Course Overview

Information security is becoming more and more important. The globalisation of the economy leads to an increasing exchange of information between organisations (employees, customers and suppliers), an increasing use of networks, such as the internal company network, the interconnection with networks of other companies and the Internet. Moreover, the activities of many companies now depend on ICT, with information becoming a valuable business asset.

Information security is essential to ensure the proper functioning and continuity of the organisation: information must be reliable.This Information Security Foundation based on ISO IEC 27001 course provide you all knowledge for the EXIN Information Security Foundation and is a relevant certification for all professionals who work with confidential information. It tests the understanding of concepts and value of information security as well as the threats and risks.

Course Objectives

 Information and Security
– Threats and risks
– Approach and Organisation
– Actions
– Law and Regulations
– Examination training

Course Content

  • Information and security
  • Threats and risks
  • Approach and organization
  • Measures
  • Legislation and regulation

Course Overview

The Third-party Risk Management application provides a centralized process for managing your organization’s third-party portfolio, performing due diligence when onboarding third-parties, and completing the risk assessment. Also, integrating with other GRC applications, provides top-down traceability for compliance with controls and risks.

Join our class to discuss how to get started developing Third-party Risk Management (TPRM) implementation strategy. This 2-day class covers domain knowledge, common technical aspects of an implementation as well as processes to effectively manage it.

Attendees will learn tactical skills and strategies that will better prepare them to implement Third-party Risk soundly and efficiently. Through lectures, group discussion, demonstrations, and hands-on labs, students build on existing knowledge and skills by applying implementation best practices. Course topics include:

– Third-party Risk Management Overview

– Core Configuration

– Assessment Configuration

– Approval and Workflow Changes

– Third-party Portal Experience

– Application Relationships

– Dashboards and Reports

Course Objectives

  • Navigate the TPRM application components and prepare for implementation
  • Configure Core data elements: Third Parties, Contacts, and Inherent Risk Questionnaires (IRQs)
  • Configure assessments in the Assessment Designer to create/modify multiple types of assessments included in the Third-party Risk Management process
  • Identify baseline workflows and potential custom workflows needed by a customer
  • Configure the Third-party Assessment Portal
  • Define relationship between assessment questions and GRC applicationsa

Course Overview

COBIT ® is a framework for the enterprise governance and management of information and technology (I&T) that supports enterprise goal achievement. This 2-day course highlights the concepts, models and key definitions of the COBIT framework and helps prepare learners to take the COBIT 2019 Foundation Exam. This COBIT 2019 Foundation training and exam covers eight key areas: 

  1. Framework introduction
  2. Principles
  3. Governance system and components
  4. Governance and management objectives
  5. Performance management
  6. Designing a tailored governance system
  7. Business case
  8. Implementation

Certificate candidates explore COBIT 2019 concepts, principles and methodologies used to establish, enhance and maintain a system for effective governance and management of enterprise information technology. The exam will test a candidate’s understanding of the topics and those that achieve a passing score on the COBIT 2019 Foundation exam receive the COBIT 2019 Foundation Certificate.

COBIT® is a Trademark of ISACA® registered in the United States and other countries

Course Objectives

At the conclusion of this course, attendees will be able to understand:

  • Recognize the target audience of COBIT 2019.
  • Recognize the context, benefits and key reasons COBIT is used as an information and technology governance framework.
  • Recognize the descriptions and purposes of the COBIT product architecture.
  • Recall the alignment of COBIT with other applicable frameworks, standards and bodies of knowledge.
  • Understand and describe the governance “system” and governance “framework” principles.
  • Describe the components of a governance system.
  • Understand the overall structure and contents of the Goals Cascade.
  • Recall the 40 Governance and Management Objectives and their purpose statements.
  • Understand the relationship between Governance and Management Objectives and Governance Components.
  • Differentiate COBIT based performance management using maturity and capability perspectives.
  • Discover how to design a tailored governance system using COBIT.
  • Explain the key points of the COBIT business case.
  • Understand and recall the phases of the COBIT implementation approach.
  • Describe the relationships between the COBIT Design and Implementation Guides.
  • Prepare for the COBIT 2019 Foundation exam

Course Content

  • Module 1:  Course Introduction
  • Module 2:  Framework Introduction
  • Module 3:  Principles
  • Module 4:  Governance System and Components
  • Module 5:  Governance and Management Objectives
  • Module 6:  Performance Management
  • Module 7:  Designing a Tailored Governance System
  • Module 8:  Business Case
  • Module 9:  Implementation
  • Module 10: Closing

Course Overview

CGEIT recognizes a wide range of professionals for their knowledge and application of enterprise IT governance principles and practices. As a CGEIT certified professional, you demonstrate that you are capable of bringing IT governance into an organization—that you grasp the complex subject holistically, and therefore, enhance value to the enterprise.

