SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
www.infosectrain.com | sales@infosectrain.com 01
Overview
CGEIT certification at InfosecTrain provides you the credibility
to discuss critical issues around governance and strategic
alignment, and the traction to consider a move to the
C-suite, if you aren’t already there.
The CGEIT is designed for professionals who have
management, advisory, and/or assurance responsibilities
relating to the governance of IT.
Advantages of CGEIT Certification
• A global and prestigious, lifelong symbol of knowledge and expertise.
• Competitive advantage that will distinguish you from your peers.
• Higher earnings and greater career growth.
• The benefits of becoming part of an elite peer network.
• The ability to leverage the tools and resources of a global community of
industry experts.
Target Audience
• IS/IT Directors
• IS/IT Managers
• IS/IT Consultants
• IT Governance Professionals
Pre-Requisite
In order to qualify for the CGEIT, you must have:
• Five (5) or more years of experience managing, serving in an advisory or
oversight role, and/or otherwise supporting the governance of the IT-related
contribution to an enterprise is required to apply for certification.
• IS/IT Executives Security Managers
• System Analysts
• Consultants
www.infosectrain.com | sales@infosectrain.com 02
Why Infosec Train?
Certified &
Experienced Instructor
Flexible Schedule Access to the
recorded
sessions
Tailor Made Training Telegram
Discussion
Group
Post Training
Support
Exam Information
Duration 4 hours
Number of Questions 150
Question format
Passing grade
Languages available
Multiple Choice
450 out of 800
English, French, German, Hebrew,
Italian, Japanese, Korean, Spanish,
Turkish, Chinese
www.infosectrain.com | sales@infosectrain.com 03
www.infosectrain.com | sales@infosectrain.com 04
Framework for the
Governance of Enterprise IT
Strategic Management
Benefits Realization
Risk Optimization
Resource
Optimization
DOMAIN
01
DOMAIN
02
DOMAIN
03
DOMAIN
05
DOMAIN
04
CGEIT
COURSE CONTENT
Domain 1: Framework for the Governance of Enterprise IT
1.1 Ensure that a framework for the governance of enterprise IT is established and
enables the achievement of enterprise goals and objectives to create
stakeholder value, taking into account benefits realization, risk optimization,
and resource optimization.
1.2 Identify the requirements and objectives for the framework for the governance
of enterprise IT incorporating input from enablers such as principles, policies
and frameworks; processes; organizational structures; culture, ethics and
behavior; information; services, infrastructure and applications; people, skills
and competencies.
1.3 Ensure that the framework for the governance of enterprise IT addresses
applicable internal and external requirements (for example, principles, policies
and standards, laws, regulations, service capabilities and contracts).
1.4 Ensure that strategic planning processes are incorporated into the framework
for the governance of enterprise IT.
1.5 Ensure the incorporation of enterprise architecture (EA) into the framework for
the governance ofenterprise IT in order to optimize IT-enabled business
solutions.
1.6 Ensure that the framework for the governance of enterprise IT incorporates
comprehensive and repeatable processes and activities.
1.7 Ensure that the roles, responsibilities and accountabilities for information
systems and IT processes are established.
1.8 Ensure issues related to the framework for the governance of enterprise IT are
reviewed, monitored, reported and remediated.
1.9 Ensure that organizational structures are in place to enable effective planning
and implementation of IT-enabled business investments.
1.10 Ensure the establishment of a communication channel to reinforce the value
of the governance of enterprise IT and transparency of IT costs, benefits and
risk throughout the enterprise.
TASK STATEMENTS
www.infosectrain.com | sales@infosectrain.com 05
1.11 Ensure that the framework for the governance of enterprise IT is periodically
assessed, including the identification of improvement opportunities.
www.infosectrain.com | sales@infosectrain.com 06
1.1 Knowledge of components of a framework for the governance of enterprise IT
1.2 Knowledge of IT governance industry practices, standards and frameworks
(for example, COBIT, Information Technology Infrastructure Library [ITIL],
International Organization for Standardization [ISO] 20000, ISO 38500)
1.3 Knowledge of business drivers related to IT governance (for example, legal,
regulatory and contractual requirements)
1.4 Knowledge of IT governance enablers (for example, principles, policies and
frameworks; processes; organizational structures; culture, ethics and
behavior; information; services, infrastructure and applications; people, skills
and competencies)
1.5 Knowledge of techniques used to identify IT strategy (for example, SWOT, BCG
Matrix)
1.6 Knowledge of components, principles, and concepts related to enterprise
architecture (EA)
1.7 Knowledge of Organizational structures and their roles and responsibilities (for
example, enterprise investment committee, program management office, IT
strategy committee, IT architecture review board, IT risk management
committee)
1.8 Knowledge of methods to manage organizational, process and cultural
change
1.9 Knowledge of models and methods to establish accountability for
information requirements, data and system ownership; and IT processes
1.10 Knowledge of IT governance monitoring processes/mechanisms (for
example, balanced scorecard (BSC)
1.11 Knowledge of IT governance reporting processes/mechanisms
1.12 Knowledge of communication and promotion techniques
1.13 Knowledge of assurance methodologies and techniques
1.14 Knowledge of continuous improvement techniques and processes
KNOWLEDGE STATEMENTS
Domain 2: Strategic Management
2.1 Evaluate, direct and monitor IT strategic planning processes to ensure
alignment with enterprise goals.
2.2 Ensure that appropriate policies and procedures are in place to support IT and
enterprise strategic alignment.
2.3 Ensure that the IT strategic planning processes and related outputs are
adequately documented and communicated.
2.4 Ensure that enterprise architecture (EA) is integrated into the IT strategic
planning process.
2.5 Ensure prioritization of IT initiatives to achieve enterprise objectives.
2.6 Ensure that IT objectives cascade into clear roles, responsibilities and actions
of IT personnel.
TASK STATEMENTS
www.infosectrain.com | sales@infosectrain.com 07
2.1 Knowledge of an enterprise’s strategic plan and how it relates to IT
2.2 Knowledge of strategic planning processes and techniques
2.3 Knowledge of impact of changes in business strategy on IT strategy
2.4 Knowledge of barriers to the achievement of strategic alignment
2.5 Knowledge of policies and procedures necessary to support IT and business
strategic alignment
2.6 Knowledge of methods to document and communicate IT strategic planning
processes (for example, IT dashboard/balanced scorecard, key indicators)
2.7 Knowledge of components, principles and frameworks of enterprise
architecture (EA)
2.8 Knowledge of current and future technologies
2.9 Knowledge of prioritization processes related to IT initiatives
KNOWLEDGE STATEMENTS
2.10 Knowledge of scope, objectives and benefits of IT investment programs
2.11 Knowledge of IT roles and responsibilities and methods to cascade business
and IT objectives to IT personnel
www.infosectrain.com | sales@infosectrain.com 08
Domain 3: Benefits Realization
3.1 Ensure that IT-enabled investments are managed as a portfolio of
investments.
3.2 Ensure that IT-enabled investments are managed through their economic life
cycle to achieve business benefit.
3.3 Ensure business ownership and accountability for IT-enabled investments
are established.
3.4 Ensure that IT investment management practices align with enterprise
investment management practices.
3.5 Ensure that IT-enabled investment portfolios, IT processes and IT services are
evaluated and benchmarked to achieve business benefit.
3.6 Ensure that outcome and performance measures are established and
evaluated to assess progress towards the achievement of enterprise and IT
objectives.
3.7 Ensure that outcome and performance measures are monitored and
reported to key stakeholders in a timely manner.
3.8 Ensure that improvement initiatives are identified, prioritized, initiated and
managed based on outcome and performance measures.
TASK STATEMENTS
www.infosectrain.com | sales@infosectrain.com 09
3.1 Knowledge of IT investment management processes, including the economic
life cycle of investments
3.2 Knowledge of basic principles of portfolio management
3.3 Knowledge of benefit calculation techniques (for example, earned value, total
cost of ownership, return on investment)
3.4 Knowledge of process and service measurement techniques (for example,
maturity models, benchmarking, key performance indicators [KPIs])
KNOWLEDGE STATEMENTS
3.5 Knowledge of processes and practices for planning, development, transition,
delivery, and support of IT solutions and services
3.6 Knowledge of continuous improvement concepts and principles
3.7 Knowledge of outcome and performance measurement techniques (for
example, service metrics, key performance indicators [KPIs])
3.8 Knowledge of procedures to manage and report the status of IT investments
3.9 Knowledge of cost optimization strategies (for example, outsourcing, adoption
of new technologies)
3.10 Knowledge of models and methods to establish accountability over IT
investments
3.11 Knowledge of value delivery frameworks (for example, Val IT)
3.12 Knowledge of business case development and evaluation techniques
www.infosectrain.com | sales@infosectrain.com 10
Domain 4: Risk Optimization
4.1 Ensure that comprehensive IT risk management processes are established to
identify, analyze, mitigate, manage, monitor, and communicate IT risk.
4.2 Ensure that legal and regulatory compliance requirements are addressed
through IT risk management.
4.3 Ensure that IT risk management is aligned with the enterprise risk
management (ERM) framework.
4.4 Ensure appropriate senior level management sponsorship for IT risk
management.
4.5 Ensure that IT risk management policies, procedures and standards are
developed and communicated.
4.6 Ensure the identification of key risk indicators (KRIs).
4.7 Ensure timely reporting and proper escalation of risk events and responses to
appropriate levels of management.
TASK STATEMENTS
www.infosectrain.com | sales@infosectrain.com 11
4.1 Knowledge of the application of risk management at the strategic, portfolio,
program, project and operations levels
4.2 Knowledge of risk management frameworks and standards (for example, RISK
IT, the Committee of Sponsoring Organizations of the Treadway Commission
Enterprise Risk Management—Integrated Framework (2004) [COSO ERM],
International Organization for Standardization (ISO) 31000)
4.3 Knowledge of the relationship of the risk management approach to legal and
regulatory compliance
4.4 Knowledge of methods to align IT and enterprise risk management (ERM)
4.5 Knowledge of the relationship of the risk management approach to business
resiliency (for example, business continuity planning [BCP] and disaster
recovery planning [DRP])
KNOWLEDGE STATEMENTS
4.6 Knowledge of risk, threats, vulnerabilities and opportunities inherent in the use of
IT
4.7 Knowledge of types of business risk, exposures and threats (for example,
external environment, internal fraud, information security) that can be
addressed using IT resources
4.8 Knowledge of risk appetite and risk tolerance
4.9 Knowledge of quantitative and qualitative risk assessment methods
4.10 Knowledge of risk mitigation strategies related to IT in the enterprise
4.11 Knowledge of methods to monitor effectiveness of mitigation strategies and/or
controls
4.12 Knowledge of stakeholder analysis and communication techniques
4.13 Knowledge of methods to establish key risk indicators (KRIs)
4.14 Knowledge of methods to manage and report the status of identified risk
www.infosectrain.com | sales@infosectrain.com 12
Domain 5: Resource Optimization
5.1 Ensure that processes are in place to identify, acquire and maintain IT resources
and capabilities (i.e., information, services, infrastructure and applications, and
people).
5.2 Evaluate, direct and monitor sourcing strategies to ensure existing resources
are taken into account to optimize IT resource utilization.
5.3 Ensure the integration of IT resource management into the enterprise’s
strategic and tactical planning.
5.4 Ensure the alignment of IT resource management processes with the
enterprise’s resource management processes.
5.5 Ensure that a resource gap analysis process is in place so that IT is able to meet
strategic objectives of the enterprise.
5.6 Ensure that policies exist to guide IT resource sourcing strategies that include
service level agreements (SLAs) and changes to sourcing strategies.
5.7 Ensure that policies and processes are in place for the assessment, training
and development of staff to address enterprise requirements and personal/
professional growth.
TASK STATEMENTS
www.infosectrain.com | sales@infosectrain.com 13
5.1 Knowledge of IT resource planning methods
5.2 Knowledge of human resource procurement, assessment, training, and
development methodologies
5.3 Knowledge of processes for acquiring application, information, and
infrastructure resources
5.4 Knowledge of outsourcing and offshoring approaches that may be employed
to meet the investment program and operation level agreements (OLAs) and
service level agreements (SLAs)
5.5 Knowledge of methods used to record and monitor IT resource utilization and
availability
KNOWLEDGE STATEMENTS
5.6 Knowledge of methods used to evaluate and report on IT resource performance
5.7 Knowledge of interoperability, standardization and economies of scale
5.8 Knowledge of data management and data governance concepts
5.9 Knowledge of service level management concepts
www.infosectrain.com | sales@infosectrain.com 14
www.infosectrain.com | sales@infosectrain.com

