The Certified in the Governance of Enterprise IT certification(CGEIT) from ISACA is framework agnostic and aimed at individuals.CGEIT is growing rapidly in popularity in South Africa and the world.
The Certified in the Governance of Enterprise IT certification(CGEIT) from ISACA is framework agnostic and aimed at individuals.CGEIT is growing rapidly in popularity in South Africa and the world.
The qualification focuses on the governance of IT, optimisation of risk, and benefits realisation. The new versions place greater emphasis on information governance and big data as well as privacy and data management. There is also a greater weight placed on managing emerging technologies.
Certified in the Governance of Enterprise IT (CGEIT) Course Outline
Domain 1: Governance of Enterprise IT (40%)
Governance Framework
Components of a Governance Framework
Organizational Structures, Roles, and Responsibilities
Strategy Development
Legal and Regulatory Compliance
Organizational Culture
Business Ethics
Technology Governance
Governance Strategy Alignment with Enterprise Objectives
Strategic Planning Process
Stakeholder Analysis and Engagement
Communication and Awareness Strategy
Enterprise Architecture
Policies and Standards
Information Governance
Information Architecture
Information Asset Lifecycle
Information Ownership and Stewardship
Information Classification and Handling
Domain 2: IT Resources (15%)
IT Resource Planning
Sourcing Strategies
Resource Capacity Planning
Acquisition of Resources
IT Resource Optimization
IT Resource Lifecycle and Asset Management
Human Resource Competency Assessment and Development
Management of Contracted Services and Relationships
Domain 3: Benefits Realization (26%)
IT Performance and Oversight
Performance Management
Change Management
Governance Monitoring
Governance Reporting
Quality Assurance
Process Development and Improvement
Management of IT-Enabled Investments
Business Case Development and Evaluation
IT Investment Management and Reporting
Performance Metrics
Benefit Evaluation Methods
Domain 4: Risk Optimization (19%)
Risk Strategy
Risk Frameworks and Standards
Enterprise Risk Management
Risk Appetite and Risk Tolerance
Risk Management
IT-Enabled Capabilities, Processes, and Services
Business Risk, Exposures, and Threats
Risk Management Lifecycle
Risk Assessment Method
Jumping Bean, a specialist training institution located in South Africa, delivers classroom-based and online instructor-led training internationally but with a primary focus on Africa.
Jumping Bean's instructors have decades of hands-on practical experience and our classes instil a passion for learning and leveraging technology for creative purposes with a focus on practical and theoretical knowledge.
Their customers include many of the top corporates on the Johannesburg Stock Exchange.
The purpose of this unit is to empower students with the advance knowledge and skills regarding the body of knowledge of Information Security and Cyber Safety in regards to the management of information within organizations.
The purpose of the Advanced Certificate in Information Security is to provide the learner with the necessary expertise and knowledge to take on appropriate professional positions in the Information Technology industry and in particular, in the field of Information Security.
Our cyber security training courses provide specialized skills for preventing and defending against cyber threats and for securing systems, networks and data. Whether you’re a beginner looking for basic cyber security awareness or a manager requiring more advanced knowledge, incorporating techniq...
Cyber Security Training & Certification is the internationally recognized standard for Information Technology. It prescribes controls for those activities that affect Information Technology.
ISACA's Certified Information Security Manager training is for those with technical expertise and experience in IS/IT security and control who want to make the move from team player to manager. CISM can add credibility and confidence to your interactions with internal and external stakeholders, pee...
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy