- Date & Time
- Introduction
- Features
- Exam Info
- Contents
- Details
Recommended Service: Video On Demand (Watch at home: 0%, Watch at school: 100%)
You can register via WhatsApp, phone, or this website. Once we confirm that a place has been reserved for you, you can pay the course fee by FPS. The process is simple!
* Government departments can use P Card for payment.
If using P Card to pay the exam fee, an additional 2.5% administrative fee will be added.
Recommended Service: Video On Demand (Watch at home: 33%, Watch at school: 67%)
You can register via WhatsApp, phone, or this website. Once we confirm that a place has been reserved for you, you can pay the course fee by FPS. The process is simple!
* Government departments can use P Card for payment.
If using P Card to pay the exam fee, an additional 2.5% administrative fee will be added.
Attention! Customers must check the school's registration number with the education bureau to confirm that the school is registered, in order to avoid unnecessary losses!
|
ISACA® was founded in 1969 and has built an outstanding reputation through years of involvement in system assurance and security, enterprise IT governance, and information risk management activities.
ISACA® has over 86,000 members across more than 160 countries. Its globally recognized Certified Information Systems Auditor (CISA®) qualification is an essential certification for IT management professionals. Achieving CISA certification demonstrates a professional's expertise in IT audit, control, and security.
Our CISA Certificate Course has been carefully developed and structured by Franco Tsang. From classroom instruction to revision, practice, exam preparation, practice questions, and the final exam, every aspect is systematically arranged and tailored to ensure you truly master the material and pass the examination.
|
| Course Name: |
CISA Certificate Course - Short name: CISA Training Course |
| Course Hours: |
18 hours (6 sessions) |
| Suitable For: |
Individuals interested in professional knowledge of IT audit, control, and security |
| Language of instruction: |
English |
| Course Notes: |
The notes are written primarily in English by our instructor, with some English text accompanied by Chinese translations. |
| 1. Taught by Franco Tsang (CCIE #19772): |
This course is personally taught by Franco Tsang, who holds CISA, CISSP, Triple CCIE, RHCE, and MCITP certifications with extensive practical experience. |
| 2. Course notes written by Franco Tsang: |
Franco has personally written the course notes, eliminating the need to struggle through dictionary-thick books that don't suit Hong Kong learning styles. |
| 3. Provide mock exam questions: |
Our center provides students with abundant mock exam questions, each accompanied by standard answers. For more challenging questions, Franco's explanations are included. |
| 4. Easy-to-understand teaching approach: |
Franco will explain the relevant concepts in a simple and easy-to-understand way in class, striving to help students understand the abstract concepts of IT auditing and control. |
| 5. Free review: |
Students of traditional lessons can review the lesson recordings for free within three months after the course ends. |
Our center is a PSI-designated CISA examination center. The instructor will explain the exam procedures during class. Exam fees are as follows:
- ISACA Member: US $575
- ISACA Nonmember: US $760
After passing the exam, students must:
- Demonstrate five years of professional work experience in IT audit, control, assurance, or security
- Agree to abide by ISACA's Code of Professional Ethics
- Agree to comply with the IS Auditing Standards adopted by ISACA
- Agree to follow the CISA Continuing Professional Education (CPE) Policy
Upon completing the above requirements, you will become a CISA.
|
Course Name: CISA Certificate Course
- Short name: CISA Training Course |
1. Domain 1: Information Systems Auditing Process
1.1. Planning 1.1.1. Introduction 1.1.2. IS Audit Standards, Guidelines, and Codes of Ethics 1.1.3. Business Processes and Audits 1.1.4. Types of Controls 1.1.5. Risk-Based Audit Planning 1.1.6. Types of Audits and Assessments 1.2. Execution 1.2.1. Audit Project Management 1.2.2. Sampling Methodology 1.2.3. Audit Evidence Collection Techniques 1.2.4. Data Analytics 1.2.5. Reporting and Communication Techniques
2. Domain 2: Governance and Management of IT
2.1. IT Governance 2.1.1. IT Governance and IT Strategy 2.1.2. IT-Related Frameworks 2.1.3. IT Standards, Policies, Procedures and Guideline 2.1.4. Organizational Structure 2.1.5. Segregation of duties / separation of duties 2.1.6. Enterprise Architecture 2.1.7. Enterprise Risk Management 2.1.8. Maturity Models 2.1.9. Laws, Regulations, and Industry Standards affecting the Organization 2.2. IT Management 2.2.1. IT Resource Management 2.2.2. IT Service Provider Acquisition and Management 2.2.3. IT Performance Monitoring and Reporting 2.2.4. Quality Assurance and Quality Management of IT
3. Domain 3: Information Systems Acquisition, Development, and Implementation
3.1. Information Systems Acquisition and Development 3.1.1. Project Governance and Management 3.1.2. Business Case and Feasibility Analysis 3.1.3. System Development Methodologies 3.1.4. Control Identification and Design 3.2. Information Systems Implementation 3.2.1. Testing Methodologies 3.2.2. Change, Configuration and Release Management 3.2.3. System Migration, Infrastructure Deployment, and Data Conversion 3.2.4. Post-implementation Review
4. Domain 4: Information Systems Operations and Business Resilience
4.1. Information Systems Operations 4.1.1. Common Technology Components 4.1.2. IT Asset Management 4.1.3. Job Scheduling and Production Process Automation 4.1.4. System Interfaces 4.1.5. End-User Computing (EUC) 4.1.6. Data Governance 4.1.7. Systems Performance Management 4.1.8. Problem and Incident Management 4.1.9. Change, Configuration, Release, and Patch Management 4.1.10. IT Service Level Management 4.1.11. Database Management 4.2. Business Resilience 4.2.1. Business Impact Analysis (BIA) 4.2.2. System Resiliency 4.2.3. Data Backup, Storage, and Restoration 4.2.4. Business Continuity Plan (BCP) 4.2.5. Disaster Recovery Plans (DRP)
5. Domain 5: Protection of Information Assets
5.1. Information Asset Security and Control 5.1.1. Introduction 5.1.2. Information Asset Security Frameworks, Standards, and Guidelines 5.1.3. Privacy Principles 5.1.4. Physical Access and Environmental Controls 5.1.5. Identity and Access Management 5.1.6. Network and End-Point Security 5.1.7. Data Classification 5.1.8. Data Encryption and Encryption-Related Techniques 5.1.9. Public Key Infrastructure (PKI) 5.1.10. Web-Based Communication Techniques 5.1.11. Virtualized Environments 5.1.12. Mobile, Wireless, and Internet-of-Things (IoT) Devices 5.2. Security Event Management 5.2.1. Security Awareness Training and Programs 5.2.2. Information System Attack Methods and Techniques 5.2.3. Security Testing Tools and Techniques 5.2.4. Security Monitoring Tools and Techniques 5.2.5. Incident Response Management 5.2.6. Evidence Collection and Forensics
6. Appendix: Additional Readings
6.1. Continuous audit techniques 6.2. Other types of system / software testing 6.2.1. Alpha and beta testing 6.2.2. Pilot testing 6.2.3. White box testing 6.2.4. Black box testing 6.2.5. Regression testing 6.2.6. Parallel testing 6.3. Types of Networks 6.3.1. PAN (Personal area networks) 6.3.2. LAN (Local area networks) 6.3.3. WAN (Wide area networks) 6.3.4. MAN (Metropolitan area networks) 6.4. OSI architecture 6.5. Network Topologies 6.5.1. Bus Topology 6.5.2. Ring Topology 6.5.3. Star Topology 6.5.4. Mesh Topology 6.6. Transmission Methods 6.7. Network Cabling, Interfaces and Interference 6.7.1. Cabling 6.7.2. Interfaces 6.7.3. Interference 6.8. Network Equipment / Basic Network Equipment 6.8.1. Routers 6.8.2. Switches 6.9. Network Services and Protocols 6.9.1. DNS (Domain Name Service) 6.9.2. Address Resolution Protocol (ARP) 6.9.3. DHCP (Dynamic Host Configuration Protocol) 6.9.4. Directory Services 6.9.5. NAT (Network Address Translation) / PAT (Port Address Translation) 6.9.6. IPsec VPN 6.10. Shadow IT 6.11. VoIP Infrastructure 6.11.1. Components in VoIP infrastructure 6.11.2. Risks in the VoIP infrastructure 6.11.3. Mitigating risks in the VoIP infrastructure 6.12. Wireless Architecture 6.13. More about Cloud Computing 6.13.1. Three Service Models 6.13.2. Four Deployment Models 6.14. Biometric Accuracy Measurement / Errors 6.15. Database transactions and ACID 6.15.1. Transactions 6.15.2. ACID 6.16. Database Views 6.17. Kerberos 6.18. Diffie-Hellman
|
1 Domain 1: Information Systems Auditing Process
1.1 Planning
1.1.1 Introduction
1.1.1.1 Why audit?
1.1.1.2 What is Information Systems (IS) audit?
1.1.2 IS Audit Standards, Guidelines, and Codes of Ethics
1.1.2.1 Standards
1.1.2.2 Guidelines
1.1.2.3 Codes of Ethics
1.1.3 Business Processes and Audits
1.1.3.1 Business Processes
1.1.3.2 Audit Charter
1.1.3.3 Audit Function Management
1.1.3.4 Audit Planning
1.1.3.5 Laws and Regulations
1.1.4 Types of Controls
1.1.4.1 Controls
1.1.4.2 Control Objectives
1.1.4.2.1 General Control Objectives
1.1.4.2.2 Information Systems (IS) Control Objectives
1.1.4.3 General Controls and IS-Specific Controls
1.1.4.3.1 General Controls
1.1.4.3.2 IS-Specific Controls
1.1.4.4 Control Classifications (Preventive, Detective and Corrective)
1.1.4.4.1 Preventive Controls
1.1.4.4.2 Detective Controls
1.1.4.4.3 Corrective Controls
1.1.4.5 Control Evaluation / Control Environment Evaluation
1.1.5 Risk-Based Audit Planning
1.1.5.1 Introduction to Risk-based Audit Planning
1.1.5.2 Risk-based Audit Approach
1.1.5.2.1 Overview
1.1.5.3 Audit Risk and Materiality
1.1.5.3.1 What is Audit Risk?
1.1.5.3.2 Factors that affect Audit Risk
1.1.5.3.2.1 Inherent risk
1.1.5.3.2.2 Control risk
1.1.5.3.2.3 Detection risk
1.1.5.3.2.4 Overall risk / Overall audit risk
1.1.5.4 Risk Assessment and Treatment Options
1.1.5.4.1 Introduction
1.1.5.4.2 What is risk
1.1.5.4.3 Risk Assessment Process
1.1.5.4.4 Risk Management Process
1.1.5.5 Risk analysis
1.1.6 Types of Audits and Assessments
1.1.6.1 IS audit
1.1.6.2 Administrative audit
1.1.6.3 Compliance audit
1.1.6.4 Fraud audit, Forensic audit and Computer forensic audit
1.1.6.5 Financial audit
1.1.6.6 Functional audit
1.1.6.7 Integrated audit
1.1.6.8 Operational audit
1.1.6.9 Third-party service audit
1.2 Execution
1.2.1 Audit Project Management
1.2.1.1 Introduction
1.2.1.2 Audit objectives
1.2.1.3 Audit Phases
1.2.1.4 Audit Programs
1.2.1.4.1 General Concepts
1.2.1.4.2 Audit work paper
1.2.1.5 Fraud, Irregularities and Illegal Acts
1.2.2 Sampling Methodology
1.2.2.1 Compliance Testing and Substantive Testing
1.2.2.1.1 Compliance Testing
1.2.2.1.2 Substantive Testing
1.2.2.1.3 Relationship between Compliance Testing and Substantive Testing
1.2.2.2 Sampling
1.2.2.2.1 Two general approaches to audit sampling
1.2.2.2.1.1 Statistical sampling
1.2.2.2.1.2 Nonstatistical sampling / Judgmental sampling
1.2.2.2.2 Two general methods of audit sampling
1.2.2.2.2.1 Attribute sampling
1.2.2.2.2.1.1 Attribute sampling / fixed sample-size attribute sampling / frequency-estimating sampling
1.2.2.2.2.1.2 Stop-or-go sampling
1.2.2.2.2.1.3 Discovery sampling
1.2.2.2.2.2 Variable sampling
1.2.2.2.2.2.1 Stratified mean per unit
1.2.2.2.2.2.2 Unstratified mean per unit
1.2.2.2.2.2.3 Difference estimation
1.2.2.3 Sampling risks
1.2.3 Audit Evidence Collection Techniques
1.2.3.1 Audit Evidence
1.2.3.2 Evaluate the reliability of Audit Evidence
1.2.3.3 Audit Evidence gathering techniques, Interview and observation
1.2.4 Data Analytics
1.2.4.1 Computer-assisted Audit Techniques (CAATs)
1.2.5 Reporting and Communication Techniques
1.2.5.1 Communication