Weitere ähnliche Inhalte

Was ist angesagt?

التسيير المالي للجمعية
التسيير المالي للجمعيةالتسيير المالي للجمعية
التسيير المالي للجمعيةOURAHOU Mohamed
 
البرمجة اللغوية العصبية
البرمجة اللغوية العصبيةالبرمجة اللغوية العصبية
البرمجة اللغوية العصبيةOURAHOU Mohamed
 
العملات الرقمية
العملات الرقميةالعملات الرقمية
العملات الرقميةKamal AL MASRI
 
Rapport Splunk.pdf
Rapport Splunk.pdfRapport Splunk.pdf
Rapport Splunk.pdfHichemKhalfi
 
نموذج لبطاقة تقنية للجمعية
نموذج لبطاقة تقنية للجمعيةنموذج لبطاقة تقنية للجمعية
نموذج لبطاقة تقنية للجمعيةKhalid Zoi
 
ادارة الوقت - ا. حازم ابو هاشم
ادارة الوقت - ا. حازم ابو هاشمادارة الوقت - ا. حازم ابو هاشم
ادارة الوقت - ا. حازم ابو هاشمmoneer_hazem
 
لغة الجسد و قراءة الافكار
لغة الجسد و قراءة الافكارلغة الجسد و قراءة الافكار
لغة الجسد و قراءة الافكارAhmed Adham
 
الإتصالات الإدارية
الإتصالات الإداريةالإتصالات الإدارية
الإتصالات الإداريةMohammed Algarni
 
مهارات السكرتارية الحديثة فى القرن 21
مهارات السكرتارية الحديثة فى القرن 21  مهارات السكرتارية الحديثة فى القرن 21
مهارات السكرتارية الحديثة فى القرن 21 Abo Rofayda
 
