Cybersecurity Training Course Training ½Òµ{
  Facebook: Cybersecurity Training Course Training ½Òµ{
 
Cybersecurity Training Course Training ½Òµ{
Cybersecurity Training Course Training ½Òµ{ Cybersecurity Training Course Training ½Òµ{ Cybersecurity Training Course Training ½Òµ{ Cybersecurity Training Course Training ½Òµ{ Cybersecurity Training Course Training ½Òµ{ Cybersecurity Training Course Training ½Òµ{ Cybersecurity Training Course Training ½Òµ{ Cybersecurity Training Course Training ½Òµ{ Cybersecurity Training Course Training ½Òµ{ Cybersecurity Training Course Training ½Òµ{ Cybersecurity Training Course Training ½Òµ{  
Cybersecurity Training Course Training ½Òµ{ Cybersecurity Training Course Training ½Òµ{

·Q©w´Áª¾¹D³Ì·s½Òµ{¤ÎÀu´f¶Ü¡H
§K¶O­q¾\¥»¤¤¤ßªº½Òµ{³q°T¡I

½Ò°ó¿ý¼vÀH®ÉÚ» 10 ¤jÀuÂI¤§¦aÂI¤è«K¡G¥»¤¤¤ß¦ì©ó©ô¨¤¡BÆ[¶í¡B¥_¨¤¡B¨F¥Ð¤Î ¤Ùªù¡A´Nªñ´äÅK¯¸¡I

CC - Certified in Cybersecurity °ê»Ú»{¥iÃҮѽҵ{
½Òµ{²ºÙ¡GCybersecurity Training Course
(¤Jªù¯Å Cybersecurity ±M·~»{ÃÒ)

  • ½Òµ{®É¶¡
  • ½Òµ{²¤¶
  • ½Òµ{¯SÂI
  • ¦Ò¸Õ¶·ª¾
  • ½Òµ{¤º®e

½Òµ{Àu´f¡I²{¤Z¦P®É³øŪ¥H¤U¨â­Ó½Òµ{¡G
§Y´î $800¡I

¶Ç²ÎªA°È¡G½Òµ{¤W°ó®É¶¡ªí (¦aÂI¡G©ô¨¤   Á`¶O¥Î¡G$4,480)
¾Ç­û¨Ï¥Î¹q¸Ü©Î¥»ºô­¶³ø¦W¡A«Ý¥»¤¤¤ß½T»{¤w¬°¾Ç­û¯d¦ì«á¡A§Y¥i¨Ï¥Î Âà¼Æ§Ö ú¥I¾Ç¶O¡A¹Lµ{²«K¡I

¶W¾_¾Ù¡G ¤Z©ó 2024¦~ 5¤ë 3¤é (¤­) ©Î¤§«e³øŪ¥»½Òµ{¡A
­ì»ù $5,600¡A²{¥u»Ý
$4,480¡I

½s¸¹ ¤é´Á (dd/mm) ¬P´Á ®É¶¡ ¶O¥Î ¾É®v  
OS0713CM  03/07 - 05/08
3/7, 8/7, 10/7, 15/7, 17/7, 22/7, 24/7, 29/7, 31/7, 5/8
 ¤U¸ü¸Ô²Ó¤W½Ò¤é´Á
¤@¡B¤T 7:00pm - 10:00pm $4,480 Franco «ö¦¹³ø¦W¡GCybersecurity Training Course Training ½Òµ{
* ¦U¬F©²³¡ªù¥i¨Ï¥Î P Card ¥I´Ú  
¦p¨Ï¥Î P Card ú¥I¦Ò¸Õ¶O¡A¦Ò¸Õ¶O»Ý¥t¥[ 1.3% ªþ¥[¶O  

*** ½è¯À«OÃÒ¡G §K¶O©ó¥ô¦ó¦aÂI¸ÕÚ»­º 3 ¤p®É½Ò°ó¿ý¼v¡A±q¦Ó¥i¹w¥ý¤F¸Ñ¾É®v¤Î±Ð§÷ªº½è¯À¡A¤~³øŪ½Òµ{¨Ó¤W°ó¡C***
½Ð­P¹q»P¥»¤¤¤ß¾­û¹w¬ù¡C ¬d¬Ý¦U¦aÂI¹q¸Ü
©ô¨¤ 2332-6544
Æ[¶í 3563-8425
¥_¨¤ 3580-1893
¨F¥Ð 2151-9360
¤Ùªù 3523-1560

