สมัครตอนนี้

เข้าสู่ระบบ

ลืมรหัสผ่าน

ลืมรหัสผ่านของคุณ? กรุณากรอกอีเมลของคุณ. คุณจะได้รับลิงค์และจะสร้างรหัสผ่านใหม่ทางอีเมล.

เพิ่มโพสต์

คุณต้องเข้าสู่ระบบเพื่อเพิ่มโพสต์ .

เพิ่มคำถาม

คุณต้องเข้าสู่ระบบเพื่อถามคำถาม.

เข้าสู่ระบบ

สมัครตอนนี้

ยินดีต้อนรับสู่ Scholarsark.com! การลงทะเบียนของคุณจะอนุญาตให้คุณเข้าถึงโดยใช้คุณสมบัติเพิ่มเติมของแพลตฟอร์มนี้. สอบถามได้ค่ะ, บริจาคหรือให้คำตอบ, ดูโปรไฟล์ของผู้ใช้รายอื่นและอีกมากมาย. สมัครตอนนี้!

High-Impact IT Leader – Succeed as CIO/CTO/IT Director 2021!

High-Impact IT LeaderSucceed as CIO/CTO/IT Director 2021!

ราคา: $109.99

Do you want to become a better IT leader?

This course is designed for those already in, or aspire to be, a CIO/CTO/IT Director or other C-level IT role. Unlike the masses of other leadership courses out there, this course is specifically for those working in the technology space.

The unique course will provide you with a broad set of knowledge and insights that will be well worth your time and the modest course fee.

Develop a LEADERSHIP MINDSET

  • Role of Today’s IT leader

  • NS 3 CIO Archetypes

  • Deloitte’s 3 CIO Patterns

  • Friend of the CEO

  • Some Questions for Today’s IT Leaders

  • Four Priorities of an IT Leader

  • Rate Yourself as a Leader

  • Egon Zehnder – 9 Core CIO Competencies

  • 6 Hats of an IT Leader

  • Impact of IT Leaders

Re-imagine the BUSINESS STRATEGY

  • Declining Fortunes

  • Former Industry Leaders

  • Marketing Myopia

  • Re-imagining the Business

  • Vision Cone

  • Examples of Strategic Vision

  • เทสลา – Vision to Strategy

  • Strategy to Competitive Advantage

  • PESTEL Analysis

  • Re-inventing the New York Times

  • BEST Analysis

  • Best Analysis for ALDI, Hamleys and Disney

  • Executable Strategy

  • 1-Page StrategyBusiness Model Canvas

Formulate the IT STRATEGY

  • What is IT Strategy?

  • ตัวอย่าง – Changi Airport Terminal 4 (T4)

  • Unlocking IT Value

  • Strategic IT Grid

  • ตัวอย่าง – Under Armour and Arcelor Mittal

  • Impact of Poor vs. Good IT Strategy

  • “Jump on the BandwagonMentality

  • Gartner Hype Cycle

  • Does IT matter?

  • 1-Page IT Strategythe IT Pyramid

  • ตัวอย่าง – IT Pyramid for NTU

  • Gartner’s IT Strategy

  • ตัวอย่าง – BBC Technology Strategy and Roadmap

  • Business-IT Alignment and IT-IT Alignment

  • UK Government’s Failed NHS Project

  • IT Vision

  • IT Roadmap and IT Portfolio

  • Prioritising Project Investments

  • Top Tips on Creating an IT Roadmap

  • Pitfalls in IT Strategy

Architect AGILE IT PLATFORMS

  • Importance of IT Architecture

  • Good vs. Bad Architecture

  • Architecture Complexities

  • Spaghetti Architecture

  • Needs of Retail Banking

  • Business Agility is the New Mantra

  • Qualities of an IT Architecture

  • Multi-application Architectures

  • KISS Principle

  • Gartner’s Core Architecture Principles (for digital business)

  • Application Programme Interface (APIs)

Build BUSINESS RESILIENCE

  • IT Outages at BA, อเมซอน, Delta and Microsoft

  • Business Resilience

  • Cost of IT Downtime

  • Business Impact of IT Outage / Degradation

  • MAS Guidelines on Business Continuity Management

  • ISO 22301

  • Key Metrics: MTD+RTO, ADL+RPO

  • 5R Business Continuity Timeline

  • Threats and Vulnerabilities

  • A Risk-Based Approach

  • Understanding Risk

  • Risk Assessment Matrix

  • Business Impact Analysis

  • Distributed Operations

  • Importance of Back-ups

  • 3-2-1 Backup Strategy

  • Data-Centre Tiers

  • Data Centre Issues and Cause of BA Outage (2017)

  • Disaster Recovery Site

  • Disaster Recovery as a Service (DRaaS)

  • Business Continuity Team

  • Pitfalls in Business Continuity Planning

Deliver PROJECT SUCCESS

  • IT Projects Come In Different Shapes and Sizes

  • The Project Lifecycle

  • Project Success and Trade-offs

  • Four Layers of Impact

  • Writing a Project Proposal

  • 4 Dimensions of Project Feasibility

  • Product vs. Project Scope

  • Types of Project Risk

  • สูงสุด 5 Causes of Project Failure

  • Requirements as a Major Pain Point

  • Prioritising with Moscow Analysis

  • Project Stakeholders

  • โครงสร้างการแบ่งงาน (Primavera P6 ทำได้ง่าย)

  • Using a WBS for Project Estimation

  • Project Estimation Methods

  • Shift from Traditional ‘Waterfallto Agile Project Lifecycle

  • Traditional vs Agile Approach

Stay safe and CYBER SECURE

  • Data Breaches at SingHealth, Equifax and Razer

  • IBM’s Cost of Data Breach Study (2019)

  • Information Assurance

  • Data Privacy

  • General Data Protection Regulation (GDPR)

  • EY Top 10 Cybersecurity Threats (2018-19)

  • Cybersecurity Threat Landscape

  • มัลแวร์

  • Malware examplesWannaCry, GigaLocker and WhatsApp

  • Keyloggers

  • IOT IssuesHomeCams, Smart Devices and Car Hacking

  • Zero-Day Attack

  • DDOS Attacks

  • Cybersecurity is a People Issue

  • Password Management

  • Biometrics

  • 2-Factor Authentication (2FA)

  • Netflix Phishing Scam (2017)

  • Phishing and Spear Phishing

  • Social Engineering

  • Social Engineering ExamplesRomance Scams, Call-Centre Scams and Impersonation

  • Deepfake Videos

  • Fake WebsiteMalindo Air

  • Insider Threat

  • NIST Framework for Cyber-Security

  • Table-top Exercise

ผู้เขียน

เกี่ยวกับ arkadmin

ทิ้งคำตอบไว้