For business inquiries : (+971) 561803315

For special requests : (+971) 561803315

A propos de la formation TOGAF 9.2

Explore key concepts, methodologies, and architecture development phases. Align business and IT strategies, enhance efficiency, and earn TOGAF 9.2 certification. Elevate your skills for impactful contributions to organizational success.

Détails
Objectifs pédagogiques de la formation TOGAF 9.2
  • Gain a comprehensive understanding of the TOGAF® framework for Enterprise Architecture
  • Navigate through the Architecture Development Method (ADM) phases for effective architecture lifecycle management
  • Establish and sustain Enterprise Architecture functions within an organization
  • Effectively manage stakeholders and architecture requirements using TOGAF® principles
  • Apply TOGAF® governance practices and employ change management methodologies
  • Align IT initiatives with overarching business strategies using TOGAF® standards.

Qui devrait suivre cette formation TOGAF 9.2 ?

Public visé par la formation TOGAF 9.2

Professionals aiming for a foundational or comprehensive understanding of Enterprise Architecture, including roles like Enterprise Architects, IT Managers, Project Managers, and Business Analysts.  

Prérequis de la formation TOGAF 9.2

No formal prerequisites are required for the TOGAF® Foundation and Practitioner Training. Open to individuals from diverse professional backgrounds.

Formations Similaires

  • CISA – Certified Information Systems Auditor Détails
  • NIST CyberSecurity Framework 2.0 Détails
  • Security Manager Détails
  • COBIT 2019 Détails
  • TOGAF 9.2 Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Course Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27001 Lead Auditor Training Course Détails
  • ISO 27005 Training Détails
  • ISO 27002 Foundation Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • EBios Détails
  • TOGAF® 10 Détails
  • ISO 22301 Lead Implementer Détails
  • Stormshield Détails
  • Configuring BIG-IP - Application Security Manager (ASM) Détails
  • ForgeRock Détails
  • Spring Security 5 Détails
  • Certified Ethical Hacker (CEH) v12 Détails
  • Implementing PowerShell Security Détails
  • Veeam Backup and Replication v12 Détails
  • KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
  • LPIC-3 Exam 303: Security Détails
  • SSO (Single Sign-On) Détails
  • IT Governance Détails
  • CCSA, Check Point Certified Security Administrator R81 Détails
  • CCSE - Check Point Certified Security Expert R80.10 Détails
  • Securing Email with Cisco Email Security Appliance SESA Détails
  • Certified Ethical Hacker CEH v12 Détails
  • FCNSA Fortinet Certified Network Security Administrator Détails
  • NSE 4 FortiGate Network Security Professional Détails
  • NSE5 FortiManager 7.0 Détails
  • Securing the Web with Cisco Web Security Appliance Détails
  • Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
  • CCNP Security Détails
  • Android app security Détails
  • Mastering IT Project Audit: Techniques and Best Practices Détails
  • SharePoint : Planification et administration (70-339) Détails

Déroulé de la formation TOGAF 9.2


Module 1: Introduction and Concepts

Enterprise

Purpose of Enterprise Architecture

Benefits of Having an Enterprise Architecture

Framework for Enterprise Architecture

Architecture Domains

Architecture Abstraction in Enterprise Architecture

Enterprise Continuum

Architecture Repository

TOGAF® Content Framework and Enterprise Metamodel

Architecture Capability for Enterprise Architecture

Risk Management

Gap Analysis

 

Module 2: Definitions

Various Definitions

Understand Relevant Terminology

 

Module 3: Introduction to the ADM Phases

TOGAF® ADM and its Phases

“Draft” and “Approved” Deliverables

Iteration and the ADM

Governing the Creation, Development, and Maintenance of Enterprise Architecture

How to Scope an Architecture?

Architecture Alternatives, Concerns, and Trade-Off

Purposes

Objectives

Information Flow Between ADM Phases

How Developing Architecture can be Applied to Support Agile Software Development

 

Module 4: Introduction to ADM Techniques

How the ADM and Supporting Guidelines and Techniques Relate to Each Other?

Purpose: Architecture Principles

Template for Architecture Principles

What Makes a Good Architecture Principle?

Business Scenarios

The Purpose of Gap Analysis

Interoperability

Business Transformation Readiness Assessment

Risk Management and the TOGAF® ADM

 

Module 5: Introduction to Applying the ADM

How to Apply the TOGAF® Standard?

Iteration and the ADM

The Three Levels of the Architecture Landscape

Partitioning to Simplify the Development of an Enterprise Architecture

Purpose-Based Architecture Projects

Applying the TOGAF® Standard to Support the Digital Enterprise

 

Module 6: Introduction to Architecture Governance

Architecture Governance

Why is Architecture Governance Beneficial?

Role of an Architecture Board and its Responsibilities

Architecture Contracts

Architecture Compliance

 

Module 7: Architecture Content

Key Concepts: Stakeholders, Concerns, Architecture Views, Architecture Viewpoints, and their Relationships

Building Blocks and the ADM

The TOGAF® Standard Deliverables Created and Consumed in the TOGAF ADM Phases

 

Module 8: Concepts

Enterprise

The Purpose of Enterprise Architecture

The Benefits of Having an Enterprise Architecture

A Framework for Enterprise Architecture

Architecture Domains

Architecture Abstraction in Enterprise Architecture

The Enterprise Continuum

The Architecture Repository

The TOGAF® Content Framework and Enterprise Metamodel

A Architecture Capability for Enterprise Architecture

Risk Management

Gap Analysis

 

Module 9: Stakeholder Management

How to Identify Stakeholders, their Concerns, Views, and the Communication involved?

The Use of Architecture Views

Stakeholder Engagement and Requirements Management

Using Trade-off to Support Architecture Development

 

Module 10: Phase A, the Starting Point

Information Necessary to Execute the Architecture Vision Phase

How to Apply Phase A and how it Contributes to Architecture Development Work?

Security-Specific Architecture Design that is Sufficient — Phase A

Outputs Necessary to Proceed with the Architecture Development

 

Module 11: Architecture Development

Steps Applicable to all ADM Phases

Risk and Security Considerations during the Architecture Development (ADM Phases B to D)

Relevant Information to Produce Outputs Valuable to the Architecture Development

How to apply Phases B, C, and D, and how they Contribute to the Architecture Development Work

Information Relevant to Phase C (Data and Applications) to Produce Outputs for the Architecture Development

Information Needed in Phase D to Produce Outputs relevant to the Architecture Development

Outputs of Phases B, C, and D Necessary to Proceed with the Architecture Development Work
 

Module 12: Implementing the Architecture

Risk and Security Considerations for Phases E, F, and G

Steps (Phase E) to Create the Implementation and Migration Strategy

Basic Approaches to Implementation

Identifying and Grouping Work Packages

Creating and Documenting Transition Architectures

The Impact of Migration Projects on the Organisation and the Coordination Required

Why and how Business Value is Assigned to each Work Package

How to Prioritise the Migration Projects (Phase F)

Confirm the Architecture Roadmap (Phase F)

The outputs of Phase F necessary to Proceed with the Architecture Implementation

Inputs to Phase G Implementation Governance

How Implementation Governance is Executed (Phase G)

Outputs to support Architecture Governance

How Architecture Contracts are used to communicate with Implementers?

 

Module 13: Architecture Change Management

Inputs Triggering Change Management — Change Requests

Activities necessary for Effective Change Management (Stakeholder Management)

Outputs Relevant to Proceed with a Change

 

Module 14: Requirements Management

Inputs that Feed the Requirements Management Phase

How the Requirements Management steps correspond to ADM Phase Steps?

Purpose of the Outputs of Requirements Management

Formations Similaires
CISA – Certified Information Systems Auditor Détails
NIST CyberSecurity Framework 2.0 Détails
Security Manager Détails
COBIT 2019 Détails
TOGAF 9.2 Détails
ISO 45001 Lead Auditor Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Course Détails
ISO 45001 Lead Implementer Détails
ISO 27001 Lead Auditor Training Course Détails
ISO 27005 Training Détails
ISO 27002 Foundation Détails
Offensive Security Certified Professional (OSCP) Détails
EBios Détails
TOGAF® 10 Détails
ISO 22301 Lead Implementer Détails
Stormshield Détails
Configuring BIG-IP - Application Security Manager (ASM) Détails
ForgeRock Détails
Spring Security 5 Détails
Certified Ethical Hacker (CEH) v12 Détails
Implementing PowerShell Security Détails
Veeam Backup and Replication v12 Détails
KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
LPIC-3 Exam 303: Security Détails
SSO (Single Sign-On) Détails
IT Governance Détails
CCSA, Check Point Certified Security Administrator R81 Détails
CCSE - Check Point Certified Security Expert R80.10 Détails
Securing Email with Cisco Email Security Appliance SESA Détails
Certified Ethical Hacker CEH v12 Détails
FCNSA Fortinet Certified Network Security Administrator Détails
NSE 4 FortiGate Network Security Professional Détails
NSE5 FortiManager 7.0 Détails
Securing the Web with Cisco Web Security Appliance Détails
Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
CCNP Security Détails
Android app security Détails
Mastering IT Project Audit: Techniques and Best Practices Détails
SharePoint : Planification et administration (70-339) Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click