Training Certified in The Governance of Enterprise IT (CGEIT®)

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Training IT

January 24, 2018

Training Certified in the Governance of Enterprise IT (CGEIT®)

Bagikan:

Introduce

As technology has become more and more vital to the achievement of business
goals and value delivery, enterprise leaders have realized that enterprise
governance must be extended to information technology and information  systems.
Successful  enterprises  now  accept  that  it  is  critical  to  align  IT projects,  assets
and processes with their business strategies and business goals. As a key
component of overall enterprise governance, IT governance has emerged as a
mission-critical issue for small and large business enterprises worldwide. In order
to support the growing demand from business and to promote good IT governance
practices, ISACA® created the first and only designation to recognize skilled IT
governance professionals—the Certified in the Governance of Enterprise IT®
(CGEIT®) certification.

Who Should Choose CGEIT

The CGEIT certification was specifically developed for IT and business professionals
who have significant management, advisory, or assurance roles relating to the
governance of enterprise IT, including:

 IS/IT Directors
 IS/IT Managers
 IS/IT Consultants
 IT Governance Professionals
 IS/IT Executives

Objective

Good IT governance is a key element of a well-performing enterprise. Enterprises


need qualified information systems professionals with knowledge and expertise
that can help them identify critical issues and customize company-specific practices
to support the governance of information and related technologies. The uniquely
governance-focused CGEIT certification ensures holders are capable of bringing IT
governance into an organization, can grasp the complex subject holistically, and
enhance the value that the enterprise obtains from its IT. Since its inception in
2007, thousands of professionals around the world have earned the industry-
leading* CGEIT designation as a means to affirm that they have the broad
knowledge and wide-ranging experience necessary to support and advance the IT
governance of an enterprise and ensure its IT and business systems align with
optimum effectiveness and efficiency.

 Developed with the input of subject matter experts from around the world,
the CGEIT designation is designed for professionals who have significant
management, advisory or assurance roles relating to the governance of IT.
 CGEIT enhances your credibility, influence and recognition and demonstrates
that you have proven experience and knowledge in the governance of
enterprise IT.
 CGEIT helps enterprises identify and hire professionals who have IT
governance knowledge and experience and is considered by many
companies and governmental agencies as a prerequisite for employees
involved with enterprise IT governance.
 CGEIT provides holders with greater recognition in the marketplace and
influence at the executive level—and many holders consider it very valuable
to their career progression and ability to deliver value to their enterprises.
 CGEIT combines the achievement of passing a comprehensive exam with
recognition of a minimum of five years proven work experience managing,
advising on and supporting the governance of enterprise IT—including one
year’s experience relating to the establishment and management of an IT
governance framework.
 CGEIT holders know more than limited areas of IT governance—they are able
to grasp the complex subject as a whole and enhance the value businesses
get from their IT. addition to having passed an exam.

*Material is presented in English, while lecturing is in Bahasa Indonesia.

Instructor

Only qualified facilitators & professionals with CGEIT® Certification will facilitate the
learning process

Partnership
This  program is  under the cooperation  between  Proxsis  –  ITGID Leadrning
Center and  ISACA Indonesia Chapter. Visit ISACA Indonesia
Chapter: www.isaca.or.id

Course Material

The curriculum of CGEIT® Review Program is inline with the CGEIT® examination
guidelines. They are:

 Framework for the governance of enterprise IT


 Strategic management
 Benefits realization
 Risk optimization
 Resource optimization

Detail Course Material

Day 1

1. Framework for the Governance of Enterprise IT

1.1. Components of a Framework for the Governance Of Enterprise IT (GEIT)

1.2. IT Governance Industry Practices, Standards and Frameworks

1.3. Business Drivers Related to IT Governance

1.4. IT Governance Enablers

1.5. Techniques Used to Identify IT Strategy

1.6. Components, Principles, and Concepts Related to Enterprise Architecture (EA)

1.7. Organizational Structures and Their Roles and Responsibilities

1.8. Methods to manage Organizational, Process and Cultural

1.9. Models and Methods to Establish Accountability for Information Requirements


Data and System Ownership, and Processes

1.10. IT Governance Monitoring Processes/Mechanisms


1.11. IT Governance Reporting Processes/Mechanisms

1.12. Communication and Promotion Techniques

1.13. Assurance Methodologies and Techniques

1.14. Continuous Improvement Techniques and Processes

Day 2

1. Strategic Management

2.1. An Enterprises Strategic Plan and How It Relates to Information Technology (IT)

2.2. Strategic Planning Processes and Techniques

2.3. Impact of Changes in Business Strategy on IT Strategy

2.4. Barriers to the Achievement of Strategic Alignment

2.5. Policies and Procedures Necessary to support IT and Business Strategic


Alignment

2.6. Methods to Document and Communicate IT Strategic Planning Processes

2.7. Components, Principles and Frameworks of Enterprise Architecture

2.8. Current and Future Technologies

2.9. Prioritization Processes Related to IT Initiatives

2.10. Scope, Objective and Benefits of IT Investment Programs

2.11. IT Roles and Responsibilities and Methods to Cascade Business and IT


Objectives to IT Personnel

1. Benefits Realization

3.1. IT Investment Management Processes, Including the Economic Life Cycle Of


Investments

3.2. Basic Principles of Portfolio Management


3.3. Benefit Calculation Techniques

3.4. Process and Service Measurement Techniques

3.5. Processes and Practices for Planning, Development, Transition, Delivery, and
Support of Solutions and

Services

3.6. Continuous Improvement Concept and Principles

3.7. Outcome and Performance Measurement Techniques

3.8. Procedures to Manage and Report the Status of Investments

3.9. Cost Optimization Strategies

3.10. Models and Methods to Establish Accountability Over IT Investments

3.11. Value Delivery Frameworks

3.12. Business Case Development and Evaluation Techniques

Day 3

1. Risk Optimization

4.1. The Application of Risk Management at the Strategic, Portfolio, Program,


Project and Operations Levels

4.2. Risk Management Frameworks and Standards

4.3. The Relationship of the Risk Management Approach to Legal and Regulatory
Compliance

4.4. Methods to Align IT and Enterprise Risk Management

4.5. The Relationship of the Risk Management Approach to Business Resiliency

4.6. Risk, Threats, Vulnerabilities and Opportunities Inherent in the Use of IT


4.7. Types of Business Risk, Exposures and Threats That Can Be Addressed Using IT
Resources

4.8. Risk Appetite and Risk Tolerance

4.9. Quantitative and Qualitative Risk Assessment Methods

4.10. Risk Mitigation Strategies Related to IT in the Enterprise

4.11. Methods to Monitor Effectiveness of Mitigation Strategies and/or Controls

4.12. Stakeholder Analysis and Communication Techniques

4.13. Methods to Establish Key Risk Indicators

4.14. Methods to Manage and Report the Status of Identified Risk

Day 4

1. Resource Optimization

5.1. IT Resource Planning Methods

5.2. Human Resource Procurement, Assessment, Training and Development


Methodologies

5.3. Processes for Acquiring Application, Information and Infrastructure Resources

5.4. Outsourcing and Offshoring Approaches That May Be Employed to Meet the
Investment Program and Operational Level Agreements and Service Level
Agreement

5.5. Methods Used to Record and Monitor IT Resource Utilization and Availability

5.6. Methods Used to Evaluate and Report on IT Resource Performance

5.7. Interoperability, Standardization and Economies of Scale

5.8. Data Management and Data Governance Concepts

5.9. Service Level Management Concepts

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy