inflearn logo

Risk Assessment for Critical Information and Communications Infrastructure 2026 Version and Latest Server Versions

These are the standards for vulnerability analysis and risk assessment following the revision of the Critical Information and Communication Infrastructure standards for the second half of 2025. Additionally, this information includes an analysis of kernels and various changes based on the latest versions of Unix and Windows OS. By applying default values, you can achieve rapid risk assessment and account for various operational risks. You may use this for study purposes or for data acquisition during follow-ups to reach the highest domestic standards through prompt action.

7 learners are taking this course

Level Intermediate

Course period 6 months

Penetration Testing
Penetration Testing
System Hacking
System Hacking
ISMS-P
ISMS-P
Engineer information security
Engineer information security
security training
security training
Penetration Testing
Penetration Testing
System Hacking
System Hacking
ISMS-P
ISMS-P
Engineer information security
Engineer information security
security training
security training

What you will gain after the course

  • Derive improvement plans through fast and accurate risk assessments using materials condensed with expertise on the latest RHEL 9 Unix OS.

  • Derived from condensed expertise on the latest Windows Server 2022 OS, this material enables fast and accurate risk assessments to develop effective improvement plans.

💡 Key changes that security managers must know for the second half of 2025!(No Audio)
As the Vulnerability Analysis and Evaluation Standards for Critical Information and Communications Infrastructure have been newly revised, this lecture provides Risk Evaluation Data that can be immediately applied in the field and summarizes the latest security issues at a glance.

🔐 The first step to protecting secure infrastructure
Security regulations evolve every year, and the revision for the second half of 2025, in particular, reflects the latest changes in operating systems and service environments, containing many essential points that security managers must be familiar with. In this course, we will highlight the key points of the revised standards through case studies and provide know-how that can be directly applied in actual inspection and evaluation fields, rather than just listing documents.

🗂 Compressed Risk Assessment Data Provided
In this lecture, we provide a core risk assessment dataset accumulated through extensive analysis and evaluation experience to help you identify complex risk factors at a glance. We share practical risk mapping and evaluation prioritization methods used in the field, rather than just simple theory.

Release of follow-up materials for the latest operating systems

  • 💻 RHEL9 (Red Hat Enterprise Linux 9): Differences from previous versions, SELinux and security module updates, and key points for enhanced system management automation

  • 💻 Windows Server 2022: Reinforcement of AD authentication systems, default support for TLS 1.3, enhanced security features for hybrid cloud environments, etc.
    We provide systematically organized follow-up materials on vulnerability assessment points and precautions when applying security patches tailored to these two operating system environments.

📊 Lecture Features

  • Full Reflection of Latest Revision Standards: Commentary focused on the second half of 2025 amendments

  • Practical Data Provided: Direct sharing of Risk Assessment Data

  • Comparison of changes by operating system : RHEL9 vs Windows Server 2022

  • Follow-up document distribution : Immediately applicable in the field even after the lecture

👩‍💻 Target Audience
Information security officers, critical information and communications infrastructure managers/operators, ISMS-P/ISO certification practitioners, internal security audit personnel, etc.

🚀 Expected Benefits
Through this course, participants will achieve three key outcomes: strengthened assessment capabilities based on the latest standards, acquisition of vulnerability response strategies for each operating system, and enhanced efficiency in risk management. It will be a time to go beyond simply 'knowing' and improve practical security execution skills that can be applied immediately in the field.


Register now to secure your leading edge in responding to the latest security changes in 2025!

Recommended for
these people

Who is this course right for?

  • At least 3 years of experience in information security

  • 5+ years of experience in fields other than information security

Hello
This is jueygrace

243

Learners

19

Reviews

4.1

Rating

39

Courses

Security Consulting

Curriculum

All

3 lectures ∙ (30min)

Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

jueygrace's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!

$17.60