Grzegorz Albinowski

Grzegorz Albinowski Senior Business
Consulant,
Transition Project
Manager

Temat: Egzaminy CISA i CISM w Warszawie (14/06/2006) Rejestracja...

Egzaminy CISA i CISM w Warszawie (14/06/2008) Rejestracja przedłużona do 11 kwietnia 2008 roku!

Informujemy, że jest jeszcze możliwa rejestracja na egzaminy CISA i CISM w czerwcu 2008. Egzaminy odędą się 14 czerwca 2008 w Warszawie.

Rejestracja jest możliwa poprzez stronę "http://www.isaca.org/examreg

Rejestracja na egzaminy przedłużona do 11 kwietnia 2008 roku!Grzegorz Albinowski edytował(a) ten post dnia 10.04.08 o godzinie 13:25
Grzegorz Albinowski

Grzegorz Albinowski Senior Business
Consulant,
Transition Project
Manager

Temat: Egzaminy CISA i CISM w Warszawie (14/06/2006) Rejestracja...

Certified Information Systems Auditor TM(CISA®)


Obrazek


The Certified Information Systems Auditor (CISA) is ISACA’s cornerstone certification. The CISA certification has been earned by more than 55,000 professionals since inception and is for the IS audit, control, assurance and/or security professionals who wish to set themselves apart from their peers. Since 1978, the CISA certification has been renowned as the globally recognized achievement for those who control, monitor and assess an organization’s information technology and business systems.

The CISA exam is offered each year in June and December and consists of 200 multiple-choice questions that cover the six job practice areas created from the most recent CISA job practice analysis.
IS audit process (10 %)—Provide IS audit services in accordance with IS audit standards, guidelines and best practices to assist the organization in ensuring that its information technology and business systems are protected and controlled.
IT governance (15 %)—Provide assurance that the organization has the structure, policies, accountability, mechanisms and monitoring practices in place to achieve the requirements of corporate governance of IT.
Systems and infrastructure life cycle (16 %)—Provide assurance that the management practices for the development/acquisition, testing, implementation, maintenance and disposal of systems and infrastructure will meet the organization’s objectives.
IT service delivery and support (14 %)—Provide assurance that the IT service management practices will ensure delivery of the level of services required to meet the organization’s objectives.
Protection of information assets (31 %)—Provide assurance that the security architecture (policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of information assets.
Business continuity and disaster recovery (14 %)—Provide assurance that, in the event of a disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, while minimizing the business impact.Grzegorz Albinowski edytował(a) ten post dnia 10.04.08 o godzinie 12:56
Grzegorz Albinowski

Grzegorz Albinowski Senior Business
Consulant,
Transition Project
Manager

Temat: Egzaminy CISA i CISM w Warszawie (14/06/2006) Rejestracja...

Certified Information Security Manager® (CISM®)


Obrazek


The Certified Information Security Manager (CISM) certification is a unique management focused certification that has been earned by over 7,000 professionals since its introduction in 2003. Unlike other security certifications, CISM is for the individual who manages, designs, oversees and assesses an enterprise's information security program. CISM defines the core competencies and international performance standards that those who have information security management responsibilities must master.

The CISM exam is offered each year in June and December and consists of 200 multiple-choice questions that cover the five information security management job practice areas created from the most recent CISM job practice analysis.

Information security governance (23 %)—Establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations.
Information risk management (22 %)—Identify and manage information security risks to achieve business objectives.
Information security program development (17 %)—Create and maintain a program to implement the information security strategy.
Information security program management (24 %)—Oversee and direct information security activities to execute the information security program.
Incident management and response (14 %)—Plan, develop and manage a capability to detect, respond to and recover from information security incidents.Grzegorz Albinowski edytował(a) ten post dnia 10.04.08 o godzinie 12:57

Następna dyskusja:

ISACA: Otwarta rejestracja ...




Wyślij zaproszenie do