA ED-SOA constructed using BPM CEP principles as component of ED-SOA The increasing quest for control of BP Real time autonomous operation Gathering business intelligence from events
2494 UML in Enterprise Architect (workshops) 21 hours The course is designed for analysts, designers, developers, testers and project managers. The workshop presents a problem analysis, design and documentation systems using UML and Enterprise Architect of Sparx Systems. During the training will be presented to the advanced capabilities of the program (such as MDA, profiles, XMI), and best practices that can greatly simplify and accelerate modeling. The training method: Lecture 10%, 90% workshop Create and configure EAP file Create and save a Enterprise Architect project file File structure of the project Types of views Program interface: menus, toolbars, Toolbox, Project Browser and other windows Docking and hiding windows Working with a model, diagram Predefined models Packages (views) and diagrams Adding elements to the model and diagram Different ways of removing the items and their consequences Saving diagrams Requirements Management Methods of requirements gathering FURPS requirements categories Requirements Diagram Relationships between requirements aggregation dependency realization How to improve the appearance of a diagram? layout diagram colour status requirements enable / disable the package names Create and manage a matrix relationship Documenting requirements HTML pages printable version Advanced requirement management  custom types of requirements custom requirements status tracking requirements requirements documenting Business process modeling, architecture Activity Diagram Compound activities Control flows, object flows Handling exceptions, interrupt flow Partitions Concurrent flows and decision-making How to improve the appearance of a diagram? different levels of detail reducing the amount of detail complexity of the process Components and Deployment diagrams The initial architecture of the system - logical and physical nested components delegation and assembly port, part interface communication paths Security, performance, reliability of the system requirements modelling Non-standard implementation of stereotypes in diagrams stereotypes graphic library adding the library to the project custom graphics stereotypes Use Cases and their documentation Functional requirements modeling  Scope of the system Actors and the relationships between them Identifying use cases Association "actor - use case" and its properties Relationship between use cases: include, extend, generalization Auto names Use Case scenarios and diagrams generated based on them them (activity, state machine, sequence) Use Case scenarios from external files Documentation generation Document Templates Domain model Main classes/objects of a system Communication Diagram message types: asynchronous, synchronous, return messages numbering stereotypes: Boundary, Control and Entity System design introduction  Static model Class Diagram Class diagram and source code generation association and its characteristics other relationships: aggregation, composition, generalization, dependency, association class naming  convention for classes and their elements show/hide classes Forward/Reverse engineering source code generating from the diagram diagram generation from source code source code and diagram synchronization Object Diagrams Dynamic Model Static model verification clarify the method signatures verification of the class diagram Dynamic modeling at the level of method calls (sequence diagram) based on use cases and static analysis model How to improve the appearance of a diagram? reducing the number of modeled scenarios reducing the number of lifelines avoiding complex nested blocks hiding details State Machine diagram states and sub-states transitions between states - trigger, condition and action internal actions (entry, do, exit) How to improve the appearance of a diagram? line style state decomposition Patterns and profiles "Gang of Four" patterns Patterns defined in the project Collaboration User patterns Importing profiles from XML files MDA, source code Class Diagram to database schema transformation SQL script generation based on class diagram Source code generation - available options Group work Enterprise Architect package versioning Differences in the versions of the project, documentation Using a repository to store the model Collaboration tools
