Training Week Chicago 

Browse All of Our Events »

Course Overview

Choose one of the following educational tracks to study during your training week.
Each track is led by subject-matter experts for a high-value learning experience.

Governance of Enterprise IT
Cybersecurity Fundamentals
COBIT 5: Strategies for Implementing IT Governance


Governance of Enterprise IT

Course description

This course will introduce IT professionals with current or prospective managerial responsibilities to relevant frameworks, best practices, and processes used to support the governance of enterprise IT, and provide insight into the value that governance brings to an enterprise. This foundational-level course will explore the risks that can be encountered if sound IT governance practices are not implemented. Course participants will also learn about sustaining governed practices, and the primary issues addressed with a change to existing business philosophy and current IT processes.

Recently, the Governance of Enterprise IT course won a 2014 APEX Award of Excellence for publication in the Education and Training category. We are proud to provide our learners with proven courses that have been recognized for their communication, effectiveness, and excellence!

  Course Outline

Level: Beginner to intermediate

Learning objectives:

  • Describe the value IT contributes to an enterprise in clear terms
  • Differentiate between Enterprise Governance, Governance of Enterprise IT (GEIT) and management of IT and their importance to an enterprise
  • Identify key challenges and benefits of GEIT (i.e. linking business objectives to IT objectives) as they relate to their organization/industry
  • Apply governance principles to real life case studies
  • Be able to map specific IT goals to enterprise goals
  • Recognize how drivers, inhibitors, and enablers affect the successful implementation of GEIT
  • Apply a systematic approach to the implementation of GEIT
  • Identify relevant frameworks, best practices and processes use to support the governance of enterprise IT
  • Define key leadership roles and responsibilities for implementing GEIT
  • Be able to create a business case for implementing governance using relevant frameworks and best practices
  • Be able to perform a self-assessment using applicable benchmarks using a Process Capability Model
  • Understand how to interpret and use applicable GEIT metrics

Target audience:

  • IT professionals who are new to Governance of Enterprise IT (GEIT)
  • IT auditors and consultants
  • Security and risk professionals
  • Enterprise leadership

 Back to top of page


Cybersecurity Fundamentals

Course description

Why become a cybersecurity professional? The protection of information is a critical function for all enterprises. Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). The CSX Fundamental Course is designed for this purpose, as well as to provide insight into the importance of cybersecurity, and the integral role of cybersecurity professionals. This course will also cover four key areas of cybersecurity: 1) cybersecurity architecture principles, 2) security of networks, systems, applications and data, 3) incident response, and 4) the security implications of the adoption of emerging technologies. Designed as a foundational course, it will also prepare learners for the CSX Fundamental Exam.

  Course Outline

Level: Beginner – intermediate

Learning objectives:

At the conclusion of the course, attendees will be able to:

  • Understand basic cybersecurity concepts and definitions
  • Apply cybersecurity architecture principles
  • Identify components of a cybersecurity architecture
  • Define network security architecture concepts including:
    • topology
    • protocols
    • components
    • principles
  • Understand malware analysis concepts and methodology
  • Recognize the methodologies and techniques for detecting host-and-network-based intrusions via intrusion detection technologies
  • Identify computer network defense (CND) and vulnerability assessment tools, including open source tools and their capabilities
  • Understand system hardening
  • Apply penetration testing principles, tools, and techniques
  • Define network systems management principles, models, methods, and tools
  • Understand remote access technology and systems administration concepts
  • Recognize the Unix command line
  • Distinguish system and application security threats and vulnerabilities
  • Recognize system lifecycle management principles, including software security and usability
  • Understand the local specialized system requirements for safety, performance, and reliability
  • Define types of incidents (categories, responses, and timelines for responses)
  • Outline disaster recovery and business continuity planning
  • Understand incident response and handling methodologies
  • Understand security event correlation tools, and how different file types can be used for atypical behavior
  • Recognize investigative implications of hardware, operating systems, and network technologies
  • Be aware of the basic concepts, practices, tools, tactics, techniques, and procedures for processing digital forensic data
  • Identify network traffic analysis methods
  • Recognize new and emerging information technology and information security technologies including:
    • The current threat landscape
    • Mobile devices
    • Cloud computing and storage

