The TOGAF 9 Certified (Level 2) certification serves as proof that you are able to use the knowledge and understanding gained from the TOGAF 9 Foundation (Level 1) course to analyse and apply the core TOGAF concepts and principles not only theoretically, but practically.
TOGAF 9 CERTIFIED
|TOGAF 9 Certified|
|Awarding Body: The Open Group|
|Study Time: Approximately 20 – 25 Hours|
|Type: Online Course|
|Required: Internet and Email|
Overview of this TOGAF 9 Certified (Level 2) Course
What you will learn
Validate your skills
During this course you will learn:
Governance of implementation
Management of architecture change
I’VE HELPED THOUSANDS OF STUDENTS, NOW I’M READY TO HELP YOU.
Our Career Advisors are highly trained to provide superior quality feedback on the various industries that our training courses offer. This enables them, through years of experience, to build a lasting relationship with you as a student in order to cater to the specific needs of your studies and your developing career.
Course Certification Details
TOGAF 9 Certified (Level 2) Course Assessment
The TOGAF 9 Certified exam is the second level of the TOGAF 9 certification process. There are two options when it comes to achieving this level of TOGAF 9 certification. The TOGAF 9 Certified (Level 2) qualification is split into two parts and each of these has an associated exam. If you have already achieved the TOGAF 9 Foundation level certification then you will be exempt from the first part of this certification process as it is the same material and examination.
However, if you do not have an existing TOGAF 9 qualification you can either take each of the two exams separately or you have the option to take a combined exam which will cover both parts. Regardless of which way you choose to take your TOGAF 9 exams, you will be required to pass both exams, or the combined version, before you will be awarded your TOGAF 9 Certified (Level 2) certification from The Open Group.
TOGAF 9 Certified (Level 2) Course Requirements
No formal requirements need to be met to study the TOGAF 9 Certified (Level 2) training course.
Is the TOGAF 9 Certified (Level 2) course for me?
Career Path Opportunities
The TOGAF 9.2 Certified (Level 2) course is suited for anyone looking to work in any of the following roles:
- Infrastructure Architect
- Domain Architect
- TOGAF Solutions Architect
- Datacentre Architect
- Enterprise Architect
- Data Migration Developer
- Security Architect
- Information Architect
- Infrastructure Solution Designer
- Technical Architect
Frequently Asked TOGAF 9 Certified (Level 2) Course Questions
QUESTION QUESTION What is the format of the TOGAF 9 Certified exam?
The TOGAF 9 Certified (Level 2) exam comprises of 8 complex multiple choice scenario-based questions. You will be allocated 90 minutes in which to complete this exam.
QUESTION QUESTION Is Part 1 of this exam the same as the TOGAF 9 Foundation exam?
Yes. Part 1 is the same exam as taken for TOGAF 9 Foundation so it is possible to simply take the combined exam instead of writing each exam individually.
QUESTION QUESTION Do I have to take each exam separately?
No. You have the option to take each exam separately or to take both exams together as a combined exam.
QUESTION QUESTION Is this the most up-to-date TOGAF course?
Yes. This TOGAF Certified training course follows the latest TOGAF curriculum and has been updated from TOGAF 9.1 to TOGAF 9.2.
View our additional bolt-on services
We have used our wealth of experience to compile a recruitment pack that will help to make job-hunting easier and more rewarding. From CV templates and cover letter templates, to articles on interview tips and preparation, this recruitment pack will prepare and assist you when stepping into your new career.
Request a Recruitment Pack from your Course and Career Advisor.
Is this course right for me?
Speak to our experts today for FREE tailored advice.
