Pour les demandes entreprises : (+33) 970 466 303

Pour les demandes particuliers : (+33) 180 272 016

A propos de la formation TOGAF 9.2

Explore key concepts, methodologies, and architecture development phases. Align business and IT strategies, enhance efficiency, and earn TOGAF 9.2 certification. Elevate your skills for impactful contributions to organizational success.

Détails
Objectifs pédagogiques de la formation TOGAF 9.2
  • Gain a comprehensive understanding of the TOGAF® framework for Enterprise Architecture
  • Navigate through the Architecture Development Method (ADM) phases for effective architecture lifecycle management
  • Establish and sustain Enterprise Architecture functions within an organization
  • Effectively manage stakeholders and architecture requirements using TOGAF® principles
  • Apply TOGAF® governance practices and employ change management methodologies
  • Align IT initiatives with overarching business strategies using TOGAF® standards.

Qui devrait suivre cette formation TOGAF 9.2 ?

Public visé par la formation TOGAF 9.2

Professionals aiming for a foundational or comprehensive understanding of Enterprise Architecture, including roles like Enterprise Architects, IT Managers, Project Managers, and Business Analysts.  

Prérequis de la formation TOGAF 9.2

No formal prerequisites are required for the TOGAF® Foundation and Practitioner Training. Open to individuals from diverse professional backgrounds.

Formations Similaires

  • CISA – Certified Information Systems Auditor Détails
  • Cobit 5 Détails
  • CISSP – Certified Information Systems Security Professional Détails
  • TOGAF® 9.2 Foundation Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 14000 Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27000 Détails
  • ISO 27005 Risk Manager Détails
  • IS0 27002 Détails
  • IT Management – COBIT Détails
  • IT Management – COBIT. Détails
  • SOC Analyst (Blue Team) Détails
  • Zero Trust Security Framework Détails
  • Sustainability & Green IT pour Collectivités Détails
  • Cyber-resilience des Services Publics Détails
  • Cybersecurity & Cloud Security for Enterprises Détails
  • Pentesting Web Apps & Mobile Apps Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • Smart Cities & Gouvernance Digitale Détails
  • Data for Public Policy & Urban Analytics Détails
  • TOGAF – Enterprise Architecture Framework Détails
  • ISO 19011 Internal Auditor & ISO 27001 (LA) Détails
  • CISM – Certified Information Security Manager Détails
  • SSCP – Systems Security Certified Practitioner Détails
  • DPS-CISA et CISSP Détails
  • Computer Security (SSO Session) Détails
  • ITIL Détails
  • ITIL4 Strategic Leader Certification – Module 1 & 2 Détails
  • IEC 62443 Certification Détails
  • ISO/IEC 27001 – Système de Management de la Sécurité de l’Information Détails
  • ISO 22000 – Système de Management de la Sécurité des Denrées Alimentaires Détails
  • Citrix Certified Advanced Administrator (CCAA) Détails
  • Palo Alto Networks PCCET (Certified Cybersecurity Entry-level Technician) Détails
  • Palo Alto Networks PCNSE (Certified Network Security Engineer) Détails
  • Analyste Cybersécurité Détails
  • ISO/IEC 27001:2022 Détails
  • Veeam Data Platform v12 – Backup, Réplication & Protection des Données Détails
  • Formation ISO/IEC 27001:2022 – Implementation Détails

Déroulé de la formation TOGAF 9.2


Module 1: Introduction and Concepts

Enterprise

Purpose of Enterprise Architecture

Benefits of Having an Enterprise Architecture

Framework for Enterprise Architecture

Architecture Domains

Architecture Abstraction in Enterprise Architecture

Enterprise Continuum

Architecture Repository

TOGAF® Content Framework and Enterprise Metamodel

Architecture Capability for Enterprise Architecture

Risk Management

Gap Analysis

 

Module 2: Definitions

Various Definitions

Understand Relevant Terminology

 

Module 3: Introduction to the ADM Phases

TOGAF® ADM and its Phases

“Draft” and “Approved” Deliverables

Iteration and the ADM

Governing the Creation, Development, and Maintenance of Enterprise Architecture

How to Scope an Architecture?

Architecture Alternatives, Concerns, and Trade-Off

Purposes

Objectives

Information Flow Between ADM Phases

How Developing Architecture can be Applied to Support Agile Software Development

 

Module 4: Introduction to ADM Techniques

How the ADM and Supporting Guidelines and Techniques Relate to Each Other?

Purpose: Architecture Principles

Template for Architecture Principles

What Makes a Good Architecture Principle?

Business Scenarios

The Purpose of Gap Analysis

Interoperability

Business Transformation Readiness Assessment

Risk Management and the TOGAF® ADM

 

Module 5: Introduction to Applying the ADM

How to Apply the TOGAF® Standard?

Iteration and the ADM

The Three Levels of the Architecture Landscape

Partitioning to Simplify the Development of an Enterprise Architecture

Purpose-Based Architecture Projects

Applying the TOGAF® Standard to Support the Digital Enterprise

 

Module 6: Introduction to Architecture Governance

Architecture Governance

Why is Architecture Governance Beneficial?

Role of an Architecture Board and its Responsibilities

Architecture Contracts

Architecture Compliance

 

Module 7: Architecture Content

Key Concepts: Stakeholders, Concerns, Architecture Views, Architecture Viewpoints, and their Relationships

Building Blocks and the ADM

The TOGAF® Standard Deliverables Created and Consumed in the TOGAF ADM Phases

 

Module 8: Concepts

Enterprise

The Purpose of Enterprise Architecture

The Benefits of Having an Enterprise Architecture

A Framework for Enterprise Architecture

Architecture Domains

Architecture Abstraction in Enterprise Architecture

The Enterprise Continuum

The Architecture Repository

The TOGAF® Content Framework and Enterprise Metamodel

A Architecture Capability for Enterprise Architecture

Risk Management

Gap Analysis

 

Module 9: Stakeholder Management

How to Identify Stakeholders, their Concerns, Views, and the Communication involved?

The Use of Architecture Views

Stakeholder Engagement and Requirements Management

Using Trade-off to Support Architecture Development

 

Module 10: Phase A, the Starting Point

Information Necessary to Execute the Architecture Vision Phase

How to Apply Phase A and how it Contributes to Architecture Development Work?

Security-Specific Architecture Design that is Sufficient — Phase A

Outputs Necessary to Proceed with the Architecture Development

 

Module 11: Architecture Development

Steps Applicable to all ADM Phases

Risk and Security Considerations during the Architecture Development (ADM Phases B to D)

Relevant Information to Produce Outputs Valuable to the Architecture Development

How to apply Phases B, C, and D, and how they Contribute to the Architecture Development Work

Information Relevant to Phase C (Data and Applications) to Produce Outputs for the Architecture Development

Information Needed in Phase D to Produce Outputs relevant to the Architecture Development

Outputs of Phases B, C, and D Necessary to Proceed with the Architecture Development Work
 

Module 12: Implementing the Architecture

Risk and Security Considerations for Phases E, F, and G

Steps (Phase E) to Create the Implementation and Migration Strategy

Basic Approaches to Implementation

Identifying and Grouping Work Packages

Creating and Documenting Transition Architectures

The Impact of Migration Projects on the Organisation and the Coordination Required

Why and how Business Value is Assigned to each Work Package

How to Prioritise the Migration Projects (Phase F)

Confirm the Architecture Roadmap (Phase F)

The outputs of Phase F necessary to Proceed with the Architecture Implementation

Inputs to Phase G Implementation Governance

How Implementation Governance is Executed (Phase G)

Outputs to support Architecture Governance

How Architecture Contracts are used to communicate with Implementers?

 

Module 13: Architecture Change Management

Inputs Triggering Change Management — Change Requests

Activities necessary for Effective Change Management (Stakeholder Management)

Outputs Relevant to Proceed with a Change

 

Module 14: Requirements Management

Inputs that Feed the Requirements Management Phase

How the Requirements Management steps correspond to ADM Phase Steps?

Purpose of the Outputs of Requirements Management

Formations Similaires
CISA – Certified Information Systems Auditor Détails
Cobit 5 Détails
CISSP – Certified Information Systems Security Professional Détails
TOGAF® 9.2 Foundation Détails
ISO 45001 Lead Auditor Détails
ISO 14000 Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Détails
ISO 45001 Lead Implementer Détails
ISO 27000 Détails
ISO 27005 Risk Manager Détails
IS0 27002 Détails
IT Management – COBIT Détails
IT Management – COBIT. Détails
SOC Analyst (Blue Team) Détails
Zero Trust Security Framework Détails
Sustainability & Green IT pour Collectivités Détails
Cyber-resilience des Services Publics Détails
Cybersecurity & Cloud Security for Enterprises Détails
Pentesting Web Apps & Mobile Apps Détails
Offensive Security Certified Professional (OSCP) Détails
Smart Cities & Gouvernance Digitale Détails
Data for Public Policy & Urban Analytics Détails
TOGAF – Enterprise Architecture Framework Détails
ISO 19011 Internal Auditor & ISO 27001 (LA) Détails
CISM – Certified Information Security Manager Détails
SSCP – Systems Security Certified Practitioner Détails
DPS-CISA et CISSP Détails
Computer Security (SSO Session) Détails
ITIL Détails
ITIL4 Strategic Leader Certification – Module 1 & 2 Détails
IEC 62443 Certification Détails
ISO/IEC 27001 – Système de Management de la Sécurité de l’Information Détails
ISO 22000 – Système de Management de la Sécurité des Denrées Alimentaires Détails
Citrix Certified Advanced Administrator (CCAA) Détails
Palo Alto Networks PCCET (Certified Cybersecurity Entry-level Technician) Détails
Palo Alto Networks PCNSE (Certified Network Security Engineer) Détails
Analyste Cybersécurité Détails
ISO/IEC 27001:2022 Détails
Veeam Data Platform v12 – Backup, Réplication & Protection des Données Détails
Formation ISO/IEC 27001:2022 – Implementation Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click