CGEIT® Certified in Governance of Enterprise IT

by ALC Training Claim Listing

The ISACA® Certified in Governance of Enterprise IT (CGEIT)® certification is the world-leading vendor-neutral certification designed for IT professionals in large organisations who are responsible for directing, managing and supporting the governance of enterprise IT.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

ALC Training Logo

img Duration

3 Days

Course Details

The ISACA® Certified in Governance of Enterprise IT (CGEIT)® certification is the world-leading vendor-neutral certification designed for IT professionals in large organisations who are responsible for directing, managing and supporting the governance of enterprise IT.

CGEIT® recognises a wide range of professionals for their knowledge and application of principles and practices of governance of enterprise IT. As a CGEIT certified professional, you demonstrate that you are capable of bringing governance of enterprise IT into an organisation that you grasp the complex subject holistically, and therefore, enhance value to the enterprise.

IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. The governance of enterprise IT provides significant support to the board of directors and executive management.

The CGEIT® program supports increasing business demands and recognises the wide range of professionals whose knowledge and application of governance of enterprise IT principles are key to managing the forces of transition.

 

Learning Outcomes

Benefits to the Organisation

Organisations employ a CGEIT to ensure they get good governance, an environment of no or few “surprises”, and the ability to have an agile response to any that arise. Increasingly, CGEIT is viewed by companies and governmental agencies around the world as a necessary prerequisite for anyone involved with governance of enterprise IT.

The CGEIT course, held over 3 days, covers four domains of practice identified as being key to ensuring that IT and business systems operate with greater efficiencies and optimum effectiveness thereby creating greater trust in and value from the investment in IT:

  • Domain 1—Governance of Enterprise IT (40%)

  • Domain 2—IT Resources (15%)

  • Domain 3—Benefits Realisation (26%)

  • Domain 4—Risk Optimisation (19%)

Benefits to the Individual

For the Professional, CGEIT provides:

  • A global and prestigious lifelong symbol of knowledge and expertise

  • Enhanced credibility, influence and recognition and the competitive advantage and higher earnings that flow from this

  • The benefits of becoming part of an elite peer network.

  • The ability to leverage the tools and resources of a global community of industry experts.

 

Who Should Attend

CGEIT is intended for professionals with management, advisory or assurance roles relating to:

  • IS/IT Directors

  • IS/IT Managers

  • IS/IT Consultants

  • IT Governance Professionals

  • IS/IT Executives

CGEITs hold many prominent positions in industry and government including:

  • Manager

  • Director

  • Consultant

  • C-level executive.

Following are examples of common roles and responsibilities held by CGEITs:

  • Oversee the development and maintenance of the IT strategic plan

  • Manage IT-enabled investment portfolios through their useful asset life cycle

  • Advise on industry accepted practices and frameworks to improve IT governance

  • Develop IT and information systems strategic plans and control frameworks

  • Integrate information security into enterprise IT governance

  • Manage the enterprise architecture, including infrastructure and applications

  • Oversee the development and maintenance of the risk strategy, plan and program

 

Course Contents

Introduction

  • Introductions, course agenda and approach

  • Overview of Domains and Tasks

Domain 1: Governance of Enterprise IT (40%)

  • Governance Framework

    • Components of a Governance Framework

    • Organisational Structures, Roles, and Responsibilities

    • Strategy Development

    • Legal and Regulatory Compliance

    • Organisational Culture

    • Business Ethics

  • Technology Governance

    • Governance Strategy Alignment with Enterprise Objectives

    • Strategic Planning Process

    • Stakeholder Analysis and Engagement

    • Communication and Awareness Strategy

    • Enterprise Architecture

    • Policies and Standards

  • Information Governance

    • Information Architecture

    • Information Asset Lifecycle

    • Information Ownership and Stewardship

    • Information Classification and Handling

Domain 2: IT Resources (15%)

  • IT Resource Planning

    • Sourcing Strategies

    • Resource Capacity Planning

    • Acquisition of Resources

  • IT Resource Optimisation

    • IT Resource Lifecycle and Asset Management

    • Human Resource Competency Assessment and Development

    • Management of Contracted Services and Relationships

Domain 3: Benefits Realization (26%)

  • IT Performance and Oversight

    • Performance Management

    • Change Management

    • Governance Monitoring

    • Governance Reporting

    • Quality Assurance

    • Process Development and Improvement

  • Management of IT-Enabled Investments

    • Business Case Development and Evaluation

    • IT Investment Management and Reporting

    • Performance Metrics

    • Benefit Evaluation Methods

Domain 4: Risk Optimisation (19%)

  • Risk Strategy

    • Risk Frameworks and Standards

    • Enterprise Risk Management

    • Risk Appetite and Risk Toleranc

  • Risk Management

    • IT-Enabled Capabilities, Processes, and Services

    • Business Risk, Exposures, and Threats

    • Risk Management Lifecycle

    • Risk Assessment Methods

  • Brisbane Branch

    Level 1, 9 McInroy Street Taringa, Brisbane
  • Melbourne Branch

    Level 18, 101 Collins Street, Melbourne
  • Perth Branch

    Level 28, AMP Tower, 140 St Georges Terrace, Perth
  • Sydney Branch

    Level 14, Lumley House 309 Kent Street, Sydney
  • Canberra Branch

    Suite 7.01, Level 7 10 Hobart Place, Canberra

Check out more CGEIT courses in Australia

CIT Solutions Logo

Information Security Manual (ISM) Fundamentals

The Information Security Manual (ISM) Fundamentals Course is designed for organisations who intend to have an Infosec Registered Assessors Program (IRAP) Assessment conducted in their workplace.

by CIT Solutions [Claim Listing ]
Tafe NSW Aviation Studies Logo

Advanced Diploma Of Network Security

The nationally accredited Advanced Diploma of Network Security equips you to lock in a career as a network security specialist. Develop a comprehensive understanding of critical network security issues in the industrial and social environments of intranet, extranet and internet connectivity.

by Tafe NSW Aviation Studies [Claim Listing ]
Canberra Institute of Technology Logo

Certificate IV in Cyber Security

The Certificate IV in Cyber Security is a technician level course. This qualification will provide you with knowledge and a range of technical skills to enable you to seek employment as a cyber security technician in a range of organisations and government bodies.

by Canberra Institute of Technology [Claim Listing ]
  • Price
  • Start Date
  • Duration
ILX Group Australia Logo

Introduction to Cyber Security training programmes

The phrase cyber security refers to the collection of processes, practices and technologies that have been designed to protect any connected systems, networks and data from unauthorised access.

by ILX Group Australia [Claim Listing ]
CertHub Logo

Certified Information Systems Security Professional (CISSP)

The CISSP certification is a way to verify your experience in the eight domains of the Cybersecurity Book of Knowledge. You need five years of paid job experience in two or more of the eight domains to be eligible for the certification.

by CertHub [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy