Skip to Content
Course

Governance of Enterprise IT

CSE-41361

Acquire your certification in Governance of Enterprise IT

Cybersecurity governance refers to an organizations policies, procedures, and safeguards implemented by the IT Governance team on how to effectively detect, circumvent, and respond to cyber-attacks. To thrive in today’s digital economy, organizations must have solid IT Governance strategies in place to manage cyber risks efficiently and effectively.

This course will prepare students for the ISACA's Certified in the Governance of Enterprise IT (CGEIT) certification. Students will learn to assess, design, implement, and manage enterprise IT governance systems that are aligned with overall business objectives.

Course Highlights:

  • Framework for the governance of enterprise IT
  • Strategic management
  • Benefits realization
  • Risk optimization
  • Resource optimization

Course Learning Outcomes:

  • Establish the objectives for the framework for the governance of enterprise IT
  • Establish a framework for the governance of enterprise IT
  • Identify the internal and external requirements for the framework for the governance of enterprise IT
  • Incorporate a strategic planning process into the framework for the governance of enterprise IT
  • Ensure that a business case development and benefits realization process for IT-enabled investments has been established
  • Incorporate enterprise architecture into the framework for the governance of enterprise IT

Lab Fee: Students must purchase a uCertify license in order to access uCertify materials for this course. Student's uCertify licenses are good for 4 months.

Course Typically Offered: Online in every quarter.

Prerequisite: A BS in Computer Science, equivalent knowledge and experience, or the course CSE-41363 Cybersecurity Fundamentals.

Next Step: After completing this course, consider earning your Certified in Governance of Enterprise IT (CGEIT) from ISACA. To continue learning, consider taking CSE-41362 Ethical Hacking or CSE-41359 Information Security Management.

Contact: For more information about this course, please email infotech@ucsd.edu.

Course Information

Online
3.00 units
$745.00

Course sessions

Closed

Section ID:

184343

Class type:

Online Asynchronous.

This course is entirely web-based and to be completed asynchronously between the published course start and end dates. Synchronous attendance is NOT required.
You will have access to your online course on the published start date OR 1 business day after your enrollment is confirmed if you enroll on or after the published start date.

Textbooks:

No textbook required.

Policies:

  • No refunds after: 9/30/2024

Schedule:

No information available at this time.
Closed

Instructor: Alfred Basta

Alfred Basta
Add To Cart

Section ID:

185785

Class type:

Online Asynchronous.

This course is entirely web-based and to be completed asynchronously between the published course start and end dates. Synchronous attendance is NOT required.
You will have access to your online course on the published start date OR 1 business day after your enrollment is confirmed if you enroll on or after the published start date.

Textbooks:

No textbook required.

Policies:

  • No refunds after: 1/13/2025

Schedule:

No information available at this time.
Add To Cart

Instructor: Tracy Reed, RHCE

Tracy Reed, RHCE

Tracy Reed has 25 years of experience with Linux and cyber security. He is a Security Architect at a "Big Four" accounting firm where he provides security and risk mitigation services. Reed has experience with container security, server hardening, intrusion detection, as well as ISO/NIST/SOC/PCI/HIPAA compliance in cloud/virtualized/containerized environments. Currently, Tracy teaches the following courses for Extended Studies; Linux Operating System Fundamentals, Linux Security, Linux Cloud Infrastructure, SELinux Fundamentals, and DevSecOps.

Full Bio