High-Impact IT Leader - Succeed as CIO/CTO/IT Director 2023! Udemy
Price: AED 459
  • Duration: Flexible

Course details

Do you want to become a better IT leader? 

This course is designed for those already in, or aspire to be, a CIO/CTO/IT Director or other C-level IT role.  Unlike the masses of other leadership courses out there, this course is specifically for those working in the technology space. 

The unique course will provide you with a broad set of knowledge and insights that will be well worth your time and the modest course fee.


Develop a LEADERSHIP MINDSET

  • Role of Today's IT leader

  • The 3 CIO Archetypes

  • Deloitte's 3 CIO Patterns

  • Friend of the CEO

  • Some Questions for Today's IT Leaders

  • Four Priorities of an IT Leader

  • Rate Yourself as a Leader

  • Egon Zehnder - 9 Core CIO Competencies

  • 6 Hats of an IT Leader

  • Impact of IT Leaders


Re-imagine the BUSINESS STRATEGY

  • Declining Fortunes

  • Former Industry Leaders

  • Marketing Myopia

  • Re-imagining the Business

  • Vision Cone

  • Examples of Strategic Vision

  • Tesla - Vision to Strategy

  • Strategy to Competitive Advantage

  • PESTEL Analysis

  • Re-inventing the New York Times

  • BEST Analysis

  • Best Analysis for ALDI, Hamleys and Disney

  • Executable Strategy

  • 1-Page Strategy - Business Model Canvas


Formulate the IT STRATEGY

  • What is IT Strategy?

  • Example - Changi Airport Terminal 4 (T4)

  • Unlocking IT Value

  • Strategic IT Grid

  • Examples - Under Armour and Arcelor Mittal

  • Impact of Poor vs. Good IT Strategy

  • Jump on the Bandwagon" Mentality

  • Gartner Hype Cycle

  • Does IT matter?

  • 1-Page IT Strategy - the IT Pyramid

  • Example - IT Pyramid for NTU

  • Gartner's IT Strategy

  • Example - BBC Technology Strategy and Roadmap

  • Business-IT Alignment and IT-IT Alignment

  • UK Government's Failed NHS Project

  • IT Vision

  • IT Roadmap and IT Portfolio

  • Prioritising Project Investments

  • Top Tips on Creating an IT Roadmap

  • Pitfalls in IT Strategy


Architect AGILE IT PLATFORMS

  • Importance of IT Architecture

  • Good vs. Bad Architecture

  • Architecture Complexities

  • Spaghetti Architecture

  • Needs of Retail Banking

  • Business Agility is the New Mantra

  • Qualities of an IT Architecture

  • Multi-application Architectures

  • KISS Principle

  • Gartner's Core Architecture Principles (for digital business)

  • Application Programme Interface (APIs)

Build BUSINESS RESILIENCE

  • IT Outages at BA, Amazon, Delta and Microsoft

  • Business Resilience

  • Cost of IT Downtime

  • Business Impact of IT Outage / Degradation

  • MAS Guidelines on Business Continuity Management

  • ISO 22301

  • Key Metrics: MTD+RTO, ADL+RPO

  • 5R Business Continuity Timeline

  • Threats and Vulnerabilities

  • A Risk-Based Approach

  • Understanding Risk

  • Risk Assessment Matrix

  • Business Impact Analysis

  • Distributed Operations

  • Importance of Back-ups

  • 3-2-1 Backup Strategy

  • Data-Centre Tiers

  • Data Centre Issues and Cause of BA Outage (2017)

  • Disaster Recovery Site

  • Disaster Recovery as a Service (DRaaS)

  • Business Continuity Team

  • Pitfalls in Business Continuity Planning


Deliver PROJECT SUCCESS

  • IT Projects Come In Different Shapes and Sizes

  • The Project Lifecycle

  • Project Success and Trade-offs

  • Four Layers of Impact

  • Writing a Project Proposal

  • 4 Dimensions of Project Feasibility

  • Product vs. Project Scope

  • Types of Project Risk

  • Top 5 Causes of Project Failure

  • Requirements as a Major Pain Point

  • Prioritising with Moscow Analysis

  • Project Stakeholders

  • Work Breakdown Structure (WBS)

  • Using a WBS for Project Estimation

  • Project Estimation Methods

  • Shift from Traditional 'Waterfall' to Agile Project Lifecycle

  • Traditional vs Agile Approach


Stay safe and CYBER SECURE

  • Data Breaches at SingHealth, Equifax and Razer

  • IBM's Cost of Data Breach Study (2019)

  • Information Assurance

  • Data Privacy

  • General Data Protection Regulation (GDPR)

  • EY Top 10 Cybersecurity Threats (2018-19)

  • Cybersecurity Threat Landscape

  • Malware

  • Malware examples - WannaCry, GigaLocker and WhatsApp

  • Keyloggers

  • IOT Issues - HomeCams, Smart Devices and Car Hacking

  • Zero-Day Attack

  • DDOS Attacks

  • Cybersecurity is a People Issue

  • Password Management

  • Biometrics

  • 2-Factor Authentication (2FA)

  • Netflix Phishing Scam (2017)

  • Phishing and Spear Phishing

  • Social Engineering

  • Social Engineering Examples - Romance Scams, Call-Centre Scams and Impersonation

  • Deepfake Videos

  • Fake Website - Malindo Air

  • Insider Threat

  • NIST Framework for Cyber-Security

  • Table-top Exercise



Updated on 02 May, 2023
Courses you can instantly connect with... Do an online course on Cybersecurity starting now. See all courses

Is this the right course for you?

Didn't find what you were looking for ?

or