§K¶O¸É°ó¡G ¾Ç­û¥i©ó¥ô¦ó¦aÂI¸É¬Ý½Ò°ó¿ý¼v¡A±q¦Ó¥i»Î±µ©¹«áªº½Ò°ó¡I
§K¶O­«Åª¡G ¾Ç­û¥i©ó½Òµ{µ²§ô«á¤T­Ó¤ë¤º©ó¥ô¦ó¦aÂI¤£­­¦¸¼Æ¦a­«¬Ý½Ò°ó¿ý¼v¡A±q¦Ó¥i¤ÏÂЭ«·Å¾ã­Ó½Òµ{¡I
½Ò®É¡G 30 ¤p®É
½Ò°ó¾É®v¡G Franco (¥ô±Ð½Òµ{²M³æ)

¶Ç²ÎªA°Èªº§K¶O¸É°ó©Î§K¶O­«Åª¡A­Y¿ï¾Ü©ô¨¤©ÎÆ[¶íªº¶¢¤é¬P´Á¤@¦Ü¥|¡A«K»Ý©ó 6:30p.m. ©Î¤§«e§¹¦¨Æ[¬Ý½Ò°ó¿ý¼v¡C

¦a°Ï ¦a§} ¹q¸Ü ±Ð¨|§½µù¥U½s¸¹
©ô¨¤ ¤EÀs©ô¨¤¨È¬Ò¦Ñµó 109 ¸¹¡A¬Ò©ô°Ó·~¤j·H 18 ¼Ó 1802 - 1807 «Ç 2332-6544 533459
Æ[¶í ¤EÀsÆ[¶í¦¨·~µó 7 ¸¹¹ç®Ê¤¤¤ß 12 ¼Ó G2 «Ç 3563-8425 588571
¥_¨¤ ­»´ä¥_¨¤°¨Ä_¹D 41-47 ¸¹µØÄ_°Ó·~¤j·H 3 ¼Ó 01-02 ¸¹çE 3580-1893 591262
¨F¥Ð ·s¬É¨F¥Ð¥Ûªù¦w¸sµó 3 ¸¹¨Ê·ç¼s³õ 1 ´Á 10 ¼Ó M «Ç 2151-9360 604488
¤Ùªù ·s¬É¤Ùªù¤Ù³ß¸ô 2 ¸¹¤Ùªù¬fÄR¼s³õ 17 ¼Ó 1708 «Ç 3523-1560 592552
ª`·N¡I «È¤á¥²¶·¬d°Ý³øŪ¾Ç®Õªº±Ð¨|§½µù¥U½s¸¹¡A¥H½T»{¸Ó®Õ¬°µù¥U¾Ç®Õ¡A¥H§K»X¨ü¤£¥²­nªº·l¥¢¡I


¸ê°T¦w¥þ¤w¦¨¬°¬ì§Þ¦æ·~¤¤³ÌÃöÁ䪺»â°ì¤§¤@¡CÀHµÛ¼Æ¾Ú¬x¬y©Mºôµ¸«Â¯Ù¤£Â_ºt¶i¡A´x´¤¸ê°T¦w¥þªº±M·~ª¾ÃÑ»P§Þ¯àÅܱo¤ñ¥H©¹¥ô¦ó®É­Ô³£¨Ó±o­«­n¡C

¬°¤FÅý±z¯à¦b¦¹±M·~»â°ì²æ¿o¦Ó¥X¡A§Ú­Ì¯S§O±À¥X¤F¥»½Òµ{¡C¥»½Òµ{¥Ñ²`¨ã¸gÅ窺±M®aºë¤ß³]­p¡A¥Øªº¬O¬°¤F½T«O¾Ç­û¯à°÷Àò±o¥þ­±¦Ó°í¹êªº¸ê°T¦w¥þ°ò¦ª¾ÃÑ¡A¨Ã¦¨¥\¦Ò¨ú±M·~»{ÃÒ¸ê®æ¡C¥»½Òµ{²[»\¤F¦Ò¸Õ¤jºõªº©Ò¦³¤º®e¡A±q¸ê¦wµ¦²¤¨î©w¡B­·ÀIµû¦ô¡A¨ì¨¾¿m§Þ¥©©MÀ³«æ¤ÏÀ³³£¥]§t¨ä¤¤¡C