1.2.5.2 Audit Report
1.2.5.3 Audit Documentation
1.2.5.4 Follow-up Activities
1.2.6 Quality Assurance and Improvement of the Audit Process
1.3 Miscellaneous topics in Domain1
1.3.1 Tracing and vouching in audit
1.3.2 Audit universe
1.3.3 Continuous audit
1.3.4 Electronic data interchange (EDI)
1.3.5 More about controls
1.3.5.1 Compensating control
1.3.5.2 Dual control
1.3.5.3 Check digit control / checksum
1.3.6 Agile Auditing
1.3.7 Artificial Intelligence in IS Audit
2 Domain 2: Governance and Management of IT
2.1 IT Governance
2.1.1 IT Governance and IT Strategy
2.1.1.1 Governance
2.1.1.2 Enterprise Governance of Information and Technology (EGIT)
2.1.1.2.1 Three Lines Model
2.1.1.3 Information Security Governance (IT Governance)
2.1.1.4 Information Systems Strategy and Strategy planning
2.1.1.4.1 Information Systems Strategy
2.1.1.4.2 Strategy planning
2.1.1.4.3 Business Intelligence (BI), data architecture and data governance
2.1.1.4.3.1 Business Intelligence (BI)
2.1.1.4.3.2 Enterprise data flow architecture (EDFA)
2.1.1.4.3.3 Data Governance
2.1.2 IT-Related Frameworks
2.1.3 IT Standards, Policies, Procedures and Guideline
2.1.3.1 Standards
2.1.3.2 Policies
2.1.3.3 Procedures
2.1.3.4 Guidelines
2.1.4 Organizational Structure
2.1.5 Segregation of duties / separation of duties
2.1.6 Enterprise Architecture
2.1.7 Enterprise Risk Management
2.1.7.1 Basic risk management concepts
2.1.7.2 Risk assessments
2.1.7.3 Risk treatments
2.1.8 Maturity Models
2.1.8.1 Capability Maturity Model Integration (CMMI)
2.1.9 Laws, Regulations, and Industry Standards affecting the Organization
2.1.9.1 Governance, Risk Management and Compliance (GRC)
2.1.9.2 Relationships between audits and compliance (legal, regulatory and industry)
2.1.9.3 Data Privacy Program and Principles
2.2 IT Management
2.2.1 IT Resource Management
2.2.1.1 IT Portfolio Management
2.2.1.2 Human Resource Management
2.2.1.3 Financial Management
2.2.1.4 Information Security Management
2.2.2 IT Service Provider Acquisition, Management, Cloud Governance and SOC
2.2.3 IT Performance Monitoring and Reporting
2.2.3.1 The role of monitoring, CSFs, KPIs and metrics
2.2.3.2 Improvements / Optimizations Methodologies, Tools and Techniques
2.2.3.2.1 Methodologies
2.2.3.2.2 Tools and techniques
2.2.4 Quality Assurance and Quality Management of IT
2.2.4.1 IT Quality Assurance (QA) and Quality control (QC)
2.2.4.2 IT Quality Management
3 Domain 3: Information Systems Acquisition, Development, and Implementation
3.1 Information Systems Acquisition and Development
3.1.1 Project Governance and Management
3.1.1.1 Project Management Structure
3.1.1.2 Project Management Structure / Project Organizational Structure
3.1.1.3 Project Management
3.1.1.3.1 Project Management Lifecycle
3.1.1.3.1.1 Project Initiation
3.1.1.3.1.2 Project Planning
3.1.1.3.1.2.1 Function Point Analysis (FPA)
3.1.1.3.1.2.2 PERT (Program Evaluation Review Technique)
3.1.1.3.1.2.3 Schedule management tools and techniques
3.1.1.3.1.2.4 Timebox Management
3.1.1.3.1.3 Project Execution
3.1.1.3.1.4 Project Monitoring and Controlling
3.1.1.3.1.5 Project Closing
3.1.1.3.2 Portfolio and Program Management
