WINDCHILL BUSINESS ADMINISTRATION
MODULE OVERVIEW
This module is a set of courses intended to provide operational capabilities in managing WIndchill Business Objects.
COURSE 101 PARTICIPANTS MANAGEMNT
Prerequisites | 003 |
Duration | 4 hours |
Course Type | Class with Hands-On Practice |
Program | • Discuss the configuration elements key to meeting business requirements
• Explain the participant concept • Create an organization and user participants • Analyze the Windchill user interface for all participants |
COURSE 102 CONTEXTS AND OBJECTS MANAGEMENT
Prerequisites | 101 |
Duration | 4 hours |
Course Type | Class with Hands-On Practice |
Program | • Identify contexts and their relationships
• Classify business objects into contexts • Plan a strategy for contexts within an organization • Assign context creators • Create and manage object types and subtypes • Manage how users interact with business objects |
COURSE 103 OBJECTS MANAGEMENT
Prerequisites | 102 |
Duration | 4 hours |
Course Type | Class with Hands-On Practice |
Program | • Create and edit subtypes
• Configure attribute layouts for users • Identify and edit object initialization rules • Constrain attributes to drive the value of another attribute • Create templates to provide context and layout structure for users • Generate license and usage reports • Implement custom versioning scheme sequences |
COURSE 104 PROCESS MANAGEMENT
Prerequisites | 103 |
Duration | 4 hours |
Course Type | Class with Hands-On Practice |
Program | • Interpret process identification
• Explain process management objects • Describe the life cycle concept • Configure and use a life cycle • Summarize the workflow design approaches • Identify workflow components • Configure and use a workflow • Describe a Promotion Request versus change management objects • Configure and use a Promotion Request |
COURSE 105 ACCESS CONTROL
Prerequisites | 104 |
Duration | 2 hours |
Course Type | Class with Hands-On Practice |
Program | • Explain the Windchill access control capabilities
• Calculate access control priorities • Use domain policies on a context and a folder • Grant and validate ad hoc access |