Courses → Course Catalog

These on-demand training courses are a great to close knowledge gaps.

Filter by topic.

Upon completion of this course, you will have learned:
  • The roles of multiple business systems in a TEM program
  • Common external data sources and how each supports a TEM program
  • How to effectively evaluate and validate data across multiple systems a TEM program
  • Common areas of automation potential in a TEM program
  • How a RASCI improves business systems integration and data integrity while increasing automation potential for a TEM program
  • Efficiency First® Framework guiding principles supporting TEM business systems and data integrity
Upon completion of this course, you will have learned:
  • What data privacy is.
  • How US data privacy laws compare to the rest of the world.
  • Which states are enacting new laws in 2023 and the scope of each.
  • What organizations need to do to comply with new data privacy laws.
  • How laws are enforced and penalties for non-compliance.
  • Efficiency First® Framework best practices supporting data privacy compliance.
Upon completion of this course, you will have learned:
  • Common success factors for TEM programs
  • What TEM program success looks like to different business stakeholders
  • How to set the stage for success with your TEM vendor
  • Why TEM programs fail and how to avoid problems
  • How to foster strong partnership with your TEM vendor
  • Efficiency First® Framework guiding principles supporting TEM program success
Upon completion of this course, you will have learned:
  • What elements should be considered for a TEM program
  • How to establish TEM program objectives
  • Common business systems used in a TEM program
  • Considerations for organizing and integrating multiple internal and external teams and workstreams into your TEM program
  • How to effectively manage TEM program change
  • Efficiency First® Framework guiding principles supporting TEM program design
Upon completion of this course, you will have learned:
  • What Technology Expense Management (TEM) is
  • How TEM supports business, why it matters, and the value it offers
  • Business applications and use cases for TEM
  • Types of vendors and offering variables currently available in the industry
  • Considerations for building a business case for TEM
  • Efficiency First® Framework guiding principles supporting a TEM program
Upon completion of this course, you will have learned:
  • Elements of a successful TEM implementation
  • Customer roles and responsibilities throughout TEM implementation
  • Common TEM implementation roadblocks and challenges you may encounter and how to overcome them
  • How to determine when your TEM implementation has achieved steady state
  • Receiving full value from your TEM program
  • Efficiency First® Framework best practices supporting TEM implementation
Upon completion of this course, you will have learned:
  • What POTS-in-a-Box is
  • What is driving demand for POTS-in-a-Box solutions and the business problems solved by these solutions
  • Common business applications and use cases that benefit from POTS-in-a-Box solutions
  • Considerations for selecting POTS-in-a-Box solutions for your business
  • Considerations for implementing and managing POTS-in-a-Box solutions
  • Efficiency First® Framework best practices supporting POTS-in-a-Box solution evaluation and implementation
This course, a non-technical primer covering mobility management program design best practices, is ideal for all technology management practitioners and leadersUpon completion of this course, you will have learned:
  • What mobility management is
  • How mobility management supports business, why it matters, and the value it offers
  • Mobility management program use cases and variables including bring your own device (BYOD) and corporate liable (CL)
  • What to consider when developing a business case for mobility management
  • Considerations for mobility management program performance after implementation
  • Efficiency First® Framework best practices supporting mobility management program objectives

Upon completion of this course, you will have learned:

  • What customer experience (CX) is
  • How CX supports business, why it matters, and the value it offers
  • CX business applications and use cases
  • Considerations for elevating CX practices for your organization
  • How to measure CX practice performance
  • Efficiency First® Framework best practices supporting service delivery CX

Upon completion of this course, you will have learned:

  • What cloud optimization is
  • Why cloud optimization matters and the value it offers
  • Cloud optimization business applications and use cases
  • Considerations for selecting a cloud optimization solution for your organization
  • Ongoing cloud optimization performance considerations
  • Efficiency First® Framework best practices supporting cloud optimization
Upon completion of this course, you will have learned:
  • What SASE is
  • How SASE supports business, why it matters, and the value it offers
  • Business applications and use cases for SASE
  • What to consider when developing a business case for implementing SASE solutions
  • Considerations for managing SASE solutions after implementation
  • Efficiency First® Framework best practices supporting SASE evaluation, adoption, and ongoing management
Upon completion of this course, you will have learned:
  • What license management is
  • How license management supports business, why it matters, and the value it offers
  • Business applications and use cases for license management
  • What to consider when developing a business case for implementing license management solutions
  • Considerations for managing license management solutions after implementation
  • Efficiency First® Framework best practices supporting license management evaluation, adoption, and ongoing management
Upon completing this course, you will have learned how to: – Describe Robotic Process Automation – Recognize the benefits of Robotic Process Automation – Identify potential uses for Robotic Process Automation
Upon completing this course, you will have learned how to: – Identify mobile environments and billing components – Understand the process for auditing a mobile environment – Audit a mobile environment
Upon completing this course, you will have learned how to: – Define a Request for Proposal – Define the purpose of the elements within a Request for Proposal – Prepare a Request for Proposal
Upon completing this course, you will have learned how to: – Recognize the benefits of an IT asset disposition program – Demonstrate the value proposition associated with properly disposing of IT assets – Recognize which certifications demonstrate sound IT asset disposition policies – Match business case elements with their definition – Demonstrate an understanding of risk mitigation
Upon completing this course, you will have learned how to: – Define TEM – Perform a TEM Program Needs Assessment – Understand the value of TEM – Calculate a TEM Program ROI – Develop a TEM Program Business Case
Upon completing this course, you will have learned how to: – Summarize the cloud auditing process – Identify different cloud invoice types – Demonstrate how to compare cloud invoice-to-contract charges – Explain the differences in cloud storage and cloud license management
Upon completing this course, you will have learned how to: – Describe the optimal cloud environment – Identify the roles and tasks needed for cloud management – Explain the differences between technical and financial auditing
Upon completing this course, you will have learned how to: – Identify the technical, customer service, financial, and time telecom pain points and perspectives – Utilize the questions that uncover those pain points – Recognize the customer assurances associated with these pain points – Describe the different responsibilities during a telecom service provider contract lifecycle
Upon completing this course, you will have learned how to: – Define circuit switching – Know what functions a private branch exchange or PBX performs – Detail advantages of a circuit-switched telephone line – Detail disadvantages to a circuit-switched telephone line
Upon completing this course, you will have learned how to: – Define a business Case – Explain the difference between capital and operation expenditures – Explain how to write and sell a business case – Explain how to track results for a cloud project implementation
Upon completing this course, you will have learned how to: – Describe the cloud environment – Match cloud management services to enterprise needs – Define cloud provisioning – Explain differences in cloud provisioning models
Upon completing this course, you will have learned how to: – Understand what a pandemic crisis is – How to prepare your enterprise for a pandemic event
Upon completing this course, you will have learned how to: – Describe cloud computing – Define three cloud management models – Define common cloud terminology
Upon completing this course, you will have learned how to: – Define what a business case is – Explain the components of a business case – Identify the steps to build a requirements assessment – Simulate building a business case
Upon completing this course, you will have learned how to: – Define MPLS – Describe the components of an MPLS network – List and describe each step of the invoice auditing process – Identify common billable components and errors in an MPLS network – Demonstrate how to calculate the cost of MPLS billing errors
Upon completing this course, you will have learned how to: – Generalize the requirements behind a DPO’s appointment – Summarize the role of the DPO – List the responsibilities of the DPO – Explain how a DPO should be reachable – Summarize the benefits of DPOaaS
This course, a primer on Telecom, Mobility, and IT Management Center of Excellence (CoE) purpose, principles, and performance, is ideal for all technology management practitioners and leaders. Throughout this course you will learn best practices from subject matter expert Timothy C. Colwell that will help you elevate the business value of technology management for your organization.
