{"id":34,"date":"2008-02-25T01:00:43","date_gmt":"2008-02-24T17:00:43","guid":{"rendered":"http:\/\/localhost\/portal\/2008\/02\/25\/cissp-sp-1392399158\/"},"modified":"2008-02-25T01:00:43","modified_gmt":"2008-02-24T17:00:43","slug":"cissp-sp-1392399158","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=34","title":{"rendered":"CISSP\u570b\u969b\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u5e2b\u8a8d\u8b49\u7814\u7fd2\u73ed"},"content":{"rendered":"<p><!-- \u5c07\u6b64\u6a19\u8a18\u653e\u5728\u60a8\u60f3\u8981\u986f\u793a +1 \u6309\u9215\u7684\u4f4d\u7f6e --> <g:plusone annotation=\"inline\"><\/g:plusone>  <!-- \u5c07\u6b64\u986f\u793a\u547c\u53eb (render call) \u653e\u5728\u9069\u7576\u4f4d\u7f6e --> <script type=\"text\/javascript\">\n  window.___gcfg = {lang: 'zh-TW'};<\/p>\n<p>  (function() {\n    var po = document.createElement('script'); po.type = 'text\/javascript'; po.async = true;\n    po.src = 'https:\/\/apis.google.com\/js\/plusone.js';\n    var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s);\n  })();\n<\/script><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>\n<h1>CISSP\u8ab2\u7a0b\u4ecb\u7d39<\/h1>\n<\/li>\n<\/ul>\n<blockquote>\n<p>\nCISSP\u662f\u7531\u570b\u969b\u8cc7\u8a0a\u5b89\u5168\u8a8d\u8b49\u59d4\u54e1\u6703\uff08International Information Systems Security Certification Consortiu\uff0c\u7c21\u7a31ISC2\uff09\u6240\u898f\u5283\u4e4b\u5c08\u696d\u8cc7\u8a0a\u5b89\u5168\u8a8d\u8b49\uff0c\u76ee\u524d\u5168\u7403\u5df2\u6709\u8d85\u904e35000\u4eba\u54e1\u64c1\u6709\u6b64\u9805\u8b49\u7167\uff0c\u53f0\u7063\u64c1\u6709\u6b64\u8b49\u7167\u4e4b\u8cc7\u8a0a\u5b89\u5168\u5c08\u696d\u4eba\u58eb\u8d85\u904e200\u4eba\u3002\u70ba\u570b\u969b\u516c\u8a8d\u6700\u5177\u6b0a\u5a01\u7684\u8cc7\u8a0a\u5b89\u5168\u5c08\u696d\u4eba\u54e1\u8b49\u7167\uff0c\u7372\u5f97\u7f8e\u570b\u570b\u5bb6\u6a19\u6e96\u5b78\u6703\uff08American National Standards Institute\uff09ISO\/IEC 17024\u6a19\u6e96\u8a8d\u53ef\uff0c\u4e5f\u662f\u884c\u653f\u9662\u570b\u5bb6\u8cc7\u901a\u5b89\u5168\u6703\u5831\u9f13\u52f5\u653f\u5e9c\u54e1\u5de5\u53d6\u5f97\u4e4b\u8cc7\u5b89\u5c08\u696d\u8b49\u7167\u3002<\/p>\n<p>\u5c0d\u65bc\u60f3\u5168\u9762\u719f\u6089\u8cc7\u8a0a\u5b89\u5168\uff0c\u6216\u662f\u6709\u8208\u8da3\u5f9e\u4e8b\u8cc7\u8a0a\u5b89\u5168\u5de5\u4f5c\uff0c\u63d0\u9ad8\u8077\u5834\u7af6\u722d\u512a\u52e2\u7684\u4eba\u54e1\u800c\u8a00\uff0c\u53ef\u85c9\u7531\u672c\u8ab2\u7a0b\uff0c\u900f\u904e\u672c\u8ab2\u7a0b\u6df1\u5165\u7c21\u51fa\u7684\u6559\u5b78\uff0c\u5b78\u7fd2CISSP\u5341\u5927\u9818\u57df\u7684\u8cc7\u8a0a\u5b89\u5168\u80fd\u529b\uff0c\u6240\u6709\u6559\u6750\u8cc7\u6599\u53ca\u6642\u66f4\u65b0\uff0c\u4e26\u53cd\u61c9\u6700\u65b0\u8cc7\u8a0a\u5b89\u5168\u6280\u8853\uff0c\u8ab2\u7a0b\u4e2d\u63d0\u4f9b100\u984c\u6a21\u64ec\u6e2c\u8a66\u984c\uff0c\u4ee5\u5354\u52a9\u60a8\u9806\u5229\u901a\u904e\u8003\u8a66\uff0c\u53d6\u5f97CISSP\u8a8d\u8b49\u3002<br \/>\n&nbsp;<\/p>\n<\/blockquote>\n<ul>\n<li>\n<h1>\u8ab2\u7a0b\u5927\u7db1<\/h1>\n<\/li>\n<\/ul>\n<blockquote><p><\/p>\n<ol>\n<li>\u5b89\u5168\u7ba1\u7406\u5e38\u898f\u5de5\u4f5c(Security Management Practices)<\/li>\n<li>\u8cc7\u8a0a\u5b89\u5168\u7cfb\u7d71\u67b6\u69cb\u53ca\u6a21\u5f0f(Security Architecture and Models)<\/li>\n<li>\u8cc7\u6599\u5b58\u53d6\u63a7\u5236\u7cfb\u7d71\u53ca\u65b9\u6cd5(Access Control Systems and Methodology)<\/li>\n<li>\u5be6\u9ad4\u5b89\u5168(Physical Security)<\/li>\n<li>\u4f5c\u696d\u5b89\u5168(Operations Security)<\/li>\n<li>\u5bc6\u78bc\u5b78(Cryptography)<\/li>\n<li>\u6cd5\u5f8b\u72af\u7f6a\u8abf\u67e5\u53ca\u9053\u5fb7\u5b88\u5247(Law, Investigations, and Ethics)<\/li>\n<li>\u8cc7\u6599\u901a\u8a0a\u53ca\u7db2\u8def\u5b89\u5168(Telecommunications, Network, and Internet Security)<\/li>\n<li>\u4f01\u696d\u6c38\u7e8c\u8a08\u5283(Business Continuity Planning)<\/li>\n<li>\u61c9\u7528\u7cfb\u7d71\u767c\u5c55\u5b89\u5168(Application Development Security)<\/li>\n<\/ol>\n<p>\n<\/p><\/blockquote>\n<ul>\n<li>\n<h1>\u9069\u5408\u5c0d\u8c61<\/h1>\n<\/li>\n<\/ul>\n<blockquote><p><\/p>\n<ol>\n<li>\u5c0dCISSP\u8b49\u7167\u6709\u8208\u8da3\uff0c\u60f3\u5f9e\u4e8b\u8cc7\u8a0a\u5b89\u5168\u76f8\u95dc\u5de5\u4f5c\u8005\u3002<\/li>\n<li>\u5c0d\u8cc7\u8a0a\u5b89\u5168\u6574\u9ad4\u6280\u8853\uff0c\u60f3\u6df1\u5165\u6dfa\u51fa\u4e00\u6b21\u5168\u76e4\u4e86\u89e3\u8005\u3002<\/li>\n<li>\u73fe\u8077\u70ba\u7db2\u8def\u3001\u4e3b\u6a5f\u7ba1\u7406\u4eba\u54e1\uff0c\u6216\u8cc7\u8a0a\u5b89\u5168\u76f8\u95dc\u5f9e\u696d\u4eba\u54e1\uff0c\u6709\u5fd7\u671d\u8cc7\u8a0a\u5b89\u5168\u5c08\u5bb6\u9081\u9032\u8005\u3002<\/li>\n<\/ol>\n<\/blockquote>\n<p><\/p>\n<ul>\n<li>\n<h1>\u8ab2\u7a0b\u8cbb\u7528<\/h1>\n<\/li>\n<\/ul>\n<blockquote><p>\n\u539f\u50f956,000\u5143\u6574\uff0c\u512a\u60e0\u50f940,000\u5143\u6574<\/p>\n<\/blockquote>\n<ul>\n<li>\n<h1>\u8ab2\u7a0b\u6642\u6578<\/h1>\n<\/li>\n<\/ul>\n<blockquote><p>\n40\u5c0f\u6642<\/p>\n<\/blockquote>\n<ul>\n<li>\n<h1>\u8ab2\u7a0b\u8a62\u554f<\/h1>\n<\/li>\n<\/ul>\n<blockquote><p><\/p>\n<ol>\n<li>\u806f\u7d61\u96fb\u8a71:   02-86781815<\/li>\n<li>\u806f\u7d61Email: <a href=\"mailto:cyberhunter.com.tw\">cyberhunter@cyberhunter.com.tw<\/a><\/li>\n<\/ol>\n<p>\n<\/p><\/blockquote>\n<ul>\n<li>\n<h1>CISSP \u8003\u8a66\u6e96\u5099\u5fc3\u5f97\u5206\u4eab\u8a0e\u8ad6\u5340<\/h1>\n<\/li>\n<\/ul>\n<blockquote><p><a href=\"..\/forum\/index.php?board=13.0\" target=\"_blank\" title=\"Cyberhunter Forum\" rel=\"noopener\"><br \/>\n\u661f\u7f85\u68cb\u5e03\u8ad6\u58c7 http:\/\/www.cyberhunter.com.tw\/forum\/index.php?board=13.0<\/a>\n<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p><script type=\"text\/javascript\"><!--\ngoogle_ad_client = \"ca-pub-1319158505166829\";\n\/* 468x60, \u5df2\u5efa\u7acb 2010\/10\/17 *\/\ngoogle_ad_slot = \"7257811969\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 60;\n\/\/-->\n<\/script><br \/>\n<script type=\"text\/javascript\"\nsrc=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\">\n<\/script><br \/>\n<br \/>\n<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; CISSP\u8ab2\u7a0b\u4ecb\u7d39 CISSP\u662f\u7531\u570b\u969b\u8cc7\u8a0a\u5b89\u5168\u8a8d\u8b49\u59d4\u54e1\u6703\uff08International Infor [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-34","post","type-post","status-publish","format-standard","hentry","category-3"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=34"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/34\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=34"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=34"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}