{"id":11,"date":"2023-01-31T11:39:29","date_gmt":"2023-01-31T03:39:29","guid":{"rendered":"http:\/\/localhost\/portal\/2010\/01\/12\/cism-training\/"},"modified":"2023-01-31T23:39:58","modified_gmt":"2023-01-31T15:39:58","slug":"cism-training","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=11","title":{"rendered":"CISM \u8cc7\u8a0a\u5b89\u5168\u7d93\u7406\u4eba\u8ab2\u7a0b"},"content":{"rendered":"\n<p class=\"has-vivid-cyan-blue-color has-text-color has-medium-font-size\"><span style=\"color: revert; font-size: revert; font-weight: revert;\"><strong>\u8ab2\u7a0b\u4ecb\u7d39<\/strong><\/span> <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>CISM\uff08\u8cc7\u8a0a\u5b89\u5168\u7d93\u7406\u4eba\u8b49\u7167\uff09\u662f\u4e00\u5f35\u7279\u5225\u70ba\u4e3b\u7ba1\u4eba\u54e1\u8a2d\u8a08\u7684\u5c08\u696d\u8b49\u7167,&nbsp; ISACA\uff08Information Systems Audit and Control Association\uff09\u5354\u6703\u81ea2003\u5e746\u670814\u65e5\u958b\u59cb\u5c0d\u5168\u7403\u8cc7\u8a0a\u5b89\u5168\u5c08\u696d\u4eba\u54e1\u8209\u8fa6\u8b49\u7167\u8003\u8a66,&nbsp; \u70ba\u76ee\u524d\u570b\u969b\u516c\u8a8d\u6700\u5177\u6b0a\u5a01\u7684\u8cc7\u8a0a\u5b89\u5168\u7d93\u7406\u4eba\u5c08\u696d\u8b49\u7167\uff0c\u7372\u5f97\u7f8e \u570b\u570b\u5bb6\u6a19\u6e96\u5b78\u6703\uff08American Nation Standards Institue\uff09ISO\/IEC 17024\u6a19\u6e96\u8a8d\u53ef,&nbsp; \u95dc\u65bcCISM \u8b49\u7167\u4ecb\u7d39,&nbsp; \u53ef\u4ee5\u76f4\u63a5\u5230<a href=\"http:\/\/www.isaca.org\/Template.cfm?Section=CISM_Certification&amp;Template=\/TaggedPage\/TaggedPageDisplay.cfm&amp;TPLID=16&amp;ContentID=4528\" target=\"_blank\" rel=\"noopener\"> ISACA <\/a>\u5b98\u65b9\u7db2\u7ad9\u67e5\u8a62\u3002<\/p>\n<\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-style-plain has-vivid-cyan-blue-color has-text-color has-medium-font-size is-layout-flow wp-block-quote-is-layout-flow\">\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\"><\/ul>\n<cite><strong>\u8ab2\u7a0b\u5927\u7db1<\/strong><\/cite><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<ol class=\"wp-block-list\">\n<li>\u8cc7\u8a0a\u5b89\u5168\u6cbb\u7406 (Information Security Governance)\uff0d17%<\/li>\n\n\n\n<li>\u8cc7\u8a0a\u5b89\u5168\u98a8\u96aa\u7ba1\u7406 (Information Security Risk Management)\uff0d20%<\/li>\n\n\n\n<li>\u8cc7\u8a0a\u5b89\u5168\u8a08\u5283 (Information Security Program)\uff0d33%<\/li>\n\n\n\n<li>\u4e8b\u6545\u7ba1\u7406 (Incident Management)\uff0d30%<\/li>\n<\/ol>\n<\/blockquote>\n\n\n\n<p class=\"has-vivid-cyan-blue-color has-text-color\"><h3><strong>\u9069\u5408\u5c0d\u8c61<\/strong><\/h3><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>\u8cc7\u901a\u5b89\u5168\u5c08\u8077\u4eba\u54e1\u60f3\u53d6\u5f97\u6578\u4f4d\u767c\u5c55\u90e8\u8a8d\u53ef\u4e4b\u8cc7\u901a\u5b89\u5168\u5c08\u696d\u8b49\u7167\u8005\u3002<\/li>\n\n\n\n<li>\u60f3\u8003\u53d6CISM\u8b49\u7167\uff0c\u5f9e\u4e8b\u8cc7\u901a\u5b89\u5168\u7ba1\u7406\u76f8\u95dc\u5de5\u4f5c\u8005\u3002<\/li>\n\n\n\n<li>\u63d0\u4f9b\u8cc7\u8a0a\u670d\u52d9\u8207\u96fb\u8166\u7a3d\u6838\u4e4b\u4eba\u54e1\u53ca\u5176\u4e3b\u7ba1\u3002<\/li>\n\n\n\n<li>\u5c0d\u6574\u9ad4\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\uff0c\u60f3\u6df1\u5165\u6dfa\u51fa\u4e00\u6b21\u5168\u76e4\u4e86\u89e3\u8005\u3002<\/li>\n<\/ol>\n\n\n\n<p><script><br \/>\ntry {<br \/>\nvar pageTracker = _gat._getTracker(\"UA-5766425-1\");<br \/>\npageTracker._trackPageview();<br \/>\n} catch(err) {}<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u8ab2\u7a0b\u4ecb\u7d39 CISM\uff08\u8cc7\u8a0a\u5b89\u5168\u7d93\u7406\u4eba\u8b49\u7167\uff09\u662f\u4e00\u5f35\u7279\u5225\u70ba\u4e3b\u7ba1\u4eba\u54e1\u8a2d\u8a08\u7684\u5c08\u696d\u8b49\u7167,&nbsp; ISACA\uff08Info [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[293],"tags":[58,291,289],"class_list":["post-11","post","type-post","status-publish","format-standard","hentry","category-cyberhunter-services","tag-cism","tag-291","tag-289"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11"}],"version-history":[{"count":4,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/11\/revisions"}],"predecessor-version":[{"id":1667,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/11\/revisions\/1667"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}