Courses → Course Catalog

These on-demand training courses are a great way to close knowledge gaps.

Filter by Topic

Upon completion of this course, you will have learned:
  • Common success factors for TEM programs
  • What TEM program success looks like to different business stakeholders
  • How to set the stage for success with your TEM vendor
  • Why TEM programs fail and how to avoid problems
  • How to foster strong partnership with your TEM vendor
  • Efficiency First® Framework guiding principles supporting TEM program success
Upon completion of this course, you will have learned:
  • What elements should be considered for a TEM program
  • How to establish TEM program objectives
  • Common business systems used in a TEM program
  • Considerations for organizing and integrating multiple internal and external teams and workstreams into your TEM program
  • How to effectively manage TEM program change
  • Efficiency First® Framework guiding principles supporting TEM program design
Upon completion of this course, you will have learned:
  • What data privacy is.
  • How US data privacy laws compare to the rest of the world.
  • Which states are enacting new laws in 2023 and the scope of each.
  • What organizations need to do to comply with new data privacy laws.
  • How laws are enforced and penalties for non-compliance.
  • Efficiency First® Framework best practices supporting data privacy compliance.
Upon completion of this course, you will have learned:
  • The roles of multiple business systems in a TEM program
  • Common external data sources and how each supports a TEM program
  • How to effectively evaluate and validate data across multiple systems a TEM program
  • Common areas of automation potential in a TEM program
  • How a RASCI improves business systems integration and data integrity while increasing automation potential for a TEM program
  • Efficiency First® Framework guiding principles supporting TEM business systems and data integrity
Learning objectives for each course supporting this certification include:

[TIO01] Technology Expense Management (TEM) Industry Overview

Upon completion of this course, you will have learned:
  • What Technology Expense Management (TEM) is
  • How TEM supports business, why it matters, and the value it offers
  • Business applications and use cases for TEM
  • Types of vendors and offering variables currently available in the industry
  • Considerations for building a business case for TEM
  • Efficiency First® Framework guiding principles supporting a TEM program

[TPD] Technology Expense Management (TEM) Program Design

Upon completion of this course, you will have learned:
  • What elements should be considered for a TEM program
  • How to establish TEM program objectives
  • Common business systems used in a TEM program
  • Considerations for organizing and integrating multiple internal and external teams and workstreams into your TEM program
  • How to effectively manage TEM program change
  • Efficiency First® Framework guiding principles supporting TEM program design

[TIR01] TEM Implementation Readiness

Upon completion of this course, you will have learned:
  • Elements of a successful TEM implementation
  • Customer roles and responsibilities throughout TEM implementation
  • Common TEM implementation roadblocks and challenges you may encounter and how to overcome them
  • How to determine when your TEM implementation has achieved steady state
  • Receiving full value from your TEM program
  • Efficiency First® Framework best practices supporting TEM implementation

[BSA] TEM Business Systems & Automation

Upon completion of this course, you will have learned:
  • The roles of multiple business systems in a TEM program
  • Common external data sources and how each supports a TEM program
  • How to effectively evaluate and validate data across multiple systems a TEM program
  • Common areas of automation potential in a TEM program
  • How a RASCI improves business systems integration and data integrity while increasing automation potential for a TEM program
  • Efficiency First® Framework guiding principles supporting TEM business systems and data integrity

[KPS] Keys to Technology Expense Management (TEM) Program Success

Upon completion of this course, you will have learned:
  • Common success factors for TEM programs
  • What TEM program success looks like to different business stakeholders
  • How to set the stage for success with your TEM vendor
  • Why TEM programs fail and how to avoid problems
  • How to foster strong partnership with your TEM vendor
  • Efficiency First® Framework guiding principles supporting TEM program success

[COEP01] Center of Excellence Primer

Upon completion of this course, you will have learned:
  • What a Center of Excellence (CoE) is
  • How a CoE supports business, why it matters, and the value it offers
  • Considerations for creating a CoE
  • Considerations for launching a CoE
  • How to evaluate CoE performance
  • Efficiency First® Framework best practices supporting CoE design, deployment, and maturity
Learning objectives for each course included in this bundle.

Introduction to Auditing (ITA)

  • Define common terms related to Invoice Auditing
  • Identify areas of an invoice where incorrect or unauthorized charges are common
  • Select responsibilities of an Invoice Auditor as defined in this course

Auditing Materials (AMN)

  • Define the materials required for invoice-to-contract or invoice-to-tariff audits
  • Understand how to read the required documents

Customer Service Record Interpretation Practices (CSR)

  • Define CSR
  • Identify best practices for utilizing a CSR
  • Understand how to use and read a CSR

Cost Containment and Cost Avoidance Practices (CAP)

  • Define cost avoidance and cost containment
  • Identify key ways to maximize cost savings
  • Resolve disputes
  • Select technology that meets operation needs at the best pricing
  • Understand how to negotiate optimal contracts

Correcting Invoice Errors and Obtaining Credits for Overcharges (CIE)

  • Calculate credits due
  • Confirm invoice errors
  • Correct invoice errors
  • Understand how to communicate errors to your service provider
Courses and learning objectives included in this bundle.

