Courses → Course Catalog

Filter by Topic

Upon completing this course, you will have learned how to: – Recognize personally identifiable information – Describe the benefits of the Privacy Shield – Explain the protections that HIPAA provides – List the various components of the Electronic Communications Privacy Act – Describe the purview of the National Institute of Standards and Technology – Summarize the expanded rights the California Consumer Privacy Act provides Californians
Upon completing this course, you will have learned how to: – Identify materials required for voice and data – Understand common billing errors for voice and data – Define the auditing process for both voice services and data services
Upon completing this course, you will have learned how to: – Recognize the organizational benefits of auditing – Recall examples of process improvement and cost savings – Identify steps in a successful audit lifecycle
Upon completing this course, you will have learned how to: – Identify mobile environments and billing components – Understand the process for auditing a mobile environment – Audit a mobile environment
Upon completing this course, you will have learned how to: – Define the materials required for invoice-to-contract or invoice-to-tariff audits – Understand how to read the required documents
Upon completing this course, you will have learned how to: – Identify components of packet switched circuits within your organization – Secure resource documents to complete an inventory – Use invoices and contracts to confirm accuracy in billing – Identify cost reduction opportunities
Upon completing this course, you will have learned how to: – Define the phases in auditing the security plan to ensure compliance – Learn the steps to resolve security plan non-compliance – Describe how each dispute management process affects security plans – Learn how to apply telecom security best practices
Upon completing this course, you will have learned how to: – Understand how to interpret audit results – Define the potential benefits found in an audit – Differentiate between opportunities for savings and recovering overpayment – Create a dispute management process – Use KPIs to Validate an auditing program
Upon completing this course, you will have learned how to: – Identify the technical, customer service, financial, and time telecom pain points and perspectives – Utilize the questions that uncover those pain points – Recognize the customer assurances associated with these pain points – Describe the different responsibilities during a telecom service provider contract lifecycle
Upon completing this course, you will have learned how to: – Define what a business case is – Explain the components of a business case – Identify the steps to build a requirements assessment – Simulate building a business case
Upon completing this course, you will have learned how to: – Define TEM – Perform a TEM Program Needs Assessment – Understand the value of TEM – Calculate a TEM Program ROI – Develop a TEM Program Business Case
Upon completion of this course, you will have learned:
  • The roles of multiple business systems in a TEM program
  • Common external data sources and how each supports a TEM program
  • How to effectively evaluate and validate data across multiple systems a TEM program
  • Common areas of automation potential in a TEM program
  • How a RASCI improves business systems integration and data integrity while increasing automation potential for a TEM program
  • Efficiency First® Framework guiding principles supporting TEM business systems and data integrity
Upon completing this course, you will have learned how to: – Define cost avoidance and cost containment – Understand how to negotiate optimal contracts – Identify key ways to maximize cost savings – Select technology that meets operation needs at the best pricing – Resolve disputes
Upon completing this course, you will have learned how to: – Describe the Importance of Contract Compliance – Explain the Benefits of Contract Catalog – Interpret Documents in a Contract Catalog – Assess Contract Compliance Adherence
Upon completing this course, you will have learned how to: – Summarize the history of the CCPA and its scope – List the rights that the CCPA provides consumers – Explain an organization’s responsibilities under the CCPA and the penalties for non-compliance – Recognize the differences between the CCPA and the General Data Protection Regulation
Upon completing this course, you will have learned how to: – Establish a CoE organizational model baseline – Perform a CoE organizational model gap analysis – Establish an action plan to close gaps
Upon completing this course, you will have learned how to: – Identify the four phases of change management within the process lifecycle – Explain what occurs within each phase of the process lifecycle – List the five departments that have specific departmental process protocols – Differentiate between the change management strategies for five separate departments
Upon completing this course, you will have learned how to: – Understand key success factors for building a CoE – Identify factors that accelerate and inhibit CoE development – Implement acceleration techniques in CoE development plan
Upon completing this course, you will have learned how to: – List the five catalysts for change in a telecommunications environment – Explain why project planning is necessary for effective change management – Develop a project plan to manage a change within a telecommunications environment – Explain the purpose of each step in the process development life cycle – Identify common processes within different areas of an organization that can help with effective change management
Upon completing this course, you will have learned how to: – Describe cloud computing – Define three cloud management models – Define common cloud terminology
Upon completing this course, you will have learned how to: – Describe the cloud environment – Match cloud management services to enterprise needs – Define cloud provisioning – Explain differences in cloud provisioning models
Upon completing this course, you will have learned how to: – Describe the optimal cloud environment – Identify the roles and tasks needed for cloud management – Explain the differences between technical and financial auditing
