|
|
|
|
|
|
|
|
|
|
|
|
|
|
Á¸°æÇÏ´Â Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦Çùȸ(ISACA Korea) ȸ¿ø ¹× Á¤º¸½Ã½ºÅÛ ÅëÁ¦¡¤°¨»ç, º¸¾È, IT °Å¹ö³Í½º ºÐ¾ß¿¡ Á¾»çÇϽô Àü¹®°¡ ¿©·¯ºÐ ¾È³çÇϽʴϱî?
¿ÃÇØ Ã³À½À¸·Î ÀÎ»ç ¿Ã¸³´Ï´Ù. ¿ÃÇØ´Â CISA ½ÃÇèÀÌ ½Ç½ÃµÈÁö 30ÁÖ³âÀÌ µÇ´Â ÇØÀÔ´Ï´Ù. ¶ÇÇÑ ¿ÃÇØ¿¡´Â CISA ÇÑ±Û ½ÃÇèÀÌ ½Ç½ÃµÉ ¿¹Á¤ÀÌ°í, ¿¬¸»¿¡´Â ÃÖÃÊ·Î IT °Å¹ö³Í½º¿¡ ´ëÇÑ ½ÃÇè(CGEIT: Certified in the Governance of Enterprise IT)ÀÌ ½Ç½ÃµÉ ¿¹Á¤ÀÔ´Ï´Ù.
ISACA Korea¿¡¼´Â ¿ÃÇØ¿¡µµ Á¤º¸½Ã½ºÅÛ ÅëÁ¦¡¤°¨»ç, º¸¾È, IT °Å¹ö³Í½º ºÐ¾ßÀÇ Áö½Ä ÃàÀû ¹× È®»ê, ȸ¿øµé°£ÀÇ ±³·ùÀÇ Àå Á¦°ø, ¿ì¸® ºÐ¾ß ¹× »ê¾÷ÀÇ ¹ßÀü¿¡ ±â¿©Çϱâ À§ÇÑ È°µ¿À» Áö¼ÓÀûÀÌ°í Àû±ØÀûÀ¸·Î ¼öÇàÇÒ ¿¹Á¤ÀÔ´Ï´Ù. ÁßÁ¡ ÃßÁø »çÇ×Àº ´ÙÀ½°ú °°½À´Ï´Ù.
|
|
• Àú³Î, CISA Manual ¹× ±âŸ Àü¹® »êÃâ¹° ¹ß°£ |
|
• °¨¸®½ÉÆ÷Áö¿ò °³ÃÖ ÁÖ°ü (6¿ù ¿¹Á¤) |
• ¡®IT °Å¹ö³Í½º¡¯ ¿¬±¸È¸ °³ÃÖ (¿Â¶óÀÎ ¹× ¿ÀÇÁ¶óÀÎ ¼¼¹Ì³ª) |
• ±¹Á¦ ÄÁÆÛ·±½º °³ÃÖ (10¿ù ¿¹Á¤) |
• ¹ýÀΠȸ¿ø»ç Çà»ç °³ÃÖ |
|
| ÀÛ³âºÎÅÍ ÇùȸÀÇ ¼Ò½ÄÀ» ¾Ë·Áµå¸®°íÀÚ °Ý¿ù·Î ´º½º·¹Å͸¦ ¹ß°£ÇÏ°í ÀÖ½À´Ï´Ù. º» ´º½º·¹Å͸¦ ÅëÇؼ ¿ì¸® ÇùȸÀÇ È°µ¿»Ó¸¸ ¾Æ´Ï¶ó ¿ì¸® ºÐ¾ßÀÇ ¹ßÀü µ¿ÇâÀ» Á¢ÇϽðí, ÀÌ·¯ÇÑ ³»¿ëµéÀÌ ¿©·¯ºÐÀÇ ¾÷¹« ÃßÁø°ú ¿¬±¸¿¡ Á¶±ÝÀÌ¶óµµ µµ¿òÀÌ µÇ¾úÀ¸¸é ÇÏ´Â ¹Ù·¥ÀÌ°í, ¾ÕÀ¸·Îµµ ¿ì¸® Çùȸ¿¡ ¸¹Àº °ü½É°ú Âü¿© ºÎŹµå¸®´Â ¹ÙÀÔ´Ï´Ù.
