강의

멘토링

커뮤니티

NEW
Security & Network

/

Computer Security

Penetration Testing Lecture 2 (Practice Environment 2 provided)

With hacking incidents occurring continuously from 2025 to the present, the addition of penetration testing to ISMS-P certification has been finalized. As the work-life balance and importance of penetration testers rise, there is a need for an environment where they can grow. Unlike other fields of information security, penetration testers can only practice and build portfolios when a proper environment is provided. Unlike the first penetration testing environment which simply provided a practice lab, this second environment allows you to build the website yourself, complete with more diverse admin functions and even actual payment features! Penetration testing scenarios for achieving practical goals have been fully implemented! ~Hone your skills according to the 2026 Major Information and Communication Infrastructure penetration testing items and evolve into one of the top penetration testers in the country!~

1 learners are taking this course

Level Intermediate

Course period 6 months

  • jueygrace
실습 중심
실습 중심
자격증
자격증
시험
시험
토이프로젝트
토이프로젝트
협업말센스
협업말센스
Engineer information security
Engineer information security
CPPG
CPPG
ISMS-P
ISMS-P
security training
security training
Industrial Security Exper
Industrial Security Exper
실습 중심
실습 중심
자격증
자격증
시험
시험
토이프로젝트
토이프로젝트
협업말센스
협업말센스
Engineer information security
Engineer information security
CPPG
CPPG
ISMS-P
ISMS-P
security training
security training
Industrial Security Exper
Industrial Security Exper

What you will gain after the course

  • Securing a penetration testing practice site

  • Acquiring penetration testing results and learning how to build penetration testing sites

🔐 Practical Penetration Testing Master Class

“Practical penetration testing learned in a real hacking environment, not just theory”


🚀 Course Introduction

This course is not just a simple lecture on vulnerability theory.
Targeting a system identical to actual service structures within a custom-built penetration testing website environment,
👉 from installation → analysis → attack → inspection → to report review,
it is a practical penetration testing training course where you experience the actual security professional process firsthand.

Students will use the provided exclusive installation file to directly build a penetration testing site based on an actual service structure that includes:
✔️ Payment functions
✔️ Admin pages
✔️ Member management systems
✔️ Database structures
✔️ Environments with partial secure coding applied


🧩 Core Course Components

🏗️ Building a Real-World Environment

  • 🔧 Provision of an automatic installation file for a dedicated penetration testing website

  • 🗄️ Includes DB structure + admin system

  • 💳 Implementation of actual payment process structures

  • 🧑‍💼 Implementation of admin page permission structures

  • 🔐 Configuration of environments with partial secure coding applied

👉 Not just a "practice demo site"
👉 A penetration testing environment with the exact same structure as a real-world service


🧑‍💻 Individual practice-oriented sessions

  • 👤 Establishment of independent environments for each student

  • 🎯 Design your own individual attack scenarios

  • 🧪 Combining automated tools + manual analysis

  • 🛠️ Hands-on learning based on attack techniques

👉 Not just hacking demonstrated by the instructor
👉 A structure where students perform the hacking themselves


📜 Reflecting 2026 Practical Standards

  • 📘 Designed with reference to the 2026 Critical Information and Communication Infrastructure Penetration Testing Standards

  • 📋 Reflecting actual inspection process structures

  • 🧾 Scenario configuration based on practical inspection methods

  • 🏛️ Same inspection structure applied to public institutions/corporations

👉 A combined structure of practical standards and educational environments


🎯 Key Curriculum Points

🧠 Vulnerability Analysis

  • 🔍 Input Validation Vulnerabilities

  • 🔓 Authentication/Authorization Structure Vulnerabilities

  • 🗃️ DB Integration Structure Analysis

  • 🧬 Session Structure Analysis

  • 🔐 Encryption/Security Logic Analysis


💳 Practical Function-Based Penetration Testing

  • 💰 Attempt to change payment amount

  • 🧾 Payment Parameter Manipulation/Forgery

  • 🛒 Payment Logic Bypass Attacks

  • 🧑‍💼 Administrator Privilege Escalation Attack

  • 🧑‍💻 User Privilege Hijacking Scenario

👉 Not just simple vulnerability attacks
👉 “Service Function-Based Hacking” centered structure


📊 Final Course Structure

🔥 Final Hands-on Project

  • 💳 Payment amount manipulation scenario

  • 🧑‍💼 Admin Function Compromise Scenario

  • 🧾 Data Manipulation Scenarios

  • 🧠 Designing Attack Logic Structures

  • 📋 Creating a Checklist for Inspection

  • 📑 Final Report Review

  • 🎯 Attack Success/Failure Analysis

  • 📈 Designing Security Improvement Strategies

👉 Review based on the structure of actual corporate penetration testing result reports


💡 Why this course is special

✅ Practice-oriented structure
✅ Environment based on real-world service architecture
✅ Standards-based inspection system
✅ Learning inspection frameworks, not just simple practice
✅ Practical structure designed for the field, not just for education
✅ Parallel