Cloud Optimization Primer (CO-01)

  • What cloud optimization is
  • Why cloud optimization matters and the value it offers
  • Cloud optimization business applications and use cases
  • Considerations for selecting a cloud optimization solution for your organization
  • Ongoing cloud optimization performance considerations

License Management Primer (LM-01)

  • What license management is
  • How license management supports business, why it matters, and the value it offers
  • Business applications and use cases for license management
  • What to consider when developing a business case for implementing license management solutions
  • Considerations for managing license management solutions after implementation

Audit & Optimization for Cloud (CLM 102)

  • Describe the optimal cloud environment
  • Explain the differences between technical and financial auditing
  • Identify the roles and tasks needed for cloud management

Intermediate Audit & Optimization for Cloud (CLM 204)

  • Demonstrate how to compare cloud invoice-to-contract charges
  • Explain the differences in cloud storage and cloud license management
  • Identify different cloud invoice types
  • Summarize the cloud auditing process

Building a Business Case for a Cloud Project (CLM 200)

  • Define a business Case
  • Explain how to track results for a cloud project implementation
  • Explain how to write and sell a business case
  • Explain the difference between capital and operation expenditures
Upon completion of this course, you will have learned:
  • What Technology Expense Management (TEM) is
  • How TEM supports business, why it matters, and the value it offers
  • Business applications and use cases for TEM
  • Types of vendors and offering variables currently available in the industry
  • Considerations for building a business case for TEM
  • Efficiency First® Framework guiding principles supporting a TEM program
Upon completion of this course, you will have learned:
  • Elements of a successful TEM implementation
  • Customer roles and responsibilities throughout TEM implementation
  • Common TEM implementation roadblocks and challenges you may encounter and how to overcome them
  • How to determine when your TEM implementation has achieved steady state
  • Receiving full value from your TEM program
  • Efficiency First® Framework best practices supporting TEM implementation
Upon completion of this course, you will have learned:
  • What POTS-in-a-Box is
  • What is driving demand for POTS-in-a-Box solutions and the business problems solved by these solutions
  • Common business applications and use cases that benefit from POTS-in-a-Box solutions
  • Considerations for selecting POTS-in-a-Box solutions for your business
  • Considerations for implementing and managing POTS-in-a-Box solutions
  • Efficiency First® Framework best practices supporting POTS-in-a-Box solution evaluation and implementation
If you or your team needs unlimited access to courses supporting career development​, then an Unlimited Subscription is for you. An Unlimited Subscription includes access to all courses available in the AOTMP® University course catalog during the subscription period. Our team will contact you shortly after you complete your purchase to setup your profile.
This course, a non-technical primer covering mobility management program design best practices, is ideal for all technology management practitioners and leadersUpon completion of this course, you will have learned:
  • What mobility management is
  • How mobility management supports business, why it matters, and the value it offers
  • Mobility management program use cases and variables including bring your own device (BYOD) and corporate liable (CL)
  • What to consider when developing a business case for mobility management
  • Considerations for mobility management program performance after implementation
  • Efficiency First® Framework best practices supporting mobility management program objectives
If you or your team needs:
  • Unlimited access to courses supporting career development​
  • Unlimited access to every AOTMP certification to verify best practice knowledge on a variety of topics
  • A training and certification program that helps individuals and teams deliver optimal performance results
Then an Unlimited Pro Subscription is for you. An Unlimited Subscription includes access to all courses available in the AOTMP® University course catalog during the subscription period, and access to each available Specialty Certification, Professional Certification, and Master Certification exam. Our team will contact you shortly after you complete your purchase to setup your profile.

Upon completion of this course, you will have learned:

  • What customer experience (CX) is
  • How CX supports business, why it matters, and the value it offers
  • CX business applications and use cases
  • Considerations for elevating CX practices for your organization
  • How to measure CX practice performance
  • Efficiency First® Framework best practices supporting service delivery CX

Upon completion of this course, you will have learned:

  • What cloud optimization is
  • Why cloud optimization matters and the value it offers
  • Cloud optimization business applications and use cases
  • Considerations for selecting a cloud optimization solution for your organization
  • Ongoing cloud optimization performance considerations
  • Efficiency First® Framework best practices supporting cloud optimization
Upon completion of this course, you will have learned:
  • What SASE is
  • How SASE supports business, why it matters, and the value it offers
  • Business applications and use cases for SASE
  • What to consider when developing a business case for implementing SASE solutions
  • Considerations for managing SASE solutions after implementation
  • Efficiency First® Framework best practices supporting SASE evaluation, adoption, and ongoing management
Upon completion of this course, you will have learned:
  • What license management is
  • How license management supports business, why it matters, and the value it offers
  • Business applications and use cases for license management
  • What to consider when developing a business case for implementing license management solutions
  • Considerations for managing license management solutions after implementation
  • Efficiency First® Framework best practices supporting license management evaluation, adoption, and ongoing management
If you or your team needs:
  • Unlimited access to courses supporting career development​
  • Multiple certifications to verify best practice knowledge on a variety of topics
  • A training and certification program that helps individuals and teams deliver optimal performance results
Then an Unlimited Plus Subscription is for you. An Unlimited Plus Subscription includes access to all courses available in the AOTMP® University course catalog during the subscription period, and access to each available Specialist Certification exam. Our team will contact you shortly after you complete your purchase to setup your profile.
Master Certification is for leaders who have a desire to validate their performance, receive recognition for competency, and enrich their reputation amongst peers. The credential validates best practice knowledge of the Efficiency First® Framework adoption practices and Telecom, Mobility & Cloud / IT Management Center of Excellence creation practices.
This Telecom Management Professional Certification is for practitioners who have a desire to validate their performance, receive recognition for competency, and enrich their reputation amongst peers. The credential validates best practice knowledge of the Efficiency First® Framework and operational application of Framework principles to a telecommunications portfolio area. The Efficiency First® Framework Guidebook is the primary study guide to prepare for the certification exam.
This Mobility Management Professional Certification is for practitioners who have a desire to validate their performance, receive recognition for competency, and enrich their reputation amongst peers. The credential validates best practice knowledge of the Efficiency First® Framework and operational application of Framework principles to a mobility portfolio area. The Efficiency First® Framework Guidebook is the primary study guide to prepare for the certification exam.
This IT Management Professional Certification is for practitioners who have a desire to validate their performance, receive recognition for competency, and enrich their reputation amongst peers. The credential validates best practice knowledge of the Efficiency First® Framework and operational application of Framework principles to a cloud / IT portfolio area. The Efficiency First® Framework Guidebook is the primary study guide to prepare for the certification exam.
Learning objectives for each course supporting this certification include:

