For business inquiries : (+1) 438 601-1155

For special requests : (+1) 438 601-1155

A propos de la formation COBIT 2019

Offering best practices in both governance and management, COBIT 2019 is designed to guide organizations in effectively overseeing and handling their enterprise information and technology.

Détails
Objectifs pédagogiques de la formation COBIT 2019
  • Gain the skills to manage performance using COBIT 2019- ensuring optimal governance and management of enterprise IT
  • Learn to design and implement a governance system customized to the unique needs of your organization using COBIT 2019 best practices
  • Understand and proficiently apply COBIT 2019's goals cascade- ensuring alignment with organizational objectives and priorities
  • Acquire the knowledge and techniques to implement COBIT 2019 using a seven-stage model- ensuring a structured and effective application of the framework in diverse organizational contexts.

Qui devrait suivre cette formation COBIT 2019 ?

Public visé par la formation COBIT 2019

IT Professionals, Governance Managers, Information Security Officers, Business Leaders, Risk and Assurance Professionals, Project Managers  

Prérequis de la formation COBIT 2019

No specific professional prerequisites. Recommended pre-course study guide provided by Learning Tree for optimal preparation.

Formations Similaires

  • NIST CyberSecurity Framework 2.0 Détails
  • Security Manager Détails
  • COBIT 2019 Détails
  • TOGAF 9.2 Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Course Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27001 Lead Auditor Training Course Détails
  • ISO 27005 Training Détails
  • ISO 27002 Foundation Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • EBios Détails
  • TOGAF® 10 Détails
  • ISO 22301 Lead Implementer Détails
  • Stormshield Détails
  • Configuring BIG-IP - Application Security Manager (ASM) Détails
  • ForgeRock Détails
  • Spring Security 5 Détails
  • Certified Ethical Hacker (CEH) v12 Détails
  • Implementing PowerShell Security Détails
  • Veeam Backup and Replication v12 Détails
  • KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
  • LPIC-3 Exam 303: Security Détails
  • SSO (Single Sign-On) Détails
  • IT Governance Détails
  • CCSA, Check Point Certified Security Administrator R81 Détails
  • CCSE - Check Point Certified Security Expert R80.10 Détails
  • Securing Email with Cisco Email Security Appliance SESA Détails
  • Certified Ethical Hacker CEH v12 Détails
  • FCNSA Fortinet Certified Network Security Administrator Détails
  • NSE 4 FortiGate Network Security Professional Détails
  • NSE5 FortiManager 7.0 Détails
  • Securing the Web with Cisco Web Security Appliance Détails
  • Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
  • CCNP Security Détails
  • Android app security Détails
  • Mastering IT Project Audit: Techniques and Best Practices Détails
  • SharePoint : Planification et administration (70-339) Détails

Déroulé de la formation COBIT 2019


Module 1: Key Concepts and Terminology of COBIT 2019

Structure and format of the COBIT 2019 framework

Key stakeholders of COBIT 2019

Business benefits provided by COBIT 2019

 

Module 2: Analyzing the Six Governance Principles

Provide stakeholder value

Benefits realization

Risk and resource optimization

Supporting the creation of business value through IT

Transforming stakeholder needs into an enterprise's actionable strategy

Clarifying the purpose of the goals cascade

Translating high-level enterprise goals into specific IT-related goals

Holistic approach

Evaluating the key components of a governance system

Dynamic governance system

Creating a dynamic governance system

Governance distinct from management

Distinguishing between governance and management in an enterprise

Relationships between governance and management

Tailored to enterprise needs

Using design factors to produce an enterprise-specific governance system

Using COBIT variants to tailor for a specific purpose or context

End-to-end governance system

A framework for business and IT leaders

Interrelating key roles and activities

 

Module 3: Analyzing the Three Governance Framework Principles

Based on conceptual model

Identifying key components

Relationships between key components

Maximizing consistency and allowing automation

Open and flexible

Updating content

Addressing new issues

Maintaining integrity and consistency

Aligned to major standards

Alignment between COBIT and related standards, frameworks and regulations

 

Module 4: The Governance System and Components

COBIT 2019 Core Model

The forty governance and management objectives

The five-domain structure

Principles, policies, procedures

Meeting good practice requirements for the scope, compliance, exceptions and monitoring

Differentiating policies, principles and procedures

Processes

Reviewing the key characteristics of the process goal categories

Organizational structures

Implementing practices for operations, responsibility delegation and decision-making

The key responsibilities of key organizational roles

Culture, ethics and behavior

Creating, encouraging and maintaining desired behaviors

Relating organizational and individual ethics with goals

Information

Reviewing the information quality categories

Interrelating the five steps of the information cycle with the information enablers

Applying information attributes to layers

Assessing context and quality of information to the user with key attributes

Services, infrastructure and applications

Analyzing the five architecture principles that govern the use of IT-related resources

Relationship with the other enablers

People, skills and competencies

Defining skill requirements for each role

Mapping the skill categories to the process domains

Skill categories in relation to the process domains

 

Module 5: Performance Management with COBIT 2019

Performance Management Principles

Simple to understand and use

Consistent with conceptual model

Providing reliable, repeatable, relevant results

Flexible to suit different organizations

Supporting multiple assessment types

Managing performance of processes

CMMI-based process capability scheme

The six process capability levels

Focus area maturity levels

Managing performance of other components

 

Module 6: Designing and implementing a tailored governance system

The design process

Understanding the need for tailoring

Using design factors and variants

Stages and steps in the design process

The relationship between design and implementation

The COBIT 2019 seven phase implementation approach


What are the drivers?

Where are we now?

Where do we want to be?

What needs to be done?

How do we get there?

Did we get there?

How do we keep the momentum going?

Formations Similaires
NIST CyberSecurity Framework 2.0 Détails
Security Manager Détails
COBIT 2019 Détails
TOGAF 9.2 Détails
ISO 45001 Lead Auditor Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Course Détails
ISO 45001 Lead Implementer Détails
ISO 27001 Lead Auditor Training Course Détails
ISO 27005 Training Détails
ISO 27002 Foundation Détails
Offensive Security Certified Professional (OSCP) Détails
EBios Détails
TOGAF® 10 Détails
ISO 22301 Lead Implementer Détails
Stormshield Détails
Configuring BIG-IP - Application Security Manager (ASM) Détails
ForgeRock Détails
Spring Security 5 Détails
Certified Ethical Hacker (CEH) v12 Détails
Implementing PowerShell Security Détails
Veeam Backup and Replication v12 Détails
KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
LPIC-3 Exam 303: Security Détails
SSO (Single Sign-On) Détails
IT Governance Détails
CCSA, Check Point Certified Security Administrator R81 Détails
CCSE - Check Point Certified Security Expert R80.10 Détails
Securing Email with Cisco Email Security Appliance SESA Détails
Certified Ethical Hacker CEH v12 Détails
FCNSA Fortinet Certified Network Security Administrator Détails
NSE 4 FortiGate Network Security Professional Détails
NSE5 FortiManager 7.0 Détails
Securing the Web with Cisco Web Security Appliance Détails
Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
CCNP Security Détails
Android app security Détails
Mastering IT Project Audit: Techniques and Best Practices Détails
SharePoint : Planification et administration (70-339) Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click