Governance of Enterprise IT
CSE-41361
Acquire your certification in Governance of Enterprise IT
Cybersecurity governance refers to an organizations policies, procedures, and safeguards implemented by the IT Governance team on how to effectively detect, circumvent, and respond to cyber-attacks. To thrive in today’s digital economy, organizations must have solid IT Governance strategies in place to manage cyber risks efficiently and effectively.
This course will prepare students for the ISACA's Certified in the Governance of Enterprise IT (CGEIT) certification. Students will learn to assess, design, implement, and manage enterprise IT governance systems that are aligned with overall business objectives.
Course Highlights:
- Framework for the governance of enterprise IT
- Strategic management
- Benefits realization
- Risk optimization
- Resource optimization
Course Learning Outcomes:
- Establish the objectives for the framework for the governance of enterprise IT
- Establish a framework for the governance of enterprise IT
- Identify the internal and external requirements for the framework for the governance of enterprise IT
- Incorporate a strategic planning process into the framework for the governance of enterprise IT
- Ensure that a business case development and benefits realization process for IT-enabled investments has been established
- Incorporate enterprise architecture into the framework for the governance of enterprise IT
Lab Fee: Students must purchase a uCertify license in order to access uCertify materials for this course. Student's uCertify licenses are good for 4 months.
Course Typically Offered: Online in every quarter.
Prerequisite: A BS in Computer Science, equivalent knowledge and experience, or the course CSE-41363 Cybersecurity Fundamentals.
Next Step: After completing this course, consider earning your Certified in Governance of Enterprise IT (CGEIT) from ISACA. To continue learning, consider taking CSE-41362 Ethical Hacking or CSE-41359 Information Security Management.
Contact: For more information about this course, please email infotech@ucsd.edu.
Course Information
Course sessions
Section ID:
Class type:
This course is entirely web-based and to be completed asynchronously between the published course start and end dates. Synchronous attendance is NOT required.
You will have access to your online course on the published start date OR 1 business day after your enrollment is confirmed if you enroll on or after the published start date.
Textbooks:
No textbook required.
Policies:
- No refunds after: 9/30/2024
Schedule:
Instructor: Alfred Basta
Section ID:
Class type:
This course is entirely web-based and to be completed asynchronously between the published course start and end dates. Synchronous attendance is NOT required.
You will have access to your online course on the published start date OR 1 business day after your enrollment is confirmed if you enroll on or after the published start date.
Textbooks:
No textbook required.
Policies:
- No refunds after: 1/13/2025
Schedule:
Instructor: Tracy Reed, RHCE
Tracy Reed has 25 years of experience with Linux and cyber security. He is a Security Architect at a "Big Four" accounting firm where he provides security and risk mitigation services. Reed has experience with container security, server hardening, intrusion detection, as well as ISO/NIST/SOC/PCI/HIPAA compliance in cloud/virtualized/containerized environments. Currently, Tracy teaches the following courses for Extended Studies; Linux Operating System Fundamentals, Linux Security, Linux Cloud Infrastructure, SELinux Fundamentals, and DevSecOps.