Automated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceAutomated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceJason Choi
 
ملتقى التميز المؤسسي 2015 - اليوم الأول - إعداد قادة المستقبل
ملتقى التميز المؤسسي 2015 - اليوم الأول - إعداد قادة المستقبلملتقى التميز المؤسسي 2015 - اليوم الأول - إعداد قادة المستقبل
ملتقى التميز المؤسسي 2015 - اليوم الأول - إعداد قادة المستقبلExcellence Dayz - ملتقى التميز المؤسسي
 
منهجية تحسين الأداء
منهجية تحسين الأداءمنهجية تحسين الأداء
منهجية تحسين الأداءMaher Salam
 
اختبار الممارس
اختبار الممارساختبار الممارس
اختبار الممارسAhmed Rezq
 
دورة بناء وقيادة فريق العمل
دورة بناء وقيادة فريق العملدورة بناء وقيادة فريق العمل
دورة بناء وقيادة فريق العملDR. Mohamed Elfaki
 
السكرتارية التنفيذية المتقدمة
السكرتارية التنفيذية المتقدمةالسكرتارية التنفيذية المتقدمة
السكرتارية التنفيذية المتقدمةIbrahim Alhariri
 
عرض تقديمي1.pptx [تم حفظه تلقائيا]
عرض تقديمي1.pptx [تم حفظه تلقائيا]عرض تقديمي1.pptx [تم حفظه تلقائيا]
عرض تقديمي1.pptx [تم حفظه تلقائيا]monem75
 
مهارات التميز القيادي
مهارات التميز القياديمهارات التميز القيادي
مهارات التميز القياديAhmed Al-Thuhaibi
 
تقييم الاستراتيجية.ppt
تقييم الاستراتيجية.pptتقييم الاستراتيجية.ppt
تقييم الاستراتيجية.pptAliLebee
 

Was ist angesagt? (20)

التسيير المالي للجمعية
التسيير المالي للجمعيةالتسيير المالي للجمعية
التسيير المالي للجمعية
 
البرمجة اللغوية العصبية
البرمجة اللغوية العصبيةالبرمجة اللغوية العصبية
البرمجة اللغوية العصبية
 
العملات الرقمية
العملات الرقميةالعملات الرقمية
العملات الرقمية
 
Rapport Splunk.pdf
Rapport Splunk.pdfRapport Splunk.pdf
Rapport Splunk.pdf
 
نموذج لبطاقة تقنية للجمعية
نموذج لبطاقة تقنية للجمعيةنموذج لبطاقة تقنية للجمعية
نموذج لبطاقة تقنية للجمعية
 
ادارة الوقت - ا. حازم ابو هاشم
ادارة الوقت - ا. حازم ابو هاشمادارة الوقت - ا. حازم ابو هاشم
ادارة الوقت - ا. حازم ابو هاشم
 
لغة الجسد و قراءة الافكار
لغة الجسد و قراءة الافكارلغة الجسد و قراءة الافكار
لغة الجسد و قراءة الافكار
 
أدوات قياس الاداء
أدوات قياس الاداءأدوات قياس الاداء
أدوات قياس الاداء
 
الإتصالات الإدارية
الإتصالات الإداريةالإتصالات الإدارية
الإتصالات الإدارية
 
مهارات السكرتارية الحديثة فى القرن 21
مهارات السكرتارية الحديثة فى القرن 21  مهارات السكرتارية الحديثة فى القرن 21
مهارات السكرتارية الحديثة فى القرن 21
 
Automated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceAutomated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security Intelligence
 
ملتقى التميز المؤسسي 2015 - اليوم الأول - إعداد قادة المستقبل
ملتقى التميز المؤسسي 2015 - اليوم الأول - إعداد قادة المستقبلملتقى التميز المؤسسي 2015 - اليوم الأول - إعداد قادة المستقبل
ملتقى التميز المؤسسي 2015 - اليوم الأول - إعداد قادة المستقبل
 
منهجية تحسين الأداء
منهجية تحسين الأداءمنهجية تحسين الأداء
منهجية تحسين الأداء
 
اختبار الممارس
اختبار الممارساختبار الممارس
اختبار الممارس
 
دورة بناء وقيادة فريق العمل
دورة بناء وقيادة فريق العملدورة بناء وقيادة فريق العمل
دورة بناء وقيادة فريق العمل
 
السكرتارية التنفيذية المتقدمة
السكرتارية التنفيذية المتقدمةالسكرتارية التنفيذية المتقدمة
السكرتارية التنفيذية المتقدمة
 
السكرتارية وادارة المكاتب
السكرتارية وادارة المكاتبالسكرتارية وادارة المكاتب
السكرتارية وادارة المكاتب
 
