SlideShare a Scribd company logo
Copyright@Wajahat Iqbal (2015)
This is not an official COBIT publication and is not endorsed, sponsored, or otherwise affiliated with ISACA or ITGI.
(Study Notes) - COBIT 5 Exam (ISACA Enterprise Governance Framework)
1) Governance Objective:
Value Creation from Benefits Realisation + Risk Optimisation+ Resource Optimisation
2) Cobit 5 initially available in 3 Volumes:
- The Framework
- Process Reference Guides
- Implementation Guide
3) Five Principles of Cobit 5:
- Meeting the Stakeholders needs
- Covering the Enterprise end-to-end
- Single integrated Framework
- Holistic approach of 7 enterprise enablers
- Separating governance from management
4) Stakeholder Needs  Enterprise Goals  IT-related Goals  Enabler Goals
5) Seven Enablers of Cobit 5 (i.e. Governance enablers)
- Principles, policies and frameworks
- Processes
-Organisational structures
- Culture, ethics and behaviours
- Information
- Service infrastructure and applications
- People skills and competencies
6) Important Drivers for Cobit 5
- Performance (Business Goals)
- Conformance (SOX, HIPAA)
- Creating value for Enterprise Stakeholders through efficient use of Technology & Information
- Complete Enterprise Governance
- Covers all Functions and Processes
- Address all Internal & External Services
- Address all Internal & External Business Processes
- Address End to end Business and IT responsibilities
- Enterprise Architecture
- Asset and Service management
7) Cobit 5 Triggers
- Pains
- Risks
- Goals Cascade
Copyright@Wajahat Iqbal (2015)
This is not an official COBIT publication and is not endorsed, sponsored, or otherwise affiliated with ISACA or ITGI.
8) Mapping of Governance & Management Domain
a) Governance Domain (EDM – Evaluate, Direct & Monitor)
b) Management Domain:
 (APO – Align, Plan & Organise)
 (BAI – Build, Acquire & Implement)
 (DSS – Deliver, Service & Support)
 (MEA – Monitor, Evaluate & Asses)
9) Cobit 5 Product Guides:
- Level 1 (Cobit Enabling Processes, Cobit 5 Enabling Information, Other Enabling Guides)
- Level 2 (Cobit 5 Implementation, Cobit 5 for Information Security, Cobit 5 for Assurance, Cobit 5 for
Risk, Other Professional Guides)
- Level 3 (Cobit 5 Online Collaborative Environment)
10) Key Governance Objective  VALUE CREATION
11) Enabler Characteristics 
- Stakeholders (Internal & External)
- Goals (expected outcome of enabler)
 Intrinsic Quality (work well & provide results)
 Contextual Quality (Relevance, effectiveness)
 Accessibility & Security (of enablers + outcomes)
- Lifecycle
 Plan, Design,
 Build/Acquire/Create/Implement
 Use/Operate
 Evaluate/Monitor
 Update/Dispose
- Good Practice
 Practices
 Work Products (Inputs & Outputs)
12) Cobit 5 Enterprise 17 Goals (Balanced Score Card 5 Dimensions):
- Financial
- Customer
- Internal
- Learning Growth
13) Cobit 5 Implementation Lifecycle
Copyright@Wajahat Iqbal (2015)
This is not an official COBIT publication and is not endorsed, sponsored, or otherwise affiliated with ISACA or ITGI.
COBIT 5 IMPLEMENTATION CYCLE
Phase 1 2 3 4 5 6 7
What are the
Drivers?
Where are we
Now?
Where do we
Want to be?
What needs to
Be done?
How do we get
there?
Did we get
