SlideShare a Scribd company logo
1 of 16
Download to read offline
www.infosectrain.com | sales@infosectrain.com 01
Overview
CGEIT certification at InfosecTrain provides you the credibility
to discuss critical issues around governance and strategic
alignment, and the traction to consider a move to the
C-suite, if you aren’t already there.
The CGEIT is designed for professionals who have
management, advisory, and/or assurance responsibilities
relating to the governance of IT.
Advantages of CGEIT Certification
• A global and prestigious, lifelong symbol of knowledge and expertise.
• Competitive advantage that will distinguish you from your peers.
• Higher earnings and greater career growth.
• The benefits of becoming part of an elite peer network.
• The ability to leverage the tools and resources of a global community of
industry experts.
Target Audience
• IS/IT Directors
• IS/IT Managers
• IS/IT Consultants
• IT Governance Professionals
Pre-Requisite
In order to qualify for the CGEIT, you must have:
• Five (5) or more years of experience managing, serving in an advisory or
oversight role, and/or otherwise supporting the governance of the IT-related
contribution to an enterprise is required to apply for certification.
• IS/IT Executives Security Managers
• System Analysts
• Consultants
www.infosectrain.com | sales@infosectrain.com 02
Why Infosec Train?
Certified &
Experienced Instructor
Flexible Schedule Access to the
recorded
sessions
Tailor Made Training Telegram
Discussion
Group
Post Training
Support
Exam Information
Duration 4 hours
Number of Questions 150
Question format
Passing grade
Languages available
Multiple Choice
450 out of 800
English, French, German, Hebrew,
Italian, Japanese, Korean, Spanish,
Turkish, Chinese
www.infosectrain.com | sales@infosectrain.com 03
www.infosectrain.com | sales@infosectrain.com 04
Framework for the
Governance of Enterprise IT
Strategic Management
Benefits Realization
Risk Optimization
Resource
Optimization
DOMAIN
01
DOMAIN
02
DOMAIN
03
DOMAIN
05
DOMAIN
04
CGEIT
COURSE CONTENT
Domain 1: Framework for the Governance of Enterprise IT
1.1 Ensure that a framework for the governance of enterprise IT is established and
enables the achievement of enterprise goals and objectives to create
stakeholder value, taking into account benefits realization, risk optimization,
and resource optimization.
1.2 Identify the requirements and objectives for the framework for the governance
of enterprise IT incorporating input from enablers such as principles, policies
and frameworks; processes; organizational structures; culture, ethics and
behavior; information; services, infrastructure and applications; people, skills
and competencies.
1.3 Ensure that the framework for the governance of enterprise IT addresses
applicable internal and external requirements (for example, principles, policies
and standards, laws, regulations, service capabilities and contracts).
1.4 Ensure that strategic planning processes are incorporated into the framework
for the governance of enterprise IT.
1.5 Ensure the incorporation of enterprise architecture (EA) into the framework for
the governance ofenterprise IT in order to optimize IT-enabled business
solutions.
1.6 Ensure that the framework for the governance of enterprise IT incorporates
comprehensive and repeatable processes and activities.
1.7 Ensure that the roles, responsibilities and accountabilities for information
systems and IT processes are established.
1.8 Ensure issues related to the framework for the governance of enterprise IT are
reviewed, monitored, reported and remediated.
1.9 Ensure that organizational structures are in place to enable effective planning
and implementation of IT-enabled business investments.
1.10 Ensure the establishment of a communication channel to reinforce the value
of the governance of enterprise IT and transparency of IT costs, benefits and
risk throughout the enterprise.
TASK STATEMENTS
www.infosectrain.com | sales@infosectrain.com 05
1.11 Ensure that the framework for the governance of enterprise IT is periodically
assessed, including the identification of improvement opportunities.
www.infosectrain.com | sales@infosectrain.com 06
1.1 Knowledge of components of a framework for the governance of enterprise IT
1.2 Knowledge of IT governance industry practices, standards and frameworks
(for example, COBIT, Information Technology Infrastructure Library [ITIL],
International Organization for Standardization [ISO] 20000, ISO 38500)
1.3 Knowledge of business drivers related to IT governance (for example, legal,
regulatory and contractual requirements)
1.4 Knowledge of IT governance enablers (for example, principles, policies and
frameworks; processes; organizational structures; culture, ethics and
behavior; information; services, infrastructure and applications; people, skills
and competencies)
1.5 Knowledge of techniques used to identify IT strategy (for example, SWOT, BCG
Matrix)
1.6 Knowledge of components, principles, and concepts related to enterprise
architecture (EA)
1.7 Knowledge of Organizational structures and their roles and responsibilities (for
example, enterprise investment committee, program management office, IT
strategy committee, IT architecture review board, IT risk management
committee)
1.8 Knowledge of methods to manage organizational, process and cultural
change
1.9 Knowledge of models and methods to establish accountability for
information requirements, data and system ownership; and IT processes
1.10 Knowledge of IT governance monitoring processes/mechanisms (for
example, balanced scorecard (BSC)
1.11 Knowledge of IT governance reporting processes/mechanisms
1.12 Knowledge of communication and promotion techniques
1.13 Knowledge of assurance methodologies and techniques
1.14 Knowledge of continuous improvement techniques and processes
KNOWLEDGE STATEMENTS
Domain 2: Strategic Management
2.1 Evaluate, direct and monitor IT strategic planning processes to ensure
alignment with enterprise goals.
2.2 Ensure that appropriate policies and procedures are in place to support IT and
enterprise strategic alignment.
2.3 Ensure that the IT strategic planning processes and related outputs are
adequately documented and communicated.
2.4 Ensure that enterprise architecture (EA) is integrated into the IT strategic
planning process.
2.5 Ensure prioritization of IT initiatives to achieve enterprise objectives.
2.6 Ensure that IT objectives cascade into clear roles, responsibilities and actions
of IT personnel.
TASK STATEMENTS
www.infosectrain.com | sales@infosectrain.com 07
2.1 Knowledge of an enterprise’s strategic plan and how it relates to IT
2.2 Knowledge of strategic planning processes and techniques
2.3 Knowledge of impact of changes in business strategy on IT strategy
2.4 Knowledge of barriers to the achievement of strategic alignment
2.5 Knowledge of policies and procedures necessary to support IT and business
strategic alignment
2.6 Knowledge of methods to document and communicate IT strategic planning
processes (for example, IT dashboard/balanced scorecard, key indicators)
2.7 Knowledge of components, principles and frameworks of enterprise
architecture (EA)
2.8 Knowledge of current and future technologies
2.9 Knowledge of prioritization processes related to IT initiatives
KNOWLEDGE STATEMENTS
2.10 Knowledge of scope, objectives and benefits of IT investment programs
2.11 Knowledge of IT roles and responsibilities and methods to cascade business
and IT objectives to IT personnel
www.infosectrain.com | sales@infosectrain.com 08
Domain 3: Benefits Realization
3.1 Ensure that IT-enabled investments are managed as a portfolio of
investments.
3.2 Ensure that IT-enabled investments are managed through their economic life
cycle to achieve business benefit.
3.3 Ensure business ownership and accountability for IT-enabled investments
are established.
3.4 Ensure that IT investment management practices align with enterprise
investment management practices.
3.5 Ensure that IT-enabled investment portfolios, IT processes and IT services are
evaluated and benchmarked to achieve business benefit.
3.6 Ensure that outcome and performance measures are established and
evaluated to assess progress towards the achievement of enterprise and IT
objectives.
3.7 Ensure that outcome and performance measures are monitored and
reported to key stakeholders in a timely manner.
3.8 Ensure that improvement initiatives are identified, prioritized, initiated and
managed based on outcome and performance measures.
TASK STATEMENTS
www.infosectrain.com | sales@infosectrain.com 09
3.1 Knowledge of IT investment management processes, including the economic
life cycle of investments
3.2 Knowledge of basic principles of portfolio management
3.3 Knowledge of benefit calculation techniques (for example, earned value, total
cost of ownership, return on investment)
3.4 Knowledge of process and service measurement techniques (for example,
maturity models, benchmarking, key performance indicators [KPIs])
KNOWLEDGE STATEMENTS
3.5 Knowledge of processes and practices for planning, development, transition,
delivery, and support of IT solutions and services
3.6 Knowledge of continuous improvement concepts and principles
3.7 Knowledge of outcome and performance measurement techniques (for
example, service metrics, key performance indicators [KPIs])
3.8 Knowledge of procedures to manage and report the status of IT investments
3.9 Knowledge of cost optimization strategies (for example, outsourcing, adoption
of new technologies)
3.10 Knowledge of models and methods to establish accountability over IT
investments
3.11 Knowledge of value delivery frameworks (for example, Val IT)
3.12 Knowledge of business case development and evaluation techniques
www.infosectrain.com | sales@infosectrain.com 10
Domain 4: Risk Optimization
4.1 Ensure that comprehensive IT risk management processes are established to
identify, analyze, mitigate, manage, monitor, and communicate IT risk.
4.2 Ensure that legal and regulatory compliance requirements are addressed
through IT risk management.
4.3 Ensure that IT risk management is aligned with the enterprise risk
management (ERM) framework.
4.4 Ensure appropriate senior level management sponsorship for IT risk
management.
4.5 Ensure that IT risk management policies, procedures and standards are
developed and communicated.
4.6 Ensure the identification of key risk indicators (KRIs).
4.7 Ensure timely reporting and proper escalation of risk events and responses to
appropriate levels of management.
TASK STATEMENTS
www.infosectrain.com | sales@infosectrain.com 11
4.1 Knowledge of the application of risk management at the strategic, portfolio,
program, project and operations levels
4.2 Knowledge of risk management frameworks and standards (for example, RISK
IT, the Committee of Sponsoring Organizations of the Treadway Commission
Enterprise Risk Management—Integrated Framework (2004) [COSO ERM],
International Organization for Standardization (ISO) 31000)
4.3 Knowledge of the relationship of the risk management approach to legal and
regulatory compliance
4.4 Knowledge of methods to align IT and enterprise risk management (ERM)
4.5 Knowledge of the relationship of the risk management approach to business
resiliency (for example, business continuity planning [BCP] and disaster
recovery planning [DRP])
KNOWLEDGE STATEMENTS
4.6 Knowledge of risk, threats, vulnerabilities and opportunities inherent in the use of
IT
4.7 Knowledge of types of business risk, exposures and threats (for example,
external environment, internal fraud, information security) that can be
addressed using IT resources
4.8 Knowledge of risk appetite and risk tolerance
4.9 Knowledge of quantitative and qualitative risk assessment methods
4.10 Knowledge of risk mitigation strategies related to IT in the enterprise
4.11 Knowledge of methods to monitor effectiveness of mitigation strategies and/or
controls
4.12 Knowledge of stakeholder analysis and communication techniques
4.13 Knowledge of methods to establish key risk indicators (KRIs)
4.14 Knowledge of methods to manage and report the status of identified risk
www.infosectrain.com | sales@infosectrain.com 12
Domain 5: Resource Optimization
5.1 Ensure that processes are in place to identify, acquire and maintain IT resources
and capabilities (i.e., information, services, infrastructure and applications, and
people).
5.2 Evaluate, direct and monitor sourcing strategies to ensure existing resources
are taken into account to optimize IT resource utilization.
5.3 Ensure the integration of IT resource management into the enterprise’s
strategic and tactical planning.
5.4 Ensure the alignment of IT resource management processes with the
enterprise’s resource management processes.
5.5 Ensure that a resource gap analysis process is in place so that IT is able to meet
strategic objectives of the enterprise.
5.6 Ensure that policies exist to guide IT resource sourcing strategies that include
service level agreements (SLAs) and changes to sourcing strategies.
5.7 Ensure that policies and processes are in place for the assessment, training
and development of staff to address enterprise requirements and personal/
professional growth.
TASK STATEMENTS
www.infosectrain.com | sales@infosectrain.com 13
5.1 Knowledge of IT resource planning methods
5.2 Knowledge of human resource procurement, assessment, training, and
development methodologies
5.3 Knowledge of processes for acquiring application, information, and
infrastructure resources
5.4 Knowledge of outsourcing and offshoring approaches that may be employed
to meet the investment program and operation level agreements (OLAs) and
service level agreements (SLAs)
5.5 Knowledge of methods used to record and monitor IT resource utilization and
availability
KNOWLEDGE STATEMENTS
5.6 Knowledge of methods used to evaluate and report on IT resource performance
5.7 Knowledge of interoperability, standardization and economies of scale
5.8 Knowledge of data management and data governance concepts
5.9 Knowledge of service level management concepts
www.infosectrain.com | sales@infosectrain.com 14
www.infosectrain.com | sales@infosectrain.com

