Store

Sharpen your skills and grow your career in minutes. Shop the industry’s most widely recognized professional training solutions now.

  • Auditing mobile telecom invoices may uncover billing errors that negatively impact the enterprise mobility management plan. This course uses sample invoices to show the learner what components to expect in their mobile invoices and demonstrate the process of auditing these documents.
  • A Request For Proposal (RFP) allows a service provider the opportunity to tell their story in a focused manner that is beneficial to the requestor. When trying to determine how to select a service provider, there are certain steps which need to be taken. This course provides an overview of Requests for Proposal, defines and illustrates the elements within an RFP, and assists the learner with preparing their own Request for Proposal. Although focused on selecting a provider of IT asset disposition services, the concepts contained in this lesson are applicable to other types of RFPs. Cascade Asset Management assisted with the development of this course. Their experience with IT Asset Disposition RFPs was invaluable and this course benefited from the lessons they have learned.
  • An organization's IT asset disposition policy asks, “How many working devices do I have and how many do I need to dispose?” With a focus on mobile devices, this course covers the benefits of an IT asset disposition program, the value proposition it offers, and the certifications which demonstrate sound policies. The value derived from decomissioned devices is discussed, but an emphasis is placed on risk mitigation and environmental protections. This course would not have been possible without the assistance of Cascade Asset Management. Their industry knowledge, and guidance, directly contributed to the success of this course.
  • Nearly one-third of organizations indicate that one of their top challenges in establishing a Telecom Expense Management (TEM) program is creating a business justification. This course provides an overview of telecom expense management, answers questions when one needs to justify the need for TEM and provides clear instructions on how to write a business case for a TEM program.
  • Expanding on the lessons learned in (CLM102) Audit & Optimization for Cloud, this course provides learners with technical steps required to complete a cloud audit. Utilizing real-world scenarios, this course provides multiple examples of cloud licensing, storage, and security auditing. This course benefited from the assistance of Shauna Heydecker, National Sales Director with IQ Telecom. Her experience in telecom, mobility, and IT management contributed to the cloud auditing and optimization knowledge base this course provides.
  • Using knowledge gained from prior cloud management courses, this audit and optimization course shows learners the optimal cloud environment and teaches them fundamental roles and tasks within that environment. It also provides learners with a background on both technical and financial cloud audits. This course benefited from the assistance of Shauna Heydecker, National Sales Director with IQ Telecom. Her experience in telecom, mobility, and IT management contributed to the cloud auditing and optimization knowledge base this course provides.
  • An organization’s telecom options increase every day. From landlines or mobile calls to online forums or chat bots, options are multiplying—and each option provides its own opportunity for inefficiency. These pain points often keep telecom managers busy solving problems that did not exist with the previous solution. With a focus on “best practices,” this course shows the learner how to recognize, and overcome, the pain points which afflict their organization.
  • This course provides a high-level overview of Voice over Internet Protocol (VoIP), including a brief history of telephone systems, an exploration of computer networking, introduction to terms and technologies used to send VoIP calls, and explanation of the drivers behind VoIP migration.
  • Deciding to implement a cloud structure within your organization is very important in today’s technological environment. This course will provide learners with not only an overview of the savings associated with implementing a cloud but how they can write a business case for organizational leaders to see the benefit as well.
  • The cloud environment is a complex place that requires organizations to examine what their business needs are. This course will provide participants with a detailed breakdown of this environment, along with examples of the types of organizations that would use each model. Additionally, in this course, you will learn the basics of cloud provisioning models and how your organization should decide on which strategy to select.
  • Pandemics can affect all departments of all types or organizations, so it’s important to plan for your telecom, mobility, and IT needs in the event of a pandemic. This course not only provides important definitions related to pandemics, but also guides you through a four-step pandemic planning process to help prepare your organization for an outbreak.