300890 OpenStack Administration - Basic 14 hours The course is dedicated to IT engineers and architects who are looking for a solution to host private or public IaaS (Infrastructure as a Service) cloud. Course goal: gaining basic knowledge regarding OpenStack design, installation and administration automated OpenStack cluster installation and configuration Introduction: What is OpenStack? Foundations of Cloud Computing Virtualization vs clustering OpenStack evolution OpenStack distributions OpenStack releases OpenStack deployment solutions OpenStack services OpenStack competitors   OpenStack Administration: Basic terms IaaS model Supported hypervisors Supported image formats Basic architecture Design concerns Installation concerns Configuration concerns Administration concerns Automation concerns Growth planning High Availability concerns Automated OpenStack installation with PackStack How to download and execute RC files How to create an external network in Neutron How to upload an image to Glance How to create a new flavor in Nova How to update default Nova and Neutron quotas How to create a new tenant in Keystone How to create a new user in Keystone How to manage roles in Keystone How to create a tenant network in Neutron How to create a router in Neutron How to manage router’s interfaces in Neutron How to update security groups in Neutron How to upload RSA key-pair to the project How to allocate floating IPs to the project How to launch an instance from image in Nova How to associate floating IPs with instances How to create a new volume in Cinder How to attach the volume to the instance How to take a snapshot of the instance How to take a snapshot of the volume How to launch an instance from snapshot in Nova How to create a volume from snapshot in Cinder How to create a container in Swift How to upload data to the container in Swift   Basic Environment: Prerequisites Nodes and networks AMQP Keystone: Objects API concerns Components Backends Authentication process   Glance: Components Backends   Nova: Components Flavors Instances launching and termination process Schedulers awareness Remote access   Neutron: Components Network virtualization Virtual network devices L2 agent OVS ML2 Bringing it all together - Compute Bringing it all together - Networker Virtual networks L3 agent DHCP agent   Horizon: Backends Cinder: Volumes Components Backends   Swift: What is object storage? Replication Structure Data addressing Modified consistent hashing ring Data placement Metadata placement Part power Ring internals Ring builder Components Backends   Heat: Use cases Components Templates “Hello World” template   Ceilometer: Use cases Basic concepts Components Polling agents Backends   Adding Compute Node: Manual addition of a Compute Node  
2569 Object-Oriented Analysis and Design using UML 21 hours This course is intended for analysts, designers, developers, testers and project managers. It is an introduction to system modeling using UML. Based on selected systems (case study) following phases of system modeling are presented: from modeling requirements, through business process modeling and documentation of functional and non-functional requirements, to the analytical model. The next step is the design phase - static and dynamic modeling using project classes and the interaction between the system components. Training can be the basis for a comprehensive process modeling in enterprise systems through the use of UML in all phases of software development. Introduction to UML A brief History of UML Overview of issues in the field of object-oriented modeling UML Specification (OMG) UML diagrams overview Requirements management Requirements Types Requirements Categories (FURPS) Methods for gathering requirements Modeling requirements using UML The relationship matrix for the requirements Creating a requirements specification Modeling business processes Activity Diagram Business process modeling in UML The definition of a business process Concurrent flows and decisions Exceptions and Exception Handling Partitions, path Modeling non-functional requirements Components and Deployment diagrams The initial architecture of the system - logical and physical Modeling requirements for security, performance, reliability, ... Modeling functional requirements Modeling functionality with the Use Case diagram Determining the scope of the system Actors and the relationships between them Identifying use cases Association "actor - use case" and its properties The relationship between use cases: include, extend, generalization Creating a use case scenarios and generate diagrams from them (activity, state machine) Analytical model of the system Using communication diagram to identify the main system objects The types of messages: asynchronous, synchronous, reply Specify the numbering sequence of messages Categories of objects: Boundary, Control and Entity Introduction to the project system Modeling the interaction Static Modeling Class Diagram and source code generation Association relationship and its characteristics. Other relationships: aggregation, composition, generalization, dependency, association class Forward/Reverse engineering Generating source code from the model Generating diagram based on the source code Synchronizing code and diagram Object Diagrams, Composite Structure Diagrams, and Package Diagrams Dynamic Modeling Verification of the static model Clarification of method signatures Verification of the class diagram The dynamic modeling at the level of method calls Diagrams: Sequence, State Machine, Timing, and Interaction
