SlideShare a Scribd company logo
Business Analysis
Training
Enterprise Analysis
Page 2Classification: Restricted
Agenda
• Enterprise Analysis
• Enterprise Analysis Activities
• Techniques Used to Define a Business Need
• Techniques Used to assess Capability Gaps
• Techniques Used to Determine Solution Approach
• Techniques Used to Define Solution Scope
• Techniques Used to Define a Business Case
• SWOT Analysis
Page 3Classification: Restricted
Enterprise Analysis
Page 4Classification: Restricted
Techniques Used to Define a Business Need
Page 5Classification: Restricted
Techniques Used to assess Capability Gaps
Page 6Classification: Restricted
Techniques Used to Determine Solution Approach
Page 7Classification: Restricted
Techniques Used to Define Solution Scope
Page 8Classification: Restricted
Techniques Used to Define a Business Case
Page 9Classification: Restricted
SWOT Analysis
Strengths: characteristics of the business, or project team that give it
an advantage over others
Weaknesses (or Limitations): are characteristics that place the team at
a disadvantage relative to others
Opportunities: external chances to improve performance (e.g. make
greater profits) in the environment
Threats: external elements in the environment that could cause
trouble for the business or project.
Page 10Classification: Restricted
SWOT Analysis
Page 11Classification: Restricted
How to Conduct SWOT Analysis
Analyze the Internal & External Environment
Page 12Classification: Restricted
Thank you

More Related Content

Similar to Enterprise Analysis and SWOT Analysis

Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
Sunil-QA
 
Resume/Interview Preparation
Resume/Interview Preparation Resume/Interview Preparation
Resume/Interview Preparation
Veneet-BA
 
Resume/Interview Preparation
Resume/Interview Preparation   Resume/Interview Preparation
Resume/Interview Preparation
SwatiS-BA
 
Resume/Interview Preparation
Resume/Interview Preparation   Resume/Interview Preparation
Resume/Interview Preparation
Lakshmi-BA
 
Strategy analysis
Strategy analysisStrategy analysis
Strategy analysis
Mustafa Tülü
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
SwatiS-BA
 
Strategic Management part_02_03
Strategic Management part_02_03Strategic Management part_02_03
Strategic Management part_02_03
Ramadan Babers, PhD
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
Shwetha-BA
 
SWOT Analysis WithAdrian™ 2013 Adrian Beale
SWOT Analysis WithAdrian™ 2013 Adrian BealeSWOT Analysis WithAdrian™ 2013 Adrian Beale
SWOT Analysis WithAdrian™ 2013 Adrian Beale
Adrian Beale
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
Veneet-BA
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise Analysis
Sunil-QA
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
AMEER Hamza
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise Analysis
Sunil-QA
 
Requirement Elicitation Techniques
Requirement Elicitation Techniques Requirement Elicitation Techniques
Requirement Elicitation Techniques
Shwetha-BA
 
Introduction to Business Analysis
Introduction to Business Analysis Introduction to Business Analysis
Introduction to Business Analysis
Sunil-QA
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
Shwetha-BA
 
Personal swot analysis
Personal swot analysisPersonal swot analysis
Personal swot analysis
NgN Menakan
 
Business Analysis Core Standard Knowledge Areas
Business Analysis Core Standard Knowledge AreasBusiness Analysis Core Standard Knowledge Areas
Business Analysis Core Standard Knowledge Areas
Ayo Apampa
 
Benchmarking
Benchmarking Benchmarking
Benchmarking
'VD' Vishnu
 
Ch04 Discussion Light
Ch04 Discussion LightCh04 Discussion Light
Ch04 Discussion Light
Avinash Kumar
 

Similar to Enterprise Analysis and SWOT Analysis (20)

Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 
Resume/Interview Preparation
Resume/Interview Preparation Resume/Interview Preparation
Resume/Interview Preparation
 
Resume/Interview Preparation
Resume/Interview Preparation   Resume/Interview Preparation
Resume/Interview Preparation
 
Resume/Interview Preparation
Resume/Interview Preparation   Resume/Interview Preparation
Resume/Interview Preparation
 
Strategy analysis
Strategy analysisStrategy analysis
Strategy analysis
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 
Strategic Management part_02_03
Strategic Management part_02_03Strategic Management part_02_03
Strategic Management part_02_03
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 
SWOT Analysis WithAdrian™ 2013 Adrian Beale
SWOT Analysis WithAdrian™ 2013 Adrian BealeSWOT Analysis WithAdrian™ 2013 Adrian Beale
SWOT Analysis WithAdrian™ 2013 Adrian Beale
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise Analysis
 
Swot analysis
Swot analysisSwot analysis
Swot analysis
 
Enterprise Analysis
Enterprise AnalysisEnterprise Analysis
Enterprise Analysis
 
Requirement Elicitation Techniques
Requirement Elicitation Techniques Requirement Elicitation Techniques
Requirement Elicitation Techniques
 
Introduction to Business Analysis
Introduction to Business Analysis Introduction to Business Analysis
Introduction to Business Analysis
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 
Personal swot analysis
Personal swot analysisPersonal swot analysis
Personal swot analysis
 