0800 160 1161
TOGAF 9 Certified Online Course Curriculum
TOGAF 9 Certified (Level 2)
1.1 Understand the inputs to the phase and be able to explain the following key elements: Architecture Frameworks, Business principles, business goals, and business drivers
1.2 Explain the influence of pre-existing architectural inputs on the phase
1.3 Understand the steps and be able to: Describe how to establish an enterprise architecture team and organization, identify and establish a set of Architecture Principles for a given scenario, discuss the appropriate considerations for tailoring the framework
1.4 Understand the outputs and be able to explain the following key elements: Architecture Principles, Architecture Governance Framework, Request for Architecture Work
1.5 Explain how Security Architecture influences this phase
2.1 Explain how Architecture Governance fits within the ADM cycle
2.2 Discuss the key success factors for putting Architecture Governance into practice
2.3 Discuss the factors that should be considered when setting up an Architecture Board
2.4 Explain how to operate an Architecture Board
3.1 Describe the properties of a good Business Scenario
3.2 Explain how to develop and validate a Business
4.1 Describe the typical contents of the Architecture Repository at this point
4.2 Understand the steps and be able to describe how to identify stakeholders, their concerns, and business requirements. As well as being able to explain the purpose of a Business Transformation Readiness Assessment and describe the risk assessment approach taken in this phase
4.3 Understand the outputs and be able to explain the following key elements including their purpose: Statement of Architecture Work, Capability Assessment, Architecture Vision and Communications Plan
4.4 Explain the Security Architecture influences on this phase
5.1 Explain the purpose of the Architecture Content Framework
5.2 Describe the main components of the Content Metamodel
5.3 Describe the relationship between the Architecture Content Framework and the TOGAF ADM
6.1 Describe the steps in developing a Stakeholder Map
6.2 Describe the stakeholders and their concerns
6.3 Use the example Stakeholder Map provided by the TOGAF Standard as a guideline to identify stakeholders
7.1 Describe the core metamodel concepts
7.2 Explain the purpose of dividing the metamodel into core and extensions
7.3 Describe the key concepts related to the core metamodel entities
8.1 Explain how to reconcile Interoperability Requirements with potential solutions
8.2 Explain the factors that influence Business Transformation Readiness
8.3 Explain how to determine requirements for risk assessments
8.4 Explain how Capability-Based Planning is applied in an enterprise architecture context
9.1 Understand the inputs to the phase and explain business principles, business goals, and business drivers
9.2 Understand the steps and be able to: Describe three techniques for business modeling, explain the considerations for selecting reference models, viewpoints and tools, explain the technique of Gap Analysis
9.3 Explain how building blocks are used in the development of the Business Architecture
9.4 Understand the outputs and be able to explain the following key elements: Business Architecture components of the Architecture Definition Document, Business Architecture components of the Architecture Requirements Specification
9.5 Explain the Security Architecture influences on this phase
10.1 Explain the considerations for the implementation order of the Data and Application Architectures
10.2 Understand the inputs to the phase and explain data principles
10.3 Understand the steps and be able to explain the considerations for selecting reference models, viewpoints, and tools
10.4 Understand the outputs and be able to explain the following key elements: Data Architecture components of the Architecture Definition Document, Data Architecture components of the Architecture Requirements Specification
10.5 Explain the Security Architecture influences on this phase
11.1 Understand the inputs to the phase and explain application principles
11.2 Understand the steps and be able to explain the considerations for selecting reference models, viewpoints, and tools
11.3 Understand the outputs and be able to explain the following key elements: Application Architecture components of the Architecture Definition Document, Application Architecture components of the Architecture Requirements Specification
11.4 Explain the Security Architecture influences on this phase
12.1 Explain the TRM graphic, including the following key elements: Application Software, Categories, Application Platform Interface, Application Platform, Communications Infrastructure Interface, Qualities
12.2 Briefly describe the structure of the TRM
12.3 Briefly explain the main architecture objectives of using the TRM
12.4 Explain what the Platform Services Taxonomy is
12.5 Explain what the Service Quality Taxonomy is
12.6 Explain how to customize the TRM to meet an organization’s specific needs
13.1 Describe the business and technical drivers for Boundaryless Information Flow
13.2 Explain how the III-RM fulfills the solution space for Boundaryless Information Flow