Upon completing this course, you will have learned how to: – Outline the history of 9-1-1 – Describe the strengths and limitations associated with the various iterations of 9-1-1 – Explain the key pieces of legislation that currently govern 9-1-1
Upon completing this course, you will have learned how to: – Demonstrate the inventory auditing process – Define Machine-to-Machine (M2M) and the Internet of Things (IoT) – Identify M2M and IoT technology and devices – Identify and resolve M2M and IoT security management challenges
Upon completing this course, you will have learned how to: – Explain what a data breach is – Describe your response if one impacts you or your organization – Summarize the differences in data breach responses across the globe
Upon completing this course, you will have learned how to: – Summarize the history of the CCPA and its scope – List the rights that the CCPA provides consumers – Explain an organization’s responsibilities under the CCPA and the penalties for non-compliance – Recognize the differences between the CCPA and the General Data Protection Regulation
Upon completing this course, you will have learned how to: – Recognize personally identifiable information – Describe the benefits of the Privacy Shield – Explain the protections that HIPAA provides – List the various components of the Electronic Communications Privacy Act – Describe the purview of the National Institute of Standards and Technology – Summarize the expanded rights the California Consumer Privacy Act provides Californians
Upon completing this course, you will have learned how to: – Understand international differences – Understand the structure of an international telecom management team – Identify international technology standards – Implement international telecom policies – Establish invoice payment and processing procedures
Upon completing this course, you will have learned how to: – Define telecom terms and acronyms – Use terminology and acronyms to better understand invoices issued by voice, data, and mobile telecom service providers – Understand terminology and acronyms found in telecom contracts – Understand technology terminology and acronyms used in daily work activity
Upon completing this course, you will have learned how to: – Create an effective mobile device security strategy and policy with compliance – Identify potential threats and motives for mobile device attacks, targets, sources, and methods used – Understand likely consequences of a security breach -Conduct a risk assessment – Identify the differences between mobile device management and mobile application management as well as the differences between agent-based and agentless control
Upon completing this course, you will have learned how to: – Match the Efficiency First Framework terms with their definitions – Recognize the 7 Stakeholder Groups, 10 Focus Areas, and 30 Core Telecom Management Activities – Identify the definitions of the Efficiency First Framework Performance Measurements
Upon completing this course, you will have learned how to: – Identify why it’s important to evaluate vendor RFP responses against your established criteria – Articulate the type of information you should expect to receive from the open-ended vendor questions in your RFP – Using the information contained in this e-learning as well as the 2 previous courses, identify components of a vendor scorecard
Upon completing this course, you will have learned how to: – Understand and define the Business Analysis Core Activity – Understand and define Business Analysis sub-activities – Recite Efficiency First® Framework best practice principles of Business Analysis
Upon completing this course, you will have learned how to: – Understand and define the Budgeting & Forecasting Core Activity – Understand and define Budgeting & Forecasting sub-activities – List Efficiently First® Framework best practice principles of Budgeting & Forecasting
Upon completing this course, you will have learned how to: – Understand the General Data Protection Regulation or GDPR, its requirements and its penalties – Recognize the effects of the GDPR on enterprise and vendor environments – Demonstrate GDPR comprehension through real-world scenarios
Upon completing this course, you will have learned how to: – Explain what a Data Protection Impact Assessment is, and why it’s critical to data privacy compliance – Describe each step required when conducting a DPIA utilizing the AOTMP® DPIA Template – Develop a strategy to mitigate risks uncovered during the DPIA process
Upon completing this course, you will have learned how to: – Identify the geographical areas that make up EMEA – List the major governing bodies in EMEA according to this course – Recall important dates in the history of EMEA telecom governing bodies – Recognize major carrier/operators located throughout EMEA
Upon completing this course, you will have learned how to: – Explain the difference between data privacy and data security – Understand the telecom, mobility, and IT management consequences that result from not following appropriate data privacy practices – Recognize the data privacy laws active in the Americas, EMEA (Europe, Middle East, & Africa) and Asia Pacific – Describe the role of a Data Protection Officer (DPO) and their impact on data privacy compliance in your technology management environment
Upon completing this course, you will have learned how to: – Describe the Importance of Contract Compliance – Explain the Benefits of Contract Catalog – Interpret Documents in a Contract Catalog – Assess Contract Compliance Adherence
Upon completing this course, you will have learned how to: – List the five catalysts for change in a telecommunications environment – Explain why project planning is necessary for effective change management – Develop a project plan to manage a change within a telecommunications environment – Explain the purpose of each step in the process development life cycle – Identify common processes within different areas of an organization that can help with effective change management
Upon completing this course, you will have learned how to: – Identify the role and responsibilities of a CoE Technical Practice Owner – Understand the skills, knowledge, and experience required to be a CoE Technical Practice Owner – Interpret CoE Technical Practice Owner performance dashboard KPIs
Upon completing this course, you will have learned how to: – Understand the PIS Specification, its requirements and its penalties – Understand the effects of the PIS Specification on enterprise and vendor environments – Apply your knowledge of the PIS Specification on enterprise and vendor environments