There?
How do we keep
the momentum
Going?
Programme
Management
Initiate
program
Define
problems
& opportunities
Define road
map
Plan
programme
Execute plan Realise
benefits
Review
Effectiveness
Change
Enablement
Establish
desire to
change
Form
implementation
team
Communicate
outcome
Identify role
players
Operate and
use
Embed new
approaches
Sustain
Continual
Improvement
Lifecycle
Recognise
need to act
Assess current
state
Define target
state
Build
improvements
Implement
improvements
Operate
improvements
Monitor and
evaluate
14) Charteristics of a Good Business Case:
- Address Business Benefits
- Address Investment needed
- Address Constraints & Dependencies
- Address Investment Monitoring
- Address business changes required
- Address ongoing IT Operating Costs
- Address Roles, Responsibilities & Accountability
15) Cobit 5 Process Capability Model (PAM)
Cobit 5 Process Capability Model (PAM)
0 Incomplete Performance Attribute (PA)
1 Performed PA1.1 Process Performance
2 Managed PA2.1 Performance Management
PA2.2 Work Product Management
3 Established PA3.1 Process Definition
PA3.2 Process Deployment
4 Predictable PA4.1 Process Measurement
PA4.2 Process Control
5 Optimising PA5.1 Process Innovation
PA5.2 Process Optimisation
Rating Levels:
a) F- Fully achieved (>85%) b) P - Partially achieved (15-50%)
c) L-Largely achieved (50-85%) d) N- Non achieved (<15%)
Copyright@Wajahat Iqbal (2015)
This is not an official COBIT publication and is not endorsed, sponsored, or otherwise affiliated with ISACA or ITGI.
16) Enterprise = Organisation = Commercial (Corporate) OR Public Sector OR Not for Profit
17) Information Enabler (Enabler 5)
1) Intrinsic Quality Accuracy,Objectivity,Believability,Reputation
2) Contextual Relevancy, Completeness, Currency, Appropriate amount of
information, Concise representation, Consistent representation
Interpretability, Understandability, Ease of manipulation
3) Security/Accessibility Availability/timeliness, Restricted Access
4) Information Layers  Physical World(Carrier/Media)
 Empiric(User Interface)
 Syntactic (Code/Language)
 Semantic (Meaning)
 Pragmatic (Use)
 Social Use (e.g. Contracts,Law,Culture)
18) Cobit 5 Stakeholders:
- Internal (Board,CFO,CIO,CTO,CEO,Business Executives,Managers,Internal Auditors,Users ..)
- External (Business Partners,Suppliers,Shareholders,Regulators,Govt,External
Users,Customers,Standardisation organizations,External Auditors,Consultants..)
19) Good Policy  Effective, Efficient, Non-Intrusive
20) DIKW - [Data – Information-Knowledge-Wisdom (Value)]
21) Information for Business (COBIT 4.1)
1 Quality  Effectiveness
 Efficiency
2 Security  Confidentiality
 Integrity
 Availability
3 Fiduciary  Compliance
 Reliability
Copyright@Wajahat Iqbal (2015)
This is not an official COBIT publication and is not endorsed, sponsored, or otherwise affiliated with ISACA or ITGI.
22) PBRM -> Plan, Build, Run, Monitor Levels (Total 37 Processes)
Governance EDM (5 Processes)
Evaluate, Direct & Monitor
Management APO (13 Processes)
Align, Plan & Organise
BAI (10 Processes)
Build, Acquire & Implement
DSS (6 Processes)
Deliver, Service & Support
MEA (3 Processes)
Monitor, Evaluate & Asses

More Related Content

PPTX
An introduction to denial of service attacks
PPT
Sql injection attack
PPTX
Thick client pentesting_the-hackers_meetup_version1.0pptx
PPSX
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx
PPTX
Chapter 4
PDF
Cyber forensics question bank
PDF
Identity and Access Management (IAM)
PPTX
Sender Policy Framework​
An introduction to denial of service attacks
Sql injection attack
Thick client pentesting_the-hackers_meetup_version1.0pptx
Introduction to the Microsoft Security Development Lifecycle (SDL).ppsx
Chapter 4
Cyber forensics question bank
Identity and Access Management (IAM)
Sender Policy Framework​

What's hot (20)

PPTX
Whitman_Ch04.pptx
PPTX
SQL Injection attack
PPTX
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
PDF
Thick Client Penetration Testing.pdf
DOCX
Types of sql injection attacks
PDF
Nmap scripting engine
PPTX
Recon with Nmap
PPT
Operating system notes ch1
PPTX
Computer Fundamentals.
PDF
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
PPT
Malware
PPTX
PPTX
Http request smuggling
PPTX
Basics of Denial of Service Attacks
PDF
Privilege escalation from 1 to 0 Workshop
PPTX
Naac ppt cs
PPTX
Chapter 7: Physical & Environmental Security
PDF
Introduction to Web Application Penetration Testing
ODP
Server Sent Events, Async Servlet, Web Sockets and JSON; born to work together!
Whitman_Ch04.pptx
SQL Injection attack
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
Thick Client Penetration Testing.pdf
Types of sql injection attacks
Nmap scripting engine
Recon with Nmap
Operating system notes ch1
Computer Fundamentals.
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
Malware
Http request smuggling
Basics of Denial of Service Attacks
Privilege escalation from 1 to 0 Workshop
Naac ppt cs
Chapter 7: Physical & Environmental Security
Introduction to Web Application Penetration Testing
Server Sent Events, Async Servlet, Web Sockets and JSON; born to work together!
Ad

Viewers also liked (19)

PDF
Effective COBIT 5 Foundation Course Materials
PDF
COBIT 5 as an IT Management Best Practices Framework - by Goh Boon Nam
PPTX
Cobit 5 - An Overview
PDF
It governance & cobit 5
PPTX
Governance and Management of Enterprise IT with COBIT 5 Framework
PDF
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...
PDF
Sample LBO Model Template – 2
PDF
CRISC Exam Questions
PPTX
Cobit 5 Business Framework -Governance and Management of Enterprise IT
PDF
What is IT Governance?
PDF
What is Cobit
PDF
10+ Getting to Know You Activities for Kids
PPTX
COBIT 5 IT Governance Model: an Introduction
PPTX
Comparison of it governance framework-COBIT, ITIL, BS7799
PPTX
CoBIT 5 (A brief Description)
PDF
10+ Getting to Know You Activities for Teens & Adults
Effective COBIT 5 Foundation Course Materials
COBIT 5 as an IT Management Best Practices Framework - by Goh Boon Nam
Cobit 5 - An Overview
It governance & cobit 5
Governance and Management of Enterprise IT with COBIT 5 Framework
La gouvernance au cœur de la transformation numérique - Comment COBIT 5 peut ...
Sample LBO Model Template – 2
CRISC Exam Questions
Cobit 5 Business Framework -Governance and Management of Enterprise IT
What is IT Governance?
What is Cobit
10+ Getting to Know You Activities for Kids
COBIT 5 IT Governance Model: an Introduction
Comparison of it governance framework-COBIT, ITIL, BS7799
CoBIT 5 (A brief Description)
10+ Getting to Know You Activities for Teens & Adults
Ad

Similar to Study Notes - COBIT 5 Foundation Certification (20)

PDF
Cobit_5_Checklist.pdf
PDF
Cobit 5-one-page
PPTX
Co5bit
PPT
Cobit5 and-grc
PDF
COBIT 5 Basic Concepts
PPTX
Frameworks For Predictability
PPT
It Governance OC CIO Nov,2013
PPT
It Governance OC CIO Nov,2013
PDF
Cobit5 laminate
PPTX
Cobit 4.1 ivooktavianti
PPTX
Cobit 4.1 ivo oktavianti
PPTX
Cobit 4.1 ivo oktavianti
PPTX
Lailatul izzati
DOC
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
PDF
Cobit 5 introduction plgr
PDF
COBIT 5 FAQ
PPT
SixSigma Training Course homework in 2016
PPTX
02. cobit 41 dan iso 17799
PPTX
Cobit 4.1 indri
PPT
COBIT5-IntroductionS
Cobit_5_Checklist.pdf
Cobit 5-one-page
Co5bit
Cobit5 and-grc
COBIT 5 Basic Concepts
Frameworks For Predictability
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
Cobit5 laminate
Cobit 4.1 ivooktavianti
Cobit 4.1 ivo oktavianti
Cobit 4.1 ivo oktavianti
Lailatul izzati
Qwr iso20000 auditor m04 implementing audit and tooling us 06 apr14
Cobit 5 introduction plgr
COBIT 5 FAQ
SixSigma Training Course homework in 2016
02. cobit 41 dan iso 17799
Cobit 4.1 indri
COBIT5-IntroductionS

Recently uploaded (20)

PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
artificial intelligence overview of it and more
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
Digital Literacy And Online Safety on internet
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Introduction to Information and Communication Technology
PPTX
innovation process that make everything different.pptx
DOCX
Unit-3 cyber security network security of internet system
PPTX
E -tech empowerment technologies PowerPoint
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Power Point - Lesson 3_2.pptx grad school presentation
artificial intelligence overview of it and more
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Exploring VPS Hosting Trends for SMBs in 2025
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Digital Literacy And Online Safety on internet
newyork.pptxirantrafgshenepalchinachinane
Slides PPTX World Game (s) Eco Economic Epochs.pptx
SAP Ariba Sourcing PPT for learning material
artificialintelligenceai1-copy-210604123353.pptx
Sims 4 Historia para lo sims 4 para jugar
Introduction to Information and Communication Technology
innovation process that make everything different.pptx
Unit-3 cyber security network security of internet system
E -tech empowerment technologies PowerPoint
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Unit-1 introduction to cyber security discuss about how to secure a system
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...

Study Notes - COBIT 5 Foundation Certification

  • 1. Copyright@Wajahat Iqbal (2015) This is not an official COBIT publication and is not endorsed, sponsored, or otherwise affiliated with ISACA or ITGI. (Study Notes) - COBIT 5 Exam (ISACA Enterprise Governance Framework) 1) Governance Objective: Value Creation from Benefits Realisation + Risk Optimisation+ Resource Optimisation 2) Cobit 5 initially available in 3 Volumes: - The Framework - Process Reference Guides - Implementation Guide 3) Five Principles of Cobit 5: - Meeting the Stakeholders needs - Covering the Enterprise end-to-end - Single integrated Framework - Holistic approach of 7 enterprise enablers - Separating governance from management 4) Stakeholder Needs  Enterprise Goals  IT-related Goals  Enabler Goals 5) Seven Enablers of Cobit 5 (i.e. Governance enablers) - Principles, policies and frameworks - Processes -Organisational structures - Culture, ethics and behaviours - Information - Service infrastructure and applications - People skills and competencies 6) Important Drivers for Cobit 5 - Performance (Business Goals) - Conformance (SOX, HIPAA) - Creating value for Enterprise Stakeholders through efficient use of Technology & Information - Complete Enterprise Governance - Covers all Functions and Processes - Address all Internal & External Services - Address all Internal & External Business Processes - Address End to end Business and IT responsibilities - Enterprise Architecture - Asset and Service management 7) Cobit 5 Triggers - Pains - Risks - Goals Cascade
  • 2. Copyright@Wajahat Iqbal (2015) This is not an official COBIT publication and is not endorsed, sponsored, or otherwise affiliated with ISACA or ITGI. 8) Mapping of Governance & Management Domain a) Governance Domain (EDM – Evaluate, Direct & Monitor) b) Management Domain:  (APO – Align, Plan & Organise)  (BAI – Build, Acquire & Implement)  (DSS – Deliver, Service & Support)  (MEA – Monitor, Evaluate & Asses) 9) Cobit 5 Product Guides: - Level 1 (Cobit Enabling Processes, Cobit 5 Enabling Information, Other Enabling Guides) - Level 2 (Cobit 5 Implementation, Cobit 5 for Information Security, Cobit 5 for Assurance, Cobit 5 for Risk, Other Professional Guides) - Level 3 (Cobit 5 Online Collaborative Environment) 10) Key Governance Objective  VALUE CREATION 11) Enabler Characteristics  - Stakeholders (Internal & External) - Goals (expected outcome of enabler)  Intrinsic Quality (work well & provide results)  Contextual Quality (Relevance, effectiveness)  Accessibility & Security (of enablers + outcomes) - Lifecycle  Plan, Design,  Build/Acquire/Create/Implement  Use/Operate  Evaluate/Monitor  Update/Dispose - Good Practice  Practices  Work Products (Inputs & Outputs) 12) Cobit 5 Enterprise 17 Goals (Balanced Score Card 5 Dimensions): - Financial - Customer - Internal - Learning Growth 13) Cobit 5 Implementation Lifecycle