Enterprise Mobility Management 101: The Basics (EMM 101)

  • Evaluate considerations for EMM
  • Follow best practices for EMM
  • Provide a foundation for understanding the scope, definitions, background, and considerations for enterprise mobility management
  • Understand definitions for Enterprise Mobility Management (EMM)
  • Understand the systems and services that support mobility EMM

Mobile Asset Management: Fundamentals (MMF)

  • Define the process for validating mobile assets
  • Identify steps to manage mobile assets
  • Understand collateral materials to identify mobile assets
  • Understand important components of mobile assets

Mobile Policy: Fundamentals (MPF)

  • Conduct an audit of a mobile policy
  • Define the process for mobile policy creation
  • Identify steps to manage mobile policies
  • Understand important components of mobile policy

Preparing for a BYOD Program (IBP)

  • Articulate the role of a planning team
  • Identify the phases of preparing for a BYOD program
  • Identify the scope of a BYOS progam
  • Recall the necessary components for a BYOD program policy

Wireless Management Strategies (WMS)

  • Define a service profile
  • Define a user profile; Identify common components in a user profile
  • Identify common components in a service profile
  • Identify two key strategies to effectively manage a wireless environment
  • Recommend ways to optimize your mobile environment
Learning objectives for each course supporting this certification include:

Developing a Telecom Service Inventory (ICS)

  • How to create telecom service invoice, detail (cost), and contract catalogs
  • How to develop a telecom services inventory
  • How to maintain a current telecom service inventory
  • The definition of the word inventory in relation to telecom services management

Invoice Inventory Best Practices for Data Accuracy (IDA)

  • Define the data types used in your environment
  • Establish an exception identification and reporting plan
  • Evaluate your workflow procedures and understand why poor workflow processes pollute your data

Stages of Inventory Management (SIM)

  • Describe differences between the stages discussed
  • Discuss the sub-steps that need to be taken within each of the stages
  • Recall the four stages of inventory management

Telecom Inventory Fundamentals (ITF)

  • Describe the different Efficiency First® Framework focus areas and telecom management activities that make inventories
  • Recall what an inventory provides your organization, as well as the purpose of a telecom inventory
  • Recognize what an inventory is

Telecom Inventory: Collateral Materials (TCM)

  • Distinguish the most important components of some collateral material examples
  • Recall the different types of collateral materials needed to create an accurate inventory
  • State the importance of a telecom inventory
Learning objectives for each course supporting this certification include:
  • Mitigate risks when communicating internationally
  • Understand international regulations and governance for telecom communication
  • Understand the importance of international security

Managing an Enterprise Telecom Security Plan (MSP)

  • Define the phases of managing telecom security plans
  • Summarize how to manage governance and tasks for implementing a security plan
  • Understand Security Risk Management best practices
  • Understand the common challenges when managing a security plan

Telecom Security Information (TSI)

  • Define areas of information sections of telecom
  • Define best practices for information security
  • Identify and mitigate risks for information security
  • Provide standards for an information security
  • Provide the flow for validating information security

Telecom Security: An Overview (TSO)

  • Define areas of systems security concerns
  • Describe ways to mitigate common risks for systems security
  • Discover risks for systems security
  • Provide best practices for systems security
  • Provide standards for systems security
  • Provide the flow for validating systems security

Telecom Security: Environmental/Physical Security (TSE)

  • Define areas of environmental/physical security
  • Describe ways to mitigate common risks for environmental/physical security
  • Provide AOTMP recommended best practices for equipment security
  • Provide standards for environmental/physical security
  • Provide the flow for validating environmental/physical security
  • Understand risks for equipment loss

Telecom Security: Systems Security (TSS)

  • Define areas of systems security concerns
  • Describe ways to mitigate common risks for systems security
  • Discover risks for systems security
  • Provide best practices for systems security
  • Provide standards for systems security
  • Provide the flow for validating systems security

Understanding Enterprise Telecom Security Plan Requirements (UPR)

  • Learn hot to apply security assessment best practices
  • Recognize common telecom security plan considerations
  • Recognize security requirement exceptions; Learn how to mitigate telecom security concerns
  • Understand each person’s role in managing security plan requirements
  • Understand telecom security plan requirements’ ramifications and importance
Learning objectives for each course supporting this certification include:

Introduction to Data Privacy (IDP)

  • Describe the role of a Data Protection Officer (DPO) and their impact on data privacy compliance in your technology management environment
  • Explain the difference between data privacy and data security
  • Recognize the data privacy laws active in the Americas, EMEA (Europe, Middle East, & Africa) and Asia Pacific
  • Understand the telecom, mobility, and IT management consequences that result from not following appropriate data privacy practices

Introduction to GDPR (GDP)

  • Demonstrate GDPR comprehension through real-world scenarios
  • Recognize the effects of the GDPR on enterprise and vendor environments
  • Understand the General Data Protection Regulation or GDPR, its requirements and its penalties

Introduction to PIPEDA (PIP)

  • Apply your knowledge of PIPEDA to real-world scenarios that affect your organization
  • Understand PIPEDA, its requirements and its penalties
  • Understand the effects of PIPEDA on the enterprise and vendor environments

Introduction to the PIS Specification (PIS)

  • Apply your knowledge of the PIS Specification on enterprise and vendor environments
  • Understand the effects of the PIS Specification on enterprise and vendor environments
  • Understand the PIS Specification, its requirements and its penalties