عرض تقديمي1.pptx [تم حفظه تلقائيا]
عرض تقديمي1.pptx [تم حفظه تلقائيا]عرض تقديمي1.pptx [تم حفظه تلقائيا]
عرض تقديمي1.pptx [تم حفظه تلقائيا]
 
مهارات التميز القيادي
مهارات التميز القياديمهارات التميز القيادي
مهارات التميز القيادي
 
تقييم الاستراتيجية.ppt
تقييم الاستراتيجية.pptتقييم الاستراتيجية.ppt
تقييم الاستراتيجية.ppt
 

Ähnlich wie CGEIT Course Content InfosecTrain

Governance V3 (2)
Governance V3 (2)Governance V3 (2)
Governance V3 (2)guestf73e68
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITShivamSharma909
 
Gaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxGaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxRobert Sheesley, CBA, CPHIMS
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy DevelopmentAlan McSweeney
 
IT Management Introduction pdf to BLZ (1).pptx
IT Management Introduction pdf to BLZ (1).pptxIT Management Introduction pdf to BLZ (1).pptx
IT Management Introduction pdf to BLZ (1).pptxRakesh Nair
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaEryk Budi Pratama
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...360 BSI
 
Project Portfolio Optimization and Governance
Project Portfolio Optimization and GovernanceProject Portfolio Optimization and Governance
Project Portfolio Optimization and GovernanceValue Amplify Consulting
 
CIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxCIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxanthonywanjohi5
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCERudy Shoushany
 
Strategic IT Planning - S42IL 110714
Strategic IT Planning - S42IL 110714Strategic IT Planning - S42IL 110714
Strategic IT Planning - S42IL 110714strategicforty2
 
Richard Pleasants Resume 12012010
Richard Pleasants Resume 12012010Richard Pleasants Resume 12012010
Richard Pleasants Resume 12012010Richard Pleasants
 

Ähnlich wie CGEIT Course Content InfosecTrain (20)

Governance V3 (2)
Governance V3 (2)Governance V3 (2)
Governance V3 (2)
 
CISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of ITCISA DOMAIN 2 Governance & Management of IT
CISA DOMAIN 2 Governance & Management of IT
 
IT Govenence.pptx
IT Govenence.pptxIT Govenence.pptx
IT Govenence.pptx
 
It governance
It governanceIt governance
It governance
 
Gaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxGaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptx
 
Ict Vision And Strategy Development
Ict Vision And Strategy DevelopmentIct Vision And Strategy Development
Ict Vision And Strategy Development
 
A6.final it professional perspective
A6.final  it professional perspectiveA6.final  it professional perspective
A6.final it professional perspective
 
IT Management Introduction pdf to BLZ (1).pptx
IT Management Introduction pdf to BLZ (1).pptxIT Management Introduction pdf to BLZ (1).pptx
IT Management Introduction pdf to BLZ (1).pptx
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL Indonesia
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
 
CGEIT sertifikacija
CGEIT sertifikacijaCGEIT sertifikacija
CGEIT sertifikacija
 
Project Portfolio Optimization and Governance
Project Portfolio Optimization and GovernanceProject Portfolio Optimization and Governance
Project Portfolio Optimization and Governance
 
ERP for IT
ERP for ITERP for IT
ERP for IT
 
IT Strategy
IT StrategyIT Strategy
IT Strategy
 
Implementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to SuccessImplementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to Success
 
CIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxCIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptx
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCE
 
Strategic IT Planning - S42IL 110714
Strategic IT Planning - S42IL 110714Strategic IT Planning - S42IL 110714
Strategic IT Planning - S42IL 110714
 
Sharpening the Lens
Sharpening the LensSharpening the Lens
Sharpening the Lens
 
Richard Pleasants Resume 12012010
Richard Pleasants Resume 12012010Richard Pleasants Resume 12012010
Richard Pleasants Resume 12012010
 

Mehr von ShivamSharma909

Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
CYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdfCYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdfShivamSharma909
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...ShivamSharma909
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfShivamSharma909
 
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfTop 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfShivamSharma909
 
Top 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfTop 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfShivamSharma909
 
Threat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseThreat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseShivamSharma909
 
Why cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitWhy cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitShivamSharma909
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerShivamSharma909
 
Top 20 azure interview questions
Top 20 azure interview questionsTop 20 azure interview questions
Top 20 azure interview questionsShivamSharma909
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questionsShivamSharma909
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystShivamSharma909
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingShivamSharma909
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingShivamSharma909
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingShivamSharma909
 
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesDomain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesShivamSharma909
 
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesDomain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesShivamSharma909
 
Domain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingDomain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingShivamSharma909
 
How is az 303 different from az-304
How is az 303 different from az-304How is az 303 different from az-304
How is az 303 different from az-304ShivamSharma909
 

Mehr von ShivamSharma909 (20)

Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
CYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdfCYBERSECURITY Interview Questions for Freshers.pdf
CYBERSECURITY Interview Questions for Freshers.pdf
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Top 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdfTop 25 Azure Architect Interview Questions and Answers.pdf
Top 25 Azure Architect Interview Questions and Answers.pdf
 
Top 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdfTop 20 Azure Administrator Interview Questions.pdf
Top 20 Azure Administrator Interview Questions.pdf
 
Threat Hunting Professional Online Training Course
Threat Hunting Professional Online Training CourseThreat Hunting Professional Online Training Course
Threat Hunting Professional Online Training Course
 
Why cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fitWhy cloud security engineers find CCSE as a perfect fit
Why cloud security engineers find CCSE as a perfect fit
 
Top 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answerTop 20 certified ethical hacker interview questions and answer
Top 20 certified ethical hacker interview questions and answer
 
Top 20 azure interview questions
Top 20 azure interview questionsTop 20 azure interview questions
Top 20 azure interview questions
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC Analyst
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
 
Domain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter HackingDomain 4 of CEH V11: Network and Perimeter Hacking
Domain 4 of CEH V11: Network and Perimeter Hacking
 
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack TechniquesDomain 3 of CEH v11: System Hacking Phases and Attack Techniques
Domain 3 of CEH v11: System Hacking Phases and Attack Techniques
 
Domain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance TechniquesDomain 2 of CEH v11: Reconnaissance Techniques
Domain 2 of CEH v11: Reconnaissance Techniques
 
Domain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical HackingDomain 1 of CEH v11: Information Security and Ethical Hacking
Domain 1 of CEH v11: Information Security and Ethical Hacking
 
How is az 303 different from az-304
How is az 303 different from az-304How is az 303 different from az-304
How is az 303 different from az-304
 

Kürzlich hochgeladen

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Kürzlich hochgeladen (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