13.3 Briefly describe the high-level structure of the III-RM
13.4 Explain the III-RM graphic, including the following components: Business Applications, Infrastructure Applications, Application Platform, Interfaces, Qualities
14.1 Understand the inputs to the phase and explain the following key elements: Technology Principles
14.2 Understand the steps and be able to: Explain how the TRM can be used when developing a Technology Architecture, Explain the role of ABBs
14.3 Understand the outputs and be able to explain the following key elements: Technology Architecture components of the Architecture Definition Document, Technology Architecture components of the Architecture Requirements Specification
14.4 Explain the Security Architecture influences on this phase
15.1 Describe how the Implementation Factor Assessment and Deduction Matrix can be used to document factors impacting the Architecture Implementation and Migration Plan
15.2 Explain the purpose of the Consolidated Gaps, Solutions, and Dependencies Matrix
15.3 Describe the purpose of an Architecture Definition Increments Table
15.4 Explain how the Transition Architecture State Evolution Table can be used in conjunction with a defined taxonomy such as the TOGAF Standards TRM
15.5 Explain how the Business Value Assessment Technique can be used in architecture development
16.1 Explain how migration planning techniques are used in this phase to review and consolidate the Gap Analysis results from earlier phases
16.2 Describe the steps to create the Implementation and Migration Strategy
16.3 Describe three basic approaches to implementation
16.4 Explain how to identify and group work packages
16.5 Explain how Transition Architectures are created and documented
17.1 Describe the management frameworks that have to be coordinated within this phase
17.2 Explain how business value is assigned to each work package
17.3 Describe the steps to prioritize the migration projects
17.4 Describe the steps to confirm the Architecture Roadmap
17.5 Explain key outputs of this phase specifically: Implementation and Migration Plan, Architecture Definition Document, including Transition Architectures (if any)
17.6 Explain the Security Architecture influences on this phase
18.1 Understand the inputs to the phase
18.2 Understand the steps and be able to describe the following: Explain how to tailor and conduct an Architecture Compliance Review
18.3 Understand the outputs and be able to explain the following key elements: The contents of Architecture Contracts, their relationship to Architecture Governance
18.4 Explain the Security Architecture influences on this phase
18.5 Demonstrate the role that risk monitoring plays in this phase
19.1 Understand the inputs to the phase and be able to explain the following: Change Requests
19.2 Understand the steps and be able to describe the following: Architecture board meetings
19.3 Understand the outputs and be able to explain when the following might occur: Updated Architecture Contracts, a new Request for Architecture Work
19.4 Explain the Security Architecture influences on this phase
20.1 Understand the inputs to the phase
20.2 Understand the steps and their correspondence to phases
20.3 Explain how the Requirements Management steps correspond to ADM phases
20.4 Explain the purpose of the outputs of Requirements Management
20.5 Explain the Security Architecture influences on the requirements captured
21.1 Describe the purpose of Architecture Partitioning
21.2 Describe the classification criteria for solutions and architectures when considering partitioning
21.3 Describe how Architecture Partitioning can be employed in the Preliminary Phase of the ADM
22.1 Explain the relationship between the Architecture Repository and the Enterprise Repository
22.2 Describe the purpose of the repository areas that hold output of projects, specifically: Architecture Landscape, Reference Library, Standards Information Base
22.3 Governance Log
23.1 Describe the concept of iteration and how it applies to TOGAF standards
23.2 Describe the factors influencing the use of iteration
23.3 Describe some suggested iteration cycles
23.4 Describe how the ADM supports different types of engagements within the organization
23.5 Explain how to apply iteration cycles to the ADM phases
23.6 Explain how the concepts of levels and the Enterprise Continuum are used to organize the Architecture Landscape
23.7 Identify the different levels of architecture that exist in an organization
24.1 Describe the responsibility that Enterprise Architects have towards Security Architecture
24.2 Describe the recommended Security adaptations to the ADM
25.1 Explain the role of a Capability Maturity Model
25.2 Explain the CMMI process improvement approach development by CMU
25.3 Describe the structure and levels of the ACMM developed by CMU for the US DoC
25.4 Explain the role of Maturity Assessments in the ADM
TOGAF® 9 Certified delivered by Good e-Learning is a course accredited by The Open Group. ITonlinelearning promotes this course for Good e-Learning.
|TOGAF 9 Certified|
|Awarding Body: The Open Group|
|Study Time: Approximately 20 – 25 Hours|
|Type: Online Course|
|Required: Internet and Email|