Understanding the California Consumer Privacy Act (CCP)

  • Explain an organization’s responsibilities under the CCPA and the penalties for non-compliance
  • List the rights that the CCPA provides consumers
  • Recognize the differences between the CCPA and the General Data Protection Regulation
  • Summarize the history of the CCPA and its scope

Understanding US Data Privacy Laws (ADP)

  • Describe the benefits of the Privacy Shield
  • Describe the purview of the National Institute of Standards and Technology
  • Explain the protections that HIPAA provides
  • List the various components of the Electronic Communications Privacy Act
  • Recognize personally identifiable information
  • Summarize the expanded rights the California Consumer Privacy Act provides Californians
Learning objectives for each course supporting this certification include:

Change Management Executing and Monitoring Change (CEM)

  • Differentiate between the change management strategies for five separate departments
  • Explain what occurs within each phase of the process lifecycle
  • Identify the four phases of change management within the process lifecycle
  • List the five departments that have specific departmental process protocols

Change Management Preparation (CMP)

  • Define change management and its underlying principles
  • Discuss items to take into consideration prior to creating the project plan and process for implementing and managing change
  • Identify catalysts for change in the telecom environment

Change Management: Project Planning (CPP)

  • Create a draft project plan
  • Identify the process used to create a change project plan
  • Recognize the components of the scope of work
  • Write the objective of the change project

Effectively Managing Change (CHM)

  • Develop a project plan to manage a change within a telecommunications environment
  • Explain the purpose of each step in the process development life cycle
  • Explain why project planning is necessary for effective change management
  • Identify common processes within different areas of an organization that can help with effective change management
  • List the five catalysts for change in a telecommunications environment

Managing the MACD Process (MMC)

  • Explain financial MACDs
  • Explain operational MACDs
  • Explain technical MACDs
Learning objectives for each course supporting this certification include:

Developing a Business Case for TEM Programs (BCT)

  • Calculate a TEM Program ROI
  • Define TEM
  • Develop a TEM Program Business Case
  • Perform a TEM Program Needs Assessment
  • Understand the value of TEM

Developing a Telecom Expense Management Plan (TEM)

  • Define Telecom Expense Management
  • Distinguish between the benefits of insourcing and outsourcing
  • Explain how to identify the ROI of a Telecom Expense Management program
  • Explain how to maximize the benefits of a Telecom Expense Management program
  • Perform a needs assessment for a Telecom Expense Management program

Invoices and TEM 101 (ITE)

  • Define TEM and its focus areas
  • Identify four types of extraneous usage
  • State the importance of a telecom or IT invoice with respect to cost

Managing TEM Vendor Relationships (MTR)

  • Explain relationship communications
  • Identify the various management considerations throughout the lifecycle of the TEM vendor relationship
  • Understand the relationship plan development process

Preparing to Use an RFP to Select a TEM Vendor (STP 01)

  • Define a RFP
  • Define the three areas of concentration in an RFP scope
  • Describe how to prepare an RFP

Thinking Constructively About TEM ROI (TRI)

  • Calculate ROI for TEM programs
  • Discuss the importance of executive level perception and buy in for TEM programs
  • Review expense management
  • Review the importance of calculating ROI for TEM programs

Using an RFP to Select a TEM Vendor (STP 02)

  • Coordinate the RFP release and TEM vendor proposal method
  • Evaluate TEM vendor proposals
  • Explain the process to select a TEM vendor
Learning objectives for each course supporting this certification include:

Fundamentals of IT Asset Disposition (ITAD 100)

  • Demonstrate an understanding of risk mitigation
  • Demonstrate the value proposition associated with properly disposing of IT assets
  • Match business case elements with their definition
  • Recognize the benefits of an IT asset disposition program
  • Recognize which certifications demonstrate sound IT asset disposition policies

IT Asset Disposition: Requests for Proposal (ITAD 200)

  • Define a Request for Proposal
  • Define the purpose of the elements within a Request for Proposal
  • Prepare a Request for Proposal

Managing IoT Devices in Your Telecom Environment (MID)

    Apply the Asset Inventory process
  • Describe specific vulnerabilities with IoT devices
  • Identify best practices for managing IoT devices

Mobile Asset Management: End of Life (MME)

  • Define the process for decommissioning mobile assets
  • Identify considerations to determine policy for mobile assets-end of life
  • Understand best practices for managing this final stage in the mobile asset management lifecyle
  • Understand options for disposition of mobile assets when no longer in use

Mobile Device Management Business Practices (MDM 200)

  • Identify different MDM equipment and infrastructure approaches
  • Recall recommended methods for ensuring data and device security
  • Recognize different types of MDM costs, metrics, and cost-cutting methods
  • Summarize the requirements for HR, IT, enterprise-wide, legal, and privacy policies in a mobile environment

Mobility Management Business Strategy (MDM 300)

  • Build a mobility management business case
  • Establish a business strategy for mobility management
  • Execute a mobility management business strategy
  • Recognize methods or performance measurement and evolution for a mobility management strategy
Learning objectives for each course supporting this certification include:

Auditing Best Practices: M2M/IoT Mobility Services (MIM)

  • Define Machine-to-Machine (M2M) and the Internet of Things (IoT)
  • Demonstrate the inventory auditing process
  • Identify and resolve M2M and IoT security management challenges
  • Identify M2M and IoT technology and devices

Auditing Mobile Telecom Invoices (AMI)

  • Be able to audit a mobile environment
  • Identify mobile environments and billing components
  • Understand the process for auditing a mobile environment

Calculating Wireless Cost Savings (CWS)

  • Define wireless optimization
  • Describe standardized metrics
  • Distinguish between chargeback models
  • Identify wireless cost savings drivers

