강의

멘토링

로드맵

NEW
Security & Network

/

Computer Security

(Personal Information/Information Security) Only the Essential Security Included! How to Protect Your Entire Company (2025 ver.)

This course covers the importance of information security and personal data protection, providing systematic learning from essential knowledge needed in practice to the latest security issues. Based on the practical experience and expertise of personal data protection specialist instructor Jo Ah-young, it provides realistic education with a sense of field experience.

1 learners are taking this course

  • skmns
개인정보
정보보안
보안교육
법정의무
security training

What you will learn!

  • Theoretical Concepts and Practical Guide to Personal Information Protection

  • Latest Security Issues and Regulatory Trends

  • Personal Information Protection Legal Mandatory Training

Essential Guide for Strengthening Practical Skills in Personal Information Protection and Information Security

  • Lectures reflecting the latest security trends for 2025


    Reflecting the latest security trends, emerging threats and dark patterns in the AI era,

    And it covers the latest regulatory trends in detail, including amendments to the Personal Information Protection Act.


  • Integrated Security Training for All Job Functions


    Understanding the importance of personal information protection and information security, and the various

    Enhance understanding of information security threats so that all employees can immediately apply this knowledge in their practical work

    Learn security strategies.



💡A sure way to protect your company! Information security starts with me!

As information threats spread beyond individuals to entire industries, it is essential for each member to understand the various information security threats they encounter in their daily lives and work. This goes beyond simple individual harm and directly connects to corporate security systems, making it important for all employees to collaborate in strengthening information protection capabilities. In particular, it is crucial to minimize security vulnerabilities that may arise during information sharing and collaboration processes between departments, and to ensure that all members have the same level of security awareness.

Information security is not limited to specific job roles, but has become an essential competency for all working professionals. This course helps all members, including managers, developers, marketers, sales staff, and general office workers, to develop and practice personal information protection and information security awareness.

Following security protocols according to each person's role is the first step in preventing data breaches and cyber attacks. This training helps all employees understand the fundamental principles of information security and effectively apply them to daily life and work, strengthening information security across all job functions and contributing to protecting the company's entire information assets and solidifying safety.

You'll learn this content

Direct instruction by CEO Jo A-young, a privacy protection consulting expert

Currently serves as the CEO of Onapeople and has performed information security consulting for a long period. Holds a Master's degree in Information Management from Korea Advanced Institute of Science and Technology (KAIST) and is the co-author of 'Understanding the Concepts and Systems of Personal Information Protection (Co-authored, 2023)'.

We summarize cases of accidents where files containing personal information were sent due to email attachment mistakes.

This explains a situation where a safety education notification email was sent with an incorrectly attached file containing students' department, student ID, name, grade level, email, etc., and the subsequent measures taken (requesting recipients to delete the file, informing about legal issues in case of data breach).

We summarize the typical attack flow where malware infiltrates asymptomatically, then proceeds through covert execution, internal propagation, and information exfiltration.

Initially, it infiltrates without signs of infection, concealing and executing processes while searching for high-value target PCs that can access personal information databases. It then sequentially spreads to multiple departments, stealing and exfiltrating information from privileged PCs, making EDR/behavior-based detection and privilege minimization·network segmentation necessary.

Personal information is classified into general, sensitive, and pseudonymized categories, with unique identification information managed separately.

It is classified into general personal information, unique identification information such as resident registration numbers, passport numbers, driver's license numbers, and foreigner registration numbers, sensitive information such as health, medical treatment, disability grade, religion, and political orientation, and pseudonymized information that can identify individuals when combined.

We organize response pathways for personal information breach incidents through reporting, dispute mediation, and civil litigation

Through the KISA Report Center, you can request system improvement recommendations, administrative sanctions, and criminal investigations, and the Dispute Mediation Committee can provide system improvement and damage compensation recommendations. Since you can separately file a civil lawsuit to claim damages, we review these options in stages based on the scale of the incident and degree of responsibility.

Summarizing AI limitations and countermeasures.

Limitations include opacity, bias, errors and hallucinations, unclear accountability, and the need for continuous learning. These are addressed through enhanced explainability, data quality and security, fact verification, and clarification of ethical standards and responsibilities.

Recommended for
these people

Who is this course right for?

  • Members responsible for personal information processing

  • Team members who are working with data

Hello
This is

1,478

Learners

195

Reviews

4.7

Rating

49

Courses

미래를 여는 No.1 러닝 파트너

오랜 경험과 혁신이 만나
AI와 DT 시대에 꼭 필요한
최첨단 학습 콘텐츠를 만듭니다.

배움의 문을 활짝 열고,
나만의 성장 스토리를 시작하세요.
함께 나아갈 준비가 되어 있습니다.

Curriculum

All

12 lectures ∙ (2hr 3min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

Limited time deal

$11,000.00

50%

$17.60

skmns's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!