CISA 国际认可证书课程
课程简称:CISA Training Course

本课程的课堂录像随时睇设有不同语音选择:
  • 课程时间
  • 课程简介
  • 课程特点
  • 考试须知
  • 课程内容
  • 详细内容


推介服务:课堂录像随时睇 (在家观看 = 0%,在校观看 = 100%)
学员使用 WhatsApp、电话或本网页报名,待本中心确认已为学员留位后,即可使用 转数快 缴付学费,过程简便!
编号 地点 可预约星期及时间 学费低至 9 折  
PO2603AV 不限
请参看个别地点
$2,580 按此报名:CISA  Training Course Training 课程
PO2603MV 旺角 一至五:14:30 - 22:15   六:13:45 - 21:30   日:10:15 - 18:00 (公众假期休息) 95 折后只需 $2,451 按此报名:CISA  Training Course Training 课程
PO2603OV 观塘 二、四及五:14:15 - 22:00   六及日:12:15 - 20:00   (一、三及公众假期休息) 9 折后只需 $2,322 按此报名:CISA  Training Course Training 课程
PO2603PV 北角 二、四及五:14:15 - 22:00   六及日:12:15 - 20:00   (一、三及公众假期休息) 9 折后只需 $2,322 按此报名:CISA  Training Course Training 课程
PO2603SV 沙田 二、四及五:14:15 - 22:00   六及日:12:15 - 20:00   (一、三及公众假期休息) 9 折后只需 $2,322 按此报名:CISA  Training Course Training 课程
PO2603YV 屯门 二、四及五:14:15 - 22:00   六及日:12:15 - 20:00   (一、三及公众假期休息) 9 折后只需 $2,322 按此报名:CISA  Training Course Training 课程
* 各政府部门可使用 P Card 付款  
如使用 P Card 缴付考试费,考试费需另加 2.5% 行政费  
在校免费试睇: 首 1 小时,请致电与本中心职员预约。 查看各地点电话
旺角 2332-6544
观塘 3563-8425
北角 3580-1893
沙田 2151-9360
屯门 3523-1560
在校免费重睇: 学员可于享用时期内于报读地点不限次数地重看课堂录像,从而可反复重温整个课程!
导师解答: 学员可于观看某一课堂录像后提出课堂直接相关的问题,课程导师会乐意为学员以单对单的形式解答!
课时: 18 小时
享用时期: 6 星期。进度由您控制,可快可慢。
课堂录像导师: Franco (任教课程清单)
在校观看: 详情及示范片段


推介服务:课堂录像随时睇 (在家观看 = 33%,在校观看 = 67%)
学员使用 WhatsApp、电话或本网页报名,待本中心确认已为学员留位后,即可使用 转数快 缴付学费,过程简便!
编号 地点 星期及时间 费用  
  在家 享用时期内每星期 7 天 (包括公众假期),每天 24 小时全天候不限次数地观看。    
PO2603MH 旺角 一至五:14:30 - 22:15   六:13:45 - 21:30   日:10:15 - 18:00 (公众假期休息) $2,580 按此报名:CISA  Training Course Training 课程
PO2603OH 观塘 二、四及五:14:15 - 22:00   六及日:12:15 - 20:00   (一、三及公众假期休息) $2,580 按此报名:CISA  Training Course Training 课程
PO2603PH 北角 二、四及五:14:15 - 22:00   六及日:12:15 - 20:00   (一、三及公众假期休息) $2,580 按此报名:CISA  Training Course Training 课程
PO2603SH 沙田 二、四及五:14:15 - 22:00   六及日:12:15 - 20:00   (一、三及公众假期休息) $2,580 按此报名:CISA  Training Course Training 课程
PO2603YH 屯门 二、四及五:14:15 - 22:00   六及日:12:15 - 20:00   (一、三及公众假期休息) $2,580 按此报名:CISA  Training Course Training 课程
* 各政府部门可使用 P Card 付款  
如使用 P Card 缴付考试费,考试费需另加 2.5% 行政费  
在校免费试睇: 首 1 小时,请致电与本中心职员预约。 查看各地点电话
旺角 2332-6544
观塘 3563-8425
北角 3580-1893
沙田 2151-9360
屯门 3523-1560
在校免费重睇: 学员可于享用时期内于报读地点不限次数地重看课堂录像,从而可反复重温整个课程!
导师解答: 学员可于观看某一课堂录像后提出课堂直接相关的问题,课程导师会乐意为学员以单对单的形式解答!
课时: 18 小时
在家及在校观看: 在家观看首 6 小时,在校观看尾 12 小时。
在家观看时禁用程序: 一些危害课堂录像版权的程序。
享用时期: 6 星期。进度由您控制,可快可慢。
课堂录像导师: Franco (任教课程清单)
在家观看: 服务条款及守则、报读程序及示范片段


地区 地址 电话 教育局注册编号
旺角 九龙旺角亚皆老街 109 号,皆旺商业大厦 18 楼 1802 - 1807 室 2332-6544 533459
观塘 九龙观塘成业街 7 号宁晋中心 12 楼 G2 室 3563-8425 588571
北角 香港北角马宝道 41-47 号华宝商业大厦 3 楼 01-02 号铺 3580-1893 591262
沙田 新界沙田石门安群街 3 号京瑞广场 1 期 10 楼 M 室 2151-9360 604488
屯门 新界屯门屯喜路 2 号屯门柏丽广场 17 楼 1708 室 3523-1560 592552
注意! 客户必须查问报读学校的教育局注册编号,以确认该校为注册学校,以免蒙受不必要的损失!


ISACA® 成立于1969年,多年来不断参与各项系统确认性与安全、企业信息治理及信息风险的活动,口碑载誉。

ISACA® 会员遍布逾 160 个国家,总数超过 86,000 人。其颁授的全球认可国际公认电脑稽核师(CISA® , Certified Information Systems Auditor)资格、更是各位信息管理人员必考的证书。取得 CISA 资格标志着该专业人员具备电脑稽核、控管和安全领域的专业知识。

中心的 CISA 国际认可证书课程由 Franco Tsang 筹备多时,精心编排。由上堂、温习、实习、考试研习、做试题至最后考试,均为你度身订造,作出有系统的编排。务求真正教识你,又令你考试及格。


课程名称: CISA 国际认可证书课程
- 简称:CISA Training Course
课程时数: 合共 18 小时 (共 6 堂)
适合人士: 对电脑稽核、控管和安全领域的专业知识有兴趣的人士
授课语言: 以普通话为主,辅以英语
课程笔记: 本中心导师亲自编写英文为主笔记,而部份英文字附有中文对照。

1. Franco Tsang (CCIE #19772) 亲自教授: 本课程由拥有 CISA, CISSP, Triple CCIE, RHCE, MCITP 实力经验俱备的 Franco Tsang 亲自教授。
2. Franco Tsang亲自编写笔记: Franco 亲自编写笔记,令你无须「死锄」如字典般厚及不适合香港读书格调的书本。
3. 提供模拟考试题目: 本中心为学员提供充足的模拟考试题目,每条考试题目均附有标准答案。而较难理解的题目,均会附有 Franco 的解释。
4. 深入浅出:

Franco 会在课堂上深入浅出地讲解相关概念,务求令同学理解抽象的电脑稽核及控管概念。

5. 免费重读: 传统课堂学员可于课程结束后三个月内免费重看课堂录像。

本中心为 PSI 指定的 CISA 考试试场,导师会在课堂上讲解考试程序。考试费用如下:

  • ISACA Member: US $575
  • ISACA Nonmember: US $760

通过考试后,同学需要

  • 提出具有从事电脑稽核、控管、确认或安全工作五年工作经验
  • 同意遵守国际电脑稽核协会的职业道德准则
  • 同意遵守国际电脑稽核协会所采用的「电脑稽核标准」
  • 同意遵守「国际电脑稽核师持续专业进修政策」(CPE)

完成上述要求后,便能成为 CISA。




课程名称:CISA 国际认可证书课程
- 简称:CISA Training Course


1. Domain 1: Information Systems Auditing Process
1.1. Planning
1.1.1. Introduction
1.1.2. IS Audit Standards, Guidelines, and Codes of Ethics
1.1.3. Business Processes and Audits
1.1.4. Types of Controls
1.1.5. Risk-Based Audit Planning
1.1.6. Types of Audits and Assessments
1.2. Execution
1.2.1. Audit Project Management
1.2.2. Sampling Methodology
1.2.3. Audit Evidence Collection Techniques
1.2.4. Data Analytics
1.2.5. Reporting and Communication Techniques

2. Domain 2: Governance and Management of IT
2.1. IT Governance
2.1.1. IT Governance and IT Strategy
2.1.2. IT-Related Frameworks
2.1.3. IT Standards, Policies, Procedures and Guideline
2.1.4. Organizational Structure
2.1.5. Segregation of duties / separation of duties
2.1.6. Enterprise Architecture
2.1.7. Enterprise Risk Management
2.1.8. Maturity Models
2.1.9. Laws, Regulations, and Industry Standards affecting the Organization
2.2. IT Management
2.2.1. IT Resource Management
2.2.2. IT Service Provider Acquisition and Management
2.2.3. IT Performance Monitoring and Reporting
2.2.4. Quality Assurance and Quality Management of IT

3. Domain 3: Information Systems Acquisition, Development, and Implementation
3.1. Information Systems Acquisition and Development
3.1.1. Project Governance and Management
3.1.2. Business Case and Feasibility Analysis
3.1.3. System Development Methodologies
3.1.4. Control Identification and Design
3.2. Information Systems Implementation
3.2.1. Testing Methodologies
3.2.2. Change, Configuration and Release Management
3.2.3. System Migration, Infrastructure Deployment, and Data Conversion
3.2.4. Post-implementation Review

4. Domain 4: Information Systems Operations and Business Resilience
4.1. Information Systems Operations
4.1.1. Common Technology Components
4.1.2. IT Asset Management
4.1.3. Job Scheduling and Production Process Automation
4.1.4. System Interfaces
4.1.5. End-User Computing (EUC)
4.1.6. Data Governance
4.1.7. Systems Performance Management
4.1.8. Problem and Incident Management
4.1.9. Change, Configuration, Release, and Patch Management
4.1.10. IT Service Level Management
4.1.11. Database Management
4.2. Business Resilience
4.2.1. Business Impact Analysis (BIA)
4.2.2. System Resiliency
4.2.3. Data Backup, Storage, and Restoration
4.2.4. Business Continuity Plan (BCP)
4.2.5. Disaster Recovery Plans (DRP)

5. Domain 5: Protection of Information Assets
5.1. Information Asset Security and Control
5.1.1. Introduction
5.1.2. Information Asset Security Frameworks, Standards, and Guidelines
5.1.3. Privacy Principles
5.1.4. Physical Access and Environmental Controls
5.1.5. Identity and Access Management
5.1.6. Network and End-Point Security
5.1.7. Data Classification
5.1.8. Data Encryption and Encryption-Related Techniques
5.1.9. Public Key Infrastructure (PKI)
5.1.10. Web-Based Communication Techniques
5.1.11. Virtualized Environments
5.1.12. Mobile, Wireless, and Internet-of-Things (IoT) Devices
5.2. Security Event Management
5.2.1. Security Awareness Training and Programs
5.2.2. Information System Attack Methods and Techniques
5.2.3. Security Testing Tools and Techniques
5.2.4. Security Monitoring Tools and Techniques
5.2.5. Incident Response Management
5.2.6. Evidence Collection and Forensics

6. Appendix: Additional Readings
6.1. Continuous audit techniques
6.2. Other types of system / software testing
6.2.1. Alpha and beta testing
6.2.2. Pilot testing
6.2.3. White box testing
6.2.4. Black box testing
6.2.5. Regression testing
6.2.6. Parallel testing
6.3. Types of Networks
6.3.1. PAN (Personal area networks)
6.3.2. LAN (Local area networks)
6.3.3. WAN (Wide area networks)
6.3.4. MAN (Metropolitan area networks)
6.4. OSI architecture
6.5. Network Topologies
6.5.1. Bus Topology
6.5.2. Ring Topology
6.5.3. Star Topology
6.5.4. Mesh Topology
6.6. Transmission Methods
6.7. Network Cabling, Interfaces and Interference
6.7.1. Cabling
6.7.2. Interfaces
6.7.3. Interference
6.8. Network Equipment / Basic Network Equipment
6.8.1. Routers
6.8.2. Switches
6.9. Network Services and Protocols
6.9.1. DNS (Domain Name Service)
6.9.2. Address Resolution Protocol (ARP)
6.9.3. DHCP (Dynamic Host Configuration Protocol)
6.9.4. Directory Services
6.9.5. NAT (Network Address Translation) / PAT (Port Address Translation)
6.9.6. IPsec VPN
6.10. Shadow IT
6.11. VoIP Infrastructure
6.11.1. Components in VoIP infrastructure
6.11.2. Risks in the VoIP infrastructure
6.11.3. Mitigating risks in the VoIP infrastructure
6.12. Wireless Architecture
6.13. More about Cloud Computing
6.13.1. Three Service Models
6.13.2. Four Deployment Models
6.14. Biometric Accuracy Measurement / Errors
6.15. Database transactions and ACID
6.15.1. Transactions
6.15.2. ACID
6.16. Database Views
6.17. Kerberos
6.18. Diffie-Hellman




