What people say...

5 star rating

Excellent

Rita Kene-Nwegbe

I love the videos and articles. They gave me insights to the different tasks.

I love the videos and articles. They gave me insights to the different tasks.

Read Less
5 star rating

Very informative and Easy Reference

Samantha Ford

Great selection of resources that are broken down in a way that's easy to follow. Enjoyed the videos and explanations given for each technique. Also some ver...

Read More

Great selection of resources that are broken down in a way that's easy to follow. Enjoyed the videos and explanations given for each technique. Also some very useful links to templates etc. that I will definitely be using going forward.

Read Less

Our Library Offers

We have put together a range of resources to help you find information quickly and easily.

  • 2

    Business Analyst Core Competency

    • IIBA Competency Model 4.0

  • 3

    Business Analyst Role: Explainers

    • 6 Types of Business Analysts - Which will you be?

    • Business Analyst - A day in the life

    • Business Analyst Career Path. Where Will You End Up?!

    • Careers NZ

  • 4

    BABOK® Summary

  • 5

    BACCM®: Business Analysis Core Concept Model

    • Video: Business Analysis Core Concept Model

  • 6

    BABOK® Chapter 4 Elicitation and Collaboration: Prepare, Conduct, Confirm, Communicate and Manage

    • Communication Models

    • How to manage a sticky stakeholder

    • The Value of Stakeholders

  • 7

    BABOK® Chapter 5 Requirements Life Cycle Management: Tracability, Maintain, Prioritise, Assess and Approve

    • How to create a requirements traceability matrix for projects

  • 8

    BABOK® Chapter 6 Strategy Analysis: Current State to Future State, Gap Analysis, Risk Assessment, Change Strategy

    • Gap Analysis Template

    • Thriving on Change: Creating A Gap Analysis

    • Strategy Canvas

  • 9

    BABOK® Chapter 7 Requirements Analysis and Design Definition

    • Business Knowledge Brief: by Agora Insights Ltd

    • Copy of Requirements Samples by Type

    • Copy of Template of full Business Requriements Document

  • 10

    BABOK® Chapter 10.0 Techniques Visulisation

  • 11

    BABOK® 10.1 Acceptance and Evaluation Criteria

    • 10.1 Acceptance and Evalution Criteria in BABOK®

    • What is the difference between acceptance and evaluation criteria?

  • 12

    BABOK® 10.2 Backlog Management

    • 10.2 Backlog Management in BABOK®

    • Building a Project Backlog

  • 13

    BABOK® 10.3 Balanced Score Card

    • 10.3 Balanced Score Card in BABOK®

    • What is a Balanced Score Card?

  • 14

    BABOK® 10.4 Benchmarking and Market Analysis

    • 10.4 Benchmarking and Market Analysis in BABOK®

    • What is Benchmarking?

  • 15

    BABOK® 10.5 Brainstorming

    • 10.5 Brainstorming in BABOK®

    • How to better brainstorm

    • IDEO Brainstorming Video from IDEO U

    • #QuickTips: Brainstorming Techniques - Rick Enrico

  • 16

    BABOK® 10.6 Business Capability Analysis

    • Best Practices for Business Capabilities Maps

    • What is a Business Capability Model?

    • LeanIX: Defining Business Capability

  • 17

    BABOK® 10.7 Business Cases

    • 10.7 Business Cases in BABOK®

    • Introduction to writing a Business Case | What are the contents of a Business Case?

    • Building A Business Case

  • 18

    BABOK® 10.8 Business Model Canvas

    • 10.8 Business Model Canvas in BABOK®

    • The Business Model Canvas - 9 Steps to Creating a Successful Business Model - Startup Tips

    • Business Model Canvas Template

  • 19

    BABOK® 10.9 Business Rules Analysis

    • 10.9 Business Rules Analysis in BABOK®

    • Business Rules Analysis

  • 20

    BABOK® 10.10 Collaborative Games

    • 10.10 Collaborative Games in BABOK®

    • Helium Stick

    • 39 Team Building Games

  • 21

    BABOK® 10.12 Data Dictionary

    • 10.12 Data Dictionary in BABOK®

    • Data Dictionary (Database)

    • 5 Minute Metadata - What is a data dictionary?

