加入 Systematic Facebook 擁躉群  
課程查詢電話:2332-6544       
 
  法律課程
  • 代理人的法律責任
  • 公司董事和合夥人的法律責任
  • 婚姻的法律責任
  • 遺產繼承的合法權益
  英文課程
  • IPA 拼音:級別 1 2 3 4
  普通話課程
  • 基礎普通話拼音 (免費)
  • 進階普通話拼音
  • 普通話會話:級別 1 2 3
  西班牙語文課程
  • 級別 1 2 3
  中醫課程
  • 濕疹與皮膚敏感病
  • 暗瘡與色斑 | 鼻敏感與感冒
  • 脫髮與白髮 | 從五官看健康
  攝影課程
  • 攝影初級
  • 攝影中級 (風景專題)
  風水命理課程
  • 紫微斗數:級別 1 2 3
  • 子平八字:級別 1 2 3
  • 八字風水:級別 1 2 3
  • 奇門遁甲:級別 1 2 3

這個頁面上的內容需要較新版本的 Adobe Flash Player。

取得 Adobe Flash Player


想定期知道最新課程及優惠嗎?
免費訂閱本中心的課程通訊!
觀看課程通訊
Reasonable Spread:
Permission email marketing

CISA 國際認可證書課程

  • 課程簡介
  • 課程特點
  • 考試須知
  • 課程內容

欲查詢課程時間表,請致電 2332 6544 ,聯絡本中心職員。

ISACA® 成立於1969年,多年來不斷參與各項系統確認性與安全、企業資訊治理及資訊風險的活動,口碑載譽。

ISACA® 會員遍佈逾 160 個國家,總數超過 86,000 人。其頒授的全球認可國際公認電腦稽核師(CISA®)資格、更是各位資訊管理人員必考的證書。取得 CISA 資格標誌著該專業人員具備電腦稽核、控管和安全領域的專業知識。

ISACA® 定期於每年的6月及12月舉行CISA考試。考生需要作答200題多項選擇題。考試分數最低為200分而滿分為800分,合格分數為450分。

本中心的 CISP 國際認可證書課程由 Franco Tsang (擁有 CISA, CISSP, CCIE : Security, CCIE : Service Provider 及 CCIE : Routing and Switching 三項 CCIE 證書) 籌備多時,精心編排。由上堂、溫習、實習、考試研習、做試題至最後考試,均為你度身訂造,作出有系統的編排。務求真正教識你,又令你考試及格。


課程時數: 合共 18 小時 (共 6 堂)
適合人仕: 對電腦稽核、控管和安全領域的專業知識有興趣的人仕
授課語言: 以廣東話為主,輔以英語
課程筆記: 本中心導師親自編寫英中對照筆記

欲查詢課程時間表,請致電 2332 6544 ,聯絡本中心職員。

1. Franco Tsang (CCIE #19772) 親自教授: 本課程由擁有 CISA, CISSP, Triple CCIE, RHCE, MCITP 實力經驗俱備的 Franco Tsang 親自教授。
2. Franco Tsang親自編寫筆記: Franco 親自編寫英中對照筆記,令你無須「死鋤」如字典般厚及不適合香港讀書格調的書本。
3. 提供模擬考試題目: 本中心為學員提供充足的模擬考試題目,每條考試題目均附有標準答案。而較難理解的題目,均會附有 Franco 的解釋。
4. 理論與實習並重:

Franco 會在課堂上深入淺出地講解相關概念,務求令同學理解抽象的電腦稽核及控管概念。

6. 免費重讀: 學員可於自課程結束後三個月內免費重讀本課程。

欲查詢課程時間表,請致電 2332 6544 ,聯絡本中心職員。

ISACA® 定期於每年的6月及12月舉行CISA考試。考生需要作答200題多項選擇題。考試分數最低為200分而滿分為800分,合格分數為450分。考試費用如下:

  ISACA 會員 非ISACA會員

早期報名費用

美元 $415

美元 $545

後期報名費用

美元 $465

美元 $595


通過考試後,同學需要

  • 提出具有從事電腦稽核、控管、確認或安全工作五年工作經驗
  • 同意遵守國際電腦稽核協會的職業道德準則
  • 同意遵守國際電腦稽核協會所採用的「電腦稽核標準」
  • 同意遵守「國際電腦稽核師持續專業進修政策」(CPE)

