- Duration: Flexible
Course details
Do you want to become a better IT leader?
This course is designed for those already in, or aspire to be, a CIO/CTO/IT Director or other C-level IT role. Unlike the masses of other leadership courses out there, this course is specifically for those working in the technology space.
The unique course will provide you with a broad set of knowledge and insights that will be well worth your time and the modest course fee.
Develop a LEADERSHIP MINDSET
Role of Today's IT leader
The 3 CIO Archetypes
Deloitte's 3 CIO Patterns
Friend of the CEO
Some Questions for Today's IT Leaders
Four Priorities of an IT Leader
Rate Yourself as a Leader
Egon Zehnder - 9 Core CIO Competencies
6 Hats of an IT Leader
Impact of IT Leaders
Re-imagine the BUSINESS STRATEGY
Declining Fortunes
Former Industry Leaders
Marketing Myopia
Re-imagining the Business
Vision Cone
Examples of Strategic Vision
Tesla - Vision to Strategy
Strategy to Competitive Advantage
PESTEL Analysis
Re-inventing the New York Times
BEST Analysis
Best Analysis for ALDI, Hamleys and Disney
Executable Strategy
1-Page Strategy - Business Model Canvas
Formulate the IT STRATEGY
What is IT Strategy?
Example - Changi Airport Terminal 4 (T4)
Unlocking IT Value
Strategic IT Grid
Examples - Under Armour and Arcelor Mittal
Impact of Poor vs. Good IT Strategy
Jump on the Bandwagon" Mentality
Gartner Hype Cycle
Does IT matter?
1-Page IT Strategy - the IT Pyramid
Example - IT Pyramid for NTU
Gartner's IT Strategy
Example - BBC Technology Strategy and Roadmap
Business-IT Alignment and IT-IT Alignment
UK Government's Failed NHS Project
IT Vision
IT Roadmap and IT Portfolio
Prioritising Project Investments
Top Tips on Creating an IT Roadmap
Pitfalls in IT Strategy
Architect AGILE IT PLATFORMS
Importance of IT Architecture
Good vs. Bad Architecture
Architecture Complexities
Spaghetti Architecture
Needs of Retail Banking
Business Agility is the New Mantra
Qualities of an IT Architecture
Multi-application Architectures
KISS Principle
Gartner's Core Architecture Principles (for digital business)
Application Programme Interface (APIs)
Build BUSINESS RESILIENCE
IT Outages at BA, Amazon, Delta and Microsoft
Business Resilience
Cost of IT Downtime
Business Impact of IT Outage / Degradation
MAS Guidelines on Business Continuity Management
ISO 22301
Key Metrics: MTD+RTO, ADL+RPO
5R Business Continuity Timeline
Threats and Vulnerabilities
A Risk-Based Approach
Understanding Risk
Risk Assessment Matrix
Business Impact Analysis
Distributed Operations
Importance of Back-ups
3-2-1 Backup Strategy
Data-Centre Tiers
Data Centre Issues and Cause of BA Outage (2017)
Disaster Recovery Site
Disaster Recovery as a Service (DRaaS)
Business Continuity Team
Pitfalls in Business Continuity Planning
Deliver PROJECT SUCCESS
IT Projects Come In Different Shapes and Sizes
The Project Lifecycle
Project Success and Trade-offs
Four Layers of Impact
Writing a Project Proposal
4 Dimensions of Project Feasibility
Product vs. Project Scope
Types of Project Risk
Top 5 Causes of Project Failure
Requirements as a Major Pain Point
Prioritising with Moscow Analysis
Project Stakeholders
Work Breakdown Structure (WBS)
Using a WBS for Project Estimation
Project Estimation Methods
Shift from Traditional 'Waterfall' to Agile Project Lifecycle
Traditional vs Agile Approach
Stay safe and CYBER SECURE
Data Breaches at SingHealth, Equifax and Razer
IBM's Cost of Data Breach Study (2019)
Information Assurance
Data Privacy
General Data Protection Regulation (GDPR)
EY Top 10 Cybersecurity Threats (2018-19)
Cybersecurity Threat Landscape
Malware
Malware examples - WannaCry, GigaLocker and WhatsApp
Keyloggers
IOT Issues - HomeCams, Smart Devices and Car Hacking
Zero-Day Attack
DDOS Attacks
Cybersecurity is a People Issue
Password Management
Biometrics
2-Factor Authentication (2FA)
Netflix Phishing Scam (2017)
Phishing and Spear Phishing
Social Engineering
Social Engineering Examples - Romance Scams, Call-Centre Scams and Impersonation
Deepfake Videos
Fake Website - Malindo Air
Insider Threat
NIST Framework for Cyber-Security
Table-top Exercise
- Computer Network Security Diploma Course GateUSD 13
USD 260Duration: Upto 1 Hour - Fundamentals of Networking Engineering Course LineUSD 24Duration: Upto 12 Hours