ISACA CISA Training Course Training 課程
  Facebook: ISACA CISA Training Course Training 課程
 
ISACA CISA Training Course Training 課程
ISACA CISA Training Course Training 課程 ISACA CISA Training Course Training 課程 ISACA CISA Training Course Training 課程 ISACA CISA Training Course Training 課程 ISACA CISA Training Course Training 課程 ISACA CISA Training Course Training 課程 ISACA CISA Training Course Training 課程 ISACA CISA Training Course Training 課程 ISACA CISA Training Course Training 課程 ISACA CISA Training Course Training 課程 ISACA CISA Training Course Training 課程 ISACA CISA Training Course Training 課程  
ISACA CISA Training Course Training 課程 ISACA CISA Training Course Training 課程

想定期知道最新課程及優惠嗎?
免費訂閱本中心的課程通訊!

課堂錄影隨時睇 10 大優點之免費試讀:無條件免費試讀,讓您毋須擔心錄影課程及導師質素,信心保證!

ISACA CISA
課程簡稱:ISACA CISA Training Course

  • 課程簡介
  • 課程特點
  • 考試須知
  • 課程內容

欲查詢課程時間表,請致電 2332 6544 ,聯絡本中心職員。

ISACA® 成立於1969年,多年來不斷參與各項系統確認性與安全、企業資訊治理及資訊風險的活動,口碑載譽。

ISACA® 會員遍佈逾 160 個國家,總數超過 86,000 人。其頒授的全球認可國際公認電腦稽核師(CISA®, Certified Information Systems Auditor)資格、更是各位資訊管理人員必考的證書。取得 CISA 資格標誌著該專業人員具備電腦稽核、控管和安全領域的專業知識。

中心的 CISA 國際認可證書課程由導師籌備多時,精心編排。由上堂、溫習、實習、考試研習、做試題至最後考試,均為你度身訂造,作出有系統的編排。務求真正教識你,又令你考試及格。


課程名稱: ISACA CISA
- 簡稱:ISACA CISA Training Course
課程時數: 合共 18 小時 (共 6 堂)
適合人仕: 對電腦稽核、控管和安全領域的專業知識有興趣的人仕
授課語言: 以廣東話為主,輔以英語
課程筆記: 本中心導師親自編寫英中對照筆記

欲查詢課程時間表,請致電 2332 6544 ,聯絡本中心職員。

1. Franco Tsang親自編寫筆記: Franco 親自編寫英中對照筆記,令你無須「死鋤」如字典般厚及不適合香港讀書格調的書本。
2. 提供模擬考試題目: 本中心為學員提供充足的模擬考試題目,每條考試題目均附有標準答案。而較難理解的題目,均會附有 Franco 的解釋。
3. 深入淺出:

Franco 會在課堂上深入淺出地講解相關概念,務求令同學理解抽象的電腦稽核及控管概念。

4. 免費重讀: 傳統課堂學員可於課程結束後三個月內免費重看課堂錄影。

欲查詢課程時間表,請致電 2332 6544 ,聯絡本中心職員。

ISACA® 定期於每年的6月及12月舉行CISA考試。考生需要作答200題多項選擇題。

通過考試後,同學需要

  • 提出具有從事電腦稽核、控管、確認或安全工作五年工作經驗
  • 同意遵守國際電腦稽核協會的職業道德準則
  • 同意遵守國際電腦稽核協會所採用的「電腦稽核標準」
  • 同意遵守「國際電腦稽核師持續專業進修政策」(CPE)

完成上述要求後,便能成為CISA。




欲查詢課程時間表,請致電 2332 6544 ,聯絡本中心職員。


課程名稱:ISACA CISA
- 簡稱:ISACA CISA Training Course


1 Domain 1: The Process of Auditing Information Systems
1.1 Planning
1.1.1 IS Audit Standards, Guidelines, and Codes of Ethics
1.1.2 Business Processes
1.1.3 Types of Controls
1.1.4 Risk-Based Audit Planning
1.1.5 Types of Audits and Assessments
1.2 Execution
1.2.1 Audit Project Management
1.2.2 Sampling Methodology
1.2.3 Audit Evidence Collection Techniques
1.2.4 Data Analytics
1.2.5 Reporting and Communication Techniques