More Related Content

Similar to CGEIT Course Content InfosecTrain.pdf

Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaEryk Budi Pratama
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...360 BSI
 
Project Portfolio Optimization and Governance
Project Portfolio Optimization and GovernanceProject Portfolio Optimization and Governance
Project Portfolio Optimization and GovernanceValue Amplify Consulting
 
CIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxCIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxanthonywanjohi5
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCERudy Shoushany
 
Strategic IT Planning - S42IL 110714
Strategic IT Planning - S42IL 110714Strategic IT Planning - S42IL 110714
Strategic IT Planning - S42IL 110714strategicforty2
 
Richard Pleasants Resume 12012010
Richard Pleasants Resume 12012010Richard Pleasants Resume 12012010
Richard Pleasants Resume 12012010Richard Pleasants
 
Frameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information TechnologyFrameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information TechnologyJohn Halliday
 
Developing IT strategy
Developing IT strategyDeveloping IT strategy
Developing IT strategyAnurag Purohit
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013James Sutter
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013Jim Sutter
 
Day 1: ICT Strategic Planning, Mr. Soufiane Ben Moussa, CTO, House of Commons...
Day 1: ICT Strategic Planning, Mr. Soufiane Ben Moussa, CTO, House of Commons...Day 1: ICT Strategic Planning, Mr. Soufiane Ben Moussa, CTO, House of Commons...
Day 1: ICT Strategic Planning, Mr. Soufiane Ben Moussa, CTO, House of Commons...wepc2016
 
Proposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITProposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITMehran Misaghi
 
Sheila Jeffrey - Well Behaved Data - It's a Matter of Principles
Sheila Jeffrey - Well Behaved Data - It's a Matter of PrinciplesSheila Jeffrey - Well Behaved Data - It's a Matter of Principles
Sheila Jeffrey - Well Behaved Data - It's a Matter of Principlesiasaglobal
 

Similar to CGEIT Course Content InfosecTrain.pdf (20)

Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL Indonesia
 
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
IT Governance: Governance & Management of Enterprise IT, 25 - 28 October 2015...
 
CGEIT sertifikacija
CGEIT sertifikacijaCGEIT sertifikacija
CGEIT sertifikacija
 
Project Portfolio Optimization and Governance
Project Portfolio Optimization and GovernanceProject Portfolio Optimization and Governance
Project Portfolio Optimization and Governance
 
ERP for IT
ERP for ITERP for IT
ERP for IT
 
IT Strategy
IT StrategyIT Strategy
IT Strategy
 
Implementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to SuccessImplementing IT Service Management: A Guide to Success
Implementing IT Service Management: A Guide to Success
 
CIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptxCIT 3122 IS Governance Lecture 3.pptx
CIT 3122 IS Governance Lecture 3.pptx
 
MAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCEMAKING SENSE OF IT GOVERNANCE
MAKING SENSE OF IT GOVERNANCE
 
Strategic IT Planning - S42IL 110714
Strategic IT Planning - S42IL 110714Strategic IT Planning - S42IL 110714
Strategic IT Planning - S42IL 110714
 
Sharpening the Lens
Sharpening the LensSharpening the Lens
Sharpening the Lens
 
Richard Pleasants Resume 12012010
Richard Pleasants Resume 12012010Richard Pleasants Resume 12012010
Richard Pleasants Resume 12012010
 
Frameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information TechnologyFrameworks to drive value from your investment in Information Technology
Frameworks to drive value from your investment in Information Technology
 
Developing IT strategy
Developing IT strategyDeveloping IT strategy
Developing IT strategy
 
april2023.pptx
april2023.pptxapril2023.pptx
april2023.pptx
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
Day 1: ICT Strategic Planning, Mr. Soufiane Ben Moussa, CTO, House of Commons...
Day 1: ICT Strategic Planning, Mr. Soufiane Ben Moussa, CTO, House of Commons...Day 1: ICT Strategic Planning, Mr. Soufiane Ben Moussa, CTO, House of Commons...
Day 1: ICT Strategic Planning, Mr. Soufiane Ben Moussa, CTO, House of Commons...
 
Proposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise ITProposal of a Framework of Lean Governance and Management of Enterprise IT
Proposal of a Framework of Lean Governance and Management of Enterprise IT
 
Sheila Jeffrey - Well Behaved Data - It's a Matter of Principles
Sheila Jeffrey - Well Behaved Data - It's a Matter of PrinciplesSheila Jeffrey - Well Behaved Data - It's a Matter of Principles
Sheila Jeffrey - Well Behaved Data - It's a Matter of Principles
 

More from infosec train

CRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdfCRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdfinfosec train
 
Everything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrainEverything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTraininfosec train
 
Top 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTrainTop 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTraininfosec train
 
Cloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTrainCloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTraininfosec train
 
Threat- Hunting-Tips .pdf InfosecTrain
Threat- Hunting-Tips  .pdf  InfosecTrainThreat- Hunting-Tips  .pdf  InfosecTrain
Threat- Hunting-Tips .pdf InfosecTraininfosec train
 
AXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectrainAXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectraininfosec train
 
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdfInterpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdfinfosec train
 
Cybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdfCybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdfinfosec train
 
𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf
𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf
𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdfinfosec train
 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfinfosec train
 
GRC Online Training by InfosecTrain.pdf
GRC Online Training by  InfosecTrain.pdfGRC Online Training by  InfosecTrain.pdf
GRC Online Training by InfosecTrain.pdfinfosec train
 
PMP Certification Training Course.pdf
PMP Certification Training    Course.pdfPMP Certification Training    Course.pdf
PMP Certification Training Course.pdfinfosec train
 
upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01infosec train
 
Best SOC Career Guide InfosecTrain .pdf
Best SOC Career Guide  InfosecTrain .pdfBest SOC Career Guide  InfosecTrain .pdf
Best SOC Career Guide InfosecTrain .pdfinfosec train
 
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrainNIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTraininfosec train
 
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdfPCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdfinfosec train
 
Types of Data Privacy by InfosecTrain.pdf
Types of Data Privacy by InfosecTrain.pdfTypes of Data Privacy by InfosecTrain.pdf
Types of Data Privacy by InfosecTrain.pdfinfosec train
 
CEH v12 Online Certification Training.pdf
CEH v12 Online Certification Training.pdfCEH v12 Online Certification Training.pdf
CEH v12 Online Certification Training.pdfinfosec train
 
Privacy Impact Assessment vs Risk Assessment vs Business Impact Assessment.pdf
Privacy Impact Assessment vs Risk Assessment vs Business Impact Assessment.pdfPrivacy Impact Assessment vs Risk Assessment vs Business Impact Assessment.pdf
Privacy Impact Assessment vs Risk Assessment vs Business Impact Assessment.pdfinfosec train
 
Antivirus vs Firewall Deep Expansion.pdf
Antivirus vs Firewall Deep Expansion.pdfAntivirus vs Firewall Deep Expansion.pdf
Antivirus vs Firewall Deep Expansion.pdfinfosec train
 

More from infosec train (20)

CRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdfCRISC Domains Mind Map InfosecTrain .pdf
CRISC Domains Mind Map InfosecTrain .pdf
 
Everything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrainEverything about APT29. pdf InfosecTrain
Everything about APT29. pdf InfosecTrain
 
Top 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTrainTop 10 Cyber Attacks 2024.pdf InfosecTrain
Top 10 Cyber Attacks 2024.pdf InfosecTrain
 
Cloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTrainCloud Storage vs. Local Storage.pdf InfosecTrain
Cloud Storage vs. Local Storage.pdf InfosecTrain
 
Threat- Hunting-Tips .pdf InfosecTrain
Threat- Hunting-Tips  .pdf  InfosecTrainThreat- Hunting-Tips  .pdf  InfosecTrain
Threat- Hunting-Tips .pdf InfosecTrain
 
AXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectrainAXIS Bank Credit Card Fraud.pdf infosectrain
AXIS Bank Credit Card Fraud.pdf infosectrain
 
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdfInterpreting the Malicious Mind Motive Behind Cyberattacks.pdf
Interpreting the Malicious Mind Motive Behind Cyberattacks.pdf
 
Cybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdfCybersecurity Expert Training InfosecTrain.pdf
Cybersecurity Expert Training InfosecTrain.pdf
 
𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf
𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf
𝐃𝐚𝐭𝐚 𝐏𝐫𝐢𝐯𝐚𝐜𝐲 𝐂𝐡𝐚𝐥𝐥𝐞𝐧𝐠𝐞𝐬 & 𝐒𝐨𝐥𝐮𝐭𝐢𝐨𝐧𝐬!.pdf
 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdf
 
GRC Online Training by InfosecTrain.pdf
GRC Online Training by  InfosecTrain.pdfGRC Online Training by  InfosecTrain.pdf
GRC Online Training by InfosecTrain.pdf
 
PMP Certification Training Course.pdf
PMP Certification Training    Course.pdfPMP Certification Training    Course.pdf
PMP Certification Training Course.pdf
 
upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01upcoming batches of InfosecTrain .pdf 01
upcoming batches of InfosecTrain .pdf 01
 
Best SOC Career Guide InfosecTrain .pdf
Best SOC Career Guide  InfosecTrain .pdfBest SOC Career Guide  InfosecTrain .pdf
Best SOC Career Guide InfosecTrain .pdf
 
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrainNIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
 
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdfPCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
PCI-DSS(Payment Card Industry Data Security Standard) Training .pdf
 
