CGEIT® Certified in Governance of Enterprise IT

by ALC Training Claim Listing

The ISACA® Certified in Governance of Enterprise IT (CGEIT)® certification is the world-leading vendor-neutral certification designed for IT professionals in large organisations who are responsible for directing, managing and supporting the governance of enterprise IT.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

ALC Training Logo

img Duration

3 Days

Course Details

The ISACA® Certified in Governance of Enterprise IT (CGEIT)® certification is the world-leading vendor-neutral certification designed for IT professionals in large organisations who are responsible for directing, managing and supporting the governance of enterprise IT.

CGEIT® recognises a wide range of professionals for their knowledge and application of principles and practices of governance of enterprise IT. As a CGEIT certified professional, you demonstrate that you are capable of bringing governance of enterprise IT into an organisation that you grasp the complex subject holistically, and therefore, enhance value to the enterprise.

IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. The governance of enterprise IT provides significant support to the board of directors and executive management.

The CGEIT® program supports increasing business demands and recognises the wide range of professionals whose knowledge and application of governance of enterprise IT principles are key to managing the forces of transition.

 

Learning Outcomes

Benefits to the Organisation

Organisations employ a CGEIT to ensure they get good governance, an environment of no or few “surprises”, and the ability to have an agile response to any that arise. Increasingly, CGEIT is viewed by companies and governmental agencies around the world as a necessary prerequisite for anyone involved with governance of enterprise IT.

The CGEIT course, held over 3 days, covers four domains of practice identified as being key to ensuring that IT and business systems operate with greater efficiencies and optimum effectiveness thereby creating greater trust in and value from the investment in IT:

  • Domain 1—Governance of Enterprise IT (40%)

  • Domain 2—IT Resources (15%)

  • Domain 3—Benefits Realisation (26%)

  • Domain 4—Risk Optimisation (19%)

Benefits to the Individual

For the Professional, CGEIT provides:

  • A global and prestigious lifelong symbol of knowledge and expertise

  • Enhanced credibility, influence and recognition and the competitive advantage and higher earnings that flow from this

  • The benefits of becoming part of an elite peer network.

  • The ability to leverage the tools and resources of a global community of industry experts.

 

Who Should Attend

CGEIT is intended for professionals with management, advisory or assurance roles relating to:

  • IS/IT Directors

  • IS/IT Managers

  • IS/IT Consultants

  • IT Governance Professionals

  • IS/IT Executives

CGEITs hold many prominent positions in industry and government including:

  • Manager

  • Director

  • Consultant

  • C-level executive.

Following are examples of common roles and responsibilities held by CGEITs:

  • Oversee the development and maintenance of the IT strategic plan

  • Manage IT-enabled investment portfolios through their useful asset life cycle

  • Advise on industry accepted practices and frameworks to improve IT governance

  • Develop IT and information systems strategic plans and control frameworks

  • Integrate information security into enterprise IT governance

  • Manage the enterprise architecture, including infrastructure and applications

  • Oversee the development and maintenance of the risk strategy, plan and program

 

Course Contents

Introduction

  • Introductions, course agenda and approach

  • Overview of Domains and Tasks

Domain 1: Governance of Enterprise IT (40%)

  • Governance Framework

    • Components of a Governance Framework

    • Organisational Structures, Roles, and Responsibilities

    • Strategy Development

    • Legal and Regulatory Compliance

    • Organisational Culture

    • Business Ethics

  • Technology Governance

    • Governance Strategy Alignment with Enterprise Objectives

    • Strategic Planning Process

    • Stakeholder Analysis and Engagement

    • Communication and Awareness Strategy

    • Enterprise Architecture

    • Policies and Standards

  • Information Governance

    • Information Architecture

    • Information Asset Lifecycle

    • Information Ownership and Stewardship

    • Information Classification and Handling

Domain 2: IT Resources (15%)

  • IT Resource Planning

    • Sourcing Strategies

    • Resource Capacity Planning

    • Acquisition of Resources

  • IT Resource Optimisation

    • IT Resource Lifecycle and Asset Management

    • Human Resource Competency Assessment and Development

    • Management of Contracted Services and Relationships

Domain 3: Benefits Realization (26%)

  • IT Performance and Oversight

    • Performance Management

    • Change Management

    • Governance Monitoring

    • Governance Reporting

    • Quality Assurance

    • Process Development and Improvement

  • Management of IT-Enabled Investments

    • Business Case Development and Evaluation

    • IT Investment Management and Reporting

    • Performance Metrics

    • Benefit Evaluation Methods

Domain 4: Risk Optimisation (19%)

  • Risk Strategy

    • Risk Frameworks and Standards

    • Enterprise Risk Management

    • Risk Appetite and Risk Toleranc

  • Risk Management

    • IT-Enabled Capabilities, Processes, and Services

    • Business Risk, Exposures, and Threats

    • Risk Management Lifecycle

    • Risk Assessment Methods

  • Brisbane Branch

    Level 1, 9 McInroy Street Taringa, Brisbane
  • Melbourne Branch

    Level 18, 101 Collins Street, Melbourne
  • Perth Branch

    Level 28, AMP Tower, 140 St Georges Terrace, Perth
  • Sydney Branch

    Level 14, Lumley House 309 Kent Street, Sydney
  • Canberra Branch

    Suite 7.01, Level 7 10 Hobart Place, Canberra

Check out more CGEIT courses in Australia

South Metropolitan TAFE Logo

Certificate IV in Cyber Security

Delve into the world of cyber security and become a trusted professional in a fast-growing industry. In a world where cyber attacks are constantly on the rise, there has never been a better time to gain in-demand skills that can set you up for a lucrative career in cyber security.

by South Metropolitan TAFE [Claim Listing ]
ALC Training Logo

CCSP® Certified Cloud Security Professional

The cloud security certification is a 5-day course where you will gain a thorough understanding of the information security risks and mitigation strategies critical to data security in the cloud in this ISC2 Certified Cloud Security Professional (CCSP) Exam Preparation course.

by ALC Training [Claim Listing ]
Pwc Auditor Training Logo

Information Security Management Systems

With cyber attacks and data security breaches on the rise and in the headlines, keeping your organisation’s data secure has never been more important.  The ISO standard for Information Security, ISO/IEC 27001:2022 Information Security Management Systems, provides the framework to ensure your b...

by Pwc Auditor Training [Claim Listing ]
ILX Group Australia Logo

Introduction to Cyber Security training programmes

The phrase cyber security refers to the collection of processes, practices and technologies that have been designed to protect any connected systems, networks and data from unauthorised access.

by ILX Group Australia [Claim Listing ]
Thebarton Senior College Logo

Cybersecurity

Students gain valuable skills and knowledge that will help them to generate solutions to protect their own personal online profile from cyber security threats and to limit the potential impact of online security breaches.

by Thebarton Senior College [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy