CCSP Training Course Training ½Òµ{
  Facebook: CCSP Training Course Training ½Òµ{
 
CCSP Training Course Training ½Òµ{
CCSP Training Course Training ½Òµ{ CCSP Training Course Training ½Òµ{ CCSP Training Course Training ½Òµ{ CCSP Training Course Training ½Òµ{ CCSP Training Course Training ½Òµ{ CCSP Training Course Training ½Òµ{ CCSP Training Course Training ½Òµ{ CCSP Training Course Training ½Òµ{ CCSP Training Course Training ½Òµ{ CCSP Training Course Training ½Òµ{ CCSP Training Course Training ½Òµ{  
CCSP Training Course Training ½Òµ{ CCSP Training Course Training ½Òµ{

·Q©w´Áª¾¹D³Ì·s½Òµ{¤ÎÀu´f¶Ü¡H
§K¶O­q¾\¥»¤¤¤ßªº½Òµ{³q°T¡I

½Ò°ó¿ý¼vÀH®ÉÚ» 10 ¤jÀuÂI¤§¦aÂI¤è«K¡G¥»¤¤¤ß¦ì©ó©ô¨¤¡BÆ[¶í¡B¥_¨¤¡B¨F¥Ð¤Î ¤Ùªù¡A´Nªñ´äÅK¯¸¡I

Certified Cloud Security Professional (CCSP) °ê»Ú»{¥iÃҮѽҵ{
½Òµ{²ºÙ¡GCCSP Training Course

  • ½Òµ{®É¶¡
  • ½Òµ{²¤¶
  • ½Òµ{¯SÂI
  • ¦Ò¸Õ¶·ª¾
  • ½Òµ{¤º®e

±À¤¶ªA°È¡G½Ò°ó¿ý¼vÀH®ÉÚ» (¦b®aÆ[¬Ý = 0%¡A¦b®ÕÆ[¬Ý = 100%)
¾Ç­û¨Ï¥Î¹q¸Ü©Î¥»ºô­¶³ø¦W¡A«Ý¥»¤¤¤ß½T»{¤w¬°¾Ç­û¯d¦ì«á¡A§Y¥i¨Ï¥Î Âà¼Æ§Ö ú¥I¾Ç¶O¡A¹Lµ{²«K¡I
½s¸¹ ¦aÂI ¥i¹w¬ù¬P´Á¤Î®É¶¡ ¾Ç¶O§C¦Ü 85 §é  
JY2406MV ©ô¨¤ ¤@¦Ü¤­¡G14:30 - 22:15   ¤»¡G13:45 - 21:30   ¤é¡G10:15 - 18:00 (¤½²³°²´Á¥ð®§) 95 §é«á¥u»Ý $5,206 «ö¦¹³ø¦W¡GCCSP Training Course Training ½Òµ{
JY2406OV Æ[¶í ¤@¦Ü¤­¡G14:15 - 22:00   ¤»¤Î¤é¡G12:15 - 20:00   (¬P´Á¤T¤Î¤½²³°²´Á¥ð®§) 9 §é«á¥u»Ý $4,932 «ö¦¹³ø¦W¡GCCSP Training Course Training ½Òµ{
JY2406PV ¥_¨¤ ¤@¦Ü¤­¡G14:15 - 22:00   ¤»¤Î¤é¡G12:15 - 20:00   (¬P´Á¤T¤Î¤½²³°²´Á¥ð®§) 9 §é«á¥u»Ý $4,932 «ö¦¹³ø¦W¡GCCSP Training Course Training ½Òµ{
JY2406SV ¨F¥Ð ¤@¦Ü¤­¡G14:15 - 22:00   ¤»¤Î¤é¡G12:15 - 20:00   (¬P´Á¤T¤Î¤½²³°²´Á¥ð®§) 85 §é«á¥u»Ý $4,658 «ö¦¹³ø¦W¡GCCSP Training Course Training ½Òµ{
JY2406YV ¤Ùªù ¤@¦Ü¤­¡G14:15 - 22:00   ¤»¤Î¤é¡G12:15 - 20:00   (¬P´Á¤@¡B¤T¤Î¤½²³°²´Á¥ð®§) 85 §é«á¥u»Ý $4,658 «ö¦¹³ø¦W¡GCCSP Training Course Training ½Òµ{
* ¦U¬F©²³¡ªù¥i¨Ï¥Î P Card ¥I´Ú  
¦p¨Ï¥Î P Card ú¥I¦Ò¸Õ¶O¡A¦Ò¸Õ¶O»Ý¥t¥[ 1.3% ªþ¥[¶O  
¦b®Õ§K¶O¸ÕÚ»¡G ­º 3 ¤p®É¡A½Ð­P¹q»P¥»¤¤¤ß¾­û¹w¬ù¡C ¬d¬Ý¦U¦aÂI¹q¸Ü
©ô¨¤ 2332-6544
Æ[¶í 3563-8425
¥_¨¤ 3580-1893
¨F¥Ð 2151-9360
¤Ùªù 3523-1560
¦b®Õ§K¶O­«Ú»¡G ¾Ç­û¥i©ó¨É¥Î®É´Á¤º©ó³øŪ¦aÂI¤£­­¦¸¼Æ¦a­«¬Ý½Ò°ó¿ý¼v¡A±q¦Ó¥i¤ÏÂЭ«·Å¾ã­Ó½Òµ{¡I
¾É®v¸Ñµª¡G ¾Ç­û¥i©óÆ[¬Ý¬Y¤@½Ò°ó¿ý¼v«á´£¥X½Ò°óª½±µ¬ÛÃöªº°ÝÃD¡A½Òµ{¾É®v·|¼Ö·N¬°¾Ç­û¥H³æ¹ï³æªº§Î¦¡¸Ñµª¡I
½Ò®É¡G 36 ¤p®É
¨É¥Î®É´Á¡G 12 ¬P´Á (¥i©ó³øŪ¤é¦Ü 4 ¬P´Á¤ºÆ[¬Ý¾ã­Ó½Òµ{¡A¥t¥[ 8 ¬P´Á³Æ¥Î®É´Á)¡C¶i«×¥Ñ±z±±¨î¡A¥i§Ö¥iºC¡C
½Ò°ó¿ý¼v¾É®v¡G Larry (¥ô±Ð½Òµ{²M³æ)
¦b®ÕÆ[¬Ý¡G ¸Ô±¡¤Î¥Ü½d¤ù¬q