  • 22

    BABOK® 10.13 Data Flow Diagrams

    • 10.13 Data Flow Diagrams in BABOK®

    • Data Flow Diagrams - What is DFD? Data Flow Diagram Symbols and More

    • Context & Data Flow Diagrams Sample 1: YouTube

    • Context & Data Flow Diagrams Sample 2: Uber

  • 23

    BABOK® 10.14 Data Mining

    • 10.14 Data Mining

    • Data Mining: How You're Revealing More Than You Think

    • Data Mining (Introduction for Business Students)

  • 24

    BABOK® 10.15 Data Modelling

    • 10.15 Data Modelling in BABOK®

    • What is a data model?

    • Data Modelling: Designing your data model?

  • 25

    BABOK® 10:16 Decision Analysis

    • 10.16 Decision Analysis in BABOK®

    • What is a decision tree?

    • Decision tree

    • Force field analysis

  • 26

    BABOK® 10.17 Decision Modelling

    • 10.17 Decision Modelling in BABOK®

    • What is decision modelling?

    • DMN Decision Modeling | ACTICO Modeler

    • Decision Modelling Explaination

  • 27

    BABOK® 10.18 Document Analysis

    • 10.18 Document Analysis in BABOK®

    • What is document analysis

    • Document Analysis: A How To Guide

  • 28

    BABOK® 10.22 Functional Decomposition

    • Video: Functional Decomposition Explainer

    • Video 2: Functional Decomposition Explainer

  • 29

    BABOK® 10.24 Interface Analysis

    • Interface analysis with explainer

  • 30

    BABOK® 10.25 Interviews

    • Qualitative analysis of interview data: A step by step guide

  • 31

    BABOK® 10.28 Metrics and Key Performance Indicators (KPIs)

    • KPI's, Key Metrics & Benchmarking Success: The Business Dashboard - How To Start A Business

    • 10.28 Metrics and Key Performance Indicators (KPIs) in BABOK®

  • 32

    BABOK® 10.30 Non-Functional Requirements Analysis

    • How Teams Measure Non-Functional Requirements

    • Analysis and Requirements Gathering 1

    • Mastering the Requirements Process: The Brown Cow Model

  • 33

    BABOK® 10.35 Process Modelling

    • BPMN 2.0 | A simple, 5-minute introduction

    • BPMN Tutorial for Beginners

    • Customer Journey Map Workshop

    • Customer Journey Map Templates

    • Free BPMN Online Tool

    • How to create a customer journey map

    • How to create a journey map (2)

  • 34

    BABOK® 10.40 Root Cause Analysis

    • What is root cause analysis

    • Root Cause Analysis (24min)

    • Root Cause: 5 whys and Fishbone

  • 35

    BABOK® 10.43 Stakeholder List, Map, or Personas

    • How to create a stakeholder map

    • Dealing with Resistant Stakeholders

  • 36

    BABOK® 10.46 Swot Analysis

    • Business Strategy: SWOT

  • 37

    BABOK® 10.47 Use Cases and Scenarios

    • UML Use Case Diagram Tutorial

  • 38

    BABOK® 10.48 User Stories

    • How to write user stories

  • 39

    BABOK® 10.50 Workshops

    • How to run a Design Thinking Workshop

    • Requirement Gathering | Workshop - Gather Requirements in 12 Steps [EP2]

    • How to run a successful requirements workshop

    • Design Thinking workshop

  • 40

    Cybersecurity Analysis Module 1: Introduction to Cybersecurity Analysis

    • 1.4.2 The 5 components of Information Systems

    • 1.4.2 Understanding Applications (APPs)

    • 1.4.2 What is a database

    • 1.4.2 Types of IT infrastructure

    • 1.4.3 What does a data centre do?

    • 1.4.4 Servers & Clients

    • 1.4.4 Servers and Clients (2)

    • 1.4.5 What is a web server

    • 1.4.5 Web Server vs Application Server

    • 1.4.5 What is a static file server?

    • 1.4.5 What is a directory server?

    • 1.4.5 What are directory services

    • 1.4.6 What is a platform?

    • 1.4.6 What is Platform as a service?

    • 1.4.6 Saas, Paas and Iaas Part 1

    • 1.4.6 Sas, Paas & Iaas Part 2

    • 1.4.7 What is OSI model?

    • 1.5.2 What is the internet protocol

    • 1.5.2 What is TCP/IP Protocol

    • 1.5.2 TCP/IP Model

    • 1.5.3 Systems Development Life Cycle (SDLC)

    • 1.5.4 Waterfall model in Software Development

    • 1.5.4 Agile in Software Development

    • 1.5.5 Staging Deployments

    • 1.5.6 ITIL - What is it?

    • 1.5.7 What is Patch Management?

    • 1.5.8 What is a web application?