2634 Introduction to Enterprise Architect 7 hours This Introduction to Enterprise Architect training course is designed for all persons who wish to use Sparx Systems’ UML modelling tool, Enterprise Architect, for their modelling activities yet are unfamiliar with the features, functions and use of Enterprise Architect. High Level Principles of UML Business Use Case modelling Process Business Modelling (Activity Diagrams) Sparx EA 9.3 (professional) Printing Publishing models on the Server - HTML
1881 Cloud Computing Overview 7 hours This course has been created for people who want to understand how to benefit from cloud computing. It uses Amazon EC2 example, but can be tailored to other providers. Short history of computing Virtualization Private Cloud vs Public Could Where to use or not to use cloud computing Could computing in action Workshops, where delegates will be entitled to start an instance (included in the course price) Starting and stopping instances Monitoring Changing hardware requirements EBS vs instance storage Auto-scaling Load balancing Spot instances Overview of cloud providers Eucalyptus Digital Ocean Azure Others
1939 UML for the IT Business Analyst 21 hours One of the fastest growing roles in the IT industry is the IT Business Analyst. Business Analysts are found in almost organizations and are important members of any IT team whether in the private or public sector. This course provides a clear, step-by-step guide to how the Business Analyst can perform his or her role using state-of-the-art object-oriented technology. Overview of Software Development Process and Modelling Methodologies and their impact on the work of a Business Analyst Waterfall steps Analysis, Design, Implementation, Testing, Maintenance Agile approach to business analysis Who Are Business Analysts? Perspective on the BA Role The Dynamic (Behavioral) Model The Static (Structural) Model Structured Analysis The BA’s Perspective on Object Orientation Object Oriented Programming and its impact on modelling The UML Standard Cognitive Psychology and OO? Objects Attributes and Operations Operations and Methods Encapsulation Classes Relationships Generalization Association Aggregation Composition Polymorphism Use Cases and Scenarios Business and System Use Cases An Overview of Business Object-Oriented Modeling (B.O.O.M.) B.O.O.M. and SDLCs The B.O.O.M. Steps Sequencing the Steps What Do You Define First—Attributes or Operations? Analyzing End-to-End Business Processes Interviews During the Initiation, Analysis, and Test Phases Step 1: Initiation Business Requirements Document Template Step 1a: Model Business Use Cases Step 1a i: Identify Business Use Cases (Business Use-Case Diagram) Putting Theory into Practice Note to Rational Rose Users Case Study D1: Business Use-Case Diagrams Step 1a ii: Scope Business Use Cases (Activity Diagram) Case Study D2: Business Use-Case Activity Diagram with Partitions Scoping the IT Project with System Use Cases Step 1b: Model System Use Cases Case Study E1: Role Map Step 1b ii: Identify System Use-Case Packages (System Use-Case Diagram) Case Study E2: System Use-Case Packages Step 1b iii: Identify System Use Cases (System Use-Case Diagram) Case Study E3: System Use-Case Diagrams Step 1c: Begin Static Model (Class Diagrams for Key Business Classes) Step 1d: Set Baseline for Analysis (BRD/Initiation) Storyboarding the User’s Experience Step 2: Analysis The Use-Case Description Template Documenting the Basic Flow Use-Case Writing Guidelines Basic Flow Example: CPP System Review Case Report Documenting Alternate Flows Documenting Exception Flows Guidelines for Conducting System Use-Case Interviews Activity Diagrams for System Use Cases Related Artifacts Decision Tables Case Study F1: Decision Table Decision Trees Case Study F2: Decision Tree Condition/Response Table Business Rules Advanced Use-Case Features Case Study F3: Advanced Use-Case Features Life Cycle Requirements for Key Business Objects What Is a State Machine Diagram? Step 2a ii: 1. Identify States of Critical Objects Case Study G1: States Step 2a ii: 2. Identify State