µL½×±z¬O IT ±M·~¤H­û¡B´Á±æÂà´«¶]¹D¶i¤J¸ê°T¦w¥þ»â°ìªºÂ¾³õ¤H¤h¡B©Î¬O¤j¾Ç¦b¾Ç¾Ç¥Í¤ÎÀ³©¡²¦·~¥Í¡A¥»½Òµ{³£±N¬O±z²z·Qªº¿ï¾Ü¡C³z¹L¥»½Òµ{¡A±z¤£¶È¯à¶}±Ò±z¦b¸ê°T¦w¥þ»â°ìªºÂ¾·~¥Í²P¡A¥ç¦P®É¬°¥¼¨Óªº¶i¶¥»{ÃÒ¦p CISSP ³þ©w°í¹êªº°ò¦¡C

¤¤¤ßªº CC - Certified in Cybersecurity °ê»Ú»{¥iÃҮѽҵ{ (¤Jªù¯Å Cybersecurity ±M·~»{ÃÒ) ¥Ñ Franco Tsang Äw³Æ¦h®É¡Aºë¤ß½s±Æ¡C¥Ñ¤W°ó¡B·Å²ß¡B¹ê²ß¡B¦Ò¸Õ¬ã²ß¡B°µ¸ÕÃD¦Ü³Ì«á¦Ò¸Õ¡A§¡¬°§A«×¨­­q³y¡A§@¥X¦³¨t²Îªº½s±Æ¡C°È¨D¯u¥¿±ÐÃѧA¡A¤S¥O§A¦Ò¸Õ¤Î®æ¡C


½Òµ{¦WºÙ¡G CC - Certified in Cybersecurity °ê»Ú»{¥iÃҮѽҵ{
- ²ºÙ¡GCybersecurity Training Course
½Òµ{®É¼Æ¡G ¦X¦@ 30 ¤p®É (¦@ 10 °ó)
¾A¦X¤H¤h¡G ¥ô¦ó¤H¤h¡AµL¶·¸gÅç¡C
±Â½Ò»y¨¥¡G ¥H¼sªF¸Ü¬°¥D¡A»²¥H­^»y
½Òµ{µ§°O¡G ¥»¤¤¤ß¾É®v¿Ë¦Û½s¼g­^¤å¬°¥Dµ§°O¡A¦Ó³¡¥÷­^¤å¦rªþ¦³¤¤¤å¹ï·Ó¡C

1. Franco Tsang (CCIE #19772) ¿Ë¦Û±Ð±Â¡G ¥»½Òµ{¥Ñ¾Ö¦³ Triple CCIE, CISA, CISM, CRISC, CDPSE, CISSP, ITILv3 Expert, ITIL 4 Managing Professional, ITIL 4 Strategic Leader, PMP µ¥±M·~»{ÃÒªº Franco Tsang ¿Ë¦Û±Ð±Â¡C
2. Franco Tsang¿Ë¦Û½s¼gµ§°O¡G Franco ¿Ë¦Û½s¼gµ§°O¡A¥O§AµL¶·¡u¦º¾S¡v¦p¦r¨å¯ë«p¤Î¤£¾A¦X­»´äŪ®Ñ®æ½Õªº®Ñ¥»¡C
3. ´£¨Ñ¼ÒÀÀ¦Ò¸ÕÃD¥Ø¡G ¥»¤¤¤ß¬°¾Ç­û´£¨Ñ¥R¨¬ªº¼ÒÀÀ¦Ò¸ÕÃD¥Ø¡A¨C±ø¦Ò¸ÕÃD¥Ø§¡ªþ¦³¼Ð·Çµª®×¡C¦Ó¸ûÃø²z¸ÑªºÃD¥Ø¡A§¡·|ªþ¦³ Franco ªº¸ÑÄÀ¡C
4. ²`¤J²L¥X¡G Franco ·|¦b½Ò°ó¤W²`¤J²L¥X¦aÁ¿¸Ñ¬ÛÃö·§©À¡A°È¨D¥O¦P¾Ç²z¸Ñ©â¶HªººÞ²z·§©À¡C
5. §K¶O­«Åª¡G ¶Ç²Î½Ò°ó¾Ç­û¥i©ó½Òµ{µ²§ô«á¤T­Ó¤ë¤º§K¶O­«¬Ý½Ò°ó¿ý¼v¡C