Business Analysis Core Standard Knowledge Areas
Business Analysis Core Standard Knowledge AreasBusiness Analysis Core Standard Knowledge Areas
Business Analysis Core Standard Knowledge Areas
 
Benchmarking
Benchmarking Benchmarking
Benchmarking
 
Ch04 Discussion Light
Ch04 Discussion LightCh04 Discussion Light
Ch04 Discussion Light
 

More from Lakshmi-BA

Unified Modeling Language - UML - Complete Guide - Part 1
Unified Modeling Language - UML - Complete Guide - Part 1Unified Modeling Language - UML - Complete Guide - Part 1
Unified Modeling Language - UML - Complete Guide - Part 1
Lakshmi-BA
 
Unified Modeling Language - UML - Complete Guide - Part 2
Unified Modeling Language - UML - Complete Guide - Part 2Unified Modeling Language - UML - Complete Guide - Part 2
Unified Modeling Language - UML - Complete Guide - Part 2
Lakshmi-BA
 
Workflow Diagram
Workflow DiagramWorkflow Diagram
Workflow Diagram
Lakshmi-BA
 
Role of BA in Testing
Role of BA in TestingRole of BA in Testing
Role of BA in Testing
Lakshmi-BA
 
Requirements Management
Requirements ManagementRequirements Management
Requirements Management
Lakshmi-BA
 
Requirement Elicitation Techniques
Requirement Elicitation Techniques   Requirement Elicitation Techniques
Requirement Elicitation Techniques
Lakshmi-BA
 
Introduction to OOA and UML - Part 2
Introduction to OOA and UML - Part 2 Introduction to OOA and UML - Part 2
Introduction to OOA and UML - Part 2
Lakshmi-BA
 
Introduction to OOA and UML
Introduction to OOA and UMLIntroduction to OOA and UML
Introduction to OOA and UML
Lakshmi-BA
 
Zachman RCA
Zachman RCAZachman RCA
Zachman RCA
Lakshmi-BA
 
GAP Analysis
GAP AnalysisGAP Analysis
GAP Analysis
Lakshmi-BA
 
RUP and Introduction to Enterprise Analysis
RUP and Introduction to Enterprise AnalysisRUP and Introduction to Enterprise Analysis
RUP and Introduction to Enterprise Analysis
Lakshmi-BA
 
SDLC - Part 2
SDLC - Part 2SDLC - Part 2
SDLC - Part 2
Lakshmi-BA
 
SDLC - Part 1
SDLC - Part 1SDLC - Part 1
SDLC - Part 1
Lakshmi-BA
 
Introduction to Business Analysis - Part 2
Introduction to Business Analysis - Part 2Introduction to Business Analysis - Part 2
Introduction to Business Analysis - Part 2
Lakshmi-BA
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
Lakshmi-BA
 

More from Lakshmi-BA (15)

Unified Modeling Language - UML - Complete Guide - Part 1
Unified Modeling Language - UML - Complete Guide - Part 1Unified Modeling Language - UML - Complete Guide - Part 1
Unified Modeling Language - UML - Complete Guide - Part 1
 
Unified Modeling Language - UML - Complete Guide - Part 2
Unified Modeling Language - UML - Complete Guide - Part 2Unified Modeling Language - UML - Complete Guide - Part 2
Unified Modeling Language - UML - Complete Guide - Part 2
 
Workflow Diagram
Workflow DiagramWorkflow Diagram
Workflow Diagram
 
Role of BA in Testing
Role of BA in TestingRole of BA in Testing
Role of BA in Testing
 
Requirements Management
Requirements ManagementRequirements Management
Requirements Management
 
Requirement Elicitation Techniques
Requirement Elicitation Techniques   Requirement Elicitation Techniques
Requirement Elicitation Techniques
 
Introduction to OOA and UML - Part 2
Introduction to OOA and UML - Part 2 Introduction to OOA and UML - Part 2
Introduction to OOA and UML - Part 2
 
Introduction to OOA and UML
Introduction to OOA and UMLIntroduction to OOA and UML
Introduction to OOA and UML
 
Zachman RCA
Zachman RCAZachman RCA
Zachman RCA
 
GAP Analysis
GAP AnalysisGAP Analysis
GAP Analysis
 
RUP and Introduction to Enterprise Analysis
RUP and Introduction to Enterprise AnalysisRUP and Introduction to Enterprise Analysis
RUP and Introduction to Enterprise Analysis
 
SDLC - Part 2
SDLC - Part 2SDLC - Part 2
SDLC - Part 2
 
SDLC - Part 1
SDLC - Part 1SDLC - Part 1
SDLC - Part 1
 
Introduction to Business Analysis - Part 2
Introduction to Business Analysis - Part 2Introduction to Business Analysis - Part 2
Introduction to Business Analysis - Part 2
 
Introduction to Business Analysis
Introduction to Business AnalysisIntroduction to Business Analysis
Introduction to Business Analysis
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

Enterprise Analysis and SWOT Analysis