Upon completing this course, you will have learned how to: – Define a business Case – Explain the difference between capital and operation expenditures – Explain how to write and sell a business case – Explain how to track results for a cloud project implementation
Upon completing this course, you will have learned how to: – Summarize the cloud auditing process – Identify different cloud invoice types – Demonstrate how to compare cloud invoice-to-contract charges – Explain the differences in cloud storage and cloud license management
Upon completing this course, you will have learned how to: – Understand the stages of CoE development – Identify stakeholders to promote and support CoE development – Establish CoE progress reporting templates
Upon completing this course, you will have learned how to: – Understand important components of telecom contract management – Define the process for validating telecom contracts – Identify steps to manage telecom contracts
Upon completing this course, you will have learned how to: – Understand important components of mobile contract management – Identify steps to manage mobile contracts – Understand the importance of mobile device peripherals – Understand best practices for mobile contracts
Upon completing this course, you will have learned how to: – Define change management and its underlying principles – Identify catalysts for change in the telecom environment – Discuss items to take into consideration prior to creating the project plan and process for implementing and managing change

Upon completion of this course, you will have learned:

  • What cloud optimization is
  • Why cloud optimization matters and the value it offers
  • Cloud optimization business applications and use cases
  • Considerations for selecting a cloud optimization solution for your organization
  • Ongoing cloud optimization performance considerations
  • Efficiency First® Framework best practices supporting cloud optimization
Upon completion of this course, you will have learned:
  • What a Center of Excellence (CoE) is
  • How a CoE supports business, why it matters, and the value it offers
  • Considerations for creating a CoE
  • Considerations for launching a CoE
  • How to evaluate CoE performance
  • Efficiency First® Framework best practices supporting CoE design, deployment, and maturity.
Upon completing this course, you will have learned how to: – Identify the process used to create a change project plan – Write the objective of the change project – Recognize the components of the scope of work – Create a draft project plan
Upon completing this course, you will have learned how to: – Identify the role and responsibilities of a CoE Business Practice Owner – Understand the skills, knowledge, and experience required to be a CoE Business Practice Owner – Interpret CoE Business Proactive Owner performance dashboard KPIs
Upon completing this course, you will have learned how to: – Identify the role and responsibilities of a CoE Executive Owner – Understand the skills, knowledge, and experience required to be a CoE Executive Owner – Interpret CoE Executive Owner performance dashboard KPIs
Upon completing this course, you will have learned how to: – Identify the role and responsibilities of a CoE Financial Practice Owner – Understand the skills, knowledge, and experience required to be a CoE Financial Practice Owner – Interpret CoE Financial Practice Owner performance dashboard KPIs
Upon completing this course, you will have learned how to: – Identify the role and responsibilities of a CoE Operational Practice Owner – Understand the skills, knowledge, and experience required to be a CoE Operational Practice Owner – Interpret CoE Operational Practice Owner performance dashboard KPIs
Upon completing this course, you will have learned how to: – Identify the role and responsibilities of a CoE Technical Practice Owner – Understand the skills, knowledge, and experience required to be a CoE Technical Practice Owner – Interpret CoE Technical Practice Owner performance dashboard KPIs
Upon completing this course, you will have learned how to: – Understand components of a CoE strategy – Identify opportunities to align a CoE to business objectives – Develop a CoE strategy aligned with business objectives
Upon completing this course, you will have learned how to: – Identify financial delivery models for a Center of Excellence – Understand benefits and considerations for each financial delivery model – Determine the appropriate financial model for your organization
Upon completing this course, you will have learned how to: – Identify mitigation procedures to cloud security concerns – Understand best practices to mitigate cloud security concerns – Perform recommended procedures to mitigate cloud security concerns
Upon completing this course, you will have learned how to: – Understand the common cloud services – Mitigate challenges with cloud services – Use common considerations to select a cloud service – Understand best practices for cloud services
Upon completing this course, you will have learned how to: – Identify wireless cost savings drivers – Distinguish between chargeback models – Define wireless optimization – Describe standardized metrics

Upon completion of this course, you will have learned:

  • What customer experience (CX) is
  • How CX supports business, why it matters, and the value it offers
  • CX business applications and use cases
  • Considerations for elevating CX practices for your organization
  • How to measure CX practice performance
  • Efficiency First® Framework best practices supporting service delivery CX
Upon completing this course, you will have learned how to: – Implement the recovery plan – Identify ways to manage common types of disasters – Create the Disaster Recovery Document Packet – Understand the steps in the post incident management process
Upon completing this course, you will have learned how to: – Identify common areas of vendor disputes – Name the “steps” of the dispute management process – Recognize challenges that exist when managing disputes – List best practices for managing disputes
Upon completing this course, you will have learned how to: – Explain what a Data Protection Impact Assessment is, and why it’s critical to data privacy compliance – Describe each step required when conducting a DPIA utilizing the AOTMP® DPIA Template – Develop a strategy to mitigate risks uncovered during the DPIA process
Upon completion of this course, you will have learned:
  • What data privacy is.