Upon completing this course, you will have learned how to: – Understand the relationship plan development process – Explain relationship communications – Identify the various management considerations throughout the lifecycle of the TEM vendor relationship
Upon completing this course, you will have learned how to: – Understand key success factors for building a CoE – Identify factors that accelerate and inhibit CoE development – Implement acceleration techniques in CoE development plan
Upon completing this course, you will have learned how to: – Understand the stages of CoE development – Identify stakeholders to promote and support CoE development – Establish CoE progress reporting templates
Upon completing this course, you will have learned how to: – Identify the four phases of change management within the process lifecycle – Explain what occurs within each phase of the process lifecycle – List the five departments that have specific departmental process protocols – Differentiate between the change management strategies for five separate departments
Upon completing this course, you will have learned how to: – Give a brief overview of the Invoice Auditing Process – Identify common components in a VoIP/SIP implementation – Identify common billable components in a VoIP/SIP implementation – Identify common components where billing errors can occur – Calculate the cost of billing errors
Upon completing this course, you will have learned how to: – Explain a physical site audit – Explain the benefits of a physical site audit – Describe typical elements recorded in a physical site audit – Identify best practices for a physical site audit
Upon completing this course, you will have learned how to: – Develop a Wireless Security Policy – Implement a Wireless Security Policy – Maintain a Wireless Security Policy
Upon completing this course, you will have learned how to: – Provide AOTMP® Best Practices to understand the documents – Identify key pieces of information contained within these documents – Understand how to obtain Tariff and Service Price Guides from service providers – Define the definitions of Tariff and Service Price Guides documents
Upon completing this course, you will have learned how to: – Define telecom policy objectives: management control, cost containment, and fraud prevention – Identify policy usage components – Follow usage policy management best practices – Understand common policy overviews
Upon completing this course, you will have learned how to: – Define Unified Communications – Identify Common Features – Identify Common Applications – Identify Common Benefits – Identify Relationships (Related technology and Efficiency First® Framework)
Upon completing this course, you will have learned how to: – Identify the necessary aspects of a UC Policy – Understand the steps in monitoring UC Policy adoption – Identify what change control mechanism are required to manage change control during UC implementation – Identify the appropriate levels of approval for each step in the change control and UC management policy process – Create a basic UC Policy
Upon completing this course, you will have learned how to: – Understand each person’s role in managing security plan requirements – Recognize common telecom security plan considerations – Learn how to apply security assessment best practices – Understand telecom security plan requirements’ ramifications and importance – Recognize security requirement exceptions; Learn how to mitigate telecom security concerns
Upon completing this course, you will have learned how to: – Review expense management – Discuss the importance of executive level perception and buy in for TEM programs – Review the importance of calculating ROI for TEM programs – Calculate ROI for TEM programs
Upon completing this course, you will have learned how to: – Understand cloud solutions benefits and limitations – Understand common Cloud Security environment concerns – Determine cloud environments requirements – Evaluate what security requirements are specific to your enterprise vertical – Create a threat assessment for your enterprise cloud environment – Understand best practices for using a cloud environment in your enterprise
Upon completing this course, you will have learned how to: • Define areas of environmental/physical security • Provide standards for environmental/physical security • Provide the flow for validating environmental/physical security • Understand risks for equipment loss • Describe ways to mitigate common risks for environmental/physical security • Provide AOTMP® recommended best practices for equipment security
Upon completing this course, you will have learned how to: – Define best practices for information security – Define areas of information sections of telecom – Provide standards for an information security – Provide the flow for validating information security – Identify and mitigate risks for information security
Upon completing this course, you will have learned how to: – Discover risks for systems security – Define areas of systems security concerns – Provide standards for systems security – Provide the flow for validating systems security – Provide best practices for systems security – Describe ways to mitigate common risks for systems security
Upon completing this course, you will have learned how to: – Define areas of systems security concerns – Provide standards for systems security – Provide the flow for validating systems security – Discover risks for systems security – Describe ways to mitigate common risks for systems security – Provide best practices for systems security
Upon completing this course, you will have learned how to: – Identify and understand the following tools: NANPA, Erlangs, State Legislature, Tariff and Service Price Guides, State Telecom Regulatory Agencies, and the FCC
Upon completing this course, you will have learned how to: – Define the core telecom management activity – project management – Describe the 3 types of telecom projects – Create a project plan – Identify best practices for Telecom Project Management
Upon completing this course, you will have learned how to: – Identify the 10 steps in technology planning – Identify where to source technology information – Differentiate between an RFI and RFP
Upon completing this course, you will have learned how to: – Define IoT – Describe the trends that enabled IoT – Identify the components of IoT – Describe a use case for IoT
