Certified in the Governance of Enterprise IT

CGEIT Course Introduction

This 3-days intensive course is designed for a professional preparing for the ISACA's CGEIT exam to gain more confidence. This course will wrap-up only key concept and vital knowledge of each domain. It is recommended that attendee should have hands-on experiences or familiar with IT governance job before attend this course. Valuable technique for the exam will be shared by the exam passer.

CGEIT Course Objectives

  • To prepare for the ISACA's CGEIT examination
  • To summarize vital knowledge based on the latest exam domain
  • To learn some techniques from the experienced exam passer

Target Group

  • Enterprise Architect
  • IT Manager
  • Business Analyst
  • Chief Information Officer
  • Chief Information Security Officer
  • IT Governance Officer

Course Outline of CGEIT

Day 1
    – Components of a Framework for the Governance of Enterprise IT
    – IT Governance Industry Practices, Standards and Frameworks
    – Business Drivers Related to IT Governance
    – IT Governance Enablers
    – Techniques Used to Identify IT Strategy
    – Components, Principles and Concepts Related to Enterprise Architecture
    – Organizational Structures and Their Roles and Responsibilities
    – Methods to Manage Organizational, Process and Cultural Change
    – Model and Methods to Establish Accountability for Information Requirements, Data and System Ownership, and IT Processes
    – IT Governance Monitoring Processes/Mechanisms
    – IT Governance Reporting Processes/Mechanisms
    – Communication and Promotion Techniques
    – Assurance Methodologies and Techniques
    – Continuous Improvement Techniques and Processes

Day 2
    – An Enterprise's Strategic Plan and How It Relates to Information Technology
    – Strategic Planning Processes and Techniques
    – Impact of Changes in Business Strategy on IT Strategy
    – Barriers to the Achievement of Strategy Alignment
    – Policies and Procedures Necessary to Support IT and Business Strategic Alignment
    – Methods to Document and Communicate IT Strategic Planning Processes
    – Components, Principles and Frameworks of Enterprise Architecture
    – Current and Future Technologies
    – Prioritization Processes Related to IT Initiatives
    – Scope, Objectives and Benefits of IT Investment Programs
    – IT Roles and Responsibilities and Methods to Cascade Business and IT Objectives to IT Personnel
    – IT Investment Management Processes, Including the Economic Life Cycle of Investments
    – Basic Principles of Portfolio Management
    – Benefit Calculation Techniques
    – Process and Service Measurement Techniques
    – Processes and Practices for Planning, Development, Transition, Delivery, and Support of Solutions and Services
    – Continuous Improvement Concepts and Principles
    – Outcome and Performance Measurement Techniques
    – Procedures to Manage and Report the Status of IT Investments
    – Cost Optimization Strategies
    – Models and Methods to Establish Accountability Over IT Investments
    – Value Delivery Frameworks
    – Business Case Development and Evaluation Techniques

Day 3
    – The Application of Risk Management at the Strategic, Portfolio, Program, Project and Operations Levels
    – Risk Management Frameworks and Standards
    – The Relationship of the Risk Management Approach to Legal and Regulatory Compliance
    – Methods to Align IT and Enterprise Risk Management
    – The Relationship of the Risk Management Approach to Business Resiliency
    – Risk, Threats, Vulnerabilities and Opportunities Inherent in the Use of IT
    – Types of Business Risk, Exposures and Threats That Can Be Addressed Using IT Resources
    – Risk Appetite and Risk Tolerance
    – Quantitative and Qualitative Risk Assessment Methods
    – Risk Mitigation Strategies Related to IT in the Enterprise
    – Methods to Monitor Effectiveness of Mitigation Strategies and/or Controls
    – Stakeholder Analysis and Communication Techniques
    – Methods to Establish Key Risk Indicators
    – Methods to Manage and Report the Status of Identified Risk
    – IT Resource Planning Methods
    – Human Resource Procurement, Assessment, Training and Development Methodologies
    – Processes for Acquiring Application, Information and Infrastructure Resources
    – Outsourcing and Offshoring Approaches That May Be Employed to Meet the Investment Program and Operational Level Agreements and Service Level Agreements
    – Methods Used to Record and Monitor IT Resource Utilization and Availability
    – Methods Used to Evaluate and Report on IT Resource Performance
    – Interoperability, Standardization and Economies of Scale
    – Data Management and Data Governance Concepts
    – Service Level Management Concepts

19-21 August 2024

Course Level



3 Days

Tuition Fee

23,500.00 THB


A.Somchai Patviboon
CIA, CISA, CISSP, CSSLP, PMP, Security+, Network+, CEH, CFE

Our website uses both essential and non-essential cookies to analyze use of our products and services. This agreement applies to non-essential cookies only. By accepting, you are agreeing to third parties receiving information about your usage and activities. If you choose to decline this agreement, we will continue to use essential cookies for the operation of the website. View Policy