¦a°Ï ¦a§} ¹q¸Ü ±Ð¨|§½µù¥U½s¸¹
©ô¨¤ ¤EÀs©ô¨¤¨È¬Ò¦Ñµó 109 ¸¹¡A¬Ò©ô°Ó·~¤j·H 18 ¼Ó 1802 - 1807 «Ç 2332-6544 533459
Æ[¶í ¤EÀsÆ[¶í¦¨·~µó 7 ¸¹¹ç®Ê¤¤¤ß 12 ¼Ó G2 «Ç 3563-8425 588571
¥_¨¤ ­»´ä¥_¨¤°¨Ä_¹D 41-47 ¸¹µØÄ_°Ó·~¤j·H 3 ¼Ó 01-02 ¸¹çE 3580-1893 591262
¨F¥Ð ·s¬É¨F¥Ð¥Ûªù¦w¸sµó 3 ¸¹¨Ê·ç¼s³õ 1 ´Á 10 ¼Ó M «Ç 2151-9360 604488
¤Ùªù ·s¬É¤Ùªù¤Ù³ß¸ô 2 ¸¹¤Ùªù¬fÄR¼s³õ 17 ¼Ó 1708 «Ç 3523-1560 592552
ª`·N¡I «È¤á¥²¶·¬d°Ý³øŪ¾Ç®Õªº±Ð¨|§½µù¥U½s¸¹¡A¥H½T»{¸Ó®Õ¬°µù¥U¾Ç®Õ¡A¥H§K»X¨ü¤£¥²­nªº·l¥¢¡I


ISC2 ³Ð¥ß¤F Certified Cloud Security Professional (CCSP) ¸ê®æ»{ÃÒ¡A¥H½T«O¶³ºÝ¦w¥þ±M·~¤H¤h¦b¶³¦w¥þ³]­p¡B¹ê¬I¡B¬[ºc¡B¹BÀç¡B±±¨î©M¿í¦uªk³W®Ø¬[¤è­±¨ã³Æ©Ò»Ýªºª¾ÃÑ¡B§Þ¯à©M¯à¤O¡C