3.1.1.4 Auditor’s Role in Project Management
3.1.2 Business Case and Feasibility Analysis
3.1.2.1 Business Case
3.1.2.2 Feasibility Analysis
3.1.2.3 Auditor’s Role in Business Case Development
3.1.3 System Development Methodologies
3.1.3.1 SDLC models
3.1.3.1.1 Waterfall
3.1.3.1.2 V-shaped / V-model
3.1.3.1.3 Iterative
3.1.3.2 SDLC phases
3.1.3.3 Software Development Methods
3.1.3.4 System Development Tools and Productivity Aids / Computer Aided Software Engineering (CASE)
3.1.4 Infrastructure Development/Acquisition Practices
3.1.5 Control Identification and Design
3.2 Information Systems Implementation
3.2.1 Testing Methodologies
3.2.1.1 Unit Test
3.2.1.2 Interface and Integration Test
3.2.1.3 Software / Application Test
3.2.1.4 Integrated test facility (ITF)
3.2.1.5 Data Integrity Test
3.2.1.6 Automated Application Test
3.2.1.7 White box testing
3.2.1.8 Code coverage testing
3.2.1.9 Black box testing
3.2.1.10 Regression testing
3.2.1.11 Parallel testing
3.2.1.12 Sociability testing
3.2.1.13 Final Acceptance Test
3.2.1.14 Pilot testing
3.2.1.15 System Test
3.2.2 Change, configuration and release management
3.2.3 System Migration, Infrastructure Deployment, and Data Conversion
3.2.3.1 Data Migration
3.2.3.2 Changeover Techniques
3.2.3.3 Implementation
3.2.4 Post-implementation Review
3.3 Miscellaneous topics in Domain3
3.3.1 Software escrow
3.3.2 Open system architecture
3.3.3 Gap analysis
3.3.4 Database transactions and ACID
3.3.4.1 Transactions
3.3.4.2 ACID
3.3.4.3 Commit and rollback
3.3.5 Decision trees
4 Domain 4: Information Systems Operations and Business Resilience
4.1 Information Systems Operations
4.1.1 Common Technology Components
4.1.1.1 Cabling
4.1.2 IT Asset Management
4.1.3 Job Scheduling and Production Process Automation
4.1.4 System Interfaces
4.1.5 End-User Computing (EUC)
4.1.6 Data Governance
4.1.6.1 Goals
4.1.6.2 Data Quality
4.1.6.3 Data
4.1.6.4 Software Licensing
4.1.6.5 Source Code Management / Program Code Management
4.1.6.6 Capacity Management
4.1.7 Problem and Incident Management
4.1.7.1 Monitoring, Detection, Notification of Abnormal Conditions
4.1.7.2 Incident Management
4.1.7.3 Problem Management
4.1.7.4 Service Desk / Help Desk
4.1.8 Change, Configuration, Release, and Patch Management
4.1.9 IT Service Level Management
4.1.10 Database Management
4.1.10.1 Normalization and denormalization
4.1.10.2 More about Database Management
4.1.11 Log Management
4.2 Business Resilience
4.2.1 Business Impact Analysis (BIA)
4.2.2 System Resiliency
4.2.3 Data Backup, Storage, and Restoration
4.2.3.1 Data Storage Resiliency
4.2.3.2 Backup and Restoration
4.2.3.3 Backup Schemes
4.2.4 Business Continuity Plan (BCP)
4.2.4.1 Key Concepts in Business Continuity
4.2.4.2 Business Continuity Planning Flow
4.2.4.3 Business Continuity Plan Contents
4.2.4.4 Business Continuity Plan Tests
4.2.4.4.1 Phases
4.2.4.4.2 Test Types
4.2.5 Disaster Recovery Plans (DRP)
4.2.5.1 RTO (Recovery Time Objective) and RPO (Recovery Point Objectives)
4.2.5.1.1 RTO (Recovery Time Objective)
4.2.5.1.2 RPO (Recovery Point Objectives)
4.2.5.1.3 Relationship between RTO and RPO