  • How US data privacy laws compare to the rest of the world.
  • Which states are enacting new laws in 2023 and the scope of each.
  • What organizations need to do to comply with new data privacy laws.
  • How laws are enforced and penalties for non-compliance.
  • Efficiency First® Framework best practices supporting data privacy compliance.
Upon completing this course, you will have learned how to: – Generalize the requirements behind a DPO’s appointment – Summarize the role of the DPO – List the responsibilities of the DPO – Explain how a DPO should be reachable – Summarize the benefits of DPOaaS
Upon completing this course, you will have learned how to: – Identify types of disasters that have the potential to impact your organization – Utilize different resources to help plan and prepare for disastrous events – Discover the importance of having a disaster relief and business continuity plan in place – Recognize the first three steps in the 10-step process for preparing a disaster recovery and business continuity plan
Upon completing this course, you will have learned how to: – Recognize the importance of a disaster recovery and business continuity plan – Recall the first three steps of the 10 step process as discussed in Part One of this course – Describe the remaining seven steps of the 10 step process – Arrange the steps of the 10-step process in the correct order
Upon completing this course, you will have learned how to: – Outline the history of 9-1-1 – Describe the strengths and limitations associated with the various iterations of 9-1-1 – Explain the key pieces of legislation that currently govern 9-1-1
Upon completing this course, you will have learned how to: – Provide a foundation for understanding the scope, definitions, background, and considerations for enterprise mobility management – Understand definitions for Enterprise Mobility Management (EMM) – Follow best practices for EMM – Understand the systems and services that support mobility EMM – Evaluate considerations for EMM
Upon completing this course, you will have learned how to: – Identify why it’s important to evaluate vendor RFP responses against your established criteria – Articulate the type of information you should expect to receive from the open-ended vendor questions in your RFP – Using the information contained in this e-learning as well as the 2 previous courses, identify components of a vendor scorecard
Upon completing this course, you will have learned how to: – Understand the General Data Protection Regulation or GDPR, its requirements and its penalties – Recognize the effects of the GDPR on enterprise and vendor environments – Demonstrate GDPR comprehension through real-world scenarios
Upon completing this course, you will have learned how to: – Recognize different aspects of the EMEA telecom structure, including roaming regulations and net neutrality – Identify the main sections of an EMEA invoice – List the proper steps to perform an audit with an EMEA invoice – Distinguish between the steps needed to perform an audit with an EMEA invoice with the steps needed to perform an audit with a US invoice – Describe the differences between types of auditing support materials
Upon completing this course, you will have learned how to: – Understand best practices for managing Help Desk tickets/incidents – Understand the best practices for building FAQ/self-help systems – Implement reporting processes and first call resolution/QA/QC best practices – Identify common telecom Help Desk challenges and mitigate them
Upon completing this course, you will have learned how to: – Define hybrid WAN and SD-WAN – Understand benefits and considerations for using hybrid WAN and SD-WAN – Evaluate the current network environment, assess future networking needs, and strategize for your pre-implementation process – Understand the considerations and best practices for deciding on a network solution
Upon completing this course, you will have learned how to: – Identify the phases of preparing for a BYOD program – Articulate the role of a planning team – Identify the scope of a BYOD program – Recall the necessary components for a BYOD program policy
Upon completing this course, you will have learned how to: – The definition of the word inventory in relation to telecom services management – How to develop a telecom services inventory – How to create telecom service invoice, detail (cost), and contract catalogs – How to maintain a current telecom service inventory
Upon completing this course, you will have learned how to: – Define the data types used in your environment – Evaluate your workflow procedures and understand why poor workflow processes pollute your data – Establish an exception identification and reporting plan
Upon completing this course, you will have learned how to: – Explain the difference between data privacy and data security – Understand the telecom, mobility, and IT management consequences that result from not following appropriate data privacy practices – Recognize the data privacy laws active in the Americas, EMEA (Europe, Middle East, & Africa) and Asia Pacific – Describe the role of a Data Protection Officer (DPO) and their impact on data privacy compliance in your technology management environment
Upon completing this course, you will have learned how to: – Understand security features of iOS mobility – Understand risks and considerations for mitigation – Understand standardized device benefits – Understand MDM security – Define considerations for an iOS Mobility policy – Follow best practices for iOS security