°¨»çÇÕ´Ï´Ù.
Ȳ°æÅ Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦Çùȸ(ISACA Korea) ȸÀå, µ¿±¹´ëÇб³ °æ¿µ´ëÇÐ °æ¿µÁ¤º¸Çаú ±³¼ö | |
|
|
|
| |
|
|
|
|
|
|
|
|
ȸÀå : Ȳ °æÅ (µ¿±¹´ëÇб³ °æ¿µ´ëÇÐ °æ¿µÁ¤º¸Çаú ±³¼ö) |
|
±âȹºÎ¹® ºÎȸÀå : ¿À°æÈñ (Ç®ºû¼ÒÇÁÆ® ´ëÇ¥) |
|
°ü¸®ºÎ¹® ºÎȸÀå : °¸í±æ (È޸ӳؽº ´ëÇ¥) |
|
»ç¾÷ºÎ¹® ºÎȸÀå : ÀÌ¿ë±Ù (»ï¼ºSDS) |
|
´ë¿ÜÇù·ÂºÎ¹®ºÎȸÀå : À±¼®Áø ( Ernst & Young ÇÑ¿µ) |
|
ÇмúºÎ¹® ºÎȸÀå : ÀÌÁ¤ÈÆ (¿¬¼¼´ëÇб³ Á¤º¸´ëÇпø ±³¼ö) |
|
°¨»ç : ±èÀϼ· (Ernst & Young ÇÑ¿µ) |
|
Ãѹ« : ÀÌÅÂÇü (¢ß¿¡À̺ñ¾¾¼Ö·ç¼Ç ´ëÇ¥) |
|
À繫 : Á¶±Ô»ê (Çѱ¹ÀºÇà) |
|
2008³â Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦Çùȸ ÀÓ¿øÁ¶Á÷µµ º¸±â |
ÃÑ 5°³ºÎ¹® 19ºÐ°ú (ÀÌ»ç : 19¸í / °£»ç : 52¸í / TFT : 32¸í) | |
|
|
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
CGEIT(Certified in the Governance of Enterprise IT) ÀÚ°ÝÀº IT°Å¹ö³Í½º ¿ø¸®¿Í »ç·ÊÀÇ Áö½Ä°ú Àû¿ëÀ» ¿øÇÏ´Â ³ÐÀº ¹üÀ§ÀÇ Àü¹®°¡¸¦ À§ÇÑ ÀÚ°ÝÀ¸·Î 2007³â ISACA ¿¡¼ ½Å¼³µÇ¾ú½À´Ï´Ù. CGEIT Grandfathering(¹«½ÃÇè ÀÚ°Ý Ãëµæ)Àº 2008³â 10¿ù 31ÀϱîÁö ½ÅûÇÒ ¼ö ÀÖ½À´Ï´Ù. (2008³â 12¿ù ½ÃÇè ½Ç½Ã ¿¹Á¤)
|
CGEIT Grandfathering ÀÚ°Ý Ãëµæ ¹æ¹ý(¹«½ÃÇè ÀÚ°Ý Ãëµæ ¹æ¹ý) |
1. ÀÚ°Ý ½Åû ºñ¿ë ³³ºÎ(Online Ä«µå °áÁ¦ °¡´É) |
(1) ISACA International ȸ¿ø : $595 |
(2) CISA/CISM ÀÚ°Ý À¯ÁöÀÚ : $ 660 |
(3) ÀÏ¹Ý : $725 (ÀÚ°Ý ½Åû ºñ¿ë ȯºÒ : 󸮺ñ¿ë$100¸¦ Á¦ÇÑ ³ª¸ÓÁö ÀÀ½Ã·á¸¦¹Ýȯ¹ÞÀ»¼öÀÖ½À´Ï´Ù.) | | |
|
|
|
| |
|
|
|
|
|
|
|
|
(1) CISA/CISM Certification Renewals |