Target Audience:
The target audience for this course includes:

  • Zero to three years cybersecurity experience.
  • Audit, risk, compliance, information security, government and legal professionals with a familiarity of basic IT/IS concepts who:
    • are new to cybersecurity
    • are interested in entering the field of cybersecurity
    • are interested in the ISACA Cybersecurity Certification
  • This course would be appropriate for students and recent graduates

A pre-assessment of attendees should gather information that will assist the instructor in determining the baseline knowledge of participants, as well as any necessary demographic information.  Results from the pre-assessment should be used to help focus lecture and activities to be most meaningful to all participants.  The pre-assessment should include questions regarding:

  • Level & years of IT experience / practical experience
  • Knowledge or experience regarding Information Security/Cybersecurity
  • Title/Role
  • Enterprise specifics:
    • Domestic or international
    • Size / # employees
    • Industry
    • Region (US / non-US)
  • Do they have a degree in cybersecurity or a related field (if so what)?
  • What university did they attend?

 Back to top of page


COBIT 5: Strategies for Implementing IT Governance

Course Description:

Learn how COBIT 5 is used to promote effective alignment of IT with business goals in the management of value delivery and risk mitigation. Integrating research by the IT Governance Institute (ITGI) and ISACA's COBIT education courses, this comprehensive program highlights IT issues, governance concepts, risk management and control. It uses the most current COBIT information, as well as supporting components and related tools, to provide guidance in implementing an IT governance process. Lecture, discussion, case studies and exercises are used to help the participant understand the proper techniques.

  Course Outline

Learning Objectives:

At the conclusion of this course, you will be able to:

  • Understand the major drivers for the development of a framework
  • Recognize the business benefits of using COBIT 5
  • Describe the COBIT 5 product architecture
  • Identify the IT management issues and challenges that affect enterprises
  • Define the 5 Key Principles of COBIT 5 for the governance and management of enterprise IT
  • Realize how COBIT 5 enables IT to be governed and managed in a holistic manner for the entire enterprise.
  • Understand the key concepts in a Process Capability Assessment and the key attributes of the COBIT 5 PAM (Process Assessment Model)
  • Recognize how the COBIT 5 processes and the Process Reference Model (PRM) help guide the creation of the 5 Principles and the 7 Governance and Management Enablers
  • Implement IT governance utilizing tools, publications and approaches identified in the COBIT 5 family of products
  • Utilize a case study to:
    • Understand the COBIT5 implementation model
    • Apply areas learned in the COBIT5 Foundation Course in a scenario format
    • Gain an appreciation for the utility and applicability of the various tools and techniques and how they can be used in your organizations

Target audience:

  • Users new to COBIT, who want to learn more about COBIT 5
  • All core IT professionals working in audit, assurance, risk, security and governance

 Back to top of page

Course Duration: 4 days
CPE: up to 32
Course hours: Monday-Thursday, 8:30AM-5PM
Registration hours: Monday, 7:30AM-12PM

Attendance at all ISACA Training Week Courses include the following:

  • 4-day instructor-led training course
  • Course materials
  • Continental breakfasts
  • Morning and afternoon coffee breaks
  • Lunches daily

Dinners, travel, hotel and parking accommodations are the responsibility of the attendee and are not included in the cost of the course registration.

Go Green

32 Hours
Earn up to 32 CPE Hours!

Cost

 

By 9 June 2016

ISACA Member
Non-member (not a member?)

US $2095
US $2295

After 9 June 2016

ISACA Member
Non-member (not a member?)

US $2295
US $2495

Cancellation Deadline

27 June 2016

ISACA offers discounts to organizations sending 4 or more employees to a single event. Please contact the ISACA Training & Education Department for more details at +1.847.660.5543 or https://support.isaca.org.

.

Event Registration Policy

Registration submissions for this event are not processed, and a seat is not confirmed or reserved, until full payment is received. All submissions not paid in full will be placed on a waitlist and priority will be given to paid registrants in a payment first-come, first-serve basis. Space is limited, so it is highly recommended that payment is provided at the time of submission to guarantee a seat within all related events.