  • 3. Copyright@Wajahat Iqbal (2015) This is not an official COBIT publication and is not endorsed, sponsored, or otherwise affiliated with ISACA or ITGI. COBIT 5 IMPLEMENTATION CYCLE Phase 1 2 3 4 5 6 7 What are the Drivers? Where are we Now? Where do we Want to be? What needs to Be done? How do we get there? Did we get There? How do we keep the momentum Going? Programme Management Initiate program Define problems & opportunities Define road map Plan programme Execute plan Realise benefits Review Effectiveness Change Enablement Establish desire to change Form implementation team Communicate outcome Identify role players Operate and use Embed new approaches Sustain Continual Improvement Lifecycle Recognise need to act Assess current state Define target state Build improvements Implement improvements Operate improvements Monitor and evaluate 14) Charteristics of a Good Business Case: - Address Business Benefits - Address Investment needed - Address Constraints & Dependencies - Address Investment Monitoring - Address business changes required - Address ongoing IT Operating Costs - Address Roles, Responsibilities & Accountability 15) Cobit 5 Process Capability Model (PAM) Cobit 5 Process Capability Model (PAM) 0 Incomplete Performance Attribute (PA) 1 Performed PA1.1 Process Performance 2 Managed PA2.1 Performance Management PA2.2 Work Product Management 3 Established PA3.1 Process Definition PA3.2 Process Deployment 4 Predictable PA4.1 Process Measurement PA4.2 Process Control 5 Optimising PA5.1 Process Innovation PA5.2 Process Optimisation Rating Levels: a) F- Fully achieved (>85%) b) P - Partially achieved (15-50%) c) L-Largely achieved (50-85%) d) N- Non achieved (<15%)
  • 4. Copyright@Wajahat Iqbal (2015) This is not an official COBIT publication and is not endorsed, sponsored, or otherwise affiliated with ISACA or ITGI. 16) Enterprise = Organisation = Commercial (Corporate) OR Public Sector OR Not for Profit 17) Information Enabler (Enabler 5) 1) Intrinsic Quality Accuracy,Objectivity,Believability,Reputation 2) Contextual Relevancy, Completeness, Currency, Appropriate amount of information, Concise representation, Consistent representation Interpretability, Understandability, Ease of manipulation 3) Security/Accessibility Availability/timeliness, Restricted Access 4) Information Layers  Physical World(Carrier/Media)  Empiric(User Interface)  Syntactic (Code/Language)  Semantic (Meaning)  Pragmatic (Use)  Social Use (e.g. Contracts,Law,Culture) 18) Cobit 5 Stakeholders: - Internal (Board,CFO,CIO,CTO,CEO,Business Executives,Managers,Internal Auditors,Users ..) - External (Business Partners,Suppliers,Shareholders,Regulators,Govt,External Users,Customers,Standardisation organizations,External Auditors,Consultants..) 19) Good Policy  Effective, Efficient, Non-Intrusive 20) DIKW - [Data – Information-Knowledge-Wisdom (Value)] 21) Information for Business (COBIT 4.1) 1 Quality  Effectiveness  Efficiency 2 Security  Confidentiality  Integrity  Availability 3 Fiduciary  Compliance  Reliability
  • 5. Copyright@Wajahat Iqbal (2015) This is not an official COBIT publication and is not endorsed, sponsored, or otherwise affiliated with ISACA or ITGI. 22) PBRM -> Plan, Build, Run, Monitor Levels (Total 37 Processes) Governance EDM (5 Processes) Evaluate, Direct & Monitor Management APO (13 Processes) Align, Plan & Organise BAI (10 Processes) Build, Acquire & Implement DSS (6 Processes) Deliver, Service & Support MEA (3 Processes) Monitor, Evaluate & Asses