Contract Management: Mobility (CMM)

  • Identify steps to manage mobile contracts
  • Understand best practices for mobile contracts
  • Understand important components of mobile contract management
  • Understand the importance of mobile device peripherals

Mobile Service Analysis (MSA)

  • Conduct an effective invoice to contract analysis
  • Develop strategies to recover overpayments made due to mobile service provider billing errors
  • Identify the different components in a mobile environment
  • Recommend ways to optimize your mobile environment

Mobile Service Components (MSS)

  • Recall the definitions of mobile voice components
  • Recognize the technological lifespan for mobile devices within your mobile environment
  • Recognize the three components your mobile environment can be broken in to: voice, data, and equipment

Optimizing Mobile Environments (OME)

  • Define different plans that can be implemented within your organization’s mobile environment
  • Describe the practical reasons for knowing your organization’s optimal cost per minute
  • Recognize mobile environment components

Wireless Service Audit and Optimization (WAO)

  • Interpret invoices and contracts
  • Optimize contract and price performance
  • Perform invoice-to-contract analysis
Learning objectives for each course supporting this certification include:

iOS Mobility Security Considerations (IMC)

  • Define considerations for an iOS Mobility policy
  • Follow best practices for iOS security
  • Understand MDM security
  • Understand risks and considerations for mitigation
  • Understand security features of iOS mobility
  • Understand standardized device benefits

Mobile Asset Management: Change Control (MCC)

  • Define the process for mobile asset change control
  • Identify steps to manage mobile asset change control
  • Understand important components of mobile asset change control
  • Understand the common challenges and ways to mitigate those challenges

Mobile Device Management Strategy Overview (MDM 100)

  • Determine why an enterprise might implement MDM and to what extent
  • Recognize AOTMP®’s recommended MDM best practices
  • Understand the purpose of each component of an MDM strategy
  • Understand the role of each MDM stakeholder group

Mobile Security Management (MSM)

  • Conduct a risk assessment
  • Create an effective mobile device security strategy and policy with compliance
  • Identify potential threats and motives for mobile device attacks, targets, sources, and methods used
  • Identify the differences between mobile device management and mobile application management as well as the differences between agent-based and agentless control
  • Understand likely consequences of a security breach

The Internet of Things (IoT) Overview (TEC 102)

  • Define IoT
  • Describe a use case for IoT
  • Describe the trends that enabled IoT
  • Identify the components of IoT

Wireless Device Security (WDS)

  • Develop a Wireless Security Policy
  • Implement a Wireless Security Policy
  • Maintain a Wireless Security Policy
Learning objectives for each course supporting this certification include:

Building a Business Case for a Cloud Project (CLM 200)

  • Define a business Case
  • Explain how to track results for a cloud project implementation
  • Explain how to write and sell a business case
  • Explain the difference between capital and operation expenditures

Cloud Security Mitigation Considerations (CSM)

  • Identify mitigation procedures to cloud security concerns
  • Perform recommended procedures to mitigate cloud security concerns
  • Understand best practices to mitigate cloud security concerns

Creating and Implementing UC Management Policy (UCP)

  • Identify the appropriate levels of approval for each step in the change control and UC management policy process
  • Create a basic UC Policy
  • Identify the necessary aspects of a UC Policy
  • Identify what change control mechanism are required to manage change control during UC implementation
  • Understand the steps in monitoring UC Policy adoption

Intermediate Audit & Optimization for Cloud (CLM 204)

  • Demonstrate how to compare cloud invoice-to-contract charges
  • Explain the differences in cloud storage and cloud license management
  • Identify different cloud invoice types
  • Summarize the cloud auditing process

Telecom Security: How to Understand and Manage Cloud Security (TSC)

  • Understand best practices for using a cloud environment in your enterprise
  • Create a threat assessment for your enterprise cloud environment
  • Determine cloud environments requirements
  • Evaluate what security requirements are specific to your enterprise vertical
  • Understand cloud solutions benefits and limitations
  • Understand common Cloud Security environment concerns
Learning objectives for each course supporting this certification include:

Introduction to Cloud Management (CLM 100)

  • Describe cloud computing
  • Define three cloud management models
  • Define common cloud terminology

Basics of Cloud Management (CLM 101)

  • Describe the cloud environment
  • Match cloud management services to enterprise needs
  • Define cloud provisioning
  • Explain differences in cloud provisioning models

Audit & Optimization for Cloud (CLM 102)

  • Describe the optimal cloud environment
  • Explain the differences between technical and financial auditing
  • Identify the roles and tasks needed for cloud management

Cloud Services: XaaS (CSX)

  • Mitigate challenges with cloud services
  • Understand best practices for cloud services
  • Understand the common cloud services
  • Use common considerations to select a cloud service

The Cloud: A Primer (TCP)

  • Identify the 5 essential characteristics of the cloud as defined by the National Institute of Standards and Technology
  • Name the 3 types of cloud infrastructures
  • Recall benefits of implementing cloud services

Understanding Cloud Architecture (UCA)

  • Define Cloud architecture and understand what basic needs are met by a cloud solution
  • Determine which delivery model is needed for different telecom environments
  • Identify and understand the network layer components and the sub components required environment
  • Understand how each component functions to enable cloud solutions in a telecom environment
Learning objectives for each course supporting this certification include:

Auditing Fixed Invoices (AFI)

  • Define the auditing process for both voice services and data services
  • Identify materials required for voice and data
  • Understand common billing errors for voice and data

Auditing Packet Switched Circuits and Services (APS)

  • Identify components of packet switched circuits within your organization
  • Identify cost reduction opportunities
  • Secure resource documents to complete an inventory
  • Use invoices and contracts to confirm accuracy in billing

