• Online, Self-Paced
Course Description

Project risk, communication, and iteration planning are key elements of Agile projects. They determine ways to avoid disastrous results and enact successful delivery. In this course, you'll learn about the risk management process, likelihood and impact assessments, risk response strategies, risk actions, and the risk philosophy of Agile. Then you'll discover the triple constraint approach to risk management and how the Agile approach compares to Waterfall in this respect, information radiators, the task board, burn-down and burn-up charts, and Agile communication principles and the daily stand-up meeting. Then, you'll explore communication planning, iteration capacity and planning, detailed iteration tasks, and backlog grooming. Finally, you'll delve into the daily rhythm of work, command and control, business acceptance, the iteration review, and the iteration retrospective. This course was originally created by Global Knowledge (GK). 

Learning Objectives

Project risk, communication, and iteration planning are key elements of Agile projects. They determine ways to avoid disastrous results and enact successful delivery. In this course, you'll learn about the risk management process, likelihood and impact assessments, risk response strategies, risk actions, and the risk philosophy of Agile. Then you'll discover the triple constraint approach to risk management and how the Agile approach compares to Waterfall in this respect, information radiators, the task board, burn-down and burn-up charts, and Agile communication principles and the daily stand-up meeting. Then, you'll explore communication planning, iteration capacity and planning, detailed iteration tasks, and backlog grooming. Finally, you'll delve into the daily rhythm of work, command and control, business acceptance, the iteration review, and the iteration retrospective. This course was originally created by Global Knowledge (GK). 

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.