Seminare
Seminare

Requirements Management Schulungen finden - Das passende Seminar in Ihrer Nähe

Lernformate der Requirements Management Schulungen
Präsenzunterricht // Onlinekurs bzw. Fernkurs // Kombination Präsenz & Online

Auf Seminarmarkt.de finden Sie aktuell 460 Schulungen (mit 1.678 Terminen) zum Thema Requirements Management mit ausführlicher Beschreibung und Buchungsinformationen:

Webinar

  • 05.12.2025- 07.01.2026
  • online
  • 1.475,60 €
4 weitere Termine

Als Product Owner ist das effektive Product‐Backlog‐Management eine Kernaufgabe. Es erfolgreich zu managen bedeutet Kundenzentrierung, klare Priorisierung und Transparenz stets anzustreben. Dies fordert von Product Ownern eine Vielzahl an Fähigkeiten, die weit über die klassischen agilen Handlungsanweisungen hinausgehen. In dieser Weiterbildung lernst du die wichtigsten Elemente und Methoden für das erfolgreiche Backlog Management kennen, vom Product Goal über die kontinuierliche Einbindung des:r Kund:in hin zum Backlog Refinement. Der Backlog sollte niemals still stehen. Das solltest du also auch nicht! Der Kurs setzt sich zusammen aus didaktisch hochwertigen Selbstlernmodulen und Live-Webinaren. Er wurde so konzipiert, dass du damit flexibel über einen Zeitraum von drei Wochen hinweg lernen kannst – ideal, wenn du dich berufsbegleitend weiterbilden möchtest.

Webinar

  • 19.01.2026- 21.01.2026
  • online
  • 3.034,50 €
1 weiterer Termin

Overview

Learn about the basic Information Management System (IMS): IMS facilities, the IMS database system, and the IMS Transaction Manager (IMS/TM). Explore how these facilities work together and how application programs interact with them in today' s complex enterprise systems.

This course has 30 hours of instruction.

This course uses a Web conference medium with live instructor audio and Internet Web conferenced material. You have chat-type Question and Answer (Q and A) ability, plus live audio. The course is taught 10:00 a.m. to 12:00 noon and 1:00 p.m. to 4:00 p.m. Central time for six work days over a two-week period. Since the course is taught live using Web conferencing methods, you can attend from your home or work. Class durations are approximately one-half day so you can still accommodate daily work responsibilities. You will be contacted prior to class start to receive connection information, hardcopy student materials, and other relevant information.

Course Materials

You will be contacted prior to class start to receive connection information, hardcopy student materials, and other relevant information.

  • firmenintern
  • Ort auf Anfrage
  • auf Anfrage


Overview

Learn about the basic Information Management System (IMS): IMS facilities, the IMS database system, and the IMS Transaction Manager (IMS/TM). Explore how these facilities work together and how application programs interact with them in today' s complex enterprise systems.

This course has 30 hours of instruction.

This course uses a Web conference medium with live instructor audio and Internet Web conferenced material. You have chat-type Question and Answer (Q and A) ability, plus live audio. The course is taught 10:00 a.m. to 12:00 noon and 1:00 p.m. to 4:00 p.m. Central time for six work days over a two-week period. Since the course is taught live using Web conferencing methods, you can attend from your home or work. Class durations are approximately one-half day so you can still accommodate daily work responsibilities. You will be contacted prior to class start to receive connection information, hardcopy student materials, and other relevant information.

Course Materials

You will be contacted prior to class start to receive connection information, hardcopy student materials, and other relevant information.

  • 05.01.2026- 09.01.2026
  • Köln
  • 4.272,10 €
3 weitere Termine

Nach Abschluss des Seminars sind Sie in der Lage, Testprojekte in OpenText ALM zu planen, verwalten und effizient zu analysieren. Zudem beherrschen Sie den Umgang mit OpenText UFT zur Erstellung automatisierter Testfälle - von der Skripterstellung bis zur Integration mit Testdaten und Objekterkennung. Sie verfügen über einen praxisorientierten Überblick über den gesamten Application Lifecycle Management-Prozess und können Ihre Testprozesse nachhaltig optimieren.