Transitions Case Study G2: Transitions Step 2a ii: 3. Identify State Activities Case Study G3: State Activities Step 2a ii: 4. Identify Composite States Case Study G4: Composite States Step 2a ii: 5. Identify Concurrent States Gathering Across-the-Board Rules with Class Diagrams Step 2b: Static Analysis Step 2b i: Identify Entity Classes Case Study H1: Entity Classes Step 2b ii: Model Generalizations Case Study H2: Generalizations Step 2b iii: Model Transient Roles Case Study H3: Transient Roles Step 2b iv: Model Whole/Part Relationships The Composite Structure Diagram Case Study H4: Whole/Part Relationships Step 2b v: Analyze Associations Case Study H5: Associations Step 2b vi: Analyze Multiplicity Case Study H6: Multiplicity Optimizing Consistency and Reuse in Requirements Documentation Step 2b vii: Link System Use Cases to the Static Model Case Study I1: Link System Use Cases to the Static Model Case Study I1: Results Step 2b viii: Add Attributes Meta-Attributes Case Study I2: Add Attributes Step 2b ix: Add Look-Up Tables Case Study I5: Analyze Look-Up Tables Step 2b x: Add Operations Case Study I7: Distribute Operations Step 2b xi: Revise Class Structure Case Study I8: Revise Structure Designing Test Cases and Completing the Project Step 2c: Specify Testing Structured Walkthroughs Decision Tables for Testing Case Study J1: Deriving Test Cases from Decision Tables Boundary Value Analysis Case Study J2: Select Test Data Using Boundary Value Analysis System Tests Beyond the System Tests Step 2d: Specify Implementation Plan Step 2e: Set Baseline for Development What Developers Do with Your Requirements Object Oriented Design Patterns Visibility Control Classes Boundary Classes Sequence Diagrams Communication Diagrams Other Diagrams Layered Architecture Interfaces Mix-Ins Implementing OO Using an OO Language Implementing OOA Using Procedural Languages Implementing a Database from OOA Using a RDBMS
1938 UML Analysis and Design 21 hours This course has been created for software architects, programmers, software developers, project managers, analysts and anyone interested in understanding analysis and designing in UML. The course shows how to analyse clients' needs, formalize them in UML diagrams, create a model and ultimately design the implementation of the software. This is a general course covering all aspects of UML. Please browse our catalogue to see more specific courses. This course uses the newest version of the standard (http://www.omg.org/spec/UML) and is taught by an OMG Certified UML Professional (OCUP) trainer. There are no specific tools for this course, each of the delegates can use their favourite tool. By default, Sparx Enterprise Architect is used. Introduction to Modelling Models and Modelling Idea of meta-modelling UML documentation Inheritance Analysis and Design Actors and Use Cases Class and Object Diagrams Classes, objects, types of relations Object and Class Relationships Association, Aggregation, Composition Inheritance Dependency Interaction Communication diagram Interaction overview diagram Sequence diagram Timing diagrams Activity Diagrams State Diagrams Packages Component and Deployment Workshop From Analysis to Implementation Introduction to design patterns
1476 Business Process Analysis with UML and BPMN 14 hours Course Audience: Managers who want to understand BPMN diagrams, Business Consultants, Business Analysts, Business Process Engineers, System Analysts and anyone who is involved in analyzing and planning Business Processes using standardized, unified modelling notation. Course Goals: Produce high-quality process diagrams Model in the BPMN process notation Capture as-is process information Implement optimized process flows for people-intensive processes Simplify complex process definitions and break them into more manageable pieces UML Business use case diagrams UML activity diagrams detailing the use case Business Entities definitions depicted with Class Diagrams Map the model into system use cases BPMN BPMN modelling techniques BPMN modelling shape overview Swimlane generation and viewing BPMN text objects, data objects, annotations, and attributions Basic Process optimization Process design best practices
Weekend Enterprise Architecture courses, Evening Enterprise Architecture training, Enterprise Architecture boot camp, Enterprise Architecture instructor-led , Evening Enterprise Architecture courses, Enterprise Architecture instructor, Enterprise Architecture one on one training , Enterprise Architecture on-site,Weekend Enterprise Architecture training, Enterprise Architecture classes, Enterprise Architecture private courses, Enterprise Architecture coaching, Enterprise Architecture training courses

Some of our clients