When an enterprise employs a CGEIT, they ensure good governance, which provides for an environment of no or few “surprises” and the ability to have an agile response to any that arise. CGEIT is considered by many companies and governmental agencies as a prerequisite for employees involved with enterprise IT governance.

For the professional, CGEIT provides:

  • A global and prestigious, lifelong symbol of knowledge and expertise.
  • Competitive advantage that will distinguish you from your peers.
  • Higher earnings and greater career growth.
  • The benefits of becoming part of an elite peer network.
  • The ability to leverage the tools and resources of a global community of industry experts.

CGEIT enhances credibility, influence and recognition. CGEIT combines the achievement of passing a comprehensive exam with recognition of work, management and educational experience, providing greater recognition in the marketplace and influence at the executive level.

Why employers hire CGEIT’s:

  • The employee has the knowledge and experience necessary to support and advance the IT governance of an enterprise.
  • The employee maintains ongoing professional development necessary for successful on-the-job performance.
  • The enterprise’s IT and business systems operate with greater efficiencies and optimum effectiveness resulting in greater trust in, and value from, information systems.

CGEIT demonstrates proven expertise. Boards and executive management expect IT to deliver business value. IT governance is a key component of enterprise governance and success. A CGEIT designation demonstrates that you have proven experience and knowledge in the governance of enterprise IT.

  • Continuing Professional Education (CPE) : 23,25
  • Practice questions (QAE = Questions, Answers and Explanations) : 12 month access

Course Objectives

CGEIT provides you the credibility to discuss critical issues around governance and strategic alignment, and the traction to consider a move to the C-suite, if you aren’t already there.

ISACA’s Certified in the Governance of Enterprise IT (CGEIT®) certification instantly validates your knowledge, skills and expertise with enterprise IT governance. It proves you can discuss critical issues around enterprise governance and align IT with strategic enterprise goals. That’s why hiring managers and clients look for it and many businesses and government agencies require it.

Course Content

Some of the focus areas include:

  • Frameworks for the governance of enterprise IT.
  • Strategic management.
  • Benefits realization.
  • Risk optimization.
  • Resource optimization. 

CGEIT empowers you to handle the governance of an entire organization and consider a move to the C-suite, if you aren’t already there. That’s why the ranks of CGEIT holders around the world are filled with CEOs, CIOs, CISOs, IT directors, security directors and more.

Course Overview

The CRISC – Certified Risk and Information System Control – certificate gives you international recognition (from ISACA) as a security professional. The CRISC extensive set of online practice questions (QAE) are included in the courseprice.

  • Continuing Professional Education (CPE) : 31
  • Practice questions (QAE = Questions, Answers and Explanations) : 12 month access

Course Objectives

The Certified in Risk and Information Systems Control certification is designed for IT professionals who have hands-on experience with risk identification, assessment, and evaluation; risk response; risk monitoring; IS control design and implementation; and IS control monitoring and maintenance.

The CRISC designation will not only certify professionals who have knowledge and experience identifying and evaluating entity-specific risk, but also aid them in helping enterprises accomplish business objectives by designing, implementing, monitoring and maintaining risk-based, efficient and effective IS controls.

  • Governance (25%)
  • IT Risk Assessment (20%)
  • Risk Response and Reporting (32%)
  • Information Technology and Security (22%)

Course Content

DOMAIN 1—Governance 26%

Organizational Governance A

  • Organizational Strategy, Goals, and Objectives
  • Organizational Structure, Roles, and Responsibilities
  • Organizational Culture
  • Policies and Standards
  • Business Processes
  • Organizational Assets

Risk Governance B

  • Enterprise Risk Management and Risk Management Framework
  • Three Lines of Defense
  • Risk Profile
  • Risk Appetite and Risk Tolerance
  • Legal, Regulatory, and Contractual Requirements
  • Professional Ethics of Risk Management

DOMAIN 2—IT Risk Assessment 20%

IT Risk Identification A

  • Risk Events (e.g., contributing conditions, loss result)
  • Threat Modelling and Threat Landscape
  • Vulnerability and Control Deficiency Analysis (e.g., root cause analysis)
  • Risk Scenario Development

IT Risk Analysis and Evaluation B

  • Risk Assessment Concepts, Standards, and Frameworks
  • Risk Register
  • Risk Analysis Methodologies
  • Business Impact Analysis
  • Inherent and Residual Risk

DOMAIN 3—Risk Response and Reporting 32%

Risk Response A

  • Risk Treatment / Risk Response Options
  • Risk and Control Ownership
  • Third-Party Risk Management
  • Issue, Finding, and Exception Management
  • Management of Emerging Risk

Control Design and Implementation B

  • Control Types, Standards, and Frameworks
  • Control Design, Selection, and Analysis
  • Control Implementation
  • Control Testing and Effectiveness Evaluation

Risk Monitoring and Reporting C

  • Risk Treatment Plans
  • Data Collection, Aggregation, Analysis, and Validation
  • Risk and Control Monitoring Techniques
  • Risk and Control Reporting Techniques (heatmap, scorecards, dashboards)
  • Key Performance Indicators
  • Key Risk Indicators (KRIs)
  • Key Control Indicators (KCIs)

DOMAIN 4—Information Technology and Security 22%

Information Technology Principles A

  • Enterprise Architecture
  • IT Operations Management (e.g., change management, IT assets, problems, incidents)
  • Project Management
  • Disaster Recovery Management (DRM)
  • Data Lifecycle Management
  • System Development Life Cycle (SDLC)
  • Emerging Technologies

Information Security Principles B

  • Information Security Concepts, Frameworks, and Standards
  • Information Security Awareness Training
  • Business Continuity Management
  • Data Privacy and Data Protection Principles

Course Overview

DevOps seems to be the latest ‘buzzword’ and trend in the IT industry. Driven by the business need for ever faster deployment of new functionality and frustration with the time and effort it takes to get new systems into Operations. It is no longer a question of ‘should we adopt DevOps’ ,but ‘when and how’. However DevOps represents a significant cultural and behavioral change and many organizations fail to address this in their adoption. This game can be used to help explore and understand DevOps, and to identify and agree concrete actions for adopting and deploying DevOps practices. The simulation game is based upon ‘The Phoenix Project’ Book.

  • Duration of the simulation 1 day
  • Number of participants 8 – 12

Course Objectives

  • How to apply DevOps principles in a real life situation?
  • How to find the right balance between delivering your SLA requirements and your IT projects according to plan?
  • How to experience how DevOps can bring serious value to your business?
  • How to increase the efficiency and effectiveness of your IT Department?
  • How to create better flow in your teams?
  • How to develop people’s skills to act in a DevOps environment?
  • How to show business their responsibilities in making IT Projects more successful?

Course Content

Do you recognise this?

In order to keep the competition ahead, business is increasingly demanding shorter release cycles for new applications. Operations are often seen as a barrier with long bureaucratic controls and delays in supplying production systems. They benefit from stability. The development department is open to change and wants to deliver new functionality quickly and often.

DevOps is a growing approach to shorten lead-time, increase quality and improve collaboration. However, this requires both a change of mind-set and culture as well as learning new behaviours in Development (Dev) and Operations (Ops). Many companies struggle with the implementation of DevOps and changing the culture.

The DevOps simulation game is based on the book ‘The Phoenix Project’. The organisation Unlimited Units is in trouble. Newspaper articles reveal the bad financial situation of the organisation. The only way to save not only the company but also to make it competitive and profitable is to start the project “The Phoenix Project”.

“The Phoenix Project” is an IT-enabled business transformation with Retail Operations as project owner. Scenario – The IT Manager of Operations is asked to take charge of the IT department and to ensure that “The Phoenix Project” will be a success. However, the IT Manager Operations faces a huge amount of work. Huge delays in issues, functions and projects.

Your team will assume different roles within the organisation Parts Unlimited. You act as Retail Operations, Human Resources and Finance – the roles of the management of the company and you act as IT Manager or one of the other IT team members who need to solve IT problems and the To develop applications.

Your challenge is to apply the principles of DevOps in this Business Simulation. In a number of rounds, you will work on IT projects and issues and ensure that “The Phoenix Project” is completed on time. But beware, the company continues to come up with new ideas and requirements, and developments from outside can also throw fun into the mix!

  • 09:30 Getting acquainted and introduction to the Game
  • 10:00 Start of first round
  • 11:15 End of first round and short break
  • 11:30 Reflection and retrospective
  • 11:45 Start round two
  • 13:00 End of round two and lunch
  • 13:45 Reflection and retrospective
  • 14:00 Start of round three
  • 15:15 End round three and short break
  • 15.30 Reflection and retrospective
  • 16.15 Closing

Course Overview

Why use Challenge of Egypt – Traditional?

Between 60 – 80% of projects fail to realize the required results. Despite the enormous amount of PM certificates in PMI or PRINCE2. This is generally not because of the lack of education or theory, but lack of understanding of how to translate theory into practice, or the lack of the right behaviors within the team. If you want to learn how to translate theory into practice, assess your project behavior and processes, and identify how to improve your project management performance, this simulation can help.Duration of the simulation 1 dayNumber of participants 8 – 12

Course Objectives

the simulation will be customized towards your own specific needs and learning objectives. But in general these are the main objectives:

  • Learn how to apply Project Management best practices and learn the essence of PRINCE2®, PMI®, PMBOK®
  • Learn how to ensure the business case is realized
  • Learn how to stay customer focused and set the right priorities based on customer requirements
  • Develop communication and team competences.

Course Content

  • Explore Project Management best practices and how to effectively use them
  • Increase Project performance and value
  • Understand project roles and dependencies
  • Get more out your Project Management training, translate theory into practice
  • Improve Team Work and identify improvements to the way you manage and run projects Do you recognize this?

Still 70% of projects fail. Figures may vary accross industries and based upon who and how the research is being performed. But however you look at it the figure is too high. Why? We trained our employees, employees passed the Prince2® or PMI certification. We implemented the Project Management framework but we still run out off budget, finish too late, Risks weren’t well managed, the final result isn’t what was required.

About the Challenge of Egypt™

Scenario We are in ancient Egypt. The Pharaoh asked the leader of the steering group to build a Pyramid to secure his journey to the afterworld. This being essential for his eternal existance. The steering group assigns a Project Leader and a project team to execute the project. The team has to deal with all kinds of events and set backs to keep the project within Scope, Quality, Budget and Time. This requires managing work packages, managing risks, managing tolerances and all those other best practice project management processes and procedures. But be prepared. The Pharaoh comes has other issues and other ideas which may impact the project.

Course Overview

Strategic Portfolio Management is the process an organization uses to select, prioritize, and manage resources within its portfolio of programs, projects, and initiatives, which are used to meet strategic goals and objectives. 

In this course, you will be introduced to the Strategic Portfolio Management (SPM) applications and learn how SPM encompasses a range of business capabilities, processes, and technological support aimed at enabling organizations to implement the three key attributes that help to see superior business results from their digital and technology-related investments: portfolio alignment, value-oriented decision-making, and continuous portfolio adaptability.

Course Objectives

At the end of this module, you will be able to:

  • Define SPM and its purpose.
  • Identify the applications within ServiceNow SPM and their purpose.
  • Change a submitted idea into a demand.
  • Demonstrate the different ways available to create projects.
  • Show how to manage the project scope, schedule, resources and financials.
  • Understand how to communicate efficiently with project teams and stakeholders.
  • Analyze project risk, issues, and changes.
  • Understand resource assignments, resource capacity, and availability.
  • Track project progress and generate detailed status reports
  • Organize project artifacts and close out projects
  • Create, plan, prioritize, and track portfolios.

Course Content

  • Innovation Management
  • Demand Management
  • Project Management
  • Resource Management
  • Portfolio Planning Workspace
  • Additional SPM applications
  • Better together with Strategic Portfolio Management

This course reflects the Xanadu release of the Now Platform®.

Course Overview

Learn the skills you need to effectively establish and manage a realistic schedule and detailed budget. Through hands-on exercises, you’ll learn to develop a work breakdown schedule, grasp diagramming techniques, identify task relationships, determine the critical path, employ estimating techniques, and analyze resource utilization.

Once the project schedule is complete, you’ll create a budget that includes all direct and indirect costs associated with the project. Learn the importance of baselining project schedules and budgets to make reporting and tracking progress easier. Understand how to use earned value analysis and other reporting techniques to ensure that your project progress is clearly identified and communicated to stakeholders. Create schedule and cost management plans, and control changes through an integrated change management process. You’ll learn to use a variety of tools that will ensure that your project is delivered on time and within budget.

This course was previously titled Managing Project Schedules and Budgets.

ourse Objectives

What You’ll Learn

  • Develop a work breakdown structure
  • Create a network diagram
  • Identify the critical path
  • Estimating techniques
  • Finalize your project schedule
  • Types of cost and expenditures
  • Develop a budget
  • Report progress through earned value analysis

Hands-On Exercises

  • Develop the Work Breakdown Structure
  • Create the Network Diagram
  • Determine the Critical Path
  • Develop a Resource Assignment Matrix
  • Create a Resource Histogram
  • Develop the Gantt Chart
  • Estimate the Budget
  • Prepare a Status Report for Schedule and Budget

Course Content

1. Successful Project Schedules

  • Schedule Fundamentals
  • Activity Definition
  • Work breakdown structure
  • Decomposition
  • Work packages
  • Activities
  • Activity Sequencing
  • Preparing precedence diagrams
  • Creating network diagrams
  • Duration Estimating
  • Expert judgment
  • Bottom up and top down estimates
  • Tools for Creating Realistic Effort Estimates and Schedules
  • Critical path method
  • GERT
  • PERT
  • Compressing the Schedule
  • Crashing and fast tracking
  • Controlling Schedule Change
  • Planning schedule management
  • Change control
  • Measuring Success Against the Schedule
  • Earned value analysis
  • Status reporting
  • Closing out the Schedule

2. Successful Project Budgets

  • Budget Fundamentals
  • Types of Cost
  • Resource
  • Direct expenses
  • Indirect expenses
  • Cost Change
  • Planning cost control
  • Change control
  • Measuring Success Against the Budget
  • Earned value analysis
  • Estimate at completion
  • Estimate to completion
  • Status reporting
  • Closing out the Budget

Course Overview

Avoid project catastrophe by developing expertise in risk management.

This course is designed for project managers who want to proactively reduce the probability of project failure. In this course, you will learn to use proven approaches and techniques specific to risk management. You will learn to plan and analyze projects so as to minimize risk in a formal environment. You will identify, analyze, and address uncertainty throughout the project lifecycle and incorporate lessons learned and industry best practices related to risk management. You will apply PMI risk management processes in a practical way to eliminate, mitigate, and minimize threats while maximizing and optimizing opportunities.

Course Objectives

  • Assess overall project riskiness
  • Manage uncertainty in terms of both opportunities and threats
  • Role of a risk management plan
  • Risk within an execution strategy
  • Conduct qualitative risk assessments in order to rank risks
  • Conduct quantitative risk assessments in order to adequately budget for uncertainty
  • Develop risk response plans for significant risks
  • Monitor and control uncertainty during execution
  • Ensure success by understanding the role of a risk management plan and lessons learned

Course Content

  • Risk Management Foundations:
  • Definition of a plan
  • Definition of risk and risk management
  • Risk management and project success
  • Project management life cycle
  • Strategic Risk Reduction:
  • Project success factors
  • Stakeholder analysis
  • Balancing constraints within a plan
  • Assessing project riskiness
  • Importance of formal planning
  • Execution Risk Reduction:
  • Risk management plan
  • Risk identification techniques
  • Qualitative risk analysis
  • Quantitative risk analysis
  • Risk response planning
  • Monitoring and Controlling Risk:
  • Protecting the plan
  • Change controls
  • Responding to risks
  • Value of Lessons Learned:
  • Capturing and employing lessons learned
  • Current methods of managing uncertainty based on lessons learned
  • Hands-On Activities:
  • Determine sources of project risk by category
  • Assess overall project risk
  • Identify and categorize risk
  • Perform qualitative risk analysis
  • Perform quantitative risk analysis
  • Plan risk responses
  • Involve stakeholders