完成上述要求後,便能成為CISA。




欲查詢課程時間表,請致電 2332 6544 ,聯絡本中心職員。

課堂由導師以講座形式教授課程理論及進行眾多的商業實習,而實習時段由學員親自進行商業實習。

  • The IS Audit Process
    • Develop and implement a risk-based IS audit strategy for the organization in compliance with IS audit standards, guidelines and best practices.
    • Plan specific audits to ensure that IT and business systems are protected and controlled.
    • Conduct audits in accordance with IS audit standards, guidelines and best practices to meet planned audit objectives.
    • Communicate emerging issues, potential risks and audit results to key stakeholders.
    • Advise on the implementation of risk management and control practices within the organization, while maintaining independence.
  • IT Governance
    • Evaluate the effectiveness of the IT governance structure to ensure adequate board control over the decisions, directions and performance of IT so that it supports the organization’s strategies and objectives.
    • Evaluate the IT organizational structure and human resources (personnel) management to ensure that they support the organization’s strategies and objectives.
    • Evaluate the IT strategy and the process for its development, approval, implementation and maintenance to ensure that it supports the organization’s strategies and objectives.
    • Evaluate the organization’s IT policies, standards and procedures and the processes for their development, approval, implementation and maintenance to ensure that they support the IT strategy and comply with regulatory and legal requirements.
    • Evaluate management practices to ensure compliance with the organization’s IT strategy, policies, standard and procedures.
    • Evaluate IT resource investment, use and allocation practices to ensure alignment with the organization’s strategies and objectives.
    • Evaluate IT contracting strategies and policies and contract management practices to ensure that they support the organization’s strategies and objectives.
    • Evaluate risk management practices to ensure that the organization’s IT-related risks are properly managed.
    • Evaluate monitoring and assurance practices to ensure that the board and executive management receive sufficient and timely information about IT performance.

 

  • System Infrastructure Life Cycle
    • Evaluate the business case for the proposed system development/acquisition to ensure that it meets the organization’s business goals.
    • Evaluate the project management framework and project governance practices to ensure that business objectives are achieved in a cost-effective manner, while managing risks to the organization.
    • Perform reviews to ensure that a project is progressing in accordance with project plans, is adequately supported by documentation and its status reporting is accurate.
    • Evaluate proposed control mechanisms for systems and/or infrastructure during specification, development/acquisition and testing to ensure that they will provide safeguards and comply with the organization’s policies and other requirements.
    • Evaluate the processes by which systems and/or infrastructure are developed/acquired and tested to ensure that the deliverables meet the organization’s objectives.
    • Evaluate the readiness of the system and/or infrastructure for implementation and migration into production.
    • Perform post implementation review of systems and/or infrastructure to ensure that they meet the organization’s objectives and are subject to effective internal control.
    • Perform periodic reviews of systems and/or infrastructure to ensure that they continue to meet the organization’s objectives and are subject to effective internal control.
    • Evaluate the process by which systems and/or infrastructure are maintained to ensure the continued support of the organization’s objectives and that the systems and/or infrastructure are subject to effective internal control.
    • Evaluate the process by which systems and/or infrastructure are disposed of to ensure that they comply with the organization’s policies and procedures.
  • IT Service Delivery and Support
    • Evaluate service-level management practices to ensure that the level of service from internal and external service providers is defined and managed.
    • Evaluate operations management to ensure that IT support functions effectively meet business needs.
    • Evaluate data administration practices to ensure the integrity and optimization of databases.
    • Evaluate the use of capacity and performance monitoring tools and techniques to ensure that IT services meet the organization’s objectives.
    • Evaluate change, configuration and release management practices to ensure that changes made to the organization’s production environment are adequately controlled and documented.
    • Evaluate problem and incident management practices to ensure that incidents, problems and errors are recorded, analyzed and resolved in a timely manner.
    • Evaluate the functionality of the IT infrastructure (e.g., network components, hardware and system software) to ensure that it supports the organization’s objectives.

 

  • Protection of Information Assets
    • Evaluate the design, implementation and monitoring of logical access controls to ensure the confidentiality, integrity, availability and authorized use of information assets.
    • Evaluate network infrastructure security to ensure confidentiality, integrity, availability and authorized use of the network and the information transmitted.
    • Evaluate the design, implementation and monitoring of environmental controls to prevent or minimize loss.
    • Evaluate the design, implementation and monitoring of physical access controls to ensure that information assets are adequately safeguarded.
    • Evaluate the processes and procedures used to store, retrieve, transport and dispose of confidential information assets.
  • Business Continuity and Disaster Recovery
    • Evaluate the adequacy of backup and restore provisions to ensure the availability of information required to resume processing.
    • Evaluate the organization’s disaster recovery plan to ensure that it enables the recovery of IT processing capabilities in the event of a disaster.
    • Evaluate the organization’s business continuity plan to ensure its ability to continue essential business operations during the period of an IT disruption.

 


 

更多綜合課程