COBIT: Beginner COBIT 5

  • 4 Courses | 3h 34m 11s
  • 8 Books | 13h 25m
Likes 38 Likes 38
 
Explore COBIT, a framework for IT management and governance.

GETTING STARTED

Architecture & Enterprise Governance

  • Playable
    1. 
    An Overview
    2m 46s
    NOW PLAYING
  • Playable
    2. 
    History and Evolution
    2m 38s
    UP NEXT

COURSES INCLUDED

Architecture & Enterprise Governance
COBIT 5 is used to maximize confidence in, and value of, information systems. Explore COBIT and its evolution over time to its most recent version, COBIT 5, as a framework for IT enterprise governance and management.
11 videos | 43m has Assessment available Badge
Stakeholder Needs & Framework Integration
COBIT 5 is used to maximize confidence in, and value of, information systems. Explore COBIT and how to tackle enterprise challenges and meet stakeholders' needs.
13 videos | 46m has Assessment available Badge
Principles
Explore COBIT 5 principles and the treatment of governance and management processes.
9 videos | 40m has Assessment available Badge
Implementation
Explore COBIT 5 concepts necessary for the successful implementation of COBIT 5 in an enterprise.
17 videos | 1h 23m has Assessment available Badge
SHOW MORE
FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

COBIT 5 Implementation
Using COBIT 5 and its components, this guide provides a good-practice approach for implementing governance of enterprise IT (GEIT) based on a continual improvement life cycle that should be tailored to suit the enterprise's specific needs.
Book Duration 1h 46m Book Authors By ISACA

Book

Transforming Cybersecurity: Using COBIT 5
Applying the COBIT 5 framework and its component publications to transforming cybersecurity in a systemic way, this book will enable a uniform governance, risk management and security management framework for enterprises and other organizations.
Book Duration 2h 49m Book Authors By ISACA

Book

COBIT 5: Enabling Information
Providing a structured way of thinking about information governance and management issues in any type of organization, this comprehensive guide addresses the information model attributes and life cycle that are introduced in the COBIT 5 framework.
Book Duration 49m Book Authors By ISACA

Book

Configuration Management: Using COBIT 5
Designed to help enterprises create a homogenous view of configuration management (CM) and implement a sustainable process, this book describes the most important challenges and formulates mitigating actions that are supported by COBIT 5 practices to manage configuration successfully.
Book Duration 1h 4m Book Authors By ISACA

Book

COBIT 5: A Business Framework for the Governance and Management of Enterprise IT
COBIT 5 is the overarching business and management framework for governance and management of enterprise IT. This volume documents the five principles of COBIT 5 and defines the 7 supporting enablers that form the framework.
Book Duration 1h 48m Book Authors By ISACA

Book

COBIT 5: Enabling Processes
Including extensive guidance on enablers for governance and management of enterprise IT, this book complements COBIT 5 and contains a detailed reference guide to the processes defined in the COBIT 5 process reference model.
Book Duration 3h 44m Book Authors By ISACA

Book

Governance of Enterprise IT Based on COBIT® 5: A Management Guide
Written for IT service managers, consultants and other practitioners in IT governance, risk and compliance, this practical book discusses all the key concepts of COBIT®5, and explains how to direct the governance of enterprise IT (GEIT) using the COBIT®5 framework.
Book Duration 1h 15m Book Authors By Geoff Harmer

Book

COBIT® 5 for Information Security (2013)
Presenting a sample chapter from the full-text book, this publication examines COBIT 5 from a security view, placing a security lens over the concepts, enablers and principles within COBIT 5.
Book Duration