Upon completing this course, you will have learned how to: – Describe Toll-Free Service – Describe the Invoice Auditing Processes – Identify the Billable Toll-Free Service Components – Identify Where Billing Errors May Occur
Upon completing this course, you will have learned how to: – Identify the 10 review points for a telecom management check-up – Distinguish between technical, financial, and operation management checks – Review scenarios and determine which checks apply
Upon completing this course, you will have learned how to: – State the importance of a telecom inventory – Recall the different types of collateral materials needed to create an accurate inventory – Distinguish the most important components of some collateral material examples
Upon completing this course, you will have learned how to: – Identify the 5 essential characteristics of the cloud as defined by the National Institute of Standards and Technology – Name the 3 types of cloud infrastructures – Recall benefits of implementing cloud services
Upon completing this course, you will have learned how to: – Review the foundation of telecom and how it inspired technologies today – Understand public switch telephone networks – Discuss IP – Review data specific IP-based technologies – Predict impacts or key points about migrating to tomorrow’s technology
Upon completing this course, you will have learned how to: – Define Technology – Identify common features, applications, and benefits – Describe the relationship to related technologies – Identify the relationship to the Efficiency First® Framework
Upon completing this course, you will have learned how to: – List the different types of technical SLAs found in telecommunications contracts – Calculate a credit amount based upon a network availability SLA – List the different types of relationship SLAs found in telecommunications contracts
Upon completing this course, you will have learned how to: – Define a RFP – Identify 4 ways to prepare your telecom environment for a TEM provider – Describe how to prepare an RFP – Define the three areas of concentration in an RFP scope
Upon completing this course, you will have learned how to: – Coordinate the RFP release and TEM vendor proposal method – Evaluate TEM vendor proposals – Explain the process to select a TEM vendor
Upon completing this course, you will have learned how to: – Explain the importance of telecom budgeting – Define telecom budget requirements – Establish a baseline of products, services, network, and operational costs – Identify best practices for budget reporting – Identify best practices for budget management
Upon completing this course, you will have learned how to: – Understand the background and definition of PSTN – Understand regulatory considerations and timeline – Describe the impact on services in the telecom environment – Evaluate risks associated to PSTN transitioning – Understand PSTN transitioning strategy considerations
Upon completing this course, you will have learned how to: – List all project milestones required for successful migration – Determine timelines, dependencies, and migration risks – Distinguish the difference between various mitigation risks – Develop a project plan for migration
Upon completing this course, you will have learned how to: – Identify AOTMP recommended organizational KPIs – Differentiate the possible causes of increases and decreases of particular KPIs – Recognize the importance of each KPI discussed – Distinguish between the goals and objectives of each KPI measurement
Upon completing this course, you will have learned how to: – Recall the four stages of inventory management – Discuss the sub-steps that need to be taken within each of the stages – Describe differences between the stages discussed
Upon completing this course, you will have learned how to: – Identify considerations to implement SIP Trunking – Consider the benefits of SIP – Determine the Return on Investment for SIP Trunking
Upon completing this course, you will have learned how to: – Explain technical MACDs – Explain financial MACDs – Explain operational MACDs
Upon completing this course, you will have learned how to: – Identify the countries in the Asia-Pacific region and the fundamental characteristics that affect telecom markets – Understand regulatory structures, consumer protections, and international cooperation between countries in the area – Review the status of telecom in major markets in the Asia-Pacific region
Upon completing this course, you will have learned how to: – Describe the benefits of validating a new infrastructure or replacement to an existing infrastructure – Perform the steps to conduct a Technical Validation – Perform the steps to conduct a Financial Validation – Apply post migration validation best practices
Upon completing this course, you will have learned how to: – Understand and define the Sourcing & Procurement Core Activity – Understand and define Sourcing & Procurement sub-activities – Recite Efficiency First Framework best practice principles of Sourcing & Procurement
Upon completing this course, you will have learned how to: – Understand security features of iOS mobility – Understand risks and considerations for mitigation – Understand standardized device benefits – Understand MDM security – Define considerations for an iOS Mobility policy – Follow best practices for iOS security
Upon completing this course, you will have learned how to: – Understand and define the Security Core Activity – Understand and define Security sub-activities – Recite Efficiency First® Framework best practice principles of Security
Upon completing this course, you will have learned how to: – Understand and define the Invoice Processing Core Activity – Understand and define the Invoice Processing sub-activities – List Efficiency First® Framework best practice principles of Invoice Processing
Upon completing this course, you will have learned how to: – Understand and define the Policy Core Activity – Understand and define Policy sub-activities – List Efficiency First Framework best practice principles of Policy
Upon completing this course, you will have learned how to: – Understand and define the Regulatory Compliance Core Activity – Understand and define Regulatory Compliance sub-activities – Recite Efficiency First Framework best practice principles of Regulatory Compliance
Upon completing this course, you will have learned how to: – Understand and define the Service Delivery Core Activity – Understand and define Service Delivery sub-activities – Recite Efficiency First Framework best practice principles of Service Delivery

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.