  • firmenintern
  • Ort auf Anfrage
  • auf Anfrage


Overview

IBM Spectrum Protect is an enterprise data protection solution designed to help you streamline your data protection processing, reduce the cost of storage, and provide the flexibility and security to meet any service level agreement. IBM Spectrum Protect optimizes storage utilization by using incremental forever as well as block-level backup and replication, policy-based data management, and an intuitive interface, the Operations Center.

 

In this course, you learn how the use of two or more Spectrum Protect servers provides more options for data movement in the environment, like replication to multiple targets. You also use IBM Cloud Object Storage to create a storage pool for backups and long-term retention. The bulk of the administrative tasks are performed using the Operations Center and Command Builder which provides a command line interface for all servers configured in the Operations Center. This course also includes scripting, performance tuning, protecting, and recovering the database and storage pools, and an introduction to IBM Spectrum Protect Plus.

 

The hands-on exercises are performed on three different IBM Spectrum Protect servers, two on Windows, and one on Linux, with additional systems added to provide the IBM Cloud Object Storage environment.

 

This course is the second in a two-course series. It is for Spectrum Protect administrators who are familiar with the daily management tasks o...

Webinar

  • 23.03.2026
  • online
  • 1.011,50 €
2 weitere Termine

Overview

This course provides database administrators and IT security professionals with the knowledge and practical skills needed to implement and manage robust security in IBM Db2 v12.1 environments. Learners will explore the fundamentals and advanced concepts of Db2 security, including authentication, authorization, and privilege hierarchies. 

This course covers key topics such as configuring access controls, utilizing database roles and authorities, managing data encryption for secure communications, and applying advanced security features like Row and Column Access Control (RCAC), Label-Based Access Control (LBAC), and Trusted Contexts for multi-tiered architectures. 

Additionally, students will examine Db2’s built-in auditing capabilities to monitor compliance and ensure secure database operations.

  • firmenintern
  • Ort auf Anfrage
  • auf Anfrage


Overview

This course provides database administrators and IT security professionals with the knowledge and practical skills needed to implement and manage robust security in IBM Db2 v12.1 environments. Learners will explore the fundamentals and advanced concepts of Db2 security, including authentication, authorization, and privilege hierarchies. 

This course covers key topics such as configuring access controls, utilizing database roles and authorities, managing data encryption for secure communications, and applying advanced security features like Row and Column Access Control (RCAC), Label-Based Access Control (LBAC), and Trusted Contexts for multi-tiered architectures. 

Additionally, students will examine Db2’s built-in auditing capabilities to monitor compliance and ensure secure database operations.

Webinar

  • 03.11.2025- 07.11.2025
  • online
  • 5.057,50 €
1 weiterer Termin

Overview

IBM Storage Protect is an enterprise data protection solution designed to help you streamline your data protection processing, reduce the cost of storage, and provide the flexibility and security to meet any service level agreement. IBM Storage Protect optimizes storage utilization by using incremental forever as well as block-level backup and replication, policy-based data management, and an intuitive interface, the Operations Center.

 

In this course, you learn how the use of two or more Storage Protect servers provides more options for data movement in the environment, like replication to multiple targets. You also use IBM Cloud Object Storage to create a storage pool for backups and long-term retention. The bulk of the administrative tasks are performed using the Operations Center and Command Builder which provides a command line interface for all servers configured in the Operations Center. This course also includes scripting, performance tuning, protecting, and recovering the database and storage pools, and an introduction to IBM Storage Protect Plus.

 

The hands-on exercises are performed on three different IBM Storage Protect servers, two on Windows, and one on Linux, with additional systems added to provide the IBM Cloud Object Storage environment.