4.2.5.2 Recovery Alternatives
5 Domain 5: Protection of Information Assets
5.1 Information Asset Security Policies, Frameworks, Standards and Guidelines
5.1.1 Information Asset Security Frameworks, Standards, and Guidelines
5.1.1.1 Information Security Policies
5.1.1.2 Information Security Standards
5.1.1.3 Information Security Guidelines
5.1.2 Information Security Frameworks and Standards
5.1.3 Information Security Baselines
5.1.4 Physical Access and Environmental Controls
5.1.4.1 Physical Security
5.1.4.2 Fire detection and suppression
5.1.4.2.1 Fire detection
5.1.4.2.2 Fire suppression
5.1.4.3 Electrical Power Threats
5.1.5 Industrial Control Systems Security
5.1.6 Identity and Access Management
5.1.6.1 General Concepts of Authentication, Authorization, Accounting
5.1.6.2 Authentication and Single Sign-on (SSO)
5.1.6.2.1 Authentication “Factors”
5.1.6.2.1.1 More about Biometric
5.1.6.2.2 Single Sign-on (SSO)
5.1.6.2.3 Federated Identity Management (FIM)
5.1.6.3 Discretionary Access Control (DAC) and Mandatory Access Control (MAC)
5.1.6.3.1 Discretionary Access Control (DAC)
5.1.6.3.2 Mandatory Access Control (MAC)
5.1.6.3.3 Role-based Access Control (RBAC)
5.1.6.3.4 Rule-Based Access Control (RuBAC)
5.1.6.3.5 Attribute-Based Access Control (ABAC)
5.1.6.3.6 Policy-Based Access Control (PBAC)
5.1.6.4 Zero-Trust Architecture
5.1.7 Directory Services
5.1.8 Identity as a Service
5.1.9 Digital Rights Management (DRM)
5.1.10 VPN
5.1.11 Network Attached Storage
5.1.12 Content Delivery Networks (CDN)
5.1.13 Network Time Protocol
5.1.14 Data Loss Prevention (DLP)
5.1.15 Firewall
5.1.15.1 Types of Firewalls
5.1.15.1.1 Packet filtering
5.1.15.1.2 Application firewall
5.1.15.1.3 Unified Threat Management (UTM)
5.1.15.2 Firewall implementations
5.1.15.2.1 Dual-homed
5.1.15.2.2 Screened-host
5.1.15.2.3 DMZ /Screened-subnet
5.1.16 Data Encryption and Encryption-Related Techniques
5.1.16.1 Encryption Basic
5.1.16.2 Symmetric Encryption Algorithms
5.1.16.3 Asymmetric Encryption Algorithms / Public Key Cryptography
5.1.16.3.1 Public Keys, Privates Keys and Operations
5.1.16.3.2 Hash
5.1.16.3.3 Digital signatures
5.1.17 Public Key Infrastructure (PKI)
5.1.18 Virtual Storage Area Network (VSAN)
5.1.19 VoIP (Voice over IP) and VLAN
5.1.19.1 Email
5.1.19.2 Peer-to-Peer
5.1.19.3 Instant Messaging and social media
5.1.19.4 Cloud Computing
5.1.19.5 Virtual Private Network (VPN) / IPsec VPN
5.1.20 Virtualized Environments
5.1.21 Mobile, Wireless, and Internet-of-Things (IoT) Devices
5.1.21.1 Mobile and BYOD (Bring Your Own Device)
5.1.21.2 Wireless LAN / Wi-Fi / GSM
5.1.21.3 Mobile Payment Systems
5.1.21.4 Internet-of-Things (IoT)
5.2 Security Event Management
5.2.1 Security Awareness Training and Programs
5.2.2 Information System Attack Methods and Techniques
5.2.2.1 Fraud Risk Factors
5.2.2.2 Computer Crime Issues
5.2.2.3 Internet Threats and Security
5.2.2.3.1 Passive Attacks
5.2.2.3.2 Active Attacks
5.2.2.3.3 Malware
5.2.3 Security Testing Tools and Techniques
5.2.3.1 Penetration test
5.2.3.2 Treat intelligence
5.2.4 Security Monitoring Tools and Techniques
5.2.4.1 Intrusion Detection Systems (IDS)
