|
NCSS 丨 統(tǒng)計分析軟件培訓 |
|
班級人數--熱線:4008699035 手機:15921673576( 微信同號) |
增加互動環(huán)節(jié),
保障培訓效果,堅持小班授課,每個班級的人數限3到5人,超過限定人數,安排到下一期進行學習。 |
授課地點及時間 |
上課地點:【上海】:同濟大學(滬西)/新城金郡商務樓(11號線白銀路站) 【深圳分部】:電影大廈(地鐵一號線大劇院站)/深圳大學成教院 【北京分部】:北京中山學院/福鑫大樓 【南京分部】:金港大廈(和燕路) 【武漢分部】:佳源大廈(高新二路) 【成都分部】:領館區(qū)1號(中和大道) 【廣州分部】:廣糧大廈 【西安分部】:協(xié)同大廈 【沈陽分部】:沈陽理工大學/六宅臻品 【鄭州分部】:鄭州大學/錦華大廈 【石家莊分部】:河北科技大學/瑞景大廈
開班時間(連續(xù)班/晚班/周末班):2020年3月16日 |
課時 |
◆資深工程師授課
☆注重質量
☆邊講邊練
☆若學員成績達到合格及以上水平,將獲得免費推薦工作的機會
★查看實驗設備詳情,請點擊此處★ |
質量以及保障 |
☆
1、如有部分內容理解不透或消化不好,可免費在以后培訓班中重聽;
☆ 2、在課程結束之后,授課老師會留給學員手機和E-mail,免費提供半年的課程技術支持,以便保證培訓后的繼續(xù)消化;
☆3、合格的學員可享受免費推薦就業(yè)機會。
☆4、合格學員免費頒發(fā)相關工程師等資格證書,提升您的職業(yè)資質。 |
☆課程大綱☆ |
|
- IREX 1.0 風險分析管理軟件
- IREX是基于澳大利亞/新西蘭風險管理標準(AS4360)的風險管理系統(tǒng),可滿足管理涉及多個站點的多個項目的復雜性。
- IREX收集了極佳的實踐以及從以前和正在進行的項目中學到的經驗教訓。它為項目經理提供了后見之明,以便有效識別風險,評估或分析風險,并有效地減輕風險以實現計劃目標。
- 關于風險緩解戰(zhàn)略和行動計劃的信息在整個項目的所有階段以結構化報告的形式提供給項目成員和管理人員。
- ?
- 功能模塊:
- IREX由四個主要模塊組成:概況、識別、分析和緩解與監(jiān)測。
- ?
- ProfileModule旨在通過手機項目背景信息(如項目人員、預算、類型、適用的風險政策以及供應商、承包商和客戶的信息)來建立項目概況。手機的信息使IRSX能夠制定適合特定項目概況的量身定制的風險模型。
- 標識模塊顯示與項目上下文相關的問題集合。在大多數情況下,對這些問題的響應式通過與項目的涉眾或團體成員進行討論來確定的。
- 隨后,分析模塊使用這些響應以及風險類型和經驗教訓之間的相互依賴關系,提出結果和可能性值。您可以在必要時覆蓋這些建議值。
- 緩解和監(jiān)控模塊提取其大小用于用戶定義的項目特定閾值的已識別風險。這些風險放在您的項目風險注冊表中,您可以在其中訪問大量旨在幫助您監(jiān)控中大風險的工具。例如,您可以在知識庫中搜索現有的緩解策略,以及下載PDF文件中的風險報告。此外,監(jiān)控模塊和風險報告中都提供了跟蹤重大風險歷史值的風險矩陣和圖表。
- ?
- 為所有與系統(tǒng)的重要用戶交互維護事件日志,以便于審核。例如,當用戶更新風險寄存器中的行動計劃時,惠濟路用戶機器的時間戳、用戶和IP地址。記錄的時間的粒度是可自定義的。
- ?
- IREX允許用戶通過分配授權用戶組來維護風險配置文件經驗教訓。例如,這些授權用戶將能夠導入和驗證從項目中學到的經驗教訓,然后再將它們同化到Syatem知識庫中。此外,隨著您的業(yè)務關系變得更加廣泛,可悶可以添加/修改供應商和客戶的配置文件。
- ?
- 【英文介紹】
- IREX is a risk management system based on the Australia/New Zealand Standard on Risk Management (AS 4360) that caters to the complexities of managing multiple projects involving multiple sites.
-
- IREX captures the best practices as well as lessons learnt from previous and on-going projects. It provides hindsight for project managers to efficiently identify risks, assess or analyse risks, and effectively mitigate risks to achieve program goals.
-
- Information on the risk mitigation strategies and action plans are available in structured reports to project members and managers throughout all stages of projects.
- ?
- Functional Modules
-
- IREX consists of four main modules: profile, identification, analysis, and mitigation & monitoring.
-
- The Profile Module aims to establish the project profile by collecting project background information such as the project personnel, budget, type, applicable risk policies, as well as information on suppliers, contractors, and clients. The collected information enables IREX to formulate tailored risk models that are suitable for specific project profiles.
-
- The Identification Module displays collections of questions that are relevant to the context of your project. In most situations, responses to these questions are determined through discussions with the stakeholders and/or team members of your projects.
-
- Subsequently, the Analysis Module suggests consequence and likelihood values using these responses as well as the interdependencies between risk types and lessons learnt. You can override these suggested values where necessary.
-
- The Mitigation & Monitoring Module extracts identified risks whose magnitudes are greater than a user-defined project-specific threshold. These risks are placed within your project risk register where you have access to a myriad of tools designed to help you monitor significant risks. For instance, you can search the knowledge repository for existing mitigation strategies as well as download risk reports in PDF files. In addition, risk matrices and charts that track the historical values of significant risks are available in both the Monitoring Module and the risk reports.
-
- Event logs are maintained for all significant user interactions with the system to facilitate auditing. For instance, the timestamp, user, and IP address of user machine are recorded when a user updates an action plan in the Risk Register. The granularity of logged events is customisable.
-
- IREX allows users to maintain risk profiles and lessons learnt by assigning groups of authorised users. For instance, these authorised users will be able to import and validate new lessons learnt from projects before they are assimilated into the system抯 knowledge repository. Moreover, they can add/modify profiles of suppliers and customers as your business relationships become more extensive.
|
|
|
|
|
|