2 Domain 2: Governance and Management of IT
2.1 IT Governance
2.1.1 IT Governance and IT Strategy
2.1.2 IT-Related Frameworks
2.1.3 IT Standards, Policies, and Procedures
2.1.4 Organizational Structure
2.1.5 Enterprise Architecture
2.1.6 Enterprise Risk Management
2.1.7 Maturity Models
2.1.8 Laws, Regulations, and Industry Standards affecting the Organization
2.2 IT Management
2.2.1 IT Resource Management
2.2.2 IT Service Provider Acquisition and Management
2.2.3 IT Performance Monitoring and Reporting
2.2.4 Quality Assurance and Quality Management of IT

3 Domain 3: Information Systems Acquisition, Development, and Implementation
3.1 Information Systems Acquisition and Development
3.1.1 Project Governance and Management
3.1.2 Business Case and Feasibility Analysis
3.1.3 System Development Methodologies
3.1.4 Control Identification and Design
3.2 Information Systems Implementation
3.2.1 Testing Methodologies
3.2.2 Configuration and Release Management
3.2.3 System Migration, Infrastructure Deployment, and Data Conversion
3.2.4 Post-implementation Review

4 Domain 4: Information Systems Operations and Business Resilience
4.1 Information Systems Operations
4.1.1 Common Technology Components
4.1.2 IT Asset Management
4.1.3 Job Scheduling and Production Process Automation
4.1.4 System Interfaces
4.1.5 End-User Computing
4.1.6 Data Governance
4.1.7 Systems Performance Management
4.1.8 Problem and Incident Management
4.1.9 Change, Configuration, Release, and Patch Management
4.1.10 IT Service Level Management
4.1.11 Database Management
4.2 Business Resilience
4.2.1 Business Impact Analysis (BIA)
4.2.2 System Resiliency
4.2.3 Data Backup, Storage, and Restoration
4.2.4 Business Continuity Plan (BCP)
4.2.5 Disaster Recovery Plans (DRP)

5 Domain 5: Protection of Information Assets
5.1 Information Asset Security and Control
5.1.1 Information Asset Security Frameworks, Standards, and Guidelines
5.1.2 Privacy Principles
5.1.3 Physical Access and Environmental Controls
5.1.4 Identity and Access Management
5.1.5 Network and End-Point Security
5.1.6 Data Classification
5.1.7 Data Encryption and Encryption-Related Techniques
5.1.8 Public Key Infrastructure (PKI)
5.1.9 Web-Based Communication Techniques
5.1.10 Virtualized Environments
5.1.11 Mobile, Wireless, and Internet-of-Things (IoT) Devices
5.2 Security Event Management
5.2.1 Security Awareness Training and Programs
5.2.2 Information System Attack Methods and Techniques
5.2.3 Security Testing Tools and Techniques
5.2.4 Security Monitoring Tools and Techniques
5.2.5 Incident Response Management
5.2.6 Evidence Collection and Forensics
The course content above may change at any time without notice in order to better reflect the content of the examination.

 

更多綜合課程
  攝影課程
  • 攝影初級
  • 攝影中級 (風景專題)
  英文課程
  • IPA 拼音:級別 1 2 3 4
  普通話課程
  • 基礎普通話拼音 (免費)
  • 進階普通話拼音
  • 普通話會話:級別 1 2 3
  西班牙語文課程
  • 級別 1 2 3
  中醫課程
  • 濕疹與皮膚敏感病
  • 暗瘡與色斑 | 鼻敏感與感冒
  • 脫髮與白髮 | 從五官看健康
  風水命理課程
  • 紫微斗數:級別 1 2 3
  • 子平八字:級別 1 2 3
  • 八字風水:級別 1 2 3
  • 奇門遁甲:級別 1 2 3