Correcting Invoice Errors and Obtaining Credits for Overcharges (CIE)

  • Calculate credits due
  • Confirm invoice errors
  • Correct invoice errors
  • Understand how to communicate errors to your service provider

Customer Service Record Interpretation Practices (CSR)

  • Define CSR
  • Identify best practices for utilizing a CSR
  • Understand how to use and read a CSR

Demystifying Service Provider Tariffs and Service/Price Guides (TSG)

  • Define the definitions of Tariff and Service Price Guides documents
  • Identify key pieces of information contained within these documents
  • Provide AOTMP® Best Practices to understand the documents
  • Understand how to obtain Tariff and Service Price Guides from service providers

Directing Traffic Studies: Optimizing Wireline Voice and Data Services (DTS)

  • Describe a traffic study
  • Describe benefits of a traffic study
  • Given a scenario, identify a best practice
  • Identify sources for conducting a traffic study

Invoice Auditing: Identifying MPLS Billing Errors (MBE)

  • Define MPLS
  • Demonstrate how to calculate the cost of MPLS billing errors
  • Describe the components of an MPLS network
  • Identify common billable components and errors in an MPLS network
  • List and describe each step of the invoice auditing process

Validating Services: Physical/Site Audit (VPS)

  • Describe typical elements recorded in a physical site audit
  • Explain a physical site audit
  • Explain the benefits of a physical site audit
  • Identify best practices for a physical site audit
Learning objectives for each course supporting this certification include: >

Auditing Lifecycle and Tools (ALT)

  • Identify steps in a successful audit lifecycle
  • Recall examples of process improvement and cost savings
  • Recognize the organizational benefits of auditing

Auditing Materials (AMN)

  • Define the materials required for invoice-to-contract or invoice-to-tariff audits
  • Understand how to read the required documents

Cost Containment and Cost Avoidance Practices (CAP)

  • Define cost avoidance and cost containment
  • Identify key ways to maximize cost savings
  • Resolve disputes
  • Select technology that meets operation needs at the best pricing
  • Understand how to negotiate optimal contracts

Dispute Management Process (DMG)

  • Identify common areas of vendor disputes
  • List best practices for managing disputes
  • Name the “steps” of the dispute management process
  • Recognize challenges that exist when managing disputes

Introduction to Auditing (ITA)

  • Define common terms related to Invoice Auditing
  • Identify areas of an invoice where incorrect or unauthorized charges are common
  • Select responsibilities of an Invoice Auditor as defined in this course
Learning objectives for each course supporting this certification include:

Invoices and TEM 101 (ITE)

  • Define TEM and its focus areas
  • Identify four types of extraneous usage
  • State the importance of a telecom or IT invoice with respect to cost

Developing a Telecom Expense Management Plan (TEM)

  • Define Telecom Expense Management
  • Distinguish between the benefits of insourcing and outsourcing
  • Explain how to identify the ROI of a Telecom Expense Management program
  • Explain how to maximize the benefits of a Telecom Expense Management program
  • Perform a needs assessment for a Telecom Expense Management program

Preparing to Use an RFP to Select a TEM Vendor (STP 01)

  • Define a RFP
  • Define the three areas of concentration in an RFP scope
  • Describe how to prepare an RFP

Using an RFP to Select a TEM Vendor (STP 02)

  • Coordinate the RFP release and TEM vendor proposal method
  • Evaluate TEM vendor proposals
  • Explain the process to select a TEM vendor

Developing a Business Case for TEM Programs (BCT)

  • Calculate a TEM Program ROI
  • Define TEM
  • Develop a TEM Program Business Case
  • Perform a TEM Program Needs Assessment
  • Understand the value of TEM

Thinking Constructively About TEM ROI (TRI)

  • Calculate ROI for TEM programs
  • Discuss the importance of executive level perception and buy in for TEM programs
  • Review expense management
  • Review the importance of calculating ROI for TEM programs

Managing TEM Vendor Relationships (MTR)

