CGEIT
Certified in the Governance of Enterprise IT


CGEIT Course Introduction

This 3-days intensive course is designed for a professional preparing for the ISACA's CGEIT exam to gain more confidence. This course will wrap-up only key concept and vital knowledge of each domain. It is recommended that attendee should have hands-on experiences or familiar with IT governance job before attend this course. Valuable technique for the exam will be shared by the exam passer.


CGEIT Course Objectives

  • To prepare for the ISACA's CGEIT examination
  • To summarize vital knowledge based on the latest exam domain
  • To learn some techniques from the experienced exam passer


Target Group

  • Enterprise Architect
  • IT Manager
  • Business Analyst
  • Chief Information Officer
  • Chief Information Security Officer
  • IT Governance Officer


Course Outline of CGEIT

Day 1

  • Components of a Framework for the Governance of Enterprise IT
  • IT Governance Industry Practices, Standards and Frameworks
  • Business Drivers Related to IT Governance
  • IT Governance Enablers
  • Techniques Used to Identify IT Strategy
  • Components, Principles and Concepts Related to Enterprise Architecture
  • Organizational Structures and Their Roles and Responsibilities
  • Methods to Manage Organizational, Process and Cultural Change
  • Model and Methods to Establish Accountability for Information Requirements, Data and System Ownership, and IT Processes
  • IT Governance Monitoring Processes/Mechanisms
  • IT Governance Reporting Processes/Mechanisms
  • Communication and Promotion Techniques
  • Assurance Methodologies and Techniques
  • Continuous Improvement Techniques and Processes

Day 2

  • An Enterprise's Strategic Plan and How It Relates to Information Technology
  • Strategic Planning Processes and Techniques
  • Impact of Changes in Business Strategy on IT Strategy
  • Barriers to the Achievement of Strategy Alignment
  • Policies and Procedures Necessary to Support IT and Business Strategic Alignment
  • Methods to Document and Communicate IT Strategic Planning Processes
  • Components, Principles and Frameworks of Enterprise Architecture
  • Current and Future Technologies
  • Prioritization Processes Related to IT Initiatives
  • Scope, Objectives and Benefits of IT Investment Programs
  • IT Roles and Responsibilities and Methods to Cascade Business and IT Objectives to IT Personnel
  • IT Investment Management Processes, Including the Economic Life Cycle of Investments
  • Basic Principles of Portfolio Management
  • Benefit Calculation Techniques
  • Process and Service Measurement Techniques
  • Processes and Practices for Planning, Development, Transition, Delivery, and Support of Solutions and Services
  • Continuous Improvement Concepts and Principles
  • Outcome and Performance Measurement Techniques
  • Procedures to Manage and Report the Status of IT Investments
  • Cost Optimization Strategies
  • Models and Methods to Establish Accountability Over IT Investments
  • Value Delivery Frameworks
  • Business Case Development and Evaluation Techniques

Day 3

  • The Application of Risk Management at the Strategic, Portfolio, Program, Project and Operations Levels
  • Risk Management Frameworks and Standards
  • The Relationship of the Risk Management Approach to Legal and Regulatory Compliance
  • Methods to Align IT and Enterprise Risk Management
  • The Relationship of the Risk Management Approach to Business Resiliency
  • Risk, Threats, Vulnerabilities and Opportunities Inherent in the Use of IT
  • Types of Business Risk, Exposures and Threats That Can Be Addressed Using IT Resources
  • Risk Appetite and Risk Tolerance
  • Quantitative and Qualitative Risk Assessment Methods
  • Risk Mitigation Strategies Related to IT in the Enterprise
  • Methods to Monitor Effectiveness of Mitigation Strategies and/or Controls
  • Stakeholder Analysis and Communication Techniques
  • Methods to Establish Key Risk Indicators
  • Methods to Manage and Report the Status of Identified Risk
  • IT Resource Planning Methods
  • Human Resource Procurement, Assessment, Training and Development Methodologies
  • Processes for Acquiring Application, Information and Infrastructure Resources
  • Outsourcing and Offshoring Approaches That May Be Employed to Meet the Investment Program and Operational Level Agreements and Service Level Agreements
  • Methods Used to Record and Monitor IT Resource Utilization and Availability
  • Methods Used to Evaluate and Report on IT Resource Performance
  • Interoperability, Standardization and Economies of Scale
  • Data Management and Data Governance Concepts
  • Service Level Management Concepts

17-19 June 2019

Course Level

Advance

Duration

3 Days

Tuition Fee

21,000.00 THB

Speaker

A.Tirayut Sripeamlap
CGEIT, COBIT 5 Foundation, ISMS (ISO 27001) Lead Auditor Training