PLB Consultant, in partnership with BPM CyT, a specialist company in BPM issues, has set up a certifying training on BPMN 2.0.
This is a unique certification in France and abroad, very appreciated by most companies and organizations.
The business process modeling standard BPMN 2.0 (Business Process Model & Notation) has become essential for organizations - companies and administrations - particularly in the context of their digital transformation.
These organizations therefore require tools to improve the understanding and description of their business processes, and their optimization.
As part of their BPM (Business Process Management) projects, companies use modelers - internally -, or external service providers. Which tool is today available for customers to check the know-how of these modelers and the quality of the models provided? A question often unanswered.
The OMG (Object Management Group), the institution responsible for the BPM discipline has set up a certification on BPM, but unfortunately has not provided for certification on the BPMN 2 standard, which companies absolutely need today to assess their providers.
Concepts and definitions
BPMN 2.0 Objectives
The 2 main models of BPMN 2.0: orchestrations and collaborations
Control flow patterns
BPMN 2.0 building blocks
Modeling tool overview
Modeling of a process responding to a usual business problem
Modeling - level 2
Types of tasks (user, manual, script, service, send, receive)
Business rules and business rule tasks
DMN (Decision Model & Notation) 1.1 overview
Concept of sub-process
Types of events: start, end, intermediate
Modeling of a first batch of processes taking into account these modeling elements
Modeling - level 2 (follow-up)
Modeling - level 3
Intermediate events: in the main process, or at a task or sub-process boundary
Intermediate events at the boundary: interruptive and non-interruptive
Modeling of a second batch of processes taking into account these modeling elements
Modeling - level 4
Specific cases of embedded sub-processes: transaction, event, ad-hoc
Reusable sub-processes: Calls activities
Repetitive tasks and sub-processes
Modeling - level 5
Intermediate events at the boundary: the difference between those at a task boundary and those at a sub-process boundary
Intermediate events at the boundary: the difference between those generated inside a sub-process, at the boundary, and outside the sub-process
Intermediate events at the boundary: the difference between those which are only interruptive, interruptive and non-interruptive, and those which are neither interruptive nor non-interruptive
Tokens: elements creating tokens, elements consuming tokens, elements which neither create nor consume tokens
Modeling of a third batch of processes taking into account these modeling elements
Types of messages exchanged
Modeling of a collaboration
Modeling methodology - level 1
Stakeholders identification (lanes)
Start events identification
End events identification
Tasks type and wording
Use of links
Checking the tokens flow
Use of artefacts
Application of these good practices to a business problem
Modeling methodology - level 2
The Process Owner, a manager for each process
The CoE (Center of Excellence, or BPM Department)
Breakdown of an overly complex process
Process / sub-process hierarchy
Approach to process description: orchestration or collaboration?
Revision of previously written processes to take into account these best practices
Preparation for the BPMN 2.0 Foundation certfication exam
Comparison of incomplete models, too extensive, difficult to read or even false, with models that exhaustively meet the BPMN standard and good modeling practices.
Correction of BPMN models
Preparation for the BPMN 2.0 Foundation certification exam
This training is intended to obtain a good understanding of business process modeling. At the end of each module, participants practice on a modeling tool in order to translate common business issues into process models.
These are common issues (production, delivery, replenishment, digital transformation, etc.) and new issues (cybersecurity, artificial intelligence).