CGEIT Course Content InfosecTrain

  • 1.
  • 2. www.infosectrain.com | sales@infosectrain.com 01 Overview CGEIT certification at InfosecTrain provides you the credibility to discuss critical issues around governance and strategic alignment, and the traction to consider a move to the C-suite, if you aren’t already there. The CGEIT is designed for professionals who have management, advisory, and/or assurance responsibilities relating to the governance of IT.
  • 3. Advantages of CGEIT Certification • A global and prestigious, lifelong symbol of knowledge and expertise. • Competitive advantage that will distinguish you from your peers. • Higher earnings and greater career growth. • The benefits of becoming part of an elite peer network. • The ability to leverage the tools and resources of a global community of industry experts. Target Audience • IS/IT Directors • IS/IT Managers • IS/IT Consultants • IT Governance Professionals Pre-Requisite In order to qualify for the CGEIT, you must have: • Five (5) or more years of experience managing, serving in an advisory or oversight role, and/or otherwise supporting the governance of the IT-related contribution to an enterprise is required to apply for certification. • IS/IT Executives Security Managers • System Analysts • Consultants www.infosectrain.com | sales@infosectrain.com 02
  • 4. Why Infosec Train? Certified & Experienced Instructor Flexible Schedule Access to the recorded sessions Tailor Made Training Telegram Discussion Group Post Training Support Exam Information Duration 4 hours Number of Questions 150 Question format Passing grade Languages available Multiple Choice 450 out of 800 English, French, German, Hebrew, Italian, Japanese, Korean, Spanish, Turkish, Chinese www.infosectrain.com | sales@infosectrain.com 03
  • 5. www.infosectrain.com | sales@infosectrain.com 04 Framework for the Governance of Enterprise IT Strategic Management Benefits Realization Risk Optimization Resource Optimization DOMAIN 01 DOMAIN 02 DOMAIN 03 DOMAIN 05 DOMAIN 04 CGEIT COURSE CONTENT
  • 6. Domain 1: Framework for the Governance of Enterprise IT 1.1 Ensure that a framework for the governance of enterprise IT is established and enables the achievement of enterprise goals and objectives to create stakeholder value, taking into account benefits realization, risk optimization, and resource optimization. 1.2 Identify the requirements and objectives for the framework for the governance of enterprise IT incorporating input from enablers such as principles, policies and frameworks; processes; organizational structures; culture, ethics and behavior; information; services, infrastructure and applications; people, skills and competencies. 1.3 Ensure that the framework for the governance of enterprise IT addresses applicable internal and external requirements (for example, principles, policies and standards, laws, regulations, service capabilities and contracts). 1.4 Ensure that strategic planning processes are incorporated into the framework for the governance of enterprise IT. 1.5 Ensure the incorporation of enterprise architecture (EA) into the framework for the governance ofenterprise IT in order to optimize IT-enabled business solutions. 1.6 Ensure that the framework for the governance of enterprise IT incorporates comprehensive and repeatable processes and activities. 1.7 Ensure that the roles, responsibilities and accountabilities for information systems and IT processes are established. 1.8 Ensure issues related to the framework for the governance of enterprise IT are reviewed, monitored, reported and remediated. 1.9 Ensure that organizational structures are in place to enable effective planning and implementation of IT-enabled business investments. 1.10 Ensure the establishment of a communication channel to reinforce the value of the governance of enterprise IT and transparency of IT costs, benefits and risk throughout the enterprise. TASK STATEMENTS www.infosectrain.com | sales@infosectrain.com 05
  • 7. 1.11 Ensure that the framework for the governance of enterprise IT is periodically assessed, including the identification of improvement opportunities. www.infosectrain.com | sales@infosectrain.com 06 1.1 Knowledge of components of a framework for the governance of enterprise IT 1.2 Knowledge of IT governance industry practices, standards and frameworks (for example, COBIT, Information Technology Infrastructure Library [ITIL], International Organization for Standardization [ISO] 20000, ISO 38500) 1.3 Knowledge of business drivers related to IT governance (for example, legal, regulatory and contractual requirements) 1.4 Knowledge of IT governance enablers (for example, principles, policies and frameworks; processes; organizational structures; culture, ethics and behavior; information; services, infrastructure and applications; people, skills and competencies) 1.5 Knowledge of techniques used to identify IT strategy (for example, SWOT, BCG Matrix) 1.6 Knowledge of components, principles, and concepts related to enterprise architecture (EA) 1.7 Knowledge of Organizational structures and their roles and responsibilities (for example, enterprise investment committee, program management office, IT strategy committee, IT architecture review board, IT risk management committee) 1.8 Knowledge of methods to manage organizational, process and cultural change 1.9 Knowledge of models and methods to establish accountability for information requirements, data and system ownership; and IT processes 1.10 Knowledge of IT governance monitoring processes/mechanisms (for example, balanced scorecard (BSC) 1.11 Knowledge of IT governance reporting processes/mechanisms 1.12 Knowledge of communication and promotion techniques 1.13 Knowledge of assurance methodologies and techniques 1.14 Knowledge of continuous improvement techniques and processes KNOWLEDGE STATEMENTS
  • 8. Domain 2: Strategic Management 2.1 Evaluate, direct and monitor IT strategic planning processes to ensure alignment with enterprise goals. 2.2 Ensure that appropriate policies and procedures are in place to support IT and enterprise strategic alignment. 2.3 Ensure that the IT strategic planning processes and related outputs are adequately documented and communicated. 2.4 Ensure that enterprise architecture (EA) is integrated into the IT strategic planning process. 2.5 Ensure prioritization of IT initiatives to achieve enterprise objectives. 2.6 Ensure that IT objectives cascade into clear roles, responsibilities and actions of IT personnel. TASK STATEMENTS www.infosectrain.com | sales@infosectrain.com 07 2.1 Knowledge of an enterprise’s strategic plan and how it relates to IT 2.2 Knowledge of strategic planning processes and techniques 2.3 Knowledge of impact of changes in business strategy on IT strategy 2.4 Knowledge of barriers to the achievement of strategic alignment 2.5 Knowledge of policies and procedures necessary to support IT and business strategic alignment 2.6 Knowledge of methods to document and communicate IT strategic planning processes (for example, IT dashboard/balanced scorecard, key indicators) 2.7 Knowledge of components, principles and frameworks of enterprise architecture (EA) 2.8 Knowledge of current and future technologies 2.9 Knowledge of prioritization processes related to IT initiatives KNOWLEDGE STATEMENTS
