Brainmatics

CGEIT (Certified in Governance of Enterprise IT) Exam Preparation

DESCRIPTION

Sertifikasi CGEIT telah secara khusus dikembangkan untuk para profesional yang memiliki manajemen yang berkaitan dengan tata kelola IT, training CGEIT Exam Preparation ini akan membantu peserta untuk mempelajari segala sesuatu yang perlu diketahui untuk persiapan ujian sertifikasi. Dengan mengikuti training ini dimaksudkan untuk: mendukung tuntutan bisnis yang berkembang terkait dengan tata kelola IT, meningkatkan kesadaran dan pentingnya praktik tata kelola IT dan masalah yang ada, serta menentukan peran dan tanggung jawab profesional TI dalam melakukan project di pemerintahan.

 

CONTENT
1. Framework for the Governance of Enterprise IT

    1.1. Components of a Framework for the Governance Of Enterprise IT (GEIT)
    1.2. IT Governance Industry Practices, Standards and Frameworks
    1.3. Business Drivers Related to IT Governance
    1.4. IT Governance Enablers
    1.5. Techniques Used to Identify IT Strategy
    1.6. Components, Principles, and Concepts Related to Enterprise Architecture (EA)
    1.7. Organizational Structures and Their Roles and Responsibilities
    1.8. Methods to manage Organizational, Process and Cultural
    1.9. Models and Methods to Establish Accountability for Information Requirements Data and System Ownership, and Processes
    1.10. IT Governance Monitoring Processes/Mechanisms
    1.11. IT Governance Reporting Processes/Mechanisms
    1.12. Communication and Promotion Techniques
    1.13. Assurance Methodologies and Techniques
    1.14. Continuous Improvement Techniques and Processes

2. Strategic Management

    2.1. An Enterprises Strategic Plan and How It Relates to Information Technology (IT)
    2.2. Strategic Planning Processes and Techniques
    2.3. Impact of Changes in Business Strategy on IT Strategy
    2.4. Barriers to the Achievement of Strategic Alignment
    2.5. Policies and Procedures Necessary to support IT and Business Strategic Alignment
    2.6. Methods to Document and Communicate IT Strategic Planning Processes
    2.7. Components, Principles and Frameworks of Enterprise Architecture
    2.8. Current and Future Technologies
    2.9. Prioritization Processes Related to IT Initiatives
    2.10. Scope, Objective and Benefits of IT Investment Programs
    2.11. IT Roles and Responsibilities and Methods to Cascade Business and IT Objectives to IT Personnel

3. Benefits Realization

    3.1. IT Investment Management Processes, Including the Economic Life Cycle Of Investments
    3.2. Basic Principles of Portfolio Management
    3.3. Benefit Calculation Techniques
    3.4. Process and Service Measurement Techniques
    3.5. Processes and Practices for Planning, Development, Transition, Delivery, and Support of Solutions and Services
    3.6. Continuous Improvement Concept and Principles
    3.7. Outcome and Performance Measurement Techniques
    3.8. Procedures to Manage and Report the Status of Investments
    3.9. Cost Optimization Strategies
    3.10. Models and Methods to Establish Accountability Over IT Investments
    3.11. Value Delivery Frameworks
    3.12. Business Case Development and Evaluation Techniques

4. Risk Optimization

    4.1. The Application of Risk Management at the Strategic, Portfolio, Program, Project and Operations Levels
    4.2. Risk Management Frameworks and Standards
    4.3. The Relationship of the Risk Management Approach to Legal and Regulatory Compliance
    4.4. Methods to Align IT and Enterprise Risk Management
    4.5. The Relationship of the Risk Management Approach to Business Resiliency
    4.6. Risk, Threats, Vulnerabilities and Opportunities Inherent in the Use of IT
    4.7. Types of Business Risk, Exposures and Threats That Can Be Addressed Using IT Resources
    4.8. Risk Appetite and Risk Tolerance
    4.9. Quantitative and Qualitative Risk Assessment Methods
    4.10. Risk Mitigation Strategies Related to IT in the Enterprise
    4.11. Methods to Monitor Effectiveness of Mitigation Strategies and/or Controls
    4.12. Stakeholder Analysis and Communication Techniques
    4.13. Methods to Establish Key Risk Indicators
    4.14. Methods to Manage and Report the Status of Identified Risk

5. Resource Optimization

    5.1. IT Resource Planning Methods
    5.2. Human Resource Procurement, Assessment, Training and Development Methodologies
    5.3. Processes for Acquiring Application, Information and Infrastructure Resources
    5.4. Outsourcing and Offshoring Approaches That May Be Employed to Meet the Investment Program and Operational Level Agreements and Service Level Agreement
    5.5. Methods Used to Record and Monitor IT Resource Utilization and Availability
    5.6. Methods Used to Evaluate and Report on IT Resource Performance
    5.7. Interoperability, Standardization and Economies of Scale
    5.8. Data Management and Data Governance Concepts
    5.9. Service Level Management Concepts

TARGET AUDIENCE

  1. Profesional IT
  2. Profesional Keuangan
  3. Auditor Internal/ Eksternal

 

INSTRUCTOR

Irfan Akbar. Menyelesaikan S1 Jurusan Akuntansi di Universitas Padjajaran pada tahun 2003. Merupakan professional trainer yang sudah berpengalaman sejak tahun 2008 untuk training CISA Exam Preparation, CISSP Exam Preparation, CISM Exam Preparation, IT Service Management (ITIL v3), IT Risk Management, IT Strategic Plan (IT Blueprint), IT Enterprise Architecture using TOGAF, IT Business Analysis, COBIT 5 & COBIT 4.1, dan IT Auditing pada lembaga training yang ada di Jakarta dan Bandung. Telah tersertifikasi CISA, CISSP, CISM, CEHv7 dan ITIL v3 Foundation.

 

 

Ahmad Reza Aminy. Menyelesaikan S2 Jurusan Ilmu Komputer di Universitas Indonesia pada tahun 2001. Telah tersertifikasi CISA, CISM, CRISC, CGEIT, ITILF, ISFS dan CCE. Berpengalaman kurang lebih 10 tahun sebagai Information Systems Auditor, dan IS Consultant. Memiliki keahlian dan tertarik dalam bidang IT Audit, IT Risk Management, IT Governance, IT Strategy, IT Infrastructure Library dan Risk Management.