Online Training : CGEIT Exam Guide

5/5

Outline

Online Training : CGEIT Exam Guide tujuannya adalah peserta memahami persyaratan ujian CISA dan memahami pengetahuan dan kompetensi yang dibutuhkan untuk persiapan ujian CGEIT

Deskripsi

Training persiapan ujian sertifikasi CGEIT. Sertifikasi CGEIT adalah sertifikasi internasional yang dikeluarkan ISACA sebagai pengakuan terhadap kompetensi Ahli Tata Kelola TI.

Durasi Training : 5 Hari

Outline Materi

  1. Framework for the Governance of Enterprise IT
    1.1. Components of a Framework for the Governance Of Enterprise IT (GEIT)
    1.2. IT Governance Industry Practices, Standards and Frameworks
    1.3. Business Drivers Related to IT Governance
    1.4. IT Governance Enablers
    1.5. Techniques Used to Identify IT Strategy
    1.6. Components, Principles, and Concepts Related to Enterprise Architecture (EA)
    1.7. Organizational Structures and Their Roles and Responsibilities
    1.8. Methods to manage Organizational, Process and Cultural
    1.9. Models and Methods to Establish Accountability for Information Requirements Data and System Ownership, and Processes
    1.10. IT Governance Monitoring Processes/Mechanisms
    1.11. IT Governance Reporting Processes/Mechanisms
    1.12. Communication and Promotion Techniques
    1.13. Assurance Methodologies and Techniques
    1.14. Continuous Improvement Techniques and Processes
  2. Strategic Management
    2.1. An Enterprises Strategic Plan and How It Relates to Information Technology (IT)
    2.2. Strategic Planning Processes and Techniques
    2.3. Impact of Changes in Business Strategy on IT Strategy
    2.4. Barriers to the Achievement of Strategic Alignment
    2.5. Policies and Procedures Necessary to support IT and Business Strategic Alignment
    2.6. Methods to Document and Communicate IT Strategic Planning Processes
    2.7. Components, Principles and Frameworks of Enterprise Architecture
    2.8. Current and Future Technologies
    2.9. Prioritization Processes Related to IT Initiatives
    2.10. Scope, Objective and Benefits of IT Investment Programs
    2.11. IT Roles and Responsibilities and Methods to Cascade Business and IT Objectives to IT Personne
  3. Benefits Realization
    3.1. IT Investment Management Processes, Including the Economic Life Cycle Of Investments
    3.2. Basic Principles of Portfolio Management
    3.3. Benefit Calculation Techniques
    3.4. Process and Service Measurement Techniques
    3.5. Processes and Practices for Planning, Development, Transition, Delivery, and Support of Solutions and Services
    3.6. Continuous Improvement Concept and Principles
    3.7. Outcome and Performance Measurement Techniques
    3.8. Procedures to Manage and Report the Status of Investments
    3.9. Cost Optimization Strategies
    3.10. Models and Methods to Establish Accountability Over IT Investments
    3.11. Value Delivery Frameworks
    3.12. Business Case Development and Evaluation Techniques
  4. Risk Optimization
    4.1. The Application of Risk Management at the Strategic, Portfolio, Program, Project and Operations Levels
    4.2. Risk Management Frameworks and Standards
    4.3. The Relationship of the Risk Management Approach to Legal and Regulatory Compliance
    4.4. Methods to Align IT and Enterprise Risk Management
    4.5. The Relationship of the Risk Management Approach to Business Resiliency
    4.6. Risk, Threats, Vulnerabilities and Opportunities Inherent in the Use of IT
    4.7. Types of Business Risk, Exposures and Threats That Can Be Addressed Using IT Resources
    4.8. Risk Appetite and Risk Tolerance
    4.9. Quantitative and Qualitative Risk Assessment Methods
    4.10. Risk Mitigation Strategies Related to IT in the Enterprise
    4.11. Methods to Monitor Effectiveness of Mitigation Strategies and/or Controls
    4.12. Stakeholder Analysis and Communication Techniques
    4.13. Methods to Establish Key Risk Indicators
    4.14. Methods to Manage and Report the Status of Identified Risk
  5. Resource Optimization
    5.1. IT Resource Planning Methods
    5.2. Human Resource Procurement, Assessment, Training and Development Methodologies
    5.3. Processes for Acquiring Application, Information and Infrastructure Resources
    5.4. Outsourcing and Offshoring Approaches That May Be Employed to Meet the Investment Program and Operational Level Agreements and Service Level Agreement
    5.5. Methods Used to Record and Monitor IT Resource Utilization and Availability
    5.6. Methods Used to Evaluate and Report on IT Resource Performance
    5.7. Interoperability, Standardization and Economies of Scale
    5.8. Data Management and Data Governance Concepts
    5.9. Service Level Management Concepts

Facilitator

Aresto Yudo Sujono, CISA, CGEIT

Aresto Yudo Sujono, Menyelesaikan S1 Ilmu Komputer di Universitas Indonesia dan MSc IT Management di Carnegie Mellon University. Memiliki pengalaman lebih dari 15 tahun dalam bidang Tata Kelola TI seperti IT Audit, IT Risk Management dan IT Strategic Planning melalui penugasan di berbagai industri termasuk telekomunikasi, keuangan dan logistik. Telah tersertifikasi CISA dan CGEIT

Daftar Lengkap, klik di bawah ini:

Jadwal & Biaya

Rp 8.5jt - Full Fare

*Harga belum termasuk pajak

Kelas ini akan dijalankan bila minimal ada 2 peserta yang mendaftar.

calendar_month 10-14 Jun 2025
schedule 09.00 - 15:00
location_on By Ms Teams

*Untuk pelatihan inclass, hotel masih tentative

Fasilitas Training

Jadwal & Biaya

*Harga Tidak Termasuk Pajak

(Belum Ada Jadwals)
09:00 - 17:00
*Harga Tidak Termasuk Pajak

(Belum Ada Jadwals)
09:00 - 17:00
*Harga Tidak Termasuk Pajak

(Belum Ada Jadwals)
09:00 - 17:00
*Harga Tidak Termasuk Pajak

(Belum Ada Jadwals)
09:00 - 17:00

*Hotel masih tentative

Fasilitas Training
9684
× Ada yang bisa dibantu? Available from 06:00 to 23:00 Available on SundayMondayTuesdayWednesdayThursdayFridaySaturday