{"id":630,"date":"2010-01-12T15:49:23","date_gmt":"2010-01-12T07:49:23","guid":{"rendered":"http:\/\/localhost\/portal\/2010\/01\/12\/20103cism\/"},"modified":"2023-01-04T21:53:48","modified_gmt":"2023-01-04T13:53:48","slug":"20103cism","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=630","title":{"rendered":"\u60f3\u65bc2010\u5e746\u670812\u65e5\u8003\u53d6CISM\uff0c\u73fe\u5728\u4fbf\u9808\u6e96\u5099\u53ca\u5831\u540d"},"content":{"rendered":"<p>Certified Information Security Manager (CISM) \u70ba\u5f9e\u4e8b IT Security \u5fc5\u5099\u7684\u8b49\u66f8\uff1b\u6bcf\u5e74\u53ea\u8209\u884c\u5169\u6b21\u8003\u8a66\uff0c2010\u5e74\u4e0a\u534a\u5e74\u8003\u8a66\u65e5\u671f\u8a02\u65bc6\u670812\u65e5\u3002<\/p>\n<p>\u8981\u4f5c\u6700\u597d\u7684\u6e96\u5099, \u53ef\u53c3\u52a0\u6211\u5011\u7684CISM \u8ab2\u7a0b\uff0c\u6642\u9593\u8a02\u65bc2\u670820\u65e5(\u661f\u671f\u516d)\u958b\u59cb, \u53c3\u52a0\u5468\u516d\u73ed\u6216\u662f\u5468\u65e5\u73ed,&nbsp; \u517135\u5c0f\u6642,&nbsp; \u7279\u60e0\u53ea\u970030,000\u5143, \u5c0f\u73ed\u6559\u80b2\u540d\u984d\u6709\u9650, \u5831\u540d\u8acb\u65e9\u3002<br \/>\n&nbsp; <\/p>\n<p>\u8a73\u60c5: <a target=\"_blank\" href=\"http:\/\/localhost\/portal\/2010\/01\/12\/cism-training\/\" rel=\"noopener\">http:\/\/www.cyberhunter.com.tw\/portal\/index.php\/2008-02-24-16-26-43\/cism\/12-cism-training<\/a><\/p>\n<p><script type=\"text\/javascript\">\nvar gaJsHost = ((\"https:\" == document.location.protocol) ? \"https:\/\/ssl.\" : \"http:\/\/www.\");\ndocument.write(unescape(\"%3Cscript src='\" + gaJsHost + \"google-analytics.com\/ga.js' type='text\/javascript'%3E%3C\/script%3E\"));\n<\/script> <script type=\"text\/javascript\">\ntry {\nvar pageTracker = _gat._getTracker(\"UA-5766425-1\");\npageTracker._trackPageview();\n} catch(err) {}<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Certified Information Security Manager (CISM) \u70ba\u5f9e\u4e8b IT Se [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[58,100],"class_list":["post-630","post","type-post","status-publish","format-standard","hentry","category-5","tag-cism","tag-isaca"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/630","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=630"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/630\/revisions"}],"predecessor-version":[{"id":1532,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/630\/revisions\/1532"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}