    • 1.5.8 Web pages, Websites, and Web Applications

    • 1.5.8 The Internet vs the Web

    • 1.5.8 HTTP & the Web

    • 1.6.2 What is Information Management?

    • 1.6.3 Cloud Computing for Beginners

    • 1.6.4 Cloud vs On-Prem

    • 1.6.4 Cost of Cloud vs On-Prem

    • 1.6.5 Management Services

    • 1.6.6 Digitization, Digital Transformation and Innovation: What’s the Difference?

    • 1.6.7 What is Business Intelligence

    • 1.6.8 Internet of Things (IoT) - How it works

    • Administrator and operator logs

  • 41

    Cybersecurity Analysis Module 2: Enterprise Security Concepts

    • Anonymization and Pseudonymization under GDPR

    • Anonymization + Pseudonymization | 60 Seconds of Legal Science | Shook

    • CIA: What is CIA Triad?

    • CISO: Three Keys to CISO Success

    • Defense in Depth

    • DMZ: What is a DMZ? (Demilitarized Zone)

    • DRM: What is digital rights management (DRM)?

    • Information Assurance and Security - CIS4930

    • Information Security Management System (ISMS)

    • Internet of Things: What is IoT

    • Intrusion Detection and Prevention Systems (IDS/ IPS) | Security Basics

    • Managed Security Service Provider (MSSP): What is it?

    • Network Segmentation

    • Rights Expression Language (REL)

    • Risk Appetite Explained - Risk Tolerance -Risk Tolerance Tips (Financial perspective)

    • Security Benchmarking

    • SIEM: Security Information & Event Management Explained

    • Virtual Private Network (VPN): What is VPN

  • 42

    Cybersecurity Analysis Module 3: Enterprise Risk

    • Common Cyber-Attacks Explained

    • Cybersecurity Basics #2 - Vulnerabilities, Exploits, and Threats

    • Executive summary

    • Cyber Security – Top 10 Threats

    • Mapping Assets, Threats, Vulnerabilities, and Attacks

    • Ownership in Risk Management

    • Risk Assessment

    • Risk management framework

    • Risk ownership and assigning risk

    • Security Controls Testing

    • SWOT Analysis - What is SWOT? Definition, Examples and How to Do a SWOT Analysis

    • The Difference Between Backup and Disaster Recovery

    • The importance of Threat Modeling

    • The law of diminishing returns

    • Vulnerability Discovery

    • Vulnerability remediation overview

    • Vulnerability Scanning With Authentication

    • What’s the Difference Between Risk Capacity vs. Risk Appetite?

    • What is Authentication

    • What is Business Continuity?

    • What is COMMERCIAL OFF-THE-SHELF? What does COMMERCIAL OFF-THE-SHELF mean?

    • What is Penetration Testing?

    • What is the MoSCoW Method?

  • 43

    Cybersecurity Analysis Module 4: Cybersecurity Risks & Controls

    • FIPS 199 200

    • Information Security Incident Management - BIA (Business Impact Analysis)

    • Non-Repudiation

    • Threats and Threat Agents

    • What is INFORMATION ASSURANCE?

  • 44

    Cybersecurity Analysis Module 5: Securing the Layers

    • Compromising Electromagnetic Emanations of Wired Keyboards 1

    • Compromising Electromagnetic Emanations of Wired Keyboards 2

    • DHCP Explained | Step by Step

    • Difference Between Whitelist and Blacklist Policy in Cisco Tetration

    • Domain Name System DNS

    • Encryption as Fast As Possible

    • Hardware Security Module (HSM)

    • Host-based vs Network Firewalls: What’s the difference?

    • How An Information Asset Register Can Help Keep Your Business Safe

    • How Does Full Disk Encryption Work?

    • How Does Individual File Encryption Work?

    • IaaS Explained

    • Introduction to IT Asset Management

    • Network Traffic & Interfaces (Egress & Ingress Traffic)

    • Over the Air Firmware Update

    • The Threat Landscape Attack Surface

    • What is a honeypot, How to install and what can we see from honeypots?

    • What is an API?

    • What is an Embedded System?

    • What is Endpoint Security?

    • What is Malware?

    • Why are flat networks a problem nowadays?

    • Why Data Isolation Matters

  • 45

    IIBA Certification Information

    • Core BA Certification Handbook

    • FAQs about Certification

    • IIBA Global Business Analysis Core Standard

    • IIBA Core Standard

    • Library of IIBA Certification FAQs

    • Link of IIBA Certification Fee Guide

Watch Intro Video

Video

Find out more about our library