CCSP »{ÃÒ«ù¦³¤H¥²»Ý¦b¶³ºÝÀô¹Ò¤¤¨ã³Æ«H®§¦w¥þ¬ÛÃöªº±M·~ª¾ÃÑ¡A¨Ã®i¥Ü¦b¶³ºÝ¦w¥þ¬[ºc¡B³]­p¡BÀç¹B©MªA°È¨ó½Õ¤è­±ªº¯à¤O¡C¦Ó CCSP »{ÃÒ¥»¨­¥çÀò±o¬ü°ê°ê®a¼Ð·Ç¨ó·| (ANAB) ªº ISO 17024 »{¥i¡AÄ~¦Ó¦¨¬°¥þ²y»{¥iªºª¾ÃÑÅé¨t¡C

CCSP ª¾ÃÑÅé¨t (Common Body of Knowledge) ¥]§tªºÃD§÷½T«O¤F¨ä¦b¶³ºÝ¦w¥þ»â°ìªº©Ò¦³§Þ³N½dÃ¥ªº¬ÛÃö©Ê¡C

¬°¦¨¥\³q¹L¦Ò¸Õ¤Î¨ú±o CCSP »{ÃÒ, ¾Ç­û¥²¶·¦b¥H¤U 6 ­Ó»â°ì®i¥Ü¬ÛÃöªº¯à¤O¡G

  • Domain 1. Cloud Concepts, Architecture and Design
  • Domain 2. Cloud Data Security
  • Domain 3. Cloud Platform & Infrastructure Security
  • Domain 4. Cloud Application Security
  • Domain 5. Cloud Security Operations
  • Domain 6. Legal, Risk and Compliance

³Æµù¡G¦Û 2016 ¦~°_ CCSP »{ÃÒ¤w³Q¯Ç¤J­»´äª÷¿ÄºÞ²z§½ (HKMA) ªº Enhanced Competency Framework on Cybersecurity (ECF-C) ±M·~¯Å§O»{ÃÒ, ¨Ã«ü¥Ü¦Uª÷¿Ä¾÷ºc (¦p»È¦æ¡B¥æ©ö©Òµ¥µ¥) ªº¸ê°T¬ì§Þ¦w¥þ¬ÛÃö¤H­û°È¥²«ù¦³ CCSP »{ÃÒ¡C

¸ê®Æ¨Ó·½:
https://www.hkma.gov.hk/media/eng/doc/key-information/guidelines-and-circular/2019/20190110e1.pdf (²Ä4¦Ü²Ä7­¶)

­Y­n¦Ò¨ú CCSP¡A¦P¾Ç¶·­n¡G

  1. ¨ã³Æ 5 ¦~¸ê°T¬ì§Þ¬ÛÃöªº¤u§@¸gÅç, ¨ä¤¤ 3 ¦~¥²¶·¬O¦b¸ê°T¦w¥þ»â°ì,¦Ó 1 ¦~¥²¶·¦b¥H¤W CCSP ¤jºõªº¤»­Ó»â°ì¤§¤@¡C
  2. ³q¹L CCSP ¦Ò¸Õ¡C(§Ú­Ì³Æ¦³¤j¶q½m²ß¥O¾Ç­û§ó©ö³q¹L¦Ò¸Õ)
  3. ³q¹L Endorsement ¹Lµ{¡C(¥»¤¤¤ßªº CCSP ¾Ç­û¥i¦V¥»¤¤¤ß§K¶O¥Ó½Ð Endorsement ªº¨ó§U¡A¦Ó¥»¤¤¤ß·|«ö·Ó ISC2 «ü¤Þ¨Ó§K¶O´£¨Ñ Endorsement ªA°È)
  4. ³q¹L ISC2 ªº¼f®Ö¡C

³Æµù¡G¥Ó½ÐªÌ¦p¥¼¨ã¦³¨¬°÷ªº¤u§@¸gÅç¡A¨ÌµM¥i¥H°Ñ¥[¥»½Òµ{¤Î CCSP ¦Ò¸Õ¡A¦Ò¸Õ«á¦¨¬° Associate of ISC2¡A¨Ã©ó¥¼¨Ó 6 ¦~¤º²Ö¿n¨¬°÷ªº¤u§@¸gÅç (§Y¤W­zªº 1.) ®É¡A«K¥i¥H¥Ó½Ð¦¨¬° CCSP¡C