­º¥ý¦Û¦æ«e©¹ ISC2 ºô¯¸«Ø¥ß ISC2 Account ¨Ã¥H¸Ó ISC2 Account µn¤J¡Aµn¤J«á¨Ì±q¸Óºô¯¸«ü¥Ü§¹µ½±zªº­Ó¤H¸ê®Æ (¦p©m¦W¡B¹q¸Ü¸¹½X¤Î¹q¶l¦a§}µ¥µ¥)¡C

­«­n¡G±z¥²¶·«ö·Ó¦b¦Ò¸Õ¤¤¤ß¥X¥Üªº¨­¥÷ÃÒ¤Wªº¸ê®Æ¨Ó¶ñ¼g±zªº«H®§¡C¦pªG¤£§¹¥þ¤Ç°t¡A±z±NµLªk°Ñ¥[¦Ò¸Õ¡A¥B¤£·|Àò°hÁÙ¥ô¦ó¶O¥Î¡C

´£¥æ ISC2 ªººô¤W¹q¤lªí®æ«á¡A±z±N³Q­«©w¦V¨ì Pearson VUE ºô¯¸¡A¦b¨ºùرz±N¯à°÷¦w±Æ¦b¥»¤¤¤ß¦Ò¸Õ¤Îú¥I USD$199 ¤§¦Ò¸Õ¶O¡C

¦Ò¸Õ·í¤é¨ì¹F¥»¤¤¤ß®É¥²¶·¥X¥Ü¤U¦C¨â¶µ¦³®Ä¤§¨­¥÷ÃÒ©ú¤å¥ó¡A§_«h¦Ò¥Í¤£¥i¶i¦æ¦Ò¸Õ¡A¦Ó¤wú¥I¤§¦Ò¸Õ¶O¥ç¤£·|°h¦^¡G

  1. ­»´ä¨­¥÷ÃÒ ¤Î
  2. ªþ¦³¦Ò¥Í©m¦W¤Îñ¦WªºÃÒ¥ó (¦p«H¥ÎÍü¡B­»´ä¯S°ÏÅ@·Ó¡BBNOµ¥)

¦Ò¸ÕÃD¥Ø¥Ñ¿D¬w¦Ò¸Õ¤¤¤ß¶Ç°e¨ì§A­nÀ³¦Òªº¹q¸£¡A¦Ò¸Õ®É¥H¹q¸£§@µª¡C©Ò¦³¦Ò¸ÕÃD¥Ø§¡¬°­^¤å¡A¦Ó¦Ò¸ÕÃD¥Ø®æ¦¡¬° 100 ±ø¦h¶µ¿ï¾ÜÃD¡C¦X®æ¤À¼Æ¬° 700 out of 1000 points¡C




½Òµ{¦WºÙ¡GCC - Certified in Cybersecurity °ê»Ú»{¥iÃҮѽҵ{
- ²ºÙ¡GCybersecurity Training Course

Domain 1: Security Principles

  • Understand the security concepts of information assurance
    • Confidentiality
    • Integrity
    • Availability
    • Authentication (e.g., methods of authentication, multi-factor authentication (MFA))
    • Non-repudiation
    • Privacy
  • Understand the risk management process
    • Risk management (e.g., risk priorities, risk tolerance)
    • Risk identification, assessment and treatment
  • Understand security controls
    • Technical controls
    • Administrative controls
    • Physical controls
  • Understand (ISC)2 Code of Ethics
    • Professional code of conduct
  • Understand governance processes
    • Policies
    • Procedures
    • Standards
    • Regulations and laws


Domain 2: Business Continuity (BC), Disaster Recovery (DR) & Incident Response Concepts