  • Migrating an enterprise’s technology to the cloud is an important transition that requires detailed decision making and organization. This course will provide participants with a better understanding of what cloud computing is and what the major management models can provide. Using terminology and concepts learned in this course, participants will be able to better, and more methodically, discuss the models which fit their enterprise.
  • In order to gain organizational buy-in to create an ongoing audit program, you will need to prepare a compelling business case. This course helps participants understand what such a business case should contain. In this course, not only will they learn all the components of a requirement assessment and business case, they will also be presented with a full scenario of an organization building a business case for real-world context.
  • MPLS technology provides a fast, efficient technology for enterprises to utilize when routing data across networks. This course provides the learner both a background of how MPLS technology operates and the tools necessary to audit the MPLS invoice for common billing errors.
  • Data Protection Officers have become more prevalent since the adoption of the European Union’s General Data Protection Regulation. Recent estimates suggest that, worldwide, more than 75,000 Data Protection Officers are needed. Upon successful completion of this course, you will know whether your organization needs one as well.
  • A telecom, mobility, and IT management Center of Excellence (COE) is developed by fostering an environment built on sound principles, philosophies, and organizational design. This course will provide essential guidance on what the key components of a COE is, and how they can be used to optimize your organization into the future.
  • Because 9-1-1 is for emergencies only, its usage must properly managed. This course will provide a history of 9-1-1, detail the process flow for emergency telephone calls, and introduce some of the legislation that currently governs emergency telephone calls. Although this course is tailored towards a North American audience, many of its principles are applicable everywhere.
  • Machine-to-Machine (M2M) and Internet of Things (IoT) are utilized in business and personal life in unique ways. Companies need to be aware of techniques that may apply to internet-connected device inventory and security. Participants will be required to demonstrate the auditing process and respond to real-world security challenges they may experience when managing these devices.
  • Although data breaches are a routine part of the 24-hour news cycle, there is a misunderstanding of what they are. In addition, because each state (and nation) has different criteria for who should be notified and for how quickly an organization must react, developing adequate policies and procedures is often difficult. This course provides an overview of data breach responses and, at the end, you will be able to explain what a data breach is, describe your response if one impacts you or your organization, and summarize the differences in data breach responses across the globe.
  • This course provides an overview of the California Consumer Privacy Act and how it might impact your organization. Upon completion of the course, your organization will be better equipped to make policy-related decisions. This course includes a history of the CCPA, an overview of its scope, an explanation of the rights it affords Californians, and an overview of an organization’s responsibilities. As an added bonus, a comparison between the CCPA and the EU’s General Data Protection Regulation is provided.
  • Unlike other regions of the world, the United States does not have a single set of data privacy regulations. Instead, multiple laws focus on data privacy and the expectation is that companies will know which ones govern their industry. This lesson provides learners with a better understanding of the regulations which should guide their decision-making processes. Course topics include Privacy Shield, HIPAA, the Electronic Communications Privacy Act, and the California Consumer Privacy Act.
  • This introductory course provides an overview of Data Protection Impact Assessments. It includes a brief overview of where they originated along with step-by-step instructions on how to complete, implement, and maintain a Data Protection Impact Assessment. This course includes a complimentary template that you can utilize when completing a Data Protection Impact Assessment for your organization. This course, and the corresponding template, should not replace the guidance of a Data Protection Officer or professional legal counsel. AOTMP® is not responsible for any data collection practices, actions, or outcomes resulting from this course.
  • This introductory course provides a foundational understanding of data privacy. Beyond introducing you to personally identifiable information, and the regional laws which protect it, this lesson covers Data Protection Officers and their relationship to data security. Although this course covers numerous Data Protection Authorities, and the rules they have implemented, it should not replace professional legal counsel. AOTMP® is not responsible for any data collection practices, actions, or outcomes resulting from this course.
  • Global telecom and IT management programs present unique challenges beyond language barriers, cultural obstacles, regulatory considerations, and differences in currency. This course explores how to structure international telecom management teams, identify technological standards, implement international telecom policies and establish invoice payment and processing procedures.
Go to Top