½Òµ{¦WºÙ¡G Certified Cloud Security Professional (CCSP) °ê»Ú»{¥iÃҮѽҵ{
- ²ºÙ¡GCCSP Training Course
½Òµ{®É¼Æ¡G ¦X¦@ 36 ¤p®É (¦@ 12 °ó¡A¦@ 1 ¬ì)
¾A¦X¤H¤h¡G ¦³§Ó¦Ò¨ú Certified Cloud Security Professional ÃҮѤH¤h©Î¹ï¶³ºÝ«O¦w§Þ³N¦³¿³½ì¤H¤h
±Â½Ò»y¨¥¡G ¥H¼sªF¸Ü¬°¥D¡A»²¥H­^»y
½Òµ{µ§°O¡G ¥»¤¤¤ß¾É®v¿Ë¦Û½s¼g­^¤å¬°¥Dµ§°O¡A¦Ó³¡¥÷­^¤å¦rªþ¦³¤¤¤å¹ï·Ó¡C

1. ´£¨Ñ¼ÒÀÀ¦Ò¸ÕÃD¥Ø¡G ¥»¤¤¤ß¬°¾Ç­û´£¨Ñ¼ÒÀÀ¦Ò¸ÕÃD¥Ø¡A¨C±ø¦Ò¸ÕÃD¥Ø§¡ªþ¦³¼Ð·Çµª®×¡C(§Ú­Ì³Æ¦³¤j¶q½m²ß¥O¾Ç­û§ó©ö³q¹L¦Ò¸Õ)
2. ®É¼Æ¾A¤¤¡G

¥»¤¤¤ßªº Certified Cloud Security Professional (CCSP) °ê»Ú»{¥iÃҮѽҵ{®É¼Æ¾A¤¤¡A¦³ 36¤p®É¡C

¥O¾Ç­û¯à¯u¥¿¤F¸Ñ¤Î´x´¤½Òµ{¤º®e¡A¦Ó¤S¯à©ó 3 ­Ó¤ë¤º¦ÒÀò¥H¤U 1 ±i°ê»Ú»{¥iÃÒ®Ñ:

  • ISC2 Certified Cloud Security Professional
3. ¾É®v¿Ë¦Û½s¼gµ§°O¡G

¸ê²`¾É®v Larry Chan¨ã³Æ¤F 28 ¦~¥H¤W¹q¸£¡Bºôµ¸¡B¼Æ¾Ú®w¤Î¶³ºÝ«O¦w¨t²Îªº¤u§@¸gÅç¡A¦Ó³Ìªñ 24 ¦~§ó©ó¥»¤¤¤ß¥þ¾±Ð¾Ç¡C

¸ê²`¾É®v Larry Chan¨Ã¦P®É©ó¥»¤¤¤ß±Ð±Â¸ê°T¬ì§Þ¦w¥þ¤Î¶³ºÝ¦w¥þ¬ÛÃöªº¤£¦P½Òµ{, ¥]¬A:

  • CompTIA Security+°ê»Ú»{¥iÃҮѽҵ{
  • Microsoft 365 Certified Security Administrator Associate (1 ¬ì Microsoft 365 °Ó°È¶³ºÝ«O¦w) °ê»Ú»{¥iÃҮѽҵ{
  • Microsoft Certified Security Operations Analyst Associate (1 ¬ì°Ó°È¶³ºÝ«O¦w) °ê»Ú»{¥iÃҮѽҵ{
  • Microsoft Certified Information Protection and Compliance Administrator Associate (1 ¬ì Microsoft 365 °Ó°È¶³ºÝ«O¦w) °ê»Ú»{¥iÃҮѽҵ{
  • Microsoft Certified Azure Security Engineer Associate (1 ¬ì Azure ¶³ºÝ«O¦w) °ê»Ú»{¥iÃҮѽҵ{
  • Microsoft Certified Cybersecurity Architect Expert (1¬ì²V¦X¶³«O¦w) °ê»Ú»{¥iÃҮѽҵ{
  • Microsoft Certified Security, Compliance, and Identity Fundamentals (1 ¬ì°ò¦¶³ºÝ«O¦w) °ê»Ú»{¥iÃҮѽҵ{
  • Google Cloud Platform Associate Cloud Engineer (GCP-ACE) °ê»Ú»{¥iÃҮѽҵ{
  • Alibaba Cloud Certification Associate (ACA) °ê»Ú»{¥iÃҮѽҵ{
  • Amazon Elastic Compute Cloud ¶³ºÝªA°ÈºÞ²z¹ê¾Ô½Òµ{
  • Juniper Networks JNCIS-SEC (SRX ¹êª«¨¾¤õÀð¤Î vSRX ¶³ºÝ¨¾¤õÀð) °ê»Ú»{¥iÃҮѽҵ{
  • Palo Alto Networks Certified Network Security Administrator (PCNSA) °ê»Ú»{¥iÃҮѽҵ{
  • ¶³ºÝ¤Îºô¸ôºÊÅ¥§Þ³N½Òµ{