Types of Data Privacy by InfosecTrain.pdf
Types of Data Privacy by InfosecTrain.pdfTypes of Data Privacy by InfosecTrain.pdf
Types of Data Privacy by InfosecTrain.pdf
 
CEH v12 Online Certification Training.pdf
CEH v12 Online Certification Training.pdfCEH v12 Online Certification Training.pdf
CEH v12 Online Certification Training.pdf
 
Privacy Impact Assessment vs Risk Assessment vs Business Impact Assessment.pdf
Privacy Impact Assessment vs Risk Assessment vs Business Impact Assessment.pdfPrivacy Impact Assessment vs Risk Assessment vs Business Impact Assessment.pdf
Privacy Impact Assessment vs Risk Assessment vs Business Impact Assessment.pdf
 
Antivirus vs Firewall Deep Expansion.pdf
Antivirus vs Firewall Deep Expansion.pdfAntivirus vs Firewall Deep Expansion.pdf
Antivirus vs Firewall Deep Expansion.pdf
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

CGEIT Course Content InfosecTrain.pdf

  • 1.
  • 2. www.infosectrain.com | sales@infosectrain.com 01 Overview CGEIT certification at InfosecTrain provides you the credibility to discuss critical issues around governance and strategic alignment, and the traction to consider a move to the C-suite, if you aren’t already there. The CGEIT is designed for professionals who have management, advisory, and/or assurance responsibilities relating to the governance of IT.
  • 3. Advantages of CGEIT Certification • A global and prestigious, lifelong symbol of knowledge and expertise. • Competitive advantage that will distinguish you from your peers. • Higher earnings and greater career growth. • The benefits of becoming part of an elite peer network. • The ability to leverage the tools and resources of a global community of industry experts. Target Audience • IS/IT Directors • IS/IT Managers • IS/IT Consultants • IT Governance Professionals Pre-Requisite In order to qualify for the CGEIT, you must have: • Five (5) or more years of experience managing, serving in an advisory or oversight role, and/or otherwise supporting the governance of the IT-related contribution to an enterprise is required to apply for certification. • IS/IT Executives Security Managers • System Analysts • Consultants www.infosectrain.com | sales@infosectrain.com 02
  • 4. Why Infosec Train? Certified & Experienced Instructor Flexible Schedule Access to the recorded sessions Tailor Made Training Telegram Discussion Group Post Training Support Exam Information Duration 4 hours Number of Questions 150 Question format Passing grade Languages available Multiple Choice 450 out of 800 English, French, German, Hebrew, Italian, Japanese, Korean, Spanish, Turkish, Chinese www.infosectrain.com | sales@infosectrain.com 03
  • 5. www.infosectrain.com | sales@infosectrain.com 04 Framework for the Governance of Enterprise IT Strategic Management Benefits Realization Risk Optimization Resource Optimization DOMAIN 01 DOMAIN 02 DOMAIN 03 DOMAIN 05 DOMAIN 04 CGEIT COURSE CONTENT
  • 6. Domain 1: Framework for the Governance of Enterprise IT 1.1 Ensure that a framework for the governance of enterprise IT is established and enables the achievement of enterprise goals and objectives to create stakeholder value, taking into account benefits realization, risk optimization, and resource optimization. 1.2 Identify the requirements and objectives for the framework for the governance of enterprise IT incorporating input from enablers such as principles, policies and frameworks; processes; organizational structures; culture, ethics and behavior; information; services, infrastructure and applications; people, skills and competencies. 1.3 Ensure that the framework for the governance of enterprise IT addresses applicable internal and external requirements (for example, principles, policies and standards, laws, regulations, service capabilities and contracts). 1.4 Ensure that strategic planning processes are incorporated into the framework for the governance of enterprise IT. 1.5 Ensure the incorporation of enterprise architecture (EA) into the framework for the governance ofenterprise IT in order to optimize IT-enabled business solutions. 1.6 Ensure that the framework for the governance of enterprise IT incorporates comprehensive and repeatable processes and activities. 1.7 Ensure that the roles, responsibilities and accountabilities for information systems and IT processes are established. 1.8 Ensure issues related to the framework for the governance of enterprise IT are reviewed, monitored, reported and remediated. 1.9 Ensure that organizational structures are in place to enable effective planning and implementation of IT-enabled business investments. 1.10 Ensure the establishment of a communication channel to reinforce the value of the governance of enterprise IT and transparency of IT costs, benefits and risk throughout the enterprise. TASK STATEMENTS www.infosectrain.com | sales@infosectrain.com 05
  • 7. 1.11 Ensure that the framework for the governance of enterprise IT is periodically assessed, including the identification of improvement opportunities. www.infosectrain.com | sales@infosectrain.com 06 1.1 Knowledge of components of a framework for the governance of enterprise IT 1.2 Knowledge of IT governance industry practices, standards and frameworks (for example, COBIT, Information Technology Infrastructure Library [ITIL], International Organization for Standardization [ISO] 20000, ISO 38500) 1.3 Knowledge of business drivers related to IT governance (for example, legal, regulatory and contractual requirements) 1.4 Knowledge of IT governance enablers (for example, principles, policies and frameworks; processes; organizational structures; culture, ethics and behavior; information; services, infrastructure and applications; people, skills and competencies) 1.5 Knowledge of techniques used to identify IT strategy (for example, SWOT, BCG Matrix) 1.6 Knowledge of components, principles, and concepts related to enterprise architecture (EA) 1.7 Knowledge of Organizational structures and their roles and responsibilities (for example, enterprise investment committee, program management office, IT strategy committee, IT architecture review board, IT risk management committee) 1.8 Knowledge of methods to manage organizational, process and cultural change 1.9 Knowledge of models and methods to establish accountability for information requirements, data and system ownership; and IT processes 1.10 Knowledge of IT governance monitoring processes/mechanisms (for example, balanced scorecard (BSC) 1.11 Knowledge of IT governance reporting processes/mechanisms 1.12 Knowledge of communication and promotion techniques 1.13 Knowledge of assurance methodologies and techniques 1.14 Knowledge of continuous improvement techniques and processes KNOWLEDGE STATEMENTS
  • 8. Domain 2: Strategic Management 2.1 Evaluate, direct and monitor IT strategic planning processes to ensure alignment with enterprise goals. 2.2 Ensure that appropriate policies and procedures are in place to support IT and enterprise strategic alignment. 2.3 Ensure that the IT strategic planning processes and related outputs are adequately documented and communicated. 2.4 Ensure that enterprise architecture (EA) is integrated into the IT strategic planning process. 2.5 Ensure prioritization of IT initiatives to achieve enterprise objectives. 2.6 Ensure that IT objectives cascade into clear roles, responsibilities and actions of IT personnel. TASK STATEMENTS www.infosectrain.com | sales@infosectrain.com 07 2.1 Knowledge of an enterprise’s strategic plan and how it relates to IT 2.2 Knowledge of strategic planning processes and techniques 2.3 Knowledge of impact of changes in business strategy on IT strategy 2.4 Knowledge of barriers to the achievement of strategic alignment 2.5 Knowledge of policies and procedures necessary to support IT and business strategic alignment 2.6 Knowledge of methods to document and communicate IT strategic planning processes (for example, IT dashboard/balanced scorecard, key indicators) 2.7 Knowledge of components, principles and frameworks of enterprise architecture (EA) 2.8 Knowledge of current and future technologies 2.9 Knowledge of prioritization processes related to IT initiatives KNOWLEDGE STATEMENTS
  • 9. 2.10 Knowledge of scope, objectives and benefits of IT investment programs 2.11 Knowledge of IT roles and responsibilities and methods to cascade business and IT objectives to IT personnel www.infosectrain.com | sales@infosectrain.com 08
  • 10. Domain 3: Benefits Realization 3.1 Ensure that IT-enabled investments are managed as a portfolio of investments. 3.2 Ensure that IT-enabled investments are managed through their economic life cycle to achieve business benefit. 3.3 Ensure business ownership and accountability for IT-enabled investments are established. 3.4 Ensure that IT investment management practices align with enterprise investment management practices. 3.5 Ensure that IT-enabled investment portfolios, IT processes and IT services are evaluated and benchmarked to achieve business benefit. 3.6 Ensure that outcome and performance measures are established and evaluated to assess progress towards the achievement of enterprise and IT objectives. 3.7 Ensure that outcome and performance measures are monitored and reported to key stakeholders in a timely manner. 3.8 Ensure that improvement initiatives are identified, prioritized, initiated and managed based on outcome and performance measures. TASK STATEMENTS www.infosectrain.com | sales@infosectrain.com 09 3.1 Knowledge of IT investment management processes, including the economic life cycle of investments 3.2 Knowledge of basic principles of portfolio management 3.3 Knowledge of benefit calculation techniques (for example, earned value, total cost of ownership, return on investment) 3.4 Knowledge of process and service measurement techniques (for example, maturity models, benchmarking, key performance indicators [KPIs]) KNOWLEDGE STATEMENTS
  • 11. 3.5 Knowledge of processes and practices for planning, development, transition, delivery, and support of IT solutions and services 3.6 Knowledge of continuous improvement concepts and principles 3.7 Knowledge of outcome and performance measurement techniques (for example, service metrics, key performance indicators [KPIs]) 3.8 Knowledge of procedures to manage and report the status of IT investments 3.9 Knowledge of cost optimization strategies (for example, outsourcing, adoption of new technologies) 3.10 Knowledge of models and methods to establish accountability over IT investments 3.11 Knowledge of value delivery frameworks (for example, Val IT) 3.12 Knowledge of business case development and evaluation techniques www.infosectrain.com | sales@infosectrain.com 10
  • 12. Domain 4: Risk Optimization 4.1 Ensure that comprehensive IT risk management processes are established to identify, analyze, mitigate, manage, monitor, and communicate IT risk. 4.2 Ensure that legal and regulatory compliance requirements are addressed through IT risk management. 4.3 Ensure that IT risk management is aligned with the enterprise risk management (ERM) framework. 4.4 Ensure appropriate senior level management sponsorship for IT risk management. 4.5 Ensure that IT risk management policies, procedures and standards are developed and communicated. 4.6 Ensure the identification of key risk indicators (KRIs). 4.7 Ensure timely reporting and proper escalation of risk events and responses to appropriate levels of management. TASK STATEMENTS www.infosectrain.com | sales@infosectrain.com 11 4.1 Knowledge of the application of risk management at the strategic, portfolio, program, project and operations levels 4.2 Knowledge of risk management frameworks and standards (for example, RISK IT, the Committee of Sponsoring Organizations of the Treadway Commission Enterprise Risk Management—Integrated Framework (2004) [COSO ERM], International Organization for Standardization (ISO) 31000) 4.3 Knowledge of the relationship of the risk management approach to legal and regulatory compliance 4.4 Knowledge of methods to align IT and enterprise risk management (ERM) 4.5 Knowledge of the relationship of the risk management approach to business resiliency (for example, business continuity planning [BCP] and disaster recovery planning [DRP]) KNOWLEDGE STATEMENTS
  • 13. 4.6 Knowledge of risk, threats, vulnerabilities and opportunities inherent in the use of IT 4.7 Knowledge of types of business risk, exposures and threats (for example, external environment, internal fraud, information security) that can be addressed using IT resources 4.8 Knowledge of risk appetite and risk tolerance 4.9 Knowledge of quantitative and qualitative risk assessment methods 4.10 Knowledge of risk mitigation strategies related to IT in the enterprise 4.11 Knowledge of methods to monitor effectiveness of mitigation strategies and/or controls 4.12 Knowledge of stakeholder analysis and communication techniques 4.13 Knowledge of methods to establish key risk indicators (KRIs) 4.14 Knowledge of methods to manage and report the status of identified risk www.infosectrain.com | sales@infosectrain.com 12
  • 14. Domain 5: Resource Optimization 5.1 Ensure that processes are in place to identify, acquire and maintain IT resources and capabilities (i.e., information, services, infrastructure and applications, and people). 5.2 Evaluate, direct and monitor sourcing strategies to ensure existing resources are taken into account to optimize IT resource utilization. 5.3 Ensure the integration of IT resource management into the enterprise’s strategic and tactical planning. 5.4 Ensure the alignment of IT resource management processes with the enterprise’s resource management processes. 5.5 Ensure that a resource gap analysis process is in place so that IT is able to meet strategic objectives of the enterprise. 5.6 Ensure that policies exist to guide IT resource sourcing strategies that include service level agreements (SLAs) and changes to sourcing strategies. 5.7 Ensure that policies and processes are in place for the assessment, training and development of staff to address enterprise requirements and personal/ professional growth. TASK STATEMENTS www.infosectrain.com | sales@infosectrain.com 13 5.1 Knowledge of IT resource planning methods 5.2 Knowledge of human resource procurement, assessment, training, and development methodologies 5.3 Knowledge of processes for acquiring application, information, and infrastructure resources 5.4 Knowledge of outsourcing and offshoring approaches that may be employed to meet the investment program and operation level agreements (OLAs) and service level agreements (SLAs) 5.5 Knowledge of methods used to record and monitor IT resource utilization and availability KNOWLEDGE STATEMENTS
  • 15. 5.6 Knowledge of methods used to evaluate and report on IT resource performance 5.7 Knowledge of interoperability, standardization and economies of scale 5.8 Knowledge of data management and data governance concepts 5.9 Knowledge of service level management concepts www.infosectrain.com | sales@infosectrain.com 14