Upon completing this course, you will have learned how to: – Identify international differences in telecom network operations – Outline structuring an international telecom management team – Identify international technology standards – Implement international telecom policies
Upon completing this course, you will have learned how to: – Understand the diversity in languages, currencies, and market structures involved in international telecom – Recognize international telecom regulations and regulatory structures – Identify geographic, socioeconomic, and geopolitical regions and groupings of the world – Implement strategies for building your international telecom team and policies – Consider global initiatives related to the progression of telecom and ICT technologies
Upon completing this course, you will have learned how to: – Define and understand IoT – Explain the benefits of IoT for the enterprise – Identify numerous IoT enterprise verticals – Recognize and understand the considerations associated with IoT
Upon completing this course, you will have learned how to: – Identify what information should be gathered prior to beginning the research process – Select considerations for your current assets, services, and locations with respect to gathering vendor information – Recognize the types of sources you can reference to gather initial information
Upon completing this course, you will have learned how to: – Understand the importance of international security – Understand international regulations and governance for telecom communication – Mitigate risks when communicating internationally
Upon completing this course, you will have learned how to: – Understand implementation options – DIY, fully managed, or hybrid – Mitigate risks associated with a network migration – Build a business case for an SD-WAN implementation for your enterprise – Define functionality and SLA requirements; and choose a service provider based on those requirements – Develop a preliminary project plan for implementation – Understand post-implementation considerations
Upon completing this course, you will have learned how to: – Select responsibilities of an Invoice Auditor as defined in this course – Define common terms related to Invoice Auditing – Identify areas of an invoice where incorrect or unauthorized charges are common
Upon completing this course, you will have learned how to: – Recognize the benefits of an IT asset disposition program – Demonstrate the value proposition associated with properly disposing of IT assets – Recognize which certifications demonstrate sound IT asset disposition policies – Match business case elements with their definition – Demonstrate an understanding of risk mitigation
Upon completing this course, you will have learned how to: – Define a Request for Proposal – Define the purpose of the elements within a Request for Proposal – Prepare a Request for Proposal
Upon completing this course, you will have learned how to: – State the importance of a telecom or IT invoice with respect to cost – Define TEM and its focus areas – Identify four types of extraneous usage
Upon completing this course, you will have learned how to: – Recognize what an inventory is – Describe the different Efficiency First® Framework focus areas and telecom management activities that make inventories – Recall what an inventory provides your organization, as well as the purpose of a telecom inventory
Upon completing this course, you will have learned how to: – Understand international differences – Understand the structure of an international telecom management team – Identify international technology standards – Implement international telecom policies – Establish invoice payment and processing procedures
Upon completing this course, you will have learned how to: – Identify global telecom regions – Understand the telecom technology development timeline – Identify regulatory bodies and regulations in the Americas, EMEA, and APAC – Understand regulations created by the International Telecommunications Union
Upon completing this course, you will have learned how to: – Define what KPIs are and how they relate to your telecom environment – Recognize the Efficiency First® Framework stakeholder groups – Describe which types of KPIs apply to different stakeholder groups – Recall the appropriate KPI measurement and reporting fundamentals
Upon completion of this course, you will have learned:
  • Common success factors for TEM programs
  • What TEM program success looks like to different business stakeholders
  • How to set the stage for success with your TEM vendor
  • Why TEM programs fail and how to avoid problems
  • How to foster strong partnership with your TEM vendor
  • Efficiency First® Framework guiding principles supporting TEM program success
Upon completion of this course, you will have learned:
  • What license management is
  • How license management supports business, why it matters, and the value it offers
  • Business applications and use cases for license management
  • What to consider when developing a business case for implementing license management solutions
  • Considerations for managing license management solutions after implementation
  • Efficiency First® Framework best practices supporting license management evaluation, adoption, and ongoing management
Upon completing this course, you will have learned how to: – Define MPLS – Describe the components of an MPLS network – List and describe each step of the invoice auditing process – Identify common billable components and errors in an MPLS network – Demonstrate how to calculate the cost of MPLS billing errors
Upon completing this course, you will have learned how to: – Define the process for mobile asset change control – Identify steps to manage mobile asset change control – Understand the common challenges and ways to mitigate those challenges – Understand important components of mobile asset change control
