This 2-day or 3-day course explains the elements and supporting materials of the COBIT framework, using a logical and example-driven approach for anyone interested in obtaining COBIT foundation level knowledge. COBIT 5 Foundation is the first step, and a prerequisite, to enroll into the advanced level courses that ISACA has released in 2013. This training provides the next generation of ISACA’s guidance on the enterprise governance and management of IT. It builds on more than 15 years of practical usage and application of COBIT by many enterprises and users from business, IT, risk, security and assurance communities. Today, more than ever, information and related technologies need to be governed, managed and operated in a holistic manner—with a single, integrated process model that provides end-to-end coverage of the roles, responsibilities and practices required.
COBIT 5 provides a comprehensive framework that assists enterprises in achieving their objectives for the governance and management of enterprise IT. It helps enterprises create optimal value from IT by maintaining a balance between realizing benefits and optimizing risk levels and resource use. COBIT 5 enables IT to be governed and managed in a holistic manner for the entire enterprise, taking in both the full end-to-end business and IT functional areas of responsibility, while considering the IT-related interests of internal and external stakeholders. COBIT 5 is generic, and is useful for enterprises of all sizes; whether commercial, not-for-profit or in the public sector.
Key challenges of using IT
IT governance concepts and benefits
COBIT 5 framework, principles, and enablers
Relationship between stakeholder needs and governance
Implementation approach for the use of COBIT 5
Structure of COBIT 5 process reference model
Governance and management domains
Components of COBIT 5 processes
Need for capability assessments governance and management
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.