For business inquiries : (+1) 438 601-1155

For special requests : (+1) 438 601-1155

A propos de la formation TOGAF® 10

Covering both Foundation and Practitioner syllabus topics, participants gain essential insights into key concepts, terminology, and methodologies crucial for successful Enterprise Architecture implementation.

Détails
Objectifs pédagogiques de la formation TOGAF® 10
  • Fundamental concepts of Enterprise Architecture and the TOGAF Standard
  • Key terminology integral to the TOGAF Standard
  • The Architecture Development Method (ADM) cycle and adaptation techniques
  • Techniques supporting ADM application-including iteration and its role in a digital enterprise
  • The role of Architecture Governance and architecture content in the development process.

Qui devrait suivre cette formation TOGAF® 10 ?

Public visé par la formation TOGAF® 10

Designed for those seeking an introduction to TOGAF® 10, professionals in architectural roles, and enterprise architects aiming for global recognition. Ideal for prospective Enterprise Architects and individuals preparing for TOGAF® Enterprise Architecture exams.  

Prérequis de la formation TOGAF® 10

No specific prerequisites required; suitable for beginners seeking foundational knowledge in Enterprise Architecture using the TOGAF approach.

Formations Similaires

  • NIST CyberSecurity Framework 2.0 Détails
  • Security Manager Détails
  • COBIT 2019 Détails
  • TOGAF 9.2 Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Course Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27001 Lead Auditor Training Course Détails
  • ISO 27005 Training Détails
  • ISO 27002 Foundation Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • EBios Détails
  • TOGAF® 10 Détails
  • ISO 22301 Lead Implementer Détails
  • Stormshield Détails
  • Configuring BIG-IP - Application Security Manager (ASM) Détails
  • ForgeRock Détails
  • Spring Security 5 Détails
  • Certified Ethical Hacker (CEH) v12 Détails
  • Implementing PowerShell Security Détails
  • Veeam Backup and Replication v12 Détails
  • KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
  • LPIC-3 Exam 303: Security Détails
  • SSO (Single Sign-On) Détails
  • IT Governance Détails
  • CCSA, Check Point Certified Security Administrator R81 Détails
  • CCSE - Check Point Certified Security Expert R80.10 Détails
  • Securing Email with Cisco Email Security Appliance SESA Détails
  • Certified Ethical Hacker CEH v12 Détails
  • FCNSA Fortinet Certified Network Security Administrator Détails
  • NSE 4 FortiGate Network Security Professional Détails
  • NSE5 FortiManager 7.0 Détails
  • Securing the Web with Cisco Web Security Appliance Détails
  • Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
  • CCNP Security Détails
  • Android app security Détails
  • Mastering IT Project Audit: Techniques and Best Practices Détails
  • SharePoint : Planification et administration (70-339) Détails

Déroulé de la formation TOGAF® 10


Module 1: Introduction to TOGAF® 10

Understanding the Evolution and Significance of TOGAF® 10

Exploring the Purpose of Enterprise Architecture

Recognizing the Updated Framework for TOGAF® 10

Key Concepts and Architecture Domains in TOGAF® 10


Module 2: Core Elements of TOGAF® 10

Unpacking the TOGAF® 10 Enterprise Continuum

Utilizing the Enhanced Architecture Repository

TOGAF® Content Framework and Enterprise Metamodel Revisited

Architecture Capability in TOGAF® 10

Integrating Risk Management and Gap Analysis in TOGAF® 10


Module 3: Fundamentals of ADM Phases in TOGAF® 10

Introduction to TOGAF® ADM and its Phases in TOGAF® 10

Dynamic Nature of "Draft" and "Approved" Deliverables

Iterative Processes in TOGAF® 10

Governing Enterprise Architecture Creation and Development

Scoping Strategies for TOGAF® 10 Architecture

Architecture Alternatives, Concerns, and Trade-Offs

Aligning with Agile Principles in a Digital Enterprise


Module 4: Techniques and Guidelines in TOGAF® 10

Correlating ADM and Supporting Guidelines and Techniques in TOGAF® 10

Practical Application of Architecture Principles

Crafting Effective Business Scenarios

Gap Analysis and Interoperability Considerations

Business Transformation Readiness Assessment in TOGAF® 10


Module 5: Applying TOGAF® 10 in Practice

Real-world Application of TOGAF® 10 Standard

Understanding Three Levels of Architecture Landscape

Strategies for Partitioning in Enterprise Architecture

Purpose-Based Architecture Projects

Navigating the Digital Enterprise with TOGAF® 10


Module 6: Governance in TOGAF® 10

Architecture Governance Principles

Benefits of Architecture Governance

Role of Architecture Board and Responsibilities

Managing Architecture Contracts and Ensuring Compliance


Module 7: Architecture Content and Stakeholder Management

Key Concepts: Stakeholders, Concerns, and Architecture Views

Building Blocks and TOGAF® 10 Standard Deliverables

Effective Stakeholder Management and Engagement

Utilizing Trade-offs to Support Architecture Development


Module 8: TOGAF® 10 Phase Execution - A Practical Approach

Essential Information for Executing Architecture Vision Phase (Phase A)

Steps to Apply Phase A and Contribute to Architecture Development

Security-Specific Architecture Design in Phase A

Outputs Necessary to Proceed with Architecture Development


Module 9: Comprehensive Architecture Development (Phases B to D)

Risk and Security Considerations in ADM Phases B to D

Producing Valuable Outputs for Architecture Development

Application of Phases B, C, and D in Architecture Development


Module 10: Implementing the Architecture in TOGAF® 10

Risk and Security Considerations for Phases E, F, and G

Creating Implementation and Migration Strategy (Phase E)

Approaches to Implementation and Work Package Identification (Phase F)

Transition Architectures and Coordination for Migration Projects

Prioritizing Migration Projects and Confirming Architecture Roadmap (Phase F)

Outputs Necessary for Architecture Implementation (Phase F)

Implementation Governance Execution (Phase G)

Supporting Outputs for Architecture Governance in Phase G

Leveraging Architecture Contracts for Effective Communication with Implementers


Module 11: Architecture Change Management in TOGAF® 10

Change Requests and Triggering Change Management

Effective Change Management Activities and Stakeholder Engagement

Outputs Relevant for Successful Change Implementation


Module 12: Requirements Management in TOGAF® 10

Inputs Feeding Requirements Management Phase

Correlation of Requirements Management Steps with ADM Phase Steps

Purpose of Outputs from Requirements Management

Formations Similaires
NIST CyberSecurity Framework 2.0 Détails
Security Manager Détails
COBIT 2019 Détails
TOGAF 9.2 Détails
ISO 45001 Lead Auditor Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Course Détails
ISO 45001 Lead Implementer Détails
ISO 27001 Lead Auditor Training Course Détails
ISO 27005 Training Détails
ISO 27002 Foundation Détails
Offensive Security Certified Professional (OSCP) Détails
EBios Détails
TOGAF® 10 Détails
ISO 22301 Lead Implementer Détails
Stormshield Détails
Configuring BIG-IP - Application Security Manager (ASM) Détails
ForgeRock Détails
Spring Security 5 Détails
Certified Ethical Hacker (CEH) v12 Détails
Implementing PowerShell Security Détails
Veeam Backup and Replication v12 Détails
KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
LPIC-3 Exam 303: Security Détails
SSO (Single Sign-On) Détails
IT Governance Détails
CCSA, Check Point Certified Security Administrator R81 Détails
CCSE - Check Point Certified Security Expert R80.10 Détails
Securing Email with Cisco Email Security Appliance SESA Détails
Certified Ethical Hacker CEH v12 Détails
FCNSA Fortinet Certified Network Security Administrator Détails
NSE 4 FortiGate Network Security Professional Détails
NSE5 FortiManager 7.0 Détails
Securing the Web with Cisco Web Security Appliance Détails
Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
CCNP Security Détails
Android app security Détails
Mastering IT Project Audit: Techniques and Best Practices Détails
SharePoint : Planification et administration (70-339) Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click