  • Explain relationship communications
  • Identify the various management considerations throughout the lifecycle of the TEM vendor relationship
  • Understand the relationship plan development process
Upon completing this course, you will have learned how to: – Describe Robotic Process Automation – Recognize the benefits of Robotic Process Automation – Identify potential uses for Robotic Process Automation
Upon completing this course, you will have learned how to: – Identify mobile environments and billing components – Understand the process for auditing a mobile environment – Audit a mobile environment
Upon completing this course, you will have learned how to: – Define a Request for Proposal – Define the purpose of the elements within a Request for Proposal – Prepare a Request for Proposal
Upon completing this course, you will have learned how to: – Recognize the benefits of an IT asset disposition program – Demonstrate the value proposition associated with properly disposing of IT assets – Recognize which certifications demonstrate sound IT asset disposition policies – Match business case elements with their definition – Demonstrate an understanding of risk mitigation
Upon completing this course, you will have learned how to: – Define TEM – Perform a TEM Program Needs Assessment – Understand the value of TEM – Calculate a TEM Program ROI – Develop a TEM Program Business Case
Upon completing this course, you will have learned how to: – Summarize the cloud auditing process – Identify different cloud invoice types – Demonstrate how to compare cloud invoice-to-contract charges – Explain the differences in cloud storage and cloud license management
Upon completing this course, you will have learned how to: – Describe the optimal cloud environment – Identify the roles and tasks needed for cloud management – Explain the differences between technical and financial auditing
Upon completing this course, you will have learned how to: – Identify the technical, customer service, financial, and time telecom pain points and perspectives – Utilize the questions that uncover those pain points – Recognize the customer assurances associated with these pain points – Describe the different responsibilities during a telecom service provider contract lifecycle
Upon completing this course, you will have learned how to: – Define circuit switching – Know what functions a private branch exchange or PBX performs – Detail advantages of a circuit-switched telephone line – Detail disadvantages to a circuit-switched telephone line
Upon completing this course, you will have learned how to: – Define a business Case – Explain the difference between capital and operation expenditures – Explain how to write and sell a business case – Explain how to track results for a cloud project implementation
Upon completing this course, you will have learned how to: – Describe the cloud environment – Match cloud management services to enterprise needs – Define cloud provisioning – Explain differences in cloud provisioning models
Upon completing this course, you will have learned how to: – Understand what a pandemic crisis is – How to prepare your enterprise for a pandemic event
Upon completing this course, you will have learned how to: – Describe cloud computing – Define three cloud management models – Define common cloud terminology
Upon completing this course, you will have learned how to: – Define what a business case is – Explain the components of a business case – Identify the steps to build a requirements assessment – Simulate building a business case
Upon completing this course, you will have learned how to: – Define MPLS – Describe the components of an MPLS network – List and describe each step of the invoice auditing process – Identify common billable components and errors in an MPLS network – Demonstrate how to calculate the cost of MPLS billing errors
Upon completing this course, you will have learned how to: – Generalize the requirements behind a DPO’s appointment – Summarize the role of the DPO – List the responsibilities of the DPO – Explain how a DPO should be reachable – Summarize the benefits of DPOaaS
Upon completion of this course, you will have learned:
  • What a Center of Excellence (CoE) is
  • How a CoE supports business, why it matters, and the value it offers
  • Considerations for creating a CoE
  • Considerations for launching a CoE
  • How to evaluate CoE performance
  • Efficiency First® Framework best practices supporting CoE design, deployment, and maturity.
Upon completing this course, you will have learned how to: – Outline the history of 9-1-1 – Describe the strengths and limitations associated with the various iterations of 9-1-1 – Explain the key pieces of legislation that currently govern 9-1-1
Upon completing this course, you will have learned how to: – Demonstrate the inventory auditing process – Define Machine-to-Machine (M2M) and the Internet of Things (IoT) – Identify M2M and IoT technology and devices – Identify and resolve M2M and IoT security management challenges
Upon completing this course, you will have learned how to: – Explain what a data breach is – Describe your response if one impacts you or your organization – Summarize the differences in data breach responses across the globe
Upon completing this course, you will have learned how to: – Summarize the history of the CCPA and its scope – List the rights that the CCPA provides consumers – Explain an organization’s responsibilities under the CCPA and the penalties for non-compliance – Recognize the differences between the CCPA and the General Data Protection Regulation
Upon completing this course, you will have learned how to: – Recognize personally identifiable information – Describe the benefits of the Privacy Shield – Explain the protections that HIPAA provides – List the various components of the Electronic Communications Privacy Act – Describe the purview of the National Institute of Standards and Technology – Summarize the expanded rights the California Consumer Privacy Act provides Californians
Upon completing this course, you will have learned how to: – Understand international differences – Understand the structure of an international telecom management team – Identify international technology standards – Implement international telecom policies – Establish invoice payment and processing procedures
Upon completing this course, you will have learned how to: – Define telecom terms and acronyms – Use terminology and acronyms to better understand invoices issued by voice, data, and mobile telecom service providers – Understand terminology and acronyms found in telecom contracts – Understand technology terminology and acronyms used in daily work activity
Upon completing this course, you will have learned how to: – Create an effective mobile device security strategy and policy with compliance – Identify potential threats and motives for mobile device attacks, targets, sources, and methods used – Understand likely consequences of a security breach -Conduct a risk assessment – Identify the differences between mobile device management and mobile application management as well as the differences between agent-based and agentless control
Upon completing this course, you will have learned how to: – Match the Efficiency First Framework terms with their definitions – Recognize the 7 Stakeholder Groups, 10 Focus Areas, and 30 Core Telecom Management Activities – Identify the definitions of the Efficiency First Framework Performance Measurements
Upon completing this course, you will have learned how to: – Identify why it’s important to evaluate vendor RFP responses against your established criteria – Articulate the type of information you should expect to receive from the open-ended vendor questions in your RFP – Using the information contained in this e-learning as well as the 2 previous courses, identify components of a vendor scorecard
Upon completing this course, you will have learned how to: – Understand and define the Business Analysis Core Activity – Understand and define Business Analysis sub-activities – Recite Efficiency First® Framework best practice principles of Business Analysis
Upon completing this course, you will have learned how to: – Understand and define the Budgeting & Forecasting Core Activity – Understand and define Budgeting & Forecasting sub-activities – List Efficiently First® Framework best practice principles of Budgeting & Forecasting
Upon completing this course, you will have learned how to: – Understand the General Data Protection Regulation or GDPR, its requirements and its penalties – Recognize the effects of the GDPR on enterprise and vendor environments – Demonstrate GDPR comprehension through real-world scenarios
