CGEIT® Certified in Governance of Enterprise IT

by ALC Training Claim Listing

The ISACA® Certified in Governance of Enterprise IT (CGEIT)® certification is the world-leading vendor-neutral certification designed for IT professionals in large organisations who are responsible for directing, managing and supporting the governance of enterprise IT.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

ALC Training Logo

img Duration

3 Days

Course Details

The ISACA® Certified in Governance of Enterprise IT (CGEIT)® certification is the world-leading vendor-neutral certification designed for IT professionals in large organisations who are responsible for directing, managing and supporting the governance of enterprise IT.

CGEIT® recognises a wide range of professionals for their knowledge and application of principles and practices of governance of enterprise IT. As a CGEIT certified professional, you demonstrate that you are capable of bringing governance of enterprise IT into an organisation that you grasp the complex subject holistically, and therefore, enhance value to the enterprise.

IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. The governance of enterprise IT provides significant support to the board of directors and executive management.

The CGEIT® program supports increasing business demands and recognises the wide range of professionals whose knowledge and application of governance of enterprise IT principles are key to managing the forces of transition.

 

Learning Outcomes

Benefits to the Organisation

Organisations employ a CGEIT to ensure they get good governance, an environment of no or few “surprises”, and the ability to have an agile response to any that arise. Increasingly, CGEIT is viewed by companies and governmental agencies around the world as a necessary prerequisite for anyone involved with governance of enterprise IT.

The CGEIT course, held over 3 days, covers four domains of practice identified as being key to ensuring that IT and business systems operate with greater efficiencies and optimum effectiveness thereby creating greater trust in and value from the investment in IT:

  • Domain 1—Governance of Enterprise IT (40%)

  • Domain 2—IT Resources (15%)

  • Domain 3—Benefits Realisation (26%)

  • Domain 4—Risk Optimisation (19%)

Benefits to the Individual

For the Professional, CGEIT provides:

  • A global and prestigious lifelong symbol of knowledge and expertise

  • Enhanced credibility, influence and recognition and the competitive advantage and higher earnings that flow from this

  • The benefits of becoming part of an elite peer network.

  • The ability to leverage the tools and resources of a global community of industry experts.

 

Who Should Attend

CGEIT is intended for professionals with management, advisory or assurance roles relating to:

  • IS/IT Directors

  • IS/IT Managers

  • IS/IT Consultants

  • IT Governance Professionals

  • IS/IT Executives

CGEITs hold many prominent positions in industry and government including:

  • Manager

  • Director

  • Consultant

  • C-level executive.

Following are examples of common roles and responsibilities held by CGEITs:

  • Oversee the development and maintenance of the IT strategic plan

  • Manage IT-enabled investment portfolios through their useful asset life cycle

  • Advise on industry accepted practices and frameworks to improve IT governance

  • Develop IT and information systems strategic plans and control frameworks

  • Integrate information security into enterprise IT governance

  • Manage the enterprise architecture, including infrastructure and applications

  • Oversee the development and maintenance of the risk strategy, plan and program

 

Course Contents

Introduction

  • Introductions, course agenda and approach

  • Overview of Domains and Tasks

Domain 1: Governance of Enterprise IT (40%)

  • Governance Framework

    • Components of a Governance Framework

    • Organisational Structures, Roles, and Responsibilities

    • Strategy Development

    • Legal and Regulatory Compliance

    • Organisational Culture

    • Business Ethics

  • Technology Governance

    • Governance Strategy Alignment with Enterprise Objectives

    • Strategic Planning Process

    • Stakeholder Analysis and Engagement

    • Communication and Awareness Strategy

    • Enterprise Architecture

    • Policies and Standards

  • Information Governance

    • Information Architecture

    • Information Asset Lifecycle

    • Information Ownership and Stewardship

    • Information Classification and Handling

Domain 2: IT Resources (15%)

  • IT Resource Planning

    • Sourcing Strategies

    • Resource Capacity Planning

    • Acquisition of Resources

  • IT Resource Optimisation

    • IT Resource Lifecycle and Asset Management

    • Human Resource Competency Assessment and Development

    • Management of Contracted Services and Relationships

Domain 3: Benefits Realization (26%)

  • IT Performance and Oversight

    • Performance Management

    • Change Management

    • Governance Monitoring

    • Governance Reporting

    • Quality Assurance

    • Process Development and Improvement

  • Management of IT-Enabled Investments

    • Business Case Development and Evaluation

    • IT Investment Management and Reporting

    • Performance Metrics

    • Benefit Evaluation Methods

Domain 4: Risk Optimisation (19%)

  • Risk Strategy

    • Risk Frameworks and Standards

    • Enterprise Risk Management

    • Risk Appetite and Risk Toleranc

  • Risk Management

    • IT-Enabled Capabilities, Processes, and Services

    • Business Risk, Exposures, and Threats

    • Risk Management Lifecycle

    • Risk Assessment Methods

  • Brisbane Branch

    Level 1, 9 McInroy Street Taringa, Brisbane
  • Melbourne Branch

    Level 18, 101 Collins Street, Melbourne
  • Perth Branch

    Level 28, AMP Tower, 140 St Georges Terrace, Perth
  • Sydney Branch

    Level 14, Lumley House 309 Kent Street, Sydney
  • Canberra Branch

    Suite 7.01, Level 7 10 Hobart Place, Canberra

Check out more CGEIT courses in Australia

Coding Kids Logo

Cybersecurity

Security, Linux and Hacking Games is a cyber security course for 14-16 year olds who are interested in learning about security and Linux fundamentals through "hacking" games. This can be attended by beginners new to Linux. No prior experience required.

by Coding Kids [Claim Listing ]
DDLS Sydney Logo

CompTIA Security+

CompTIA Security+ is a global certification that validates the baseline skills necessary to improve baseline security readiness and incident response by applying current best practices for preventing and addressing today’s threats.

by DDLS Sydney [Claim Listing ]
Lumify Group Logo

CompTIA Security+

CompTIA Security+ is a global certification that validates the baseline skills necessary to improve baseline security readiness and incident response by applying current best practices for preventing and addressing today’s threats.

by Lumify Group [Claim Listing ]
ITSM Hub Logo

NIST Cyber Security Professional Certification

The Framework also helps them respond to and recover from cyber security incidents, prompting them to analyse root causes and consider how they can make improvements

by ITSM Hub [Claim Listing ]
Torrens University Australia Logo

Cybersecurity

This Micro-credential introduces?the principles of cybersecurity and explores the?scale of the cybersecurity challenge globally, including the social factors informing?individual, organisational and international attitudes.

by Torrens University Australia [Claim Listing ]
  • Price
  • Start Date
  • Duration

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy