70% EXPERIENCED ON-THE-JOB IMPROVEMENT
22% RECEIVED A PAY BOOST
ISACA’S commitment
The Certified in the Governance of Enterprise IT® (CGEIT®) certification is framework agnostic and the only IT governance certification for the individual. Whether you’re seeking a new career opportunity or striving to grow within your current organization, CGEIT proves your expertise in enterprise IT governance, resources, benefits and risk optimization.
Job practice areas tested for and validated by a CGEIT certification
This domain deals with the organizational structure of building IT frameworks, the strategy and technology aspects of IT governance and essential knowledge about governing various types of information.
A—GOVERNANCE FRAMEWORK
- Components of a Governance Framework
- Organizational Structures, Roles and Responsibilities
- Strategy Development
- Legal and Regulatory Compliance
- Organizational Culture
- Business Ethics
B—TECHNOLOGY GOVERNANCE
- Governance Strategy Alignment with Enterprise Objectives
- Strategic Planning Process
- Stakeholder Analysis and Engagement
- Communication and Awareness Strategy
- Enterprise Architecture
- Policies and Standards
C—INFORMATION GOVERNANCE
- Information Architecture
- Information Asset Lifecycle
- Information Ownership and Stewardship
- Information Classification and Handling
This domain provides insight about where to effectively allocate your IT resources and how to ensure IT resources are streamlined for performance.
A–IT RESOURCE PLANNING
- Sourcing Strategies
- Resource Capacity Planning
- Acquisition of Resources
B–IT RESOURCE OPTIMIZATION
- IT Resource Lifecycle and Asset Management
- Human Resource Competency Assessment and Development
- Management of Contracted Services and Relationships
This domain’s focus is on managing performance, monitoring and reporting, and analyzing IT-enabled technology investment management.
A–IT PERFORMANCE AND OVERSIGHT
- Performance Management
- Change Management
- Governance Monitoring
- Governance Reporting
- Quality Assurance
- Process Development and Improvement
B–MANAGEMENT OF IT-ENABLED INVESTMENTS
- Business Case Development and Evaluation
- IT Investment Management and Reporting
- Performance Metrics
- Benefit Evaluation Methods
This domain is about mitigating potential IT risks and challenges and overseeing the risks of IT management capabilities.
A–RISK STRATEGY
- Risk Frameworks and Standards
- Enterprise Risk Management
- Risk Appetite and Risk Tolerance
B–RISK MANAGEMENT
- IT-Enabled Capabilities, Processes and Services
- Business Risk, Exposures and Threats
- Risk Management Lifecycle
- Risk Assessment Methods
Establish the objectives for the framework for the governance of enterprise IT.
Establish a framework for the governance of enterprise IT.
Identify the internal and external requirements for the framework for the governance of enterprise IT.
Incorporate a strategic planning process into the framework for the governance of enterprise IT.
Ensure that a business case development and benefits realization process for IT-enabled investments has been established.
Incorporate enterprise architecture into the framework for the governance of enterprise IT.
Incorporate information architecture into the framework for the governance of enterprise IT.
Align the framework for the governance of enterprise IT with enterprise-wide shared services.
Incorporate comprehensive and repeatable processes and activities into the framework for the governance of enterprise IT.
Establish roles, responsibilities, and accountabilities for information assets and IT processes.
Evaluate the framework for the governance of enterprise IT and identify improvement opportunities.
Establish a process for the identification and remediation of issues related to the framework for the governance of enterprise IT.
Establish policies and standards that support IT and enterprise strategic alignment.
Establish policies and standards that inform decision-making with regard to IT-enabled business investments.
Establish communication and awareness processes to convey the value of the governance of enterprise IT.
Evaluate, direct, and monitor IT strategic planning processes to ensure alignment with enterprise goals.
Evaluate, direct, and monitor stakeholder engagement.
Document and communicate the IT strategic planning processes and related outputs.
Ensure that enterprise architecture is integrated into the IT strategic planning process.
Ensure that information architecture is integrated into the IT strategic planning process.
Incorporate a prioritization process for IT initiatives into the framework for the governance of enterprise IT.
Ensure that processes are in place to manage the lifecycle of IT resources and capabilities.
Ensure that processes are in place to govern the lifecycle of information assets.
Incorporate sourcing strategies into the framework for the governance of enterprise IT to ensure optimization and control.
Ensure the alignment of IT resource management processes with the enterprise’s resource management processes.
Ensure the alignment of information governance with the framework for the governance of enterprise IT.
Ensure that processes are in place for the assessment and development of personnel to align with business needs.
Ensure that IT-enabled investments are managed through their economic lifecycle.
Evaluate the process that assigns ownership and accountability for IT-enabled investments.
Ensure that IT investment management practices align with enterprise investment management practices.
Evaluate the benefits realization of IT-enabled investments, IT processes and IT services.
Establish a performance management program for IT-enabled investments, IT processes and IT services.
Ensure that improvement initiatives are based on the results derived from performance measures.
Ensure that comprehensive IT and information risk management programs are established.
Ensure that a process is in place to monitor and report on the adherence to IT and information risk management policies and standards.
Ensure the alignment of IT processes with the enterprise’s legal and regulatory compliance objectives.
Ensure the alignment of IT and information risk management with the enterprise risk management framework.
Ensure that IT and information risk management policies and standards are developed and communicated.







GOVERNANCE OF ENTERPRISE IT
BENEFITS REALIZATION
IT RESOURCES
RISK OPTIMIZATION
Training Details
Training will be held at the IDEL site or a remote site.
Dedicated arrangement for a group of trainees.
40 Hours 5 days
Trainer Nabil Khalil, He holds a master’s degree in computer information systems from the University of Toronto, Canada, and holds an international license certificate in examining networks and systems, in addition to an MSS certificate from EC University New York and from many international institutions in information security and systems. He contributed to the development of international policies for information security and protection, the strategy for responding to information technology security incidents, the strategy for business continuity in many government and private sectors, the legal requirements related to information security, and the development of the training material for the information security awareness project in the financial sector. He also trained information security officers in The public and private sectors, and auditing by adopting best practices within, ITIL, ISO, CMM, COBIT, and he is a member of ISACA, and one of the international authors in information security affiliated with the international organization EC-Council and a certified trainer from EC-Council and Microsoft Corporation, in addition to a trainer Certified Instructor ITIL, IOS 27001, and 24 years of practical experience
Pass the certification exam
Submit application to demonstrate experience requirements
Adhere to the Code of Professional Ethics >
Adhere to the Continuing Professional Education Policy >
Compliance with the Information Systems Auditing Standards >
The CGEIT Certification is required for everyone who manages, monitors, or evaluates an organization’s information technology and business systems. Individuals may wish to become CGEIT certified depending on their own professional aspirations or personal ambitions.
IS/IT auditors/consultants
IT Compliance Managers
Chief Compliance Officers
Chief Risk & Privacy Officers
Security heads/directors
Security managers/architects