1 Domain 1: Information Systems Auditing Process
1.1 Planning
1.1.1 Introduction
1.1.1.1 Why audit?
1.1.1.2 What is Information Systems (IS) audit?
1.1.2 IS Audit Standards, Guidelines, and Codes of Ethics
1.1.2.1 Standards
1.1.2.2 Guidelines
1.1.2.3 Codes of Ethics
1.1.3 Business Processes and Audits
1.1.3.1 Business Processes
1.1.3.2 Audit Charter
1.1.3.3 Audit Function Management
1.1.3.4 Audit Planning
1.1.3.5 Laws and Regulations
1.1.4 Types of Controls
1.1.4.1 Controls
1.1.4.2 Control Objectives
1.1.4.2.1 General Control Objectives
1.1.4.2.2 Information Systems (IS) Control Objectives
1.1.4.3 General Controls and IS-Specific Controls
1.1.4.3.1 General Controls
1.1.4.3.2 IS-Specific Controls
1.1.4.4 Control Classifications (Preventive, Detective and Corrective)
1.1.4.4.1 Preventive Controls
1.1.4.4.2 Detective Controls
1.1.4.4.3 Corrective Controls
1.1.4.5 Control Evaluation / Control Environment Evaluation
1.1.5 Risk-Based Audit Planning
1.1.5.1 Introduction to Risk-based Audit Planning
1.1.5.2 Risk-based Audit Approach
1.1.5.2.1 Overview
1.1.5.3 Audit Risk and Materiality
1.1.5.3.1 What is Audit Risk?
1.1.5.3.2 Factors that affect Audit Risk
1.1.5.3.2.1 Inherent risk
1.1.5.3.2.2 Control risk
1.1.5.3.2.3 Detection risk
1.1.5.3.2.4 Overall risk / Overall audit risk
1.1.5.4 Risk Assessment and Treatment Options
1.1.5.4.1 Introduction
1.1.5.4.2 What is risk
1.1.5.4.3 Risk Assessment Process
1.1.5.4.4 Risk Management Process
1.1.5.5 Risk analysis
1.1.6 Types of Audits and Assessments
1.1.6.1 IS audit
1.1.6.2 Administrative audit
1.1.6.3 Compliance audit
1.1.6.4 Fraud audit, Forensic audit and Computer forensic audit
1.1.6.5 Financial audit
1.1.6.6 Functional audit
1.1.6.7 Integrated audit
1.1.6.8 Operational audit
1.1.6.9 Third-party service audit
1.2 Execution
1.2.1 Audit Project Management
1.2.1.1 Introduction
1.2.1.2 Audit objectives
1.2.1.3 Audit Phases
1.2.1.4 Audit Programs
1.2.1.4.1 General Concepts
1.2.1.4.2 Audit work paper
1.2.1.5 Fraud, Irregularities and Illegal Acts
1.2.2 Sampling Methodology
1.2.2.1 Compliance Testing and Substantive Testing
1.2.2.1.1 Compliance Testing
1.2.2.1.2 Substantive Testing
1.2.2.1.3 Relationship between Compliance Testing and Substantive Testing
1.2.2.2 Sampling
1.2.2.2.1 Two general approaches to audit sampling
1.2.2.2.1.1 Statistical sampling
1.2.2.2.1.2 Nonstatistical sampling / Judgmental sampling
1.2.2.2.2 Two general methods of audit sampling
1.2.2.2.2.1 Attribute sampling
1.2.2.2.2.1.1 Attribute sampling / fixed sample-size attribute sampling / frequency-estimating sampling
1.2.2.2.2.1.2 Stop-or-go sampling
1.2.2.2.2.1.3 Discovery sampling
1.2.2.2.2.2 Variable sampling
1.2.2.2.2.2.1 Stratified mean per unit
1.2.2.2.2.2.2 Unstratified mean per unit
1.2.2.2.2.2.3 Difference estimation
1.2.2.3 Sampling risks
1.2.3 Audit Evidence Collection Techniques
1.2.3.1 Audit Evidence
1.2.3.2 Evaluate the reliability of Audit Evidence
1.2.3.3 Audit Evidence gathering techniques, Interview and observation
1.2.4 Data Analytics
1.2.4.1 Computer-assisted Audit Techniques (CAATs)
1.2.5 Reporting and Communication Techniques
1.2.5.1 Communication
1.2.5.2 Audit Report
1.2.5.3 Audit Documentation
1.2.5.4 Follow-up Activities
1.2.6 Quality Assurance and Improvement of the Audit Process
1.3 Miscellaneous topics in Domain1
1.3.1 Tracing and vouching in audit
1.3.2 Audit universe
1.3.3 Continuous audit
1.3.4 Electronic data interchange (EDI)
1.3.5 More about controls
1.3.5.1 Compensating control
1.3.5.2 Dual control
1.3.5.3 Check digit control / checksum
1.3.6 Agile Auditing
1.3.7 Artificial Intelligence in IS Audit

