Managed IT Services

DUDE DESIGNZ DC

IT Auditing

Managing your IT Infrastructure

Data Store

Manage & Monitor buildings, rooms, and resources

Project Management

Data Migration (Import emails, calendar, and contacts)

Security (Manage Security Features)

Google Cloud Services

Reports (Track Usage of Service)

IT Strategy

IT Governance, Organizational Structures, and HR

Explain the effectiveness of the IT governance structure.

Discuss IT organizational structure and human resources management.

Formulate an IT strategic plan checklist.

IT Strategy, Management, Policies, Standards, and Procedures

Utilize the enterprise’s IT policies, standards, and procedures to determine if the enterprise is in compliance and support IT strategy.

Illustrate the importance of the Quality Management Systems (QMS).

Summarize IT management and monitoring of controls.

Monitoring and Assurance Practices and IT Resource Management

Examine IT monitoring and internal control evaluations.

Align assurance practices and IT performance.

Justify an IT balanced scorecard.

IT Contracting Strategies and Policies

Survey IT contracting strategies and policies.

Examine the contract management practices and the Service Level Agreement (SLA).

Compare change management with configuration management in the context of existing business processes.

Risk Management Practices

Compare risk management practices.

Formulate a risk management and mitigation plan.

Business Continuity Planning (BCP)

Distinguish the IT role in the Business Continuity (BC) and Disaster Recovery (DR) planning.

Examine the Business Continuity Plan standards and procedures.

Model an Enterprise’s Business Continuity Plan (BCP).

Business Case Development

Investigate benefits realization techniques.

Investigate project and portfolio management techniques.

Create a business case for proposed investments in information systems acquisition, development, and implementation.

Project Management Practices

Examine project governance mechanisms and project control frameworks, practices, and tools.

Determine risk management practices.

Create project management practices and controls that promote cost-effective and risk acceptable systems development efforts.

Project Reviews

Examine project success factors and risk.

Examine risk management practices.

Construct reviews to determine project progress.

Develop Project Controls

Examine controls for IT architecture, requirements analysis, systems development methodologies and tools, and testing.

Examine acquisition practices.

Design controls for information systems during the requirements, acquisition, development, and testing phases.

Information Systems Implementation and Migration

Distinguish between configuration and release management practices.

Examine systems migration and release management practices.

Examine data conversion tools and techniques.

Create an implementation plan.

Post-Implementation Reviews

Investigate project closure practices.

Examine performance measurement practices.

Formulate a post-implementation review plan.

IT Governance and Information Systems

Examine the role of IT Governance.

List and describe the various operations and end-user procedures in organizations.

Describe and analyze Enterprise Resource Planning, Transaction Processing, and Financial Reporting Systems.

Auditing, Assurance, and Control

Describe some of the objectives and techniques for auditing and internal controls.

Explore and apply computer-assisted tools and techniques.

Evaluate and apply testing, performance, and capacity monitoring tools and techniques to determine whether IT services meet the organization’s objectives.

Hardware, Network, and Database Operations

Identify different security concepts and operations related to hardware, network components, and system software.

Identify operational audit risks and mitigation techniques with operating systems and networks.

Identify operational audit risks and mitigation techniques with database systems.

System Design and Control Techniques

To be able to conduct a cost-benefit analysis for different approaches in system design.

Identify control techniques that ensure the integrity of system interfaces, software licensing, and inventory practice.

System Development and Management

Evaluate service level management practices to determine whether the level of service from internal and external service providers is defined, managed, adhered, and controlled.

Conduct reviews of information systems to determine whether they meet and continue to meet the organization’s objectives.

Change, Configuration, and Release Management

Identify and evaluate system change, configuration, and release management practices.

Identify and evaluate problem and incident management practices.

IT Governance

Technical Writing

IT Strategy

System Designz

Security Awareness and Standards

Analyze methods for increasing information security awareness.

Evaluate the range of security policies, standards and procedures, and generally accepted practices.

Compare policies to actual practices to determine compliance.

Logical System Security

Analyze the various logical access controls for the identification, authentication, and restriction of users to authorized functions and data.

Evaluate audit procedures for determining compliance with logical access policies.

Data Classification and Protection

Analyze the purpose of data classification.

Evaluate how organizations protect data at the various data classification levels.

Examine tools used to monitor protection at each of the classification levels.

Physical and Environmental Controls

Evaluate the various physical and environmental controls for the identification, authentication, and restriction of users to authorized functions and data.

Analyze audit procedures for determining compliance with physical access policies.

Handling Information Assets

Analyze the various dispositions of information assets.

Evaluate the tools available for information assets disposition.

Business Continuity

Apply business continuity plans for adequate protection of information assets.

Apply information handling processes assuring information asset disposition.

Business and Information Systems

Describe the relationship between business processes and information systems.

Discuss the influence of ethics and privacy on information systems.

Describe what information security is and why we need it.

Infrastructure, Network, and Data Management

Describe how you would apply the necessary hardware and software components as the infrastructure for information systems.

Explain at least two approaches to managing data.

Discuss potential uses of the various kinds of networks.

Enterprise and Business Applications

Explain the business value of transaction processing systems and functional area information systems.

Describe the uses of customer relationship management systems.

Explain the benefits of supply chain management systems.

Business Intelligence and Information Systems

Analyze and describe the use of information systems technology in decision-support frameworks.

Define business intelligence and describe its impact on business.

Describe the capabilities of a business intelligence application.

Information Systems Planning

Define information systems planning for a business.

Compare and contrast at least two methodologies for systems development.

Discuss available tools and techniques used in acquiring information systems.

Emerging Information Systems Topics

Define utility and cloud computing, and discuss the advantages and disadvantages of their use.

Discuss future opportunities for the use of mobile and wearable computing.

Research career requirements and opportunities in information systems management.