5.2.4.2 Intrusion Prevention Systems (IPS)
5.2.4.3 Honeypots
5.2.4.4 Security Information and Event Management (SIEM) / Security Event Management (SEM) / Security Information Management (SIM) / Security Orchestration, Automation, and Response (SOAR)
5.2.5 Incident Response Management
5.2.6 Evidence Collection and Forensics
5.2.6.1 General Concepts, Activities and Chain of custody (CoC)
5.2.6.2 Techniques
5.3 Miscellaneous topics
5.3.1 Certification and Accreditation
5.3.2 Web application security
5.3.3 Network Services and Protocols
5.3.3.1 DHCP (Dynamic Host Configuration Protocol)
5.3.3.1.1 Threats and relevant mitigation measures
5.3.3.2 DNS (Domain Name Service)
5.3.3.2.1 Threats and relevant mitigation measures
5.3.3.2.2 Pharming
5.3.4 Other Network Attacks
5.3.5 Other topics
6 Further readings: Laws, frameworks and standards
6.1 Laws
6.1.1 United States Laws
6.1.1.1 Gramm-Leach-Bliley Act (GLBA)
6.1.1.2 Family Educational Rights and Privacy Act (FERPA)
6.1.1.3 Children's Online Privacy Protection Act (COPPA)
6.1.1.4 Children's Internet Protection Act (CIPA)
6.1.1.5 Health Insurance Portability and Accountability Act (HIPAA)
6.1.1.6 Federal Information Security Management Act of 2002 (FISMA)
6.1.1.7 Sarbanes-Oxley Act (SOX) of 2002
6.1.2 Canada
6.1.2.1 Personal Information Protection and Electronic Documents Act (PIPEDA)
6.1.3 South Korea
6.1.3.1 Personal Information Protection Act (PIPA)
6.1.4 Japan
6.1.4.1 Financial Instruments and Exchange Act (FIEA) of 2006
6.1.5 South Africa
6.1.5.1 Protection of Personal Information (POPI) Act
6.1.6 United Kingdom
6.1.6.1 DEFCON 658
6.1.6.2 Data Protection Act
6.1.7 European Union
6.1.7.1 General Data Protection Regulation (GDPR)
6.1.8 Saudi Arabia
6.1.8.1 Personal Data Protection Law (PDPL)
6.1.9 Australia
6.1.9.1 Privacy Act 1988
6.2 Information security frameworks and standards
6.2.1 ISO/IEC 27001
6.2.2 Zachman Framework
6.2.3 The Open Group Architecture Framework (TOGAF)
6.2.4 Sherwood Applied Business Security Architecture (SABSA)
6.2.5 COBIT
6.2.6 The NIST Cybersecurity Framework (CSF)
6.2.7 Information Technology Infrastructure Library (ITIL)
7 Appendix: Additional Readings
7.1 Continuous audit techniques
7.2 Initiating, Diagnosing, Establishing, Acting & Learning (IDEAL)
7.3 Organizational Change Management
7.4 More about Project Governance
7.4.1 Hard Factors
7.4.2 Soft Factors
7.5 Types of Networks
7.5.1 PAN (Personal area networks)
7.5.2 LAN (Local area networks)
7.5.3 WAN (Wide area networks)
7.5.4 MAN (Metropolitan area networks)
7.6 OSI architecture
7.7 Network Topologies
7.7.1 Bus Topology
7.7.2 Ring Topology
7.7.3 Star Topology
7.7.4 Mesh Topology
7.8 LAN Components
7.8.1 Repeaters
7.8.2 Bridges
7.8.3 Layer 2 Switches
7.8.4 Routers
7.9 Transmission Methods
7.10 Wide Area Network (WAN)
7.11 WAN Message Transmission Techniques
7.12 Network Administration and Control
7.13 Network Performance Metrics
7.14 Network Management Issues
7.15 Network Management Tools
7.16 Converged Protocols
7.17 Internet Protocol Networking
7.18 Network Address Translation
7.19 Common Hardware Components and Architectures
7.19.1 CPU
7.19.2 Other Architectures
7.19.3 Common Enterprise Back-End Devices
7.19.4 Universal Serial Bus (USB)
7.19.5 Radio frequency identification (RFID)
7.20 Network Cabling, Interfaces and Interference
7.20.1.1 Fiber-Optic
7.20.1.2 Coaxial Cable (Coax)
7.20.2 Interfaces
7.20.2.1 RJ 45
7.20.2.2 BNC
7.20.3 Interference
7.20.3.1 Noise
7.20.3.2 Attenuation
7.21 Network Equipment / Basic Network Equipment
7.21.1 Routers
7.21.2 Switches
7.21.3 Directory Services
7.21.4 NAT (Network Address Translation) / PAT (Port Address Translation)
7.21.5 IPsec VPN
7.22 VoIP Infrastructure
7.22.1 Components in VoIP infrastructure
7.22.2 Risks in the VoIP infrastructure
7.22.3 Mitigating risks in the VoIP infrastructure
7.23 Wireless Architecture
7.24 More about Cloud Computing
7.24.1 Three Service Models
7.24.2 Four Deployment Models
7.25 More about database: Referential integrity
7.26 Database Views
7.27 Telecommunication Networks Resiliency and Disaster Recovery Methods
7.28 Kerberos
7.29 Diffie-Hellman
7.30 More about project management
7.30.1 More about project initiation
7.30.2 More about project planning
7.30.2.1 More about time / cost estimation
7.30.2.1.1 Analogous Estimating
7.30.2.1.2 Parametric Estimating
7.30.2.1.3 Bottom-up estimating
7.30.2.1.4 Actual costs
7.30.3 Relationship between budget, resource and duration
7.30.4 Project Management Office (PMO)
7.30.5 Project Benefit Realization
7.31 Business Application Development
7.32 Fourth-generation Languages (4GLs)
7.33 Data Life Cycle
7.34 Three Categories of System Interfaces
7.35 Systems Performance Management
7.36 Operating Systems
7.37 Database Structure
7.38 Database Management / Database Management System (DBMS)
7.39 Controls framework selection and their implication
7.40 Advantages and disadvantages of packet filtering firewall
7.41 Stateful inspection firewall
7.42 Data Classification
7.43 Control frameworks
7.44 Ownership
7.45 Termination
7.46 Privacy Principles
7.46.1 Practices
7.47 Mantrap
7.48 More about Physical Access Controls
7.49 More about authentication
7.50 More about FIM
7.51 FIM vs SSO
7.52 More about privileged access management
7.53 More about Directory Service
7.54 More about Identity Governance and Administration (IGA)
7.55 More about IDaaS
7.56 More about Digital Rights Management (DRM)
7.57 More about Password Attacks
7.58 More about VPN
7.59 More about NAS
7.60 More about Content Delivery Network (CDN)
7.61 More about Network Time Protocol (NTP)
7.62 More about Applications in a Networked Environment
7.63 More about Network Infrastructure Security
7.64 More about TCP vs UDP
7.65 More about Firewalls and NGFW
7.66 More about Web Application Firewall
7.67 More about Unified Threat Management (UTM)
7.68 More about Network Segmentation
7.69 More about Data Loss Prevention (DLP)
7.70 More about Elliptic Curve Cryptography (ECC)
7.71 More about Quantum Cryptography
7.72 More about Homomorphic Encryption
7.73 More about Kerberos
7.74 More about Secure Shell
7.75 More about DNSSEC
7.76 More about Email Security
7.77 More about Cloud and Virtualization Environments
7.78 More about Containerization
7.79 More about Mobile Payment Systems
7.80 More about IoT
|
|