Upon completing this course, you will have learned how to: – Explain the purpose and benefits of Telecom Environment Management – Identify the 7 components of Telecom Expense Management and their purpose – Provide examples of Telecom Expense Management Activities and how they will optimize the Telecom Environment – Explain the inter-connectedness of Telecom Environment and Expense Management
Upon completing this course, you will have learned how to: – Understand the purpose of each component of an MDM strategy – Determine why an enterprise might implement MDM and to what extent – Recognize AOTMP® recommended MDM best practices – Understand the role of each MDM stakeholder group
Upon completing this course, you will have learned how to: – Identify different MDM equipment and infrastructure approaches – Recall recommended methods for ensuring data and device security – Recognize different types of MDM costs, metrics, and cost-cutting methods – Summarize the requirements for HR, IT, enterprise-wide, legal, and privacy policies in a mobile environment
Upon completing this course, you will have learned how to: – Establish a business strategy for mobility management – Build a mobility management business case – Execute a mobility management business strategy – Recognize methods or performance measurement and evolution for a mobility management strategy
Upon completing this course, you will have learned how to: – Apply the Asset Inventory process – Describe specific vulnerabilities with IoT devices – Identify best practices for managing IoT devices
Upon completing this course, you will have learned how to: – Demonstrate the inventory auditing process – Define Machine-to-Machine (M2M) and the Internet of Things (IoT) – Identify M2M and IoT technology and devices – Identify and resolve M2M and IoT security management challenges
Upon completing this course, you will have learned how to: – Define Machine-to-Machine (M2M) solutions – Understand the different components that make up M2M solutions – Understand how M2M deployments can be applied to an enterprise environment – Determine your M2M vendor partners – Identify the necessary steps to evaluate the success of an M2M deployment
Upon completing this course, you will have learned how to: – Explain technical MACDs – Explain financial MACDs – Explain operational MACDs
Upon completing this course, you will have learned how to: – Define the process for decommissioning mobile assets – Identify considerations to determine policy for mobile assets-end of life – Understand options for disposition of mobile assets when no longer in use – Understand best practices for managing this final stage in the mobile asset management lifecyle
Upon completing this course, you will have learned how to: – Define the process for validating mobile assets – Identify steps to manage mobile assets – Understand collateral materials to identify mobile assets – Understand important components of mobile assets
Upon completing this course, you will have learned how to: – Define the process for provisioning and tracking mobile assets – Understand collateral materials to use for provisioning and tracking mobile assets – Understand important components of mobile provisioning and tracking
This course, a non-technical primer covering mobility management program design best practices, is ideal for all technology management practitioners and leadersUpon completion of this course, you will have learned:
  • What mobility management is
  • How mobility management supports business, why it matters, and the value it offers
  • Mobility management program use cases and variables including bring your own device (BYOD) and corporate liable (CL)
  • What to consider when developing a business case for mobility management
  • Considerations for mobility management program performance after implementation
  • Efficiency First® Framework best practices supporting mobility management program objectives
Upon completing this course, you will have learned how to: – Understand important components of mobile policy – Define the process for mobile policy creation – Identify steps to manage mobile policies – Conduct an audit of a mobile policy
Upon completing this course, you will have learned how to: – Identify the different components in a mobile environment – Conduct an effective invoice to contract analysis – Develop strategies to recover overpayments made due to mobile service provider billing errors
Upon completing this course, you will have learned how to: – Create an effective mobile device security strategy and policy with compliance – Identify potential threats and motives for mobile device attacks, targets, sources, and methods used – Understand likely consequences of a security breach -Conduct a risk assessment – Identify the differences between mobile device management and mobile application management as well as the differences between agent-based and agentless control
Upon completing this course, you will have learned how to: – Define the phases of managing telecom security plans – Understand the common challenges when managing a security plan – Summarize how to manage governance and tasks for implementing a security plan – Understand Security Risk Management best practices
Upon completing this course, you will have learned how to: – Recognize the three components your mobile environment can be broken in to: voice, data, and equipment – Recall the definitions of mobile voice components – Recognize the technological lifespan for mobile devices within your mobile environment

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.