inflearn logo

2026 Version Electronic Financial Infrastructure and Critical Information and Communications Infrastructure and Latest DB, WAS, PC, Web, App Penetration Testing Risk Assessment

Vulnerability analysis and evaluation for electronic financial infrastructure as of 2025, covering DBMS, WAS (PaaS), and PC based on the revised standards for critical information and communications infrastructure in the second half of 2025. Additionally, penetration testing explained according to the standards revised in the second half of 2025, including mobile penetration testing. Expect skill improvement through the transfer of know-how, along with fast and accurate inspection methods and remediation plans.

13 learners are taking this course

Level Intermediate

Course period 6 months

Penetration Testing
Penetration Testing
ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security
security training
security training
Penetration Testing
Penetration Testing
ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security
security training
security training

What you will gain after the course

  • Providing standards infused with expert know-how, featuring the latest versions by type in accordance with the 2025 updated Electronic Financial Infrastructure standards and the 2025 revised Critical Information and Communication Infrastructure standards.

  • From penetration testing based on the 2025 revised standards for Critical Information and Communication Infrastructure to mobile penetration testing.

💻 [2025 Latest Standards: Comprehensive Vulnerability Analysis and Penetration Testing Training] (No Audio)

📅 Target Audience: Information security officers, electronic financial infrastructure operators, critical information and communications infrastructure managers, DBMS/WAS/PC management experts

🔍 Training Overview:
Based on the 2025 Electronic Financial Infrastructure Vulnerability Analysis and Evaluation Standards and the Revised Major Information and Communications Infrastructure Vulnerability Analysis and Evaluation Standards for the Second Half of 2025, we provide DBMS, WAS(PaaS), and PC risk assessment know-how that can be applied immediately in the field. By systematically sharing fast and accurate evaluation standards that account for failure risks, we minimize errors that may occur during the vulnerability diagnosis process and maximize practical efficiency.

🛠 Educational Features:

  • DBMS·WAS(PaaS)·PC Risk Assessment Practice: Step-by-step learning of major vulnerability types, risk inspection methods, and failure response processes

  • Penetration Testing Methodology Training: Providing latest standards-based penetration testing scenario design, attack path analysis, vulnerability identification, and remediation strategies

  • Sharing Inspection Methodology Know-how: Points easily missed during evaluation and inspection, practical application cases, and tips for rapid response

  • Remediation Training: Immediately applicable remediation methods upon vulnerability discovery, and response priorities by risk level

  • Mobile Penetration Testing Lecture: Hands-on practice with mobile vulnerabilities, attack types, and the latest defense technologies in Android and iOS environments

📌 Educational Benefits:

  • Strengthening practical evaluation capabilities reflecting the latest standards

  • Improvement of risk analysis and response capabilities for each DBMS, WAS, and PC environment

  • Acquire field-applicable know-how throughout the entire process of penetration testing design, inspection, and remediation.

  • Establishing a comprehensive security response system that includes mobile environments

💡 Key Training Points:

  • Essential for those in charge of security inspections for electronic finance and major information and communication infrastructure.

  • Learn both the revised evaluation criteria and actual field application cases simultaneously.

  • Strengthen organizational security by establishing a rapid and accurate response system in the event of an incident

🎯 Core Curriculum at a Glance:
1⃣ DBMS/WAS/PC Risk Assessment Know-how
2⃣ Penetration Testing Methodology Training & Inspection Strategy
3⃣ Hands-on Remediation Practice
4⃣ Mobile Penetration Testing Lecture

🔗 Register now and gain practical security skills aligned with the latest 2025 standards!

Recommended for
these people

Who is this course right for?

  • At least 5 years of experience in information security

  • At least 1 year of experience in penetration testing

Hello
This is jueygrace

204

Learners

17

Reviews

4.2

Rating

26

Courses

Security Consulting

Curriculum

All

5 lectures ∙ (52min)

Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

jueygrace's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!

$17.60