CGEIT (Certified in Governance of Enterprise IT) telah secara khusus dikembangkan untuk para profesional yang memiliki manajemen yang berkaitan dengan tata kelola IT, training CGEIT Exam Preparation ini akan membantu peserta untuk mempelajari segala sesuatu yang perlu diketahui untuk persiapan ujian sertifikasi. Dengan mengikuti training ini dimaksudkan untuk: mendukung tuntutan bisnis yang berkembang terkait dengan tata kelola IT, meningkatkan kesadaran dan pentingnya praktik tata kelola IT dan masalah yang ada, serta menentukan peran dan tanggung jawab profesional TI dalam melakukan project di pemerintahan.
1. Framework for the Governance of Enterprise IT
a. Components of a Framework for the Governance Of Enterprise IT (GEIT)
b. IT Governance Industry Practices, Standards and Frameworks
c. Business Drivers Related to IT Governance
d. IT Governance Enablers
e. Techniques Used to Identify IT Strategy
f. Components, Principles, and Concepts Related to Enterprise Architecture (EA)
g. Organizational Structures and Their Roles and Responsibilities
h. Methods to manage Organizational, Process and Cultural
i. Models and Methods to Establish Accountability for InformationRequirements Data and System Ownership, and Processes
j. IT Governance Monitoring Processes/Mechanisms
k. IT Governance Reporting Processes/Mechanisms
l. Communication and Promotion Techniques
m. Assurance Methodologies and Techniques
n. Continuous Improvement Techniques and Processes
2. Strategic Management
a. An Enterprises Strategic Plan and How It Relates to Information Technology(IT)
b. Strategic Planning Processes and Techniques
c. Impact of Changes in Business Strategy on IT Strategy
d. Barriers to the Achievement of Strategic Alignment
e. Policies and Procedures Necessary to support IT and Business StrategicAlignment
f. Methods to Document and Communicate IT Strategic Planning Processes
g. Components, Principles and Frameworks of Enterprise Architecture
h. Current and Future Technologies
i. Prioritization Processes Related to IT Initiatives
j. Scope, Objective and Benefits of IT Investment Programs
k. IT Roles and Responsibilities and Methods to Cascade Business and ITOBJECTIVE to IT Personnel
3. Benefits Realization
a. IT Investment Management Processes, Including the Economic Life Cycle Of Investments
b. Basic Principles of Portfolio Management
c. Benefit Calculation Techniques
d. Process and Service Measurement Techniques
e. Processes and Practices for Planning, Development, Transition, Delivery, and Support of Solutions and Services
f. Continuous Improvement Concept and Principles
g. Outcome and Performance Measurement Techniques
h. Procedures to Manage and Report the Status of Investments
i. Cost Optimization Strategies
j. Models and Methods to Establish Accountability Over IT Investments Value Delivery Frameworks
k. Business Case Development and Evaluation Techniques
4. Risk Optimization
a. The Application of Risk Management at the Strategic, Portfolio, Program, Project and Operations Levels
b. Risk Management Frameworks and Standards
c. The Relationship of the Risk Management Approach to Legal and Regulatory Compliance
d. Methods to Align IT and Enterprise Risk Management
e. The Relationship of the Risk Management Approach to Business Resiliency
f. Risk, Threats, Vulnerabilities and Opportunities Inherent in the Use of IT
g. Types of Business Risk, Exposures and Threats That Can Be Addressed Using IT Resources
h. Risk Appetite and Risk Tolerance
i. Quantitative and Qualitative Risk Assessment Methods Risk Mitigation Strategies Related to IT in the Enterprise
j. Methods to Monitor Effectiveness of Mitigation Strategies and/or Controls Stakeholder Analysis and Communication Techniques
k. Methods to Establish Key Risk Indicators
l. Methods to Manage and Report the Status of Identified Risk
5. Resource Optimization
a. IT Resource Planning Methods
b. Human Resource Procurement, Assessment, Training and Development Methodologies
c. Processes for Acquiring Application, Information and Infrastructure Resources
d. Outsourcing and Offshoring Approaches That May Be Employed to Meet the Investment Program and Operational Level Agreements and Service Level Agreement
e. Methods Used to Record and Monitor IT Resource Utilization and Availability
f. Methods Used to Evaluate and Report on IT Resource Performance
g. Interoperability, Standardization and Economies of Scale
h. Data Management and Data Governance Concepts
i. Service Level Management Concepts
| Syifa (082130264999) |
| Arga (081227728242) |
| Margi (081394000042) |
| Tuti (081321237948) |