Introduce
As technology has become more and more vital to the achievement of business goals and value delivery, enterprise leaders have realized that enterprise governance must be extended to information technology and information systems. Successful enterprises now accept that it is critical to align IT projects, assets and processes with their business strategies and business goals. As a key component of overall enterprise governance, IT governance has emerged as a mission-critical issue for small and large business enterprises worldwide. In order to support the growing demand from business and to promote good IT governance practices, ISACA® created the first and only designation to recognize skilled IT governance professionals—the Certified in the Governance of Enterprise IT® (CGEIT®) certification.
Who Should Choose Certified in the Governance of Enterprise (CGEIT)
The CGEIT certification was specifically developed for IT and business professionals who have significant management, advisory, or assurance roles relating to the governance of enterprise IT, including:
- IS/IT Directors
- IS/IT Managers
- IS/IT Consultants
- IT Governance Professionals
- IS/IT Executives
Objective
Good IT governance is a key element of a well-performing enterprise. Enterprises need qualified information systems professionals with knowledge and expertise that can help them identify critical issues and customize company-specific practices to support the governance of information and related technologies. The uniquely governance-focused CGEIT certification ensures holders are capable of bringing IT governance into an organization, can grasp the complex subject holistically, and enhance the value that the enterprise obtains from its IT. Since its inception in 2007, thousands of professionals around the world have earned the industry-leading* CGEIT designation as a means to affirm that they have the broad knowledge and wide-ranging experience necessary to support and advance the IT governance of an enterprise and ensure its IT and business systems align with optimum effectiveness and efficiency.
- Developed with the input of subject matter experts from around the world, the Certified in the Governance of Enterprise (CGEIT) designation is designed for professionals who have significant management, advisory or assurance roles relating to the governance of IT.
- CGEIT enhances your credibility, influence and recognition and demonstrates that you have proven experience and knowledge in the governance of enterprise IT.
- CGEIT helps enterprises identify and hire professionals who have IT governance knowledge and experience and is considered by many companies and governmental agencies as a prerequisite for employees involved with enterprise IT governance.
- CGEIT provides holders with greater recognition in the marketplace and influence at the executive level—and many holders consider it very valuable to their career progression and ability to deliver value to their enterprises.
- CGEIT combines the achievement of passing a comprehensive exam with recognition of a minimum of five years proven work experience managing, advising on and supporting the governance of enterprise IT—including one year’s experience relating to the establishment and management of an IT governance framework.
- CGEIT holders know more than limited areas of IT governance—they are able to grasp the complex subject as a whole and enhance the value businesses get from their IT. addition to having passed an exam.
*Material is presented in English, while lecturing is in Bahasa Indonesia.
Instructor
Only qualified facilitators & professionals with Certified in the Governance of Enterprise (CGEIT®) Certification will facilitate the learning process
Partnership
This program is under the cooperation between Proxsis – ITGID Leadrning Center and ISACA Indonesia Chapter. Visit ISACA Indonesia Chapter: www.isaca.or.id
Course Material
The curriculum of Certified in the Governance of Enterprise (CGEIT®) Review Program is inline with the CGEIT® examination guidelines. They are:
- Framework for the governance of enterprise IT
- Strategic management
- Benefits realization
- Risk optimization
- Resource optimization
Detail Course Material
Day 1
- Framework for the Governance of Enterprise IT
1.1. Components of a Framework for the Governance Of Enterprise IT (GEIT)
1.2. IT Governance Industry Practices, Standards and Frameworks
1.3. Business Drivers Related to IT Governance
1.4. IT Governance Enablers
1.5. Techniques Used to Identify IT Strategy
1.6. Components, Principles, and Concepts Related to Enterprise Architecture (EA)
1.7. Organizational Structures and Their Roles and Responsibilities
1.8. Methods to manage Organizational, Process and Cultural
1.9. Models and Methods to Establish Accountability for Information Requirements Data and System Ownership, and Processes
1.10. IT Governance Monitoring Processes/Mechanisms
1.11. IT Governance Reporting Processes/Mechanisms
1.12. Communication and Promotion Techniques
1.13. Assurance Methodologies and Techniques
1.14. Continuous Improvement Techniques and Processes
Day 2
- Strategic Management
2.1. An Enterprises Strategic Plan and How It Relates to Information Technology (IT)
2.2. Strategic Planning Processes and Techniques
2.3. Impact of Changes in Business Strategy on IT Strategy
2.4. Barriers to the Achievement of Strategic Alignment
2.5. Policies and Procedures Necessary to support IT and Business Strategic Alignment
2.6. Methods to Document and Communicate IT Strategic Planning Processes
2.7. Components, Principles and Frameworks of Enterprise Architecture
2.8. Current and Future Technologies
2.9. Prioritization Processes Related to IT Initiatives
2.10. Scope, Objective and Benefits of IT Investment Programs
2.11. IT Roles and Responsibilities and Methods to Cascade Business and IT Objectives to IT Personnel
- Benefits Realization
3.1. IT Investment Management Processes, Including the Economic Life Cycle Of Investments
3.2. Basic Principles of Portfolio Management
3.3. Benefit Calculation Techniques
3.4. Process and Service Measurement Techniques
3.5. Processes and Practices for Planning, Development, Transition, Delivery, and Support of Solutions and
Services
3.6. Continuous Improvement Concept and Principles
3.7. Outcome and Performance Measurement Techniques
3.8. Procedures to Manage and Report the Status of Investments
3.9. Cost Optimization Strategies
3.10. Models and Methods to Establish Accountability Over IT Investments
3.11. Value Delivery Frameworks
3.12. Business Case Development and Evaluation Techniques
Day 3
- Risk Optimization
4.1. The Application of Risk Management at the Strategic, Portfolio, Program, Project and Operations Levels
4.2. Risk Management Frameworks and Standards
4.3. The Relationship of the Risk Management Approach to Legal and Regulatory Compliance
4.4. Methods to Align IT and Enterprise Risk Management
4.5. The Relationship of the Risk Management Approach to Business Resiliency
4.6. Risk, Threats, Vulnerabilities and Opportunities Inherent in the Use of IT
4.7. Types of Business Risk, Exposures and Threats That Can Be Addressed Using IT Resources
4.8. Risk Appetite and Risk Tolerance
4.9. Quantitative and Qualitative Risk Assessment Methods
4.10. Risk Mitigation Strategies Related to IT in the Enterprise
4.11. Methods to Monitor Effectiveness of Mitigation Strategies and/or Controls
4.12. Stakeholder Analysis and Communication Techniques
4.13. Methods to Establish Key Risk Indicators
4.14. Methods to Manage and Report the Status of Identified Risk
Day 4
- Resource Optimization
5.1. IT Resource Planning Methods
5.2. Human Resource Procurement, Assessment, Training and Development Methodologies
5.3. Processes for Acquiring Application, Information and Infrastructure Resources
5.4. Outsourcing and Offshoring Approaches That May Be Employed to Meet the Investment Program and Operational Level Agreements and Service Level Agreement
5.5. Methods Used to Record and Monitor IT Resource Utilization and Availability
5.6. Methods Used to Evaluate and Report on IT Resource Performance
5.7. Interoperability, Standardization and Economies of Scale
5.8. Data Management and Data Governance Concepts
5.9. Service Level Management Concepts