 

This course is the second in a two-course series. It is for Storage Protect administrators who are familiar with the daily management tasks on a si...

  • firmenintern
  • Ort auf Anfrage
  • auf Anfrage


Overview

IBM Storage Protect is an enterprise data protection solution designed to help you streamline your data protection processing, reduce the cost of storage, and provide the flexibility and security to meet any service level agreement. IBM Storage Protect optimizes storage utilization by using incremental forever as well as block-level backup and replication, policy-based data management, and an intuitive interface, the Operations Center.

 

In this course, you learn how the use of two or more Storage Protect servers provides more options for data movement in the environment, like replication to multiple targets. You also use IBM Cloud Object Storage to create a storage pool for backups and long-term retention. The bulk of the administrative tasks are performed using the Operations Center and Command Builder which provides a command line interface for all servers configured in the Operations Center. This course also includes scripting, performance tuning, protecting, and recovering the database and storage pools, and an introduction to IBM Storage Protect Plus.

 

The hands-on exercises are performed on three different IBM Storage Protect servers, two on Windows, and one on Linux, with additional systems added to provide the IBM Cloud Object Storage environment.

 

This course is the second in a two-course series. It is for Storage Protect administrators who are familiar with the daily management tasks on a si...

  • firmenintern
  • Ort auf Anfrage
  • auf Anfrage


Overview

This course teaches experienced authors advanced report building techniques to enhance, customize, manage, and distribute reports. Additionally, the student will learn how to create highly interactive and engaging reports that can be run offline by creating Active Reports.

1 ... 39 40 41 ... 46

Auf der Suche nach Online-Seminaren?

Bei Seminarmarkt.de erkennen Sie auf den ersten Blick die Online-Kurse der Seminaranbieter. So können Sie sich in Zeiten der Digitalisierung und Krisen schnell und kostengünstig vom Home-Office oder vom Arbeitsplatz aus weiterbilden.



Experten finden

Auf der Suche nach individueller Weiterbildung? Nicht das passende Requirements Management Seminar gefunden?

Sie haben einen individuellen Weiterbildungsbedarf in Ihrem Unternehmen oder suchen einen Trainer / Coach zur Festanstellung? Sie wünschen sich eine maßgeschneiderte Weiterbildung oder ein Requirements Management Inhouse-Seminar? Dann starten Sie doch einen kostenfreien Suchauftrag unter Seminarmarkt.de/Gesuche.

Seminarwissen

Seminarwissen aus der Infothek

Auf dem Weiterbildungsmarkt gibt es eine Vielzahl an Seminaren, Trainings und Workshops. Welches passt zu mir? Welcher Abschluss lohnt sich für meine Karriere? In unserer Infothek gehen wir auf die unterschiedlichsten Themen aus der Welt der Seminare, Weiterbildungen und Kurse ein.


Nach unten
Nach oben
Wir setzen Analyse-Cookies ein, um Ihre Zufriedenheit bei der Nutzung unserer Webseite zu verbessern. Diese Cookies werden nicht automatisiert gesetzt. Wenn Sie mit dem Einsatz dieser Cookies einverstanden sind, klicken Sie bitte auf Akzeptieren. Weitere Informationen finden Sie hier.
Akzeptieren Nicht akzeptieren









Um Spam abzuwehren, geben Sie bitte die Buchstaben auf dem Bild in das Textfeld ein:

captcha



Bei der Verarbeitung Ihrer personenbezogenen Daten im Zusammenhang mit der Kontaktfunktion beachten wir die gesetzlichen Bestimmungen. Unsere ausführlichen Datenschutzinformationen finden Sie hier. Bei der Kontakt-Funktion erhobene Daten werden nur an den jeweiligen Anbieter weitergeleitet und sind nötig, damit der Anbieter auf Ihr Anliegen reagieren kann.







Um Spam abzuwehren, geben Sie bitte die Buchstaben auf dem Bild in das Textfeld ein:

captcha