2007³â CPE µî·Ï°ú 2008³â ÀÚ°ÝÁõ À¯Áöºñ¸¦ ³³ºÎÇÏÁö ¾ÊÀº CISA/CISM ÀÚ°ÝÀÚ´Â 4¿ù 30ÀϱîÁö www.isaca.org·Î ·Î±×ÀÎ – My Renewal ÆäÀÌÁö¿¡¼ CPE µî·Ï ¹× ÀÚ°ÝÁõ À¯Áöºñ¸¦ ³³ºÎÇÏ¿©¾ß ÇÕ´Ï´Ù. 4¿ù 30ÀϱîÁö Renewal ÇÏÁö ¾ÊÀ» °æ¿ì CISA/CISM ÀÚ°ÝÀÌ Ãë¼ÒµË´Ï´Ù. |
(2) »õ·Î ¹ßÇàµÈ µµ¼ |
Audit Procedures 2008 • Balanced Scorecard Step-by-Step: Maximizing Performance and Maintaining Results, 2nd Edition • Essentials of Sarbanes-Oxley • Gobierno de las Tecnologías y los Sistemas de Información • Gray Hat Hacking, 2nd Edition • Information Technology Ethics: Cultural Perspectives • IT Control Objectives for Basel II* • IT Governance Global Status Report 2008* • Network Security Fundamentals • Reinventing Project Management • Service-Oriented Architecture: A Planning and Implementation Guide for Business and Technology • Stepping Through the InfoSec Program* • XSS Exploits—Cross Site Scripting Attacks and Defense | |
|
|
|
| |
|
| |
|
|
|
| |
|
|
|
|
|
|
|
1. ȸ¿ø´ÔÀº ISACAÀÇ ¸ÞÀÏ ¼ºñ½º¸¦ ½ÅûÇϼÌÀ¸¸ç ÇöÀç È®ÀÎÇÑ °á°ú ¸ÞÀϼö½Å¿¡ µ¿ÀÇÇϽŠ»óÅÂÀ̹ǷΠº» ¸ÞÀÏÀ» ¹ß¼ÛÇÕ´Ï´Ù. 2. ¸ÞÀÏ ¼ö½ÅÀ» ¿øÄ¡ ¾ÊÀ¸½Ã¸é [¼ö½Å°ÅºÎ]¸¦ Ŭ¸¯ÇÏ¿© ¸ÞÀÏ ¼ö½Å »óŸ¦ º¯°æÇϽʽÿÀ. If you don't want to receive this mail anymore click here ¡æ [Refuse button] 3. º» ¸ÞÀÏÀº ¹ß½Å Àü¿ë ¸ÞÀÏ·Î, ¹®ÀÇ»çÇ×Àº isacak@isaca.or.kr·Î º¸³»ÁÖ¼¼¿ä |
|
|
Çѱ¹Á¤º¸½Ã½ºÅÛ °¨»çÅëÁ¦Çùȸ °ü·Ã¹®ÀÇ TEL: 02-786-2179, 2026-3820 Fax : 02) 2026-3818 E-mail : isacak@isaca.or.kr ISACA Korea Chapter »ç¹«±¹ ¼¿ï ±Ýõ±¸ °¡»êµ¿ 371-28 ¿ì¸²¶óÀ̿½º¹ë¸® Cµ¿ 1106È£ Copyright ¨Ï 2001 Korea ISACA Korea Chapter. All Rights Reserved designed by ISACA Korea | |
|
|
|
| |
|
|