Business analysis training in nj Information Technology (IT) at Geebo

Business analysis training in nj

Week 1:
Day1.
Role of a Business Analyst.
Structure of a Project Team.
System Development Life Cycle (SDLC).
Requirement Gathering.
Analysis and Design.
Implementation and Testing.
Deployment.
Importance of Requirement gathering.
.
Different Types of Requirements.
.
Requirement Gathering Techniques.
JAD Session.
Role of a BA in JAD Session.
How to conduct JAD session? Day2.
Compare and Contrast different SDLC Models.
Waterfall.
SCRUM.
Rational Unified Process (RUP).
RAD methodology.
Increasing use of SCRUM?.
Deep Dive into SCRUM.
SCRUM Basics.
SCRUM Team Structure.
SCRUM Estimation and Tracking.
SCRUM ChallengesWeek 2Day3.
Understanding Business analysis Artifacts.
Business requirement Document.
Functional Requirement Document (FRD, TSD etc).
Use Case Methodology.
Importance of Use Case.
Development of use cases.
Live Project examples of use cases.
Exercise to build a use caseDay4.
Review use cases.
UML Methodology.
Use Case Diagrams.
Activity and Sequence Diagrams.
Collaboration Diagrams.
State Chart Diagrams.
Class and Component Diagrams.
Object Diagrams.
Deployment Diagrams.
Change Management.
Build Management / Process.
Role of BA in Development Phase.
QA Phase.
Role of BA in Testing.
Role of BA in UATWeek 3Day5.
QA Phaseo Role of BA in Testing o Role of BA in UAT.
Introduction to Project Management.
Triple Constraint (Cost, Time and Scope Management).
Communication Management.
Stakeholder Management.
Challenges in Real life project environmentDay 6.
Real Time Scena.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.