AWS 클라우드 서비스 인프라 구축 이해와 해킹, 보안
보안프로젝트
IT 서비스가 클라우드 환경으로 빠르게 전환되고 있습니다. 아마존 AWS 클라우드 환경 보안을 위해 알아야 할 기본적인 가상 인프라 구축부터, 각 영역별 보안 위협 모니터링, 취약점 진단 관점을 통해 보안 실무를 배우게 됩니다.
초급
AWS, 모의해킹
Through the lectures, the Protostar tutorial helps you understand the principles of the system attack techniques through several example programs.

Reverse engineering analysis
Hacking Contest Problem Solving
Reversing
System Hacking
- You can understand the principles of these system attack techniques through several example programs.
Security Project - Frontline CTO
- General Manager of Security Project Online Lectures
- Multi-campus IT external expert instructor (Kubernetes, bug hunting, etc.)
- Caseild Junior external professional instructor
- Hansae Cyber, Dongil Industrial High School Cyber Guardians external expert instructor
- Establishment and development of hacking defense system
- Long-term course on "Breach Incident Analysis and ELK Integrated Log System Construction"
- Long-term course on "Data Analysis Utilization"
- Long-term course on "malware analysis by type"
- Author of "Complete Practice of Web Mock Hacking Using Vibox"
- Online lecture on building and utilizing the ELK integrated log system for IT professionals
- Windows Application Vulnerability Analysis Online Course
- Over 30 lectures, including "Introduction to Network Packet Analysis and Malware Sample Analysis"
Who is this course right for?
For those who want to understand Linux reverse analysis
Anyone preparing for a hacking competition
Anyone who wants to learn reverse analysis
Need to know before starting?
IT Security Knowledge
C language
101,833
Learners
3,168
Reviews
445
Answers
4.7
Rating
67
Courses
보안프로젝트 ( www.boanproject.com )는 IT보안, 빅데이터, 머신러닝, IoT 등 다양한 분야의 온라인 강의, 그룹 강의를 진행하고 있습니다.
All
31 lectures ∙ (8hr 43min)
All
26 reviews
4.8
26 reviews
Reviews 4
∙
Average Rating 5.0
Reviews 11
∙
Average Rating 4.4
Reviews 1
∙
Average Rating 5.0
Reviews 1
∙
Average Rating 5.0
$77.00
Check out other courses by the instructor!
Explore other courses in the same field!