AWS 클라우드 서비스 인프라 구축 이해와 해킹, 보안
보안프로젝트
IT 서비스가 클라우드 환경으로 빠르게 전환되고 있습니다. 아마존 AWS 클라우드 환경 보안을 위해 알아야 할 기본적인 가상 인프라 구축부터, 각 영역별 보안 위협 모니터링, 취약점 진단 관점을 통해 보안 실무를 배우게 됩니다.
Basic
AWS, 모의해킹
The most important part of the security response and security control work is to monitor and remove potential security threats to your company/customer services in advance. Let’s establish and utilize a security threat monitoring plan using the OSINT search service Criminal IP.

IT Security OSINT Search Utilization
Criminal IP Utilization
Security Threat Monitoring
Security response, more powerful with open search service!
This lecture covers security monitoring using Open Intelligence Service (OSINT) representative Criminal IP and cases of external security threats.
Many security hacking incidents are occurring using Open Source Intelligence (OSINT) search services . The use of open search services is increasing in mock hacking, breach response, and regular security activities. Regular monitoring is essential for unnecessary port access. If services connected to open ports have inadequate access control, default account settings, or inadequate management of the administrator page, criminals can pose a serious security threat to internal systems.
This lecture covers how to proactively monitor and eliminate potential security threats from an offensive perspective before an attack occurs. Let's learn how to quickly respond to security threats using the Criminal IP search service, a leading OSINT service.
Open source intelligence (OSINT) refers to information obtained from publicly available sources . It is also called open source intelligence, public information, public information, open source information, or open source intelligence.
The types of intelligence collected by national intelligence agencies like the CIA and private intelligence companies include human intelligence (HUMINT), signals intelligence (SIGINT), imagery intelligence (IMINT), measured intelligence (MASINT), open-source intelligence (OSINT), and technical intelligence (TECHINT). While the CIA originally focused on HUMINT, the importance of TECHINT has grown significantly with the advancement of computers. (Wikipedia)
This lecture will cover the Criminal IP search service, a leading OSINT service. Unlike other OSINT search services, this service was developed in Korea and offers detailed monitoring capabilities, including Korean language searches, malware-infected sites, and phishing site searches. We will also cover various recent security threats arising from the use of this search service.
📢 Please check before learning!
This practical guide explains the various functions of OSINT search services, a major activity in security threat monitoring.
You can also indirectly explore the security integration monitoring capabilities by including the enterprise ASM service available for use in your enterprise.
You can use various services provided by Criminal IP to identify security threats caused by unnecessary ports and insufficient access control.
History
published books
Who is this course right for?
For those considering security monitoring using OSINT search in practice
Anyone who wants to utilize OSINT's representative Criminal IP
Anyone who wants to monitor unnecessary ports and vulnerabilities for security threats
Need to know before starting?
IT Security Basics
101,697
Learners
3,143
Reviews
445
Answers
4.7
Rating
67
Courses
보안프로젝트 ( www.boanproject.com )는 IT보안, 빅데이터, 머신러닝, IoT 등 다양한 분야의 온라인 강의, 그룹 강의를 진행하고 있습니다.
All
22 lectures ∙ (3hr 30min)
All
17 reviews
4.9
17 reviews
Reviews 1
∙
Average Rating 5.0
Reviews 8
∙
Average Rating 5.0
Reviews 2
∙
Average Rating 5.0
Reviews 609
∙
Average Rating 4.9
Reviews 11
∙
Average Rating 5.0
Free
Check out other courses by the instructor!