  • 9. 2.10 Knowledge of scope, objectives and benefits of IT investment programs 2.11 Knowledge of IT roles and responsibilities and methods to cascade business and IT objectives to IT personnel www.infosectrain.com | sales@infosectrain.com 08
  • 10. Domain 3: Benefits Realization 3.1 Ensure that IT-enabled investments are managed as a portfolio of investments. 3.2 Ensure that IT-enabled investments are managed through their economic life cycle to achieve business benefit. 3.3 Ensure business ownership and accountability for IT-enabled investments are established. 3.4 Ensure that IT investment management practices align with enterprise investment management practices. 3.5 Ensure that IT-enabled investment portfolios, IT processes and IT services are evaluated and benchmarked to achieve business benefit. 3.6 Ensure that outcome and performance measures are established and evaluated to assess progress towards the achievement of enterprise and IT objectives. 3.7 Ensure that outcome and performance measures are monitored and reported to key stakeholders in a timely manner. 3.8 Ensure that improvement initiatives are identified, prioritized, initiated and managed based on outcome and performance measures. TASK STATEMENTS www.infosectrain.com | sales@infosectrain.com 09 3.1 Knowledge of IT investment management processes, including the economic life cycle of investments 3.2 Knowledge of basic principles of portfolio management 3.3 Knowledge of benefit calculation techniques (for example, earned value, total cost of ownership, return on investment) 3.4 Knowledge of process and service measurement techniques (for example, maturity models, benchmarking, key performance indicators [KPIs]) KNOWLEDGE STATEMENTS
  • 11. 3.5 Knowledge of processes and practices for planning, development, transition, delivery, and support of IT solutions and services 3.6 Knowledge of continuous improvement concepts and principles 3.7 Knowledge of outcome and performance measurement techniques (for example, service metrics, key performance indicators [KPIs]) 3.8 Knowledge of procedures to manage and report the status of IT investments 3.9 Knowledge of cost optimization strategies (for example, outsourcing, adoption of new technologies) 3.10 Knowledge of models and methods to establish accountability over IT investments 3.11 Knowledge of value delivery frameworks (for example, Val IT) 3.12 Knowledge of business case development and evaluation techniques www.infosectrain.com | sales@infosectrain.com 10
  • 12. Domain 4: Risk Optimization 4.1 Ensure that comprehensive IT risk management processes are established to identify, analyze, mitigate, manage, monitor, and communicate IT risk. 4.2 Ensure that legal and regulatory compliance requirements are addressed through IT risk management. 4.3 Ensure that IT risk management is aligned with the enterprise risk management (ERM) framework. 4.4 Ensure appropriate senior level management sponsorship for IT risk management. 4.5 Ensure that IT risk management policies, procedures and standards are developed and communicated. 4.6 Ensure the identification of key risk indicators (KRIs). 4.7 Ensure timely reporting and proper escalation of risk events and responses to appropriate levels of management. TASK STATEMENTS www.infosectrain.com | sales@infosectrain.com 11 4.1 Knowledge of the application of risk management at the strategic, portfolio, program, project and operations levels 4.2 Knowledge of risk management frameworks and standards (for example, RISK IT, the Committee of Sponsoring Organizations of the Treadway Commission Enterprise Risk Management—Integrated Framework (2004) [COSO ERM], International Organization for Standardization (ISO) 31000) 4.3 Knowledge of the relationship of the risk management approach to legal and regulatory compliance 4.4 Knowledge of methods to align IT and enterprise risk management (ERM) 4.5 Knowledge of the relationship of the risk management approach to business resiliency (for example, business continuity planning [BCP] and disaster recovery planning [DRP]) KNOWLEDGE STATEMENTS
  • 13. 4.6 Knowledge of risk, threats, vulnerabilities and opportunities inherent in the use of IT 4.7 Knowledge of types of business risk, exposures and threats (for example, external environment, internal fraud, information security) that can be addressed using IT resources 4.8 Knowledge of risk appetite and risk tolerance 4.9 Knowledge of quantitative and qualitative risk assessment methods 4.10 Knowledge of risk mitigation strategies related to IT in the enterprise 4.11 Knowledge of methods to monitor effectiveness of mitigation strategies and/or controls 4.12 Knowledge of stakeholder analysis and communication techniques 4.13 Knowledge of methods to establish key risk indicators (KRIs) 4.14 Knowledge of methods to manage and report the status of identified risk www.infosectrain.com | sales@infosectrain.com 12
  • 14. Domain 5: Resource Optimization 5.1 Ensure that processes are in place to identify, acquire and maintain IT resources and capabilities (i.e., information, services, infrastructure and applications, and people). 5.2 Evaluate, direct and monitor sourcing strategies to ensure existing resources are taken into account to optimize IT resource utilization. 5.3 Ensure the integration of IT resource management into the enterprise’s strategic and tactical planning. 5.4 Ensure the alignment of IT resource management processes with the enterprise’s resource management processes. 5.5 Ensure that a resource gap analysis process is in place so that IT is able to meet strategic objectives of the enterprise. 5.6 Ensure that policies exist to guide IT resource sourcing strategies that include service level agreements (SLAs) and changes to sourcing strategies. 5.7 Ensure that policies and processes are in place for the assessment, training and development of staff to address enterprise requirements and personal/ professional growth. TASK STATEMENTS www.infosectrain.com | sales@infosectrain.com 13 5.1 Knowledge of IT resource planning methods 5.2 Knowledge of human resource procurement, assessment, training, and development methodologies 5.3 Knowledge of processes for acquiring application, information, and infrastructure resources 5.4 Knowledge of outsourcing and offshoring approaches that may be employed to meet the investment program and operation level agreements (OLAs) and service level agreements (SLAs) 5.5 Knowledge of methods used to record and monitor IT resource utilization and availability KNOWLEDGE STATEMENTS
  • 15. 5.6 Knowledge of methods used to evaluate and report on IT resource performance 5.7 Knowledge of interoperability, standardization and economies of scale 5.8 Knowledge of data management and data governance concepts 5.9 Knowledge of service level management concepts www.infosectrain.com | sales@infosectrain.com 14