Registration rate is determined based on the date payment is received by ISACA HQ and current membership status. Please plan accordingly, as it may take 10 or more business days for a wire transfer or mailed check to reach ISACA. Should we receive payment after a registration rate deadline, your account will be adjusted to reflect the current due amount. Entrance to the event is contingent upon full payment.

Course materials are not guaranteed to those who register on site or fail to submit payment two weeks prior to the event.

 

Payment Methods

Choose one of these easy ways to pay

  1. Mail your payment to: ISACA, 1055 Paysphere Circle, Chicago, IL 60674 USA
  2. Bank Wires—send electronic payments in US dollars to:
    Bank of America, 135 S. LaSalle St., Chicago, IL 60603
    ABA #0260-0959-3
    ISACA Account #22-71578
    S.W.I.F.T. code BOFAUS3N
    [Please include attendee’s name and ISACA Training Week on the Advice of Transfer.]

 

 


Cancellation Policy

If your plans change and you won’t be able to attend this course, contact us by phone, fax or e-mail to cancel your registration. All cancellations must be received by the cancellation deadline to receive a refund of registration fees. A cancellation charge of US $150 will be subtracted from refunds. No refunds can be given after the cancellation deadline. Attendee substitution is permitted at any time until the event.

NOTE: Registration is contingent upon full payment of the registration fee. To guarantee registration, course fees must be received by the published deadline.It may take 10 or more business days for a wire transfer or mailed check to reach ISACA, so please plan accordingly. If, for any reason, ISACA must cancel a course or event, liability is limited solely to the registration fees paid. ISACA is not responsible for other expenses incurred, including travel and accommodation fees. Course materials are not guaranteed to those who register on site or fail to submit payment prior to the event. For more information regarding administrative policies, please contact the ISACA Training & Education department at https://support.isaca.org.

.


Continuing Professional Education Credits

To maintain ISACA certifications, certification holders are required to earn 120 CPE credit hours over a 3-year period in accordance with ISACA’s continuing professional education (CPE) policy. Attendees can earn up to 32 CPE credits by attending the four-day ISACA Training Week Course. ISACA training week courses are Group Live and do not require any advanced preparation.

ISACA is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org.

National Registry of CPE Sponsors
150 Fourth Ave North
Suite 700
Nashville, Tennessee 37219-2417
USA
www.nasba.org

Disclaimer Policy

ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation and to grant the rights to ISACA as set forth in speaker agreement. Subject to the rights granted in the speaker agreement, all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.

Please note: Unauthorized recording, in any form, of presentations and workshops is prohibited.


Not a member of ISACA? Join today!

When you register for the event as a nonmember, the difference between member and nonmember event fees can be applied towards ISACA membership. This means you can become a member at the international and chapter level for little to no additional cost; it just depends on your local chapter dues. To take advantage of this great offer, click on the "Click here to join now" link in your event registration shopping cart. For more information about ISACA membership, visit the web site at www.isaca.org/membership or contact the membership department at membership@isaca.org.


Permission to be Photographed

By attending this event, the registrant grants permission to be photographed during the event. The resultant photographs may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs now or in the future.


Dress

Business casual is appropriate for all training events.


Visa

Obtaining a VISA is solely the responsibility of the registrant. Please contact the local government of the host country for details. Once a paid registration is received, a letter of invitation will be provided by ISACA, on request.

Course location

DePaul University (Loop Campus)
1 E Jackson Blvd.
Chicago, IL 60604
Telephone: +1.312.362.8000
Venue Web Site

 

Suggested hotels:

ISACA has not reserved rooms for this event. View places to stay near the Loop Campus, provided by DePaul University. The following two hotels are close to the Training Week facility. 

Palmer House Hilton
17 E. Monroe Avenue
Chicago, IL 60603
Telephone: +1.877.865-5321
Palmer House Hilton 

Club Quarters - Central Loop
111 W. Adams Street
Chicago, IL 60604
www.clubquarters.com

Questions

Please Contact ISACA's Training & Education Department:
Tel:
+1.847.660.5543
Fax: +1.847.253.1443
https://support.isaca.org.