Certified in the Governance of Enterprise IT (CGEIT)

Convenient

Self-Paced

Virtual

About Course

Certified in the Governance of Enterprise IT is a much sought after certification for those who would like to move their career upwards at the decision making level. Suitable for Senior Management, CEO, CRO, CTO, CFO level positions.

Description

Domain 1: Governance of Enterprise IT (40%)

  1. Governance Framework
    1. Components of a Governance Framework
    2. Organizational Structures, Roles, and Responsibilities
    3. Strategy Development
    4. Legal and Regulatory Compliance
    5. Organizational Culture
    6. Business Ethics
  2. Technology Governance
    1. Governance Strategy Alignment with Enterprise Objectives
    2. Strategic Planning Process
    3. Stakeholder Analysis and Engagement
    4. Communication and Awareness Strategy
    5. Enterprise Architecture
    6. Policies and Standards
  3. Information Governance
    1. Information Architecture
    2. Information Asset Lifecycle
    3. Information Ownership and Stewardship
    4. Information Classification and Handling

Domain 2: IT Resources (15%)

  1. IT Resource Planning
    1. Sourcing Strategies
    2. Resource Capacity Planning
    3. Acquisition of Resources
  2. IT Resource Optimization
    1. IT Resource Lifecycle and Asset Management
    2. Human Resource Competency Assessment and Development
    3. Management of Contracted Services and Relationships

Domain 3: Benefits Realization (26%)

  1. IT Performance and Oversight
    1. Performance Management
    2. Change Management
    3. Governance Monitoring
    4. Governance Reporting
    5. Quality Assurance
    6. Process Development and Improvement
  2. Management of IT-Enabled Investments
    1. Business Case Development and Evaluation
    2. IT Investment Management and Reporting
    3. Performance Metrics
    4. Benefit Evaluation Methods

Domain 4: Risk Optimization (19%)

  1. Risk Strategy
    1. Risk Frameworks and Standards
    2. Enterprise Risk Management
    3. Risk Appetite and Risk Tolerance
  2. Risk Management
    1. IT-Enabled Capabilities, Processes, and Services
    2. Business Risk, Exposures, and Threats
    3. Risk Management Lifecycle
    4. Risk Assessment Methods

 

Secondary Classification

Task Statements

  1. Establish the objectives for the framework for the governance of enterprise IT.
  2. Establish a framework for the governance of enterprise IT.
  3. Identify the internal and external requirements for the framework for the governance of enterprise IT.
  4. Incorporate a strategic planning process into the framework for the governance of enterprise IT.
  5. Ensure that a business case development and benefits realization process for IT-enabled investments has been established.
  6. Incorporate enterprise architecture into the framework for the governance of enterprise IT.
  7. Incorporate information architecture into the framework for the governance of enterprise IT.
  8. Align the framework for the governance of enterprise IT with enterprise-wide shared services.
  9. Incorporate comprehensive and repeatable processes and activities into the framework for the governance of enterprise IT.
  10. Establish roles, responsibilities, and accountabilities for information assets and IT processes.
  11. Evaluate the framework for the governance of enterprise IT and identify improvement opportunities.
  12. Establish a process for the identification and remediation of issues related to the framework for the governance of enterprise IT.
  13. Establish policies and standards that support IT and enterprise strategic alignment.
  14. Establish policies and standards that inform decision-making with regard to IT-enabled business investments.
  15. Establish communication and awareness processes to convey the value of the governance of enterprise IT.
  16. Evaluate, direct, and monitor IT strategic planning processes to ensure alignment with enterprise goals.
  17. Evaluate, direct, and monitor stakeholder engagement.
  18. Document and communicate the IT strategic planning processes and related outputs.
  19. Ensure that enterprise architecture is integrated into the IT strategic planning process.
  20. Ensure that information architecture is integrated into the IT strategic planning process.
  21. Incorporate a prioritization process for IT initiatives into the framework for the governance of enterprise IT.
  22. Ensure that processes are in place to manage the lifecycle of IT resources and capabilities.
  23. Ensure that processes are in place to govern the lifecycle of information assets.
  24. Incorporate sourcing strategies into the framework for the governance of enterprise IT to ensure optimization and control.
  25. Ensure the alignment of IT resource management processes with the enterprise’s resource management processes.
  26. Ensure the alignment of information governance with the framework for the governance of enterprise IT.
  27. Ensure that processes are in place for the assessment and development of personnel to align with business needs.
  28. Ensure that IT-enabled investments are managed through their economic lifecycle.
  29. Evaluate the process that assigns ownership and accountability for IT-enabled investments.
  30. Ensure that IT investment management practices align with enterprise investment management practices.
  31. Evaluate the benefits realization of IT-enabled investments, IT processes, and IT services.
  32. Establish a performance management program for IT-enabled investments, IT processes, and IT services.
  33. Ensure that improvement initiatives are based on the results derived from performance measures.
  34. Ensure that comprehensive IT and information risk management programs are established.
  35. Ensure that a process is in place to monitor and report on the adherence to IT and information risk management policies and standards.
  36. Ensure the alignment of IT processes with the enterprise’s legal and regulatory compliance objectives.
  37. Ensure the alignment of IT and information risk management with the enterprise risk management framework.
  38. Ensure that IT and information risk management policies and standards are developed and communicated.
CGEIT Training
Free
Free access this course

About the Instructor

Srinivasan Shamarao

ESESP Academy’s founder and Chief Trainer Shrinivasan Shamarao “Shrini” is a Qualified Chartered Accountant and is accredited as Chapter Trainer by APMG for CISA, CRISC and CGEIT. He has more than 23 years of industry experience in IT audit, Security, GRC and Finance and has experience of training more than 150 students in all ISACA certifications. He has been Guest Faculty for ISACA Chennai and Muscat Chapters and has 7 years of training experience.

Srinivasan Shamarao

ESESP Academy’s founder and Chief Trainer Shrinivasan Shamarao “Shrini” is a Qualified Chartered Accountant and is accredited as Chapter Trainer by APMG for CISA, CRISC and CGEIT. He has more than 23 years of industry experience in IT audit, Security, GRC and Finance and has experience of training more than 150 students in all ISACA certifications. He has been Guest Faculty for ISACA Chennai and Muscat Chapters and has 7 years of training experience.

p9

Share this Course