The business analyst has become a pivotal role for information technology projects, responsible for bridging the gap between IT and the key business participants of any project. The business needs must be communicated in a way that supports business user validation as well as providing the foundation for the technical staff to design and build a successful solution. This class focuses on the many types of modeling techniques that are used by the business analyst in system development and provide hands-on experience for attendees to learn how to develop and interpret the models. Techniques taught are IIBA compliant.
- Home
- Modeling Techniques For The Business Analyst
Modeling Techniques For The Business Analyst
- There are no upcoming events.
Upcoming Events
Course Length |
4 days |
Credits Earned |
28 PDU credits |
What You Will Accomplish
- Overview of BA role
- Introduction to Modeling
- Overview of the most common system development methodologies (SDLCs)
- How modeling supports the SDLCs
- Business Process Improvement, Re-engineering and modeling
- Context Models
- Process Models
- Usage Models
- Data Models
- Design Models
- Tips for Success
Who Should Attend
This course is designed for:
- New business analysts, systems analysts and business architects
- Experienced business analysts looking to update their modeling skills or understanding the modeling skills required for the CBAP certification
- Project managers who incorporate business analysis roles in their projects
Course Outline
I. Overview of BA role
VII. Process Models
- A. Business Rules
- B. Decision Trees / Tables
- C. Event and Trigger Identification
- D. SIPOC Business Models
- E. Functional Decomposition Diagram
- F. Workflow Models (As-Is, To-Be)
- G. Flowcharts and Activity Diagrams
- H. Sequence Diagrams
- I. State Models
- A. User Profiles
- B. Use Case Modeling
- C. User Stories
- D. Storyboards
- E. Prototyping
- F. Screen Navigation and User Interface Design
IX. Data Models
- A. Data Dictionaries
- B. Data Flow Diagrams
- C. Entity Relationship Diagrams
- D. Class Models
- E. Data Transformation and Mapping
- F. Metadata
- A. Techniques in common with business models
- B. Architecture or Network Diagram
- C. System Structure Chart
- D. System Flow Diagram
- E. Security Model (CRUD)
- Please contact Deep Creek Center for information.
It is only a solution if it produces the desired results.