2 Domain 2: Governance and Management of IT
2.1 IT Governance
2.1.1 IT Governance and IT Strategy
2.1.1.1 Governance
2.1.1.2 Enterprise Governance of Information and Technology (EGIT)
2.1.1.2.1 Three Lines Model
2.1.1.3 Information Security Governance (IT Governance)
2.1.1.4 Information Systems Strategy and Strategy planning
2.1.1.4.1 Information Systems Strategy
2.1.1.4.2 Strategy planning
2.1.1.4.3 Business Intelligence (BI), data architecture and data governance
2.1.1.4.3.1 Business Intelligence (BI)
2.1.1.4.3.2 Enterprise data flow architecture (EDFA)
2.1.1.4.3.3 Data Governance
2.1.2 IT-Related Frameworks
2.1.3 IT Standards, Policies, Procedures and Guideline
2.1.3.1 Standards
2.1.3.2 Policies
2.1.3.3 Procedures
2.1.3.4 Guidelines
2.1.4 Organizational Structure
2.1.5 Segregation of duties / separation of duties
2.1.6 Enterprise Architecture
2.1.7 Enterprise Risk Management
2.1.7.1 Basic risk management concepts
2.1.7.2 Risk assessments
2.1.7.3 Risk treatments
2.1.8 Maturity Models
2.1.8.1 Capability Maturity Model Integration (CMMI)
2.1.9 Laws, Regulations, and Industry Standards affecting the Organization
2.1.9.1 Governance, Risk Management and Compliance (GRC)
2.1.9.2 Relationships between audits and compliance (legal, regulatory and industry)
2.1.9.3 Data Privacy Program and Principles
2.2 IT Management
2.2.1 IT Resource Management
2.2.1.1 IT Portfolio Management
2.2.1.2 Human Resource Management
2.2.1.3 Financial Management
2.2.1.4 Information Security Management
2.2.2 IT Service Provider Acquisition, Management, Cloud Governance and SOC
2.2.3 IT Performance Monitoring and Reporting
2.2.3.1 The role of monitoring, CSFs, KPIs and metrics
2.2.3.2 Improvements / Optimizations Methodologies, Tools and Techniques
2.2.3.2.1 Methodologies
2.2.3.2.2 Tools and techniques
2.2.4 Quality Assurance and Quality Management of IT
2.2.4.1 IT Quality Assurance (QA) and Quality control (QC)
2.2.4.2 IT Quality Management

3 Domain 3: Information Systems Acquisition, Development, and Implementation
3.1 Information Systems Acquisition and Development
3.1.1 Project Governance and Management
3.1.1.1 Project Management Structure
3.1.1.2 Project Management Structure / Project Organizational Structure
3.1.1.3 Project Management
3.1.1.3.1 Project Management Lifecycle
3.1.1.3.1.1 Project Initiation
3.1.1.3.1.2 Project Planning
3.1.1.3.1.2.1 Function Point Analysis (FPA)
3.1.1.3.1.2.2 PERT (Program Evaluation Review Technique)
3.1.1.3.1.2.3 Schedule management tools and techniques
3.1.1.3.1.2.4 Timebox Management
3.1.1.3.1.3 Project Execution
3.1.1.3.1.4 Project Monitoring and Controlling
3.1.1.3.1.5 Project Closing
3.1.1.3.2 Portfolio and Program Management
3.1.1.4 Auditor’s Role in Project Management
3.1.2 Business Case and Feasibility Analysis
3.1.2.1 Business Case
3.1.2.2 Feasibility Analysis
3.1.2.3 Auditor’s Role in Business Case Development
3.1.3 System Development Methodologies
3.1.3.1 SDLC models
3.1.3.1.1 Waterfall
3.1.3.1.2 V-shaped / V-model
3.1.3.1.3 Iterative
3.1.3.2 SDLC phases
3.1.3.3 Software Development Methods
3.1.3.4 System Development Tools and Productivity Aids / Computer Aided Software Engineering (CASE)
3.1.4 Infrastructure Development/Acquisition Practices
3.1.5 Control Identification and Design
3.2 Information Systems Implementation
3.2.1 Testing Methodologies
3.2.1.1 Unit Test
3.2.1.2 Interface and Integration Test
3.2.1.3 Software / Application Test
3.2.1.4 Integrated test facility (ITF)
3.2.1.5 Data Integrity Test
3.2.1.6 Automated Application Test
3.2.1.7 White box testing
3.2.1.8 Code coverage testing
3.2.1.9 Black box testing
3.2.1.10 Regression testing
3.2.1.11 Parallel testing
3.2.1.12 Sociability testing
3.2.1.13 Final Acceptance Test
3.2.1.14 Pilot testing
3.2.1.15 System Test
3.2.2 Change, configuration and release management
3.2.3 System Migration, Infrastructure Deployment, and Data Conversion
3.2.3.1 Data Migration
3.2.3.2 Changeover Techniques
3.2.3.3 Implementation
3.2.4 Post-implementation Review
3.3 Miscellaneous topics in Domain3
3.3.1 Software escrow
3.3.2 Open system architecture
3.3.3 Gap analysis
3.3.4 Database transactions and ACID
3.3.4.1 Transactions
3.3.4.2 ACID
3.3.4.3 Commit and rollback
3.3.5 Decision trees

4 Domain 4: Information Systems Operations and Business Resilience
4.1 Information Systems Operations
4.1.1 Common Technology Components
4.1.1.1 Cabling
4.1.2 IT Asset Management
4.1.3 Job Scheduling and Production Process Automation
4.1.4 System Interfaces
4.1.5 End-User Computing (EUC)
4.1.6 Data Governance
4.1.6.1 Goals
4.1.6.2 Data Quality
4.1.6.3 Data
4.1.6.4 Software Licensing
4.1.6.5 Source Code Management / Program Code Management
4.1.6.6 Capacity Management
4.1.7 Problem and Incident Management
4.1.7.1 Monitoring, Detection, Notification of Abnormal Conditions
4.1.7.2 Incident Management
4.1.7.3 Problem Management
4.1.7.4 Service Desk / Help Desk
4.1.8 Change, Configuration, Release, and Patch Management
4.1.9 IT Service Level Management
4.1.10 Database Management
4.1.10.1 Normalization and denormalization
4.1.10.2 More about Database Management
4.1.11 Log Management
4.2 Business Resilience
4.2.1 Business Impact Analysis (BIA)
4.2.2 System Resiliency
4.2.3 Data Backup, Storage, and Restoration
4.2.3.1 Data Storage Resiliency
4.2.3.2 Backup and Restoration
4.2.3.3 Backup Schemes
4.2.4 Business Continuity Plan (BCP)
4.2.4.1 Key Concepts in Business Continuity
4.2.4.2 Business Continuity Planning Flow
4.2.4.3 Business Continuity Plan Contents
4.2.4.4 Business Continuity Plan Tests
4.2.4.4.1 Phases
4.2.4.4.2 Test Types
4.2.5 Disaster Recovery Plans (DRP)
4.2.5.1 RTO (Recovery Time Objective) and RPO (Recovery Point Objectives)
4.2.5.1.1 RTO (Recovery Time Objective)
4.2.5.1.2 RPO (Recovery Point Objectives)
4.2.5.1.3 Relationship between RTO and RPO
4.2.5.2 Recovery Alternatives

5 Domain 5: Protection of Information Assets
5.1 Information Asset Security Policies, Frameworks, Standards and Guidelines
5.1.1 Information Asset Security Frameworks, Standards, and Guidelines
5.1.1.1 Information Security Policies
5.1.1.2 Information Security Standards
5.1.1.3 Information Security Guidelines
5.1.2 Information Security Frameworks and Standards
5.1.3 Information Security Baselines
5.1.4 Physical Access and Environmental Controls
5.1.4.1 Physical Security
5.1.4.2 Fire detection and suppression
5.1.4.2.1 Fire detection
5.1.4.2.2 Fire suppression
5.1.4.3 Electrical Power Threats
5.1.5 Industrial Control Systems Security
5.1.6 Identity and Access Management
5.1.6.1 General Concepts of Authentication, Authorization, Accounting
5.1.6.2 Authentication and Single Sign-on (SSO)
5.1.6.2.1 Authentication “Factors”
5.1.6.2.1.1 More about Biometric
5.1.6.2.2 Single Sign-on (SSO)
5.1.6.2.3 Federated Identity Management (FIM)
5.1.6.3 Discretionary Access Control (DAC) and Mandatory Access Control (MAC)
5.1.6.3.1 Discretionary Access Control (DAC)
5.1.6.3.2 Mandatory Access Control (MAC)
5.1.6.3.3 Role-based Access Control (RBAC)
5.1.6.3.4 Rule-Based Access Control (RuBAC)
5.1.6.3.5 Attribute-Based Access Control (ABAC)
5.1.6.3.6 Policy-Based Access Control (PBAC)
5.1.6.4 Zero-Trust Architecture
5.1.7 Directory Services
5.1.8 Identity as a Service
5.1.9 Digital Rights Management (DRM)
5.1.10 VPN
5.1.11 Network Attached Storage
5.1.12 Content Delivery Networks (CDN)
5.1.13 Network Time Protocol
5.1.14 Data Loss Prevention (DLP)
5.1.15 Firewall
5.1.15.1 Types of Firewalls
5.1.15.1.1 Packet filtering
5.1.15.1.2 Application firewall
5.1.15.1.3 Unified Threat Management (UTM)
5.1.15.2 Firewall implementations
5.1.15.2.1 Dual-homed
5.1.15.2.2 Screened-host
5.1.15.2.3 DMZ /Screened-subnet
5.1.16 Data Encryption and Encryption-Related Techniques
5.1.16.1 Encryption Basic
5.1.16.2 Symmetric Encryption Algorithms
5.1.16.3 Asymmetric Encryption Algorithms / Public Key Cryptography
5.1.16.3.1 Public Keys, Privates Keys and Operations
5.1.16.3.2 Hash
5.1.16.3.3 Digital signatures
5.1.17 Public Key Infrastructure (PKI)
5.1.18 Virtual Storage Area Network (VSAN)
5.1.19 VoIP (Voice over IP) and VLAN
5.1.19.1 Email
5.1.19.2 Peer-to-Peer
5.1.19.3 Instant Messaging and social media
5.1.19.4 Cloud Computing
5.1.19.5 Virtual Private Network (VPN) / IPsec VPN
5.1.20 Virtualized Environments
5.1.21 Mobile, Wireless, and Internet-of-Things (IoT) Devices
5.1.21.1 Mobile and BYOD (Bring Your Own Device)
5.1.21.2 Wireless LAN / Wi-Fi / GSM
5.1.21.3 Mobile Payment Systems
5.1.21.4 Internet-of-Things (IoT)
5.2 Security Event Management
5.2.1 Security Awareness Training and Programs
5.2.2 Information System Attack Methods and Techniques
5.2.2.1 Fraud Risk Factors
5.2.2.2 Computer Crime Issues
5.2.2.3 Internet Threats and Security
5.2.2.3.1 Passive Attacks
5.2.2.3.2 Active Attacks
5.2.2.3.3 Malware
5.2.3 Security Testing Tools and Techniques
5.2.3.1 Penetration test
5.2.3.2 Treat intelligence
5.2.4 Security Monitoring Tools and Techniques
5.2.4.1 Intrusion Detection Systems (IDS)
5.2.4.2 Intrusion Prevention Systems (IPS)
5.2.4.3 Honeypots
5.2.4.4 Security Information and Event Management (SIEM) / Security Event Management (SEM) / Security Information Management (SIM) / Security Orchestration, Automation, and Response (SOAR)
5.2.5 Incident Response Management
5.2.6 Evidence Collection and Forensics
5.2.6.1 General Concepts, Activities and Chain of custody (CoC)
5.2.6.2 Techniques
5.3 Miscellaneous topics
5.3.1 Certification and Accreditation
5.3.2 Web application security
5.3.3 Network Services and Protocols
5.3.3.1 DHCP (Dynamic Host Configuration Protocol)
5.3.3.1.1 Threats and relevant mitigation measures
5.3.3.2 DNS (Domain Name Service)
5.3.3.2.1 Threats and relevant mitigation measures
5.3.3.2.2 Pharming
5.3.4 Other Network Attacks
5.3.5 Other topics

6 Further readings: Laws, frameworks and standards
6.1 Laws
6.1.1 United States Laws
6.1.1.1 Gramm-Leach-Bliley Act (GLBA)
6.1.1.2 Family Educational Rights and Privacy Act (FERPA)
6.1.1.3 Children's Online Privacy Protection Act (COPPA)
6.1.1.4 Children's Internet Protection Act (CIPA)
6.1.1.5 Health Insurance Portability and Accountability Act (HIPAA)
6.1.1.6 Federal Information Security Management Act of 2002 (FISMA)
6.1.1.7 Sarbanes-Oxley Act (SOX) of 2002
6.1.2 Canada
6.1.2.1 Personal Information Protection and Electronic Documents Act (PIPEDA)
6.1.3 South Korea
6.1.3.1 Personal Information Protection Act (PIPA)
6.1.4 Japan
6.1.4.1 Financial Instruments and Exchange Act (FIEA) of 2006
6.1.5 South Africa
6.1.5.1 Protection of Personal Information (POPI) Act
6.1.6 United Kingdom
6.1.6.1 DEFCON 658
6.1.6.2 Data Protection Act
6.1.7 European Union
6.1.7.1 General Data Protection Regulation (GDPR)
6.1.8 Saudi Arabia
6.1.8.1 Personal Data Protection Law (PDPL)
6.1.9 Australia
6.1.9.1 Privacy Act 1988
6.2 Information security frameworks and standards
6.2.1 ISO/IEC 27001
6.2.2 Zachman Framework
6.2.3 The Open Group Architecture Framework (TOGAF)
6.2.4 Sherwood Applied Business Security Architecture (SABSA)
6.2.5 COBIT
6.2.6 The NIST Cybersecurity Framework (CSF)
6.2.7 Information Technology Infrastructure Library (ITIL)

7 Appendix: Additional Readings
7.1 Continuous audit techniques
7.2 Initiating, Diagnosing, Establishing, Acting & Learning (IDEAL)
7.3 Organizational Change Management
7.4 More about Project Governance
7.4.1 Hard Factors
7.4.2 Soft Factors
7.5 Types of Networks
7.5.1 PAN (Personal area networks)
7.5.2 LAN (Local area networks)
7.5.3 WAN (Wide area networks)
7.5.4 MAN (Metropolitan area networks)
7.6 OSI architecture
7.7 Network Topologies
7.7.1 Bus Topology
7.7.2 Ring Topology
7.7.3 Star Topology
7.7.4 Mesh Topology
7.8 LAN Components
7.8.1 Repeaters
7.8.2 Bridges
7.8.3 Layer 2 Switches
7.8.4 Routers
7.9 Transmission Methods
7.10 Wide Area Network (WAN)
7.11 WAN Message Transmission Techniques
7.12 Network Administration and Control
7.13 Network Performance Metrics
7.14 Network Management Issues
7.15 Network Management Tools
7.16 Converged Protocols
7.17 Internet Protocol Networking
7.18 Network Address Translation
7.19 Common Hardware Components and Architectures
7.19.1 CPU
7.19.2 Other Architectures
7.19.3 Common Enterprise Back-End Devices
7.19.4 Universal Serial Bus (USB)
7.19.5 Radio frequency identification (RFID)
7.20 Network Cabling, Interfaces and Interference
7.20.1.1 Fiber-Optic
7.20.1.2 Coaxial Cable (Coax)
7.20.2 Interfaces
7.20.2.1 RJ 45
7.20.2.2 BNC
7.20.3 Interference
7.20.3.1 Noise
7.20.3.2 Attenuation
7.21 Network Equipment / Basic Network Equipment
7.21.1 Routers
7.21.2 Switches
7.21.3 Directory Services
7.21.4 NAT (Network Address Translation) / PAT (Port Address Translation)
7.21.5 IPsec VPN
7.22 VoIP Infrastructure
7.22.1 Components in VoIP infrastructure
7.22.2 Risks in the VoIP infrastructure
7.22.3 Mitigating risks in the VoIP infrastructure
7.23 Wireless Architecture
7.24 More about Cloud Computing
7.24.1 Three Service Models
7.24.2 Four Deployment Models
7.25 More about database: Referential integrity
7.26 Database Views
7.27 Telecommunication Networks Resiliency and Disaster Recovery Methods
7.28 Kerberos
7.29 Diffie-Hellman
7.30 More about project management
7.30.1 More about project initiation
7.30.2 More about project planning
7.30.2.1 More about time / cost estimation
7.30.2.1.1 Analogous Estimating
7.30.2.1.2 Parametric Estimating
7.30.2.1.3 Bottom-up estimating
7.30.2.1.4 Actual costs
7.30.3 Relationship between budget, resource and duration
7.30.4 Project Management Office (PMO)
7.30.5 Project Benefit Realization
7.31 Business Application Development
7.32 Fourth-generation Languages (4GLs)
7.33 Data Life Cycle
7.34 Three Categories of System Interfaces
7.35 Systems Performance Management
7.36 Operating Systems
7.37 Database Structure
7.38 Database Management / Database Management System (DBMS)
7.39 Controls framework selection and their implication
7.40 Advantages and disadvantages of packet filtering firewall
7.41 Stateful inspection firewall
7.42 Data Classification
7.43 Control frameworks
7.44 Ownership
7.45 Termination
7.46 Privacy Principles
7.46.1 Practices
7.47 Mantrap
7.48 More about Physical Access Controls
7.49 More about authentication
7.50 More about FIM
7.51 FIM vs SSO
7.52 More about privileged access management
7.53 More about Directory Service
7.54 More about Identity Governance and Administration (IGA)
7.55 More about IDaaS
7.56 More about Digital Rights Management (DRM)
7.57 More about Password Attacks
7.58 More about VPN
7.59 More about NAS
7.60 More about Content Delivery Network (CDN)
7.61 More about Network Time Protocol (NTP)
7.62 More about Applications in a Networked Environment
7.63 More about Network Infrastructure Security
7.64 More about TCP vs UDP
7.65 More about Firewalls and NGFW
7.66 More about Web Application Firewall
7.67 More about Unified Threat Management (UTM)
7.68 More about Network Segmentation
7.69 More about Data Loss Prevention (DLP)
7.70 More about Elliptic Curve Cryptography (ECC)
7.71 More about Quantum Cryptography
7.72 More about Homomorphic Encryption
7.73 More about Kerberos
7.74 More about Secure Shell
7.75 More about DNSSEC
7.76 More about Email Security
7.77 More about Cloud and Virtualization Environments
7.78 More about Containerization
7.79 More about Mobile Payment Systems
7.80 More about IoT