  • Understand business continuity (BC)
    • Purpose
    • Importance
    • Components
  • Understand disaster recovery (DR)
    • Purpose
    • Importance
    • Components
  • Understand incident response
    • Purpose
    • Importance
    • Components


Domain 3: Access Controls Concepts

  • Understand physical access controls
    • Physical security controls (e.g., badge systems, gate entry, environmental design)
    • Monitoring (e.g., security guards, closed-circuit television (CCTV), alarm systems, logs)
    • Authorized versus unauthorized personnel
  • Understand logical access controls
    • Principle of least privilege
    • Segregation of duties
    • Discretionary access control (DAC)
    • Mandatory access control (MAC)
    • Role-based access control (RBAC)


Domain 4: Network Security

  • Understand computer networking
    • Networks (e.g., Open Systems Interconnection (OSI) model, Transmission Control Protocol/Internet Protocol (TCP/IP) model, Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6), WiFi)
    • Ports
    • Applications
  • Understand network threats and attacks
    • Types of threats (e.g., distributed denial-of-service (DDoS), virus, worm, Trojan, man-in-the-middle (MITM), side-channel)
    • Identification (e.g., intrusion detection system (IDS), host-based intrusion detection system (HIDS), network intrusion detection system (NIDS))
    • Prevention (e.g., antivirus, scans, firewalls, intrusion prevention system (IPS))
  • Understand network security infrastructure
    • On-premises (e.g., power, data center/closets, Heating, Ventilation, and Air Conditioning (HVAC), environmental, fire suppression, redundancy, memorandum of understanding (MOU)/memorandum of agreement (MOA))
    • Design (e.g., network segmentation (demilitarized zone (DMZ), virtual local area network (VLAN), virtual private network (VPN), micro-segmentation), defense in depth, Network Access Control (NAC) (segmentation for embedded systems, Internet of Things (IoT))
    • Cloud (e.g., service-level agreement (SLA), managed service provider (MSP), Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), hybrid)

Domain 5: Security Operations

  • Understand data security
    • Encryption (e.g., symmetric, asymmetric, hashing)
    • Data handling (e.g., destruction, retention, classification, labeling)
    • Logging and monitoring security events
  • Understand system hardening
    • Configuration management (e.g., baselines, updates, patches)
  • Understand best practice security policies
    • Data handling policy
    • Password policy
    • Acceptable Use Policy (AUP)
    • Bring your own device (BYOD) policy
    • Change management policy (e.g., documentation, approval, rollback)
    • Privacy policy
  • Understand security awareness training
    • Purpose/concepts (e.g., social engineering, password protection)
    • Importance

 

The course content above may change at any time without notice in order to better reflect the content of the examination.



 

§ó¦hºî¦X½Òµ{
  Äá¼v½Òµ{
  ¡E Äá¼vªì¯Å
  ¡E Äá¼v¤¤¯Å (­·´º±MÃD)
  ­^¤å½Òµ{
  ¡E IPA «÷­µ¡G¯Å§O 1 ¡E 2 ¡E 3 ¡E 4
  ´¶³q¸Ü½Òµ{
  ¡E °ò¦´¶³q¸Ü«÷­µ (§K¶O)
  ¡E ¶i¶¥´¶³q¸Ü«÷­µ
  ¡E ´¶³q¸Ü·|¸Ü¡G¯Å§O 1 ¡E 2 ¡E 3
  ¦è¯Z¤ú»y¤å½Òµ{
  ¡E ¯Å§O 1 ¡E 2 ¡E 3
  ¤¤Âå½Òµ{
  ¡E Àã¯l»P¥Ö½§±Ó·P¯f
  ¡E ·t½H»P¦â´³ | »ó±Ó·P»P·P«_
  ¡E ²æ¾v»P¥Õ¾v | ±q¤­©x¬Ý°·±d
  ­·¤ô©R²z½Òµ{
  ¡E µµ·L¤æ¼Æ¡G¯Å§O 1 ¡E 2 ¡E 3
  ¡E ¤l¥­¤K¦r¡G¯Å§O 1 ¡E 2 ¡E 3
  ¡E ¤K¦r­·¤ô¡G¯Å§O 1 ¡E 2 ¡E 3
  ¡E ©_ªù¹P¥Ò¡G¯Å§O 1 ¡E 2 ¡E 3