¸ê²`¾É®v Larry Chan ¿Ë¦Û½s¼gµ§°O¡Aµ´¹ï¾A¦X¦Ò¸Õ¤Î¹ê»ÚºÞ²z¤§¥Î¡A¥O§AµL¶·¡u¦º¾S¡v¦p¦r¨å¯ë«p¤Î¤£¾A¦X­»´äŪ®Ñ®æ½Õªº®Ñ¥»¡C

4. ¤@¤H¤@¾÷¤W½Ò¡G

¥»½Òµ{¥H¤@¤H¤@¾÷¼Ò¦¡¤W½Ò¡C

5. §K¶O­«Åª¡G ¶Ç²Î½Ò°ó¾Ç­û¥i©ó½Òµ{µ²§ô«á¤T­Ó¤ë¤º§K¶O­«¬Ý½Ò°ó¿ý¼v¡C

­º¥ý¦Û¦æ«e©¹ ISC2 ºô¯¸«Ø¥ß ISC2 Account ¨Ã¥H¸Ó ISC2 Account µn¤J¡Aµn¤J«á¨Ì±q¸Óºô¯¸«ü¥Ü§¹µ½±zªº­Ó¤H¸ê®Æ (¦p©m¦W¡B¹q¸Ü¸¹½X¤Î¹q¶l¦a§}µ¥µ¥)¡C

­«­n¡G±z¥²¶·«ö·Ó¦b¦Ò¸Õ¤¤¤ß¥X¥Üªº¨­¥÷ÃÒ¤Wªº¸ê®Æ¨Ó¶ñ¼g±zªº«H®§¡C¦pªG¤£§¹¥þ¤Ç°t¡A±z±NµLªk°Ñ¥[¦Ò¸Õ¡A¥B¤£·|Àò°hÁÙ¥ô¦ó¶O¥Î¡C

´£¥æ ISC2 ªººô¤W¹q¤lªí®æ«á¡A±z±N³Q­«©w¦V¨ì Pearson VUE ºô¯¸¡A¦b¨ºùرz±N¯à°÷¦w±Æ¦b¥»¤¤¤ß¦Ò¸Õ¤Îú¥I USD$599 ¤§¦Ò¸Õ¶O¡C

¦Ò¸Õ·í¤é¨ì¹F¥»¤¤¤ß®É¥²¶·¥X¥Ü¤U¦C¨â¶µ¦³®Ä¤§¨­¥÷ÃÒ©ú¤å¥ó¡A§_«h¦Ò¥Í¤£¥i¶i¦æ¦Ò¸Õ¡A¦Ó¤wú¥I¤§¦Ò¸Õ¶O¥ç¤£·|°h¦^¡G

  1. ­»´ä¨­¥÷ÃÒ ¤Î
  2. ªþ¦³¦Ò¥Í©m¦W¤Îñ¦WªºÃÒ¥ó (¦p«H¥ÎÍü¡B­»´ä¯S°ÏÅ@·Ó¡BBNOµ¥)

¦Ò¸ÕÃD¥Ø¥Ñ¿D¬w¦Ò¸Õ¤¤¤ß¶Ç°e¨ì§A­nÀ³¦Òªº¹q¸£¡A¦Ò¸Õ®É¥H¹q¸£§@µª¡C©Ò¦³¦Ò¸ÕÃD¥Ø§¡¬°­^¤å¡A¦Ó¦Ò¸ÕÃD¥Ø®æ¦¡¬°³æ¶µ¤Î¦h¶µ¿ï¾ÜÃD¡C

¦Ò¸Õ¤£¦X®æ«K¥i©ó 30 ¤é«á­«·s³ø¦Ò¡A¨C¦~³Ì¦h 4 ¦¸¡C±ýª¾¹D§@µª®É¶¡¡BÃD¥ØÁ`¼Æ¡B¦X®æ¤À¼Æµ¥¸Ô²Ó¦Ò¸Õ¸ê®Æ¡A¥iÂsÄý¥»¤¤¤ßºô­¶ "¦U¬ì¦Ò¸Õ¤À¼Æ¸ê®Æ"¡C




½Òµ{¦WºÙ¡GCertified Cloud Security Professional (CCSP) °ê»Ú»{¥iÃҮѽҵ{
- ²ºÙ¡GCCSP Training Course

Domain 1: Cloud Concepts, Architecture and Design
1.1 Understand cloud computing concepts
1.2 Describe cloud reference architecture
1.3 Understand security concepts relevant to cloud computing
1.4 Understand design principles of secure cloud computing
1.5 Evaluate cloud service providers

Domain 2: Cloud Data Security
2.1 Describe cloud data concepts
2.2 Design and implement cloud data storage architectures
2.3 Design and apply data security technologies and strategies
2.4 Implement data discovery
2.5 Plan and implement data classification
2.6 Design and implement Information Rights Management (IRM)
2.7 Plan and implement data retention, deletion and archiving policies
2.8 Design and implement auditability, traceability and accountability of data events

Domain 3: Cloud Platform and Infrastructure Security
3.1 Comprehend cloud infrastructure and platform components
3.2 Design a secure data center
3.3 Analyze risks associated with cloud infrastructure and platforms
3.4 Plan and implementation of security controls
3.5 Plan business continuity (BC) and disaster recovery (DR)

Domain 4: Cloud Application Security
4.1 Advocate training and awareness for application security
4.2 Describe the Secure Software Development Life Cycle (SDLC) process
4.3 Apply the Secure Software Development Life Cycle (SDLC)
4.4 Apply cloud software assurance and validation
4.5 Use verified secure software
4.6 Comprehend the specifics of cloud application architecture
4.7 Design appropriate identity and access management (IAM) solutions

Domain 5: Cloud Security Operations
5.1 Build and implement physical and logical infrastructure for cloud environment
5.2 Operate and maintain physical and logical infrastructure for cloud environment
5.3 Implement operational controls and standards (e.g. Information Technology Infrastructure)
5.4 Support digital forensics
5.5 Manage communication with relevant parties
5.6 Manage security operations

Domain 6: Legal, Risk and Compliance
6.1 Articulate legal requirements and unique risks within the cloud environment
6.2 Understand privacy issues
6.3 Understand audit process, methodologies, and required adaptations for a cloud environment
6.4 Understand implications of cloud to enterprise risk management
6.5 Understand outsourcing and cloud contract design

The course content above may change at any time without notice in order to better reflect the content of examination.

 

§ó¦hºî¦X½Òµ{
  Äá¼v½Òµ{
  ¡E Äá¼vªì¯Å
  ¡E Äá¼v¤¤¯Å (­·´º±MÃD)
  ­^¤å½Òµ{
  ¡E IPA «÷­µ¡G¯Å§O 1 ¡E 2 ¡E 3 ¡E 4
  ´¶³q¸Ü½Òµ{
  ¡E °ò¦´¶³q¸Ü«÷­µ (§K¶O)
  ¡E ¶i¶¥´¶³q¸Ü«÷­µ
  ¡E ´¶³q¸Ü·|¸Ü¡G¯Å§O 1 ¡E 2 ¡E 3
  ¦è¯Z¤ú»y¤å½Òµ{
  ¡E ¯Å§O 1 ¡E 2 ¡E 3
  ¤¤Âå½Òµ{
  ¡E Àã¯l»P¥Ö½§±Ó·P¯f
  ¡E ·t½H»P¦â´³ | »ó±Ó·P»P·P«_
  ¡E ²æ¾v»P¥Õ¾v | ±q¤­©x¬Ý°·±d
  ­·¤ô©R²z½Òµ{
  ¡E µµ·L¤æ¼Æ¡G¯Å§O 1 ¡E 2 ¡E 3
  ¡E ¤l¥­¤K¦r¡G¯Å§O 1 ¡E 2 ¡E 3
  ¡E ¤K¦r­·¤ô¡G¯Å§O 1 ¡E 2 ¡E 3
  ¡E ©_ªù¹P¥Ò¡G¯Å§O 1 ¡E 2 ¡E 3