Upon completing this course, you will have learned how to: – Explain what a Data Protection Impact Assessment is, and why it’s critical to data privacy compliance – Describe each step required when conducting a DPIA utilizing the AOTMP® DPIA Template – Develop a strategy to mitigate risks uncovered during the DPIA process
Upon completing this course, you will have learned how to: – Identify the geographical areas that make up EMEA – List the major governing bodies in EMEA according to this course – Recall important dates in the history of EMEA telecom governing bodies – Recognize major carrier/operators located throughout EMEA
Upon completing this course, you will have learned how to: – Explain the difference between data privacy and data security – Understand the telecom, mobility, and IT management consequences that result from not following appropriate data privacy practices – Recognize the data privacy laws active in the Americas, EMEA (Europe, Middle East, & Africa) and Asia Pacific – Describe the role of a Data Protection Officer (DPO) and their impact on data privacy compliance in your technology management environment
Upon completing this course, you will have learned how to: – Describe the Importance of Contract Compliance – Explain the Benefits of Contract Catalog – Interpret Documents in a Contract Catalog – Assess Contract Compliance Adherence
Upon completing this course, you will have learned how to: – List the five catalysts for change in a telecommunications environment – Explain why project planning is necessary for effective change management – Develop a project plan to manage a change within a telecommunications environment – Explain the purpose of each step in the process development life cycle – Identify common processes within different areas of an organization that can help with effective change management
Upon completing this course, you will have learned how to: – Identify the role and responsibilities of a CoE Technical Practice Owner – Understand the skills, knowledge, and experience required to be a CoE Technical Practice Owner – Interpret CoE Technical Practice Owner performance dashboard KPIs
Upon completing this course, you will have learned how to: – Understand the PIS Specification, its requirements and its penalties – Understand the effects of the PIS Specification on enterprise and vendor environments – Apply your knowledge of the PIS Specification on enterprise and vendor environments
Upon completing this course, you will have learned how to: – Understand the relationship plan development process – Explain relationship communications – Identify the various management considerations throughout the lifecycle of the TEM vendor relationship
Upon completing this course, you will have learned how to: – Understand key success factors for building a CoE – Identify factors that accelerate and inhibit CoE development – Implement acceleration techniques in CoE development plan
Upon completing this course, you will have learned how to: – Understand the stages of CoE development – Identify stakeholders to promote and support CoE development – Establish CoE progress reporting templates
Upon completing this course, you will have learned how to: – Identify the four phases of change management within the process lifecycle – Explain what occurs within each phase of the process lifecycle – List the five departments that have specific departmental process protocols – Differentiate between the change management strategies for five separate departments
Upon completing this course, you will have learned how to: – Give a brief overview of the Invoice Auditing Process – Identify common components in a VoIP/SIP implementation – Identify common billable components in a VoIP/SIP implementation – Identify common components where billing errors can occur – Calculate the cost of billing errors
Upon completing this course, you will have learned how to: – Explain a physical site audit – Explain the benefits of a physical site audit – Describe typical elements recorded in a physical site audit – Identify best practices for a physical site audit
Upon completing this course, you will have learned how to: – Develop a Wireless Security Policy – Implement a Wireless Security Policy – Maintain a Wireless Security Policy
Upon completing this course, you will have learned how to: – Provide AOTMP® Best Practices to understand the documents – Identify key pieces of information contained within these documents – Understand how to obtain Tariff and Service Price Guides from service providers – Define the definitions of Tariff and Service Price Guides documents
Upon completing this course, you will have learned how to: – Define telecom policy objectives: management control, cost containment, and fraud prevention – Identify policy usage components – Follow usage policy management best practices – Understand common policy overviews
Upon completing this course, you will have learned how to: – Define Unified Communications – Identify Common Features – Identify Common Applications – Identify Common Benefits – Identify Relationships (Related technology and Efficiency First® Framework)
Upon completing this course, you will have learned how to: – Identify the necessary aspects of a UC Policy – Understand the steps in monitoring UC Policy adoption – Identify what change control mechanism are required to manage change control during UC implementation – Identify the appropriate levels of approval for each step in the change control and UC management policy process – Create a basic UC Policy
Upon completing this course, you will have learned how to: – Understand each person’s role in managing security plan requirements – Recognize common telecom security plan considerations – Learn how to apply security assessment best practices – Understand telecom security plan requirements’ ramifications and importance – Recognize security requirement exceptions; Learn how to mitigate telecom security concerns
Upon completing this course, you will have learned how to: – Review expense management – Discuss the importance of executive level perception and buy in for TEM programs – Review the importance of calculating ROI for TEM programs – Calculate ROI for TEM programs
Upon completing this course, you will have learned how to: – Understand cloud solutions benefits and limitations – Understand common Cloud Security environment concerns – Determine cloud environments requirements – Evaluate what security requirements are specific to your enterprise vertical – Create a threat assessment for your enterprise cloud environment – Understand best practices for using a cloud environment in your enterprise
Upon completing this course, you will have learned how to: • Define areas of environmental/physical security • Provide standards for environmental/physical security • Provide the flow for validating environmental/physical security • Understand risks for equipment loss • Describe ways to mitigate common risks for environmental/physical security • Provide AOTMP® recommended best practices for equipment security
Upon completing this course, you will have learned how to: – Define best practices for information security – Define areas of information sections of telecom – Provide standards for an information security – Provide the flow for validating information security – Identify and mitigate risks for information security
Upon completing this course, you will have learned how to: – Discover risks for systems security – Define areas of systems security concerns – Provide standards for systems security – Provide the flow for validating systems security – Provide best practices for systems security – Describe ways to mitigate common risks for systems security
Upon completing this course, you will have learned how to: – Define areas of systems security concerns – Provide standards for systems security – Provide the flow for validating systems security – Discover risks for systems security – Describe ways to mitigate common risks for systems security – Provide best practices for systems security
Upon completing this course, you will have learned how to: – Identify and understand the following tools: NANPA, Erlangs, State Legislature, Tariff and Service Price Guides, State Telecom Regulatory Agencies, and the FCC
Upon completing this course, you will have learned how to: – Define the core telecom management activity – project management – Describe the 3 types of telecom projects – Create a project plan – Identify best practices for Telecom Project Management
Upon completing this course, you will have learned how to: – Identify the 10 steps in technology planning – Identify where to source technology information – Differentiate between an RFI and RFP
Upon completing this course, you will have learned how to: – Define IoT – Describe the trends that enabled IoT – Identify the components of IoT – Describe a use case for IoT

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.