In this course, you'll examine phase G, phase H, and architecture requirements management of the Architecture Development Method (ADM Cycle). You'll also learn about the TOGAF® framework and Enterprise Architecture with a focus on guidelines and techniques.
Learning Objectives
TOGAF® Advanced - Guidelines and Techniques
- start the course
- describe the inputs, processes, and outputs of the implementation governance phase of the ADM
- describe the objectives and approach of the architecture change management phase of the ADM
- describe the inputs, processes, and outputs of the architecture change management phase of the ADM
- describe the objectives and approach of the architecture requirements management phase of the ADM
- describe the inputs, processes, and outputs of the architecture requirements management phase of the ADM
- introduce guidelines and techniques and how they can be applied to the ADM
- describe how to apply iteration to the ADM
- describe how to apply the architectural landscape to the ADM
- describe how to apply security architecture to the ADM focusing on architecture domains and business requirements
- describe how to apply security architecture to the ADM focusing on preliminary phase
- describe how to apply security architecture to the ADM focusing on the architecture vision phase
- describe how to apply security architecture to the ADM focusing on the business architecture phase
- describe how to apply security architecture to the ADM focusing on the information systems architecture phase
- describe how to apply security architecture to the ADM focusing on the technology architecture phase
- describe how to apply security architecture to the ADM focusing on the remaining phases
- describe how to apply the ADM to enhance a Service-Oriented Architecture
- describe how to create and apply architectural principles throughout the ADM cycle
- describe how to manage stakeholders through the ADM cycle
- describe how to apply architectural patterns through the ADM cycle
- apply principles and techniques of the Security Architecture in a given case study