The ISACA® Certified in Governance of Enterprise IT (CGEIT)® certification is the world-leading vendor-neutral certification designed for IT professionals in large organisations who are responsible for directing, managing and supporting the governance of enterprise IT.
The ISACA® Certified in Governance of Enterprise IT (CGEIT)® certification is the world-leading vendor-neutral certification designed for IT professionals in large organisations who are responsible for directing, managing and supporting the governance of enterprise IT.
CGEIT® recognises a wide range of professionals for their knowledge and application of principles and practices of governance of enterprise IT. As a CGEIT certified professional, you demonstrate that you are capable of bringing governance of enterprise IT into an organisation that you grasp the complex subject holistically, and therefore, enhance value to the enterprise.
IT systems are continually evolving to ensure competitiveness, enable reach to global markets and handle external pressures such as regulation. The governance of enterprise IT provides significant support to the board of directors and executive management.
The CGEIT® program supports increasing business demands and recognises the wide range of professionals whose knowledge and application of governance of enterprise IT principles are key to managing the forces of transition.
Learning Outcomes
Benefits to the Organisation
Organisations employ a CGEIT to ensure they get good governance, an environment of no or few “surprises”, and the ability to have an agile response to any that arise. Increasingly, CGEIT is viewed by companies and governmental agencies around the world as a necessary prerequisite for anyone involved with governance of enterprise IT.
The CGEIT course, held over 3 days, covers four domains of practice identified as being key to ensuring that IT and business systems operate with greater efficiencies and optimum effectiveness thereby creating greater trust in and value from the investment in IT:
Domain 1—Governance of Enterprise IT (40%)
Domain 2—IT Resources (15%)
Domain 3—Benefits Realisation (26%)
Domain 4—Risk Optimisation (19%)
Benefits to the Individual
For the Professional, CGEIT provides:
A global and prestigious lifelong symbol of knowledge and expertise
Enhanced credibility, influence and recognition and the competitive advantage and higher earnings that flow from this
The benefits of becoming part of an elite peer network.
The ability to leverage the tools and resources of a global community of industry experts.
Who Should Attend
CGEIT is intended for professionals with management, advisory or assurance roles relating to:
IS/IT Directors
IS/IT Managers
IS/IT Consultants
IT Governance Professionals
IS/IT Executives
CGEITs hold many prominent positions in industry and government including:
Manager
Director
Consultant
C-level executive.
Following are examples of common roles and responsibilities held by CGEITs:
Oversee the development and maintenance of the IT strategic plan
Manage IT-enabled investment portfolios through their useful asset life cycle
Advise on industry accepted practices and frameworks to improve IT governance
Develop IT and information systems strategic plans and control frameworks
Integrate information security into enterprise IT governance
Manage the enterprise architecture, including infrastructure and applications
Oversee the development and maintenance of the risk strategy, plan and program
Course Contents
Introduction
Introductions, course agenda and approach
Overview of Domains and Tasks
Domain 1: Governance of Enterprise IT (40%)
Governance Framework
Components of a Governance Framework
Organisational Structures, Roles, and Responsibilities
Strategy Development
Legal and Regulatory Compliance
Organisational Culture
Business Ethics
Technology Governance
Governance Strategy Alignment with Enterprise Objectives
Strategic Planning Process
Stakeholder Analysis and Engagement
Communication and Awareness Strategy
Enterprise Architecture
Policies and Standards
Information Governance
Information Architecture
Information Asset Lifecycle
Information Ownership and Stewardship
Information Classification and Handling
Domain 2: IT Resources (15%)
IT Resource Planning
Sourcing Strategies
Resource Capacity Planning
Acquisition of Resources
IT Resource Optimisation
IT Resource Lifecycle and Asset Management
Human Resource Competency Assessment and Development
Management of Contracted Services and Relationships
Domain 3: Benefits Realization (26%)
IT Performance and Oversight
Performance Management
Change Management
Governance Monitoring
Governance Reporting
Quality Assurance
Process Development and Improvement
Management of IT-Enabled Investments
Business Case Development and Evaluation
IT Investment Management and Reporting
Performance Metrics
Benefit Evaluation Methods
Domain 4: Risk Optimisation (19%)
Risk Strategy
Risk Frameworks and Standards
Enterprise Risk Management
Risk Appetite and Risk Toleranc
Risk Management
IT-Enabled Capabilities, Processes, and Services
Business Risk, Exposures, and Threats
Risk Management Lifecycle
Risk Assessment Methods
Who We Are And What We Do
ALC is a leading Australia-based provider of quality training for business and government, since 1994. Our focus is on best-practice methods and frameworks that help ensure you get the most out of your investment.
With offices in Sydney, Melbourne, Brisbane, Singapore and Kuala Lumpur, our courses are held regularly throughout Australia, New Zealand and South-East Asia. More than 55,000 people have trained with ALC.
Company Announcement
We are pleased to advise that as of 17 March 2023, ALC Training has become a part of the Tesserent Group of companies as the first key step of the new Tesserent Academy initiative.
The mission statement of the Tesserent Academy is to be the pre-eminent provider of cyber security education in the Asia-Pacific region. ALC, with its very strong background of nearly 30 years in information and cyber security training will provide Tesserent Academy with an immediate and commanding position in this sector.
By joining Tesserent, ALC will have access to a much greater range of resources which will lead to many new opportunities and significantly increased growth potential.
The focus will be on portfolio expansion, the development of new skills-based programs, and the creation of new certifications relevant to our region.
Why Choose Alc?
There are many providers of training, just as there are many providers of most services. So how do you choose?
Well, for starters, training for us is not a sideline activity – it is all that we do. And we have been doing it since March 1994. In that time, we have seen many training companies come and go. To be a market leader all this time, we must be doing something right.
We are a team of dedicated and capable people who care about what we do. We give it single-minded focus. We offer commitment, professionalism, and enthusiasm.
When You Train With ALC You Get:
The Framework also helps them respond to and recover from cyber security incidents, prompting them to analyse root causes and consider how they can make improvements
If you are looking to develop a career in the IT industry, love new technology and are seeking employment in Cyber Security – this is the course for you.
CISM defines the core competencies and international standards of performance that information security managers are expected to master. It provides executive management with the assurance that those who have earned their CISM have the experience and knowledge to offer effective security management
You will learn a range of technical skills including how to implement network security infrastructure and detect breaches in network security, as well as stakeholder management. This course will provide you with a range of foundation knowledge and skills in website security, IT network testing, and
The nationally accredited Advanced Diploma of Network Security equips you to lock in a career as a network security specialist. Develop a comprehensive understanding of critical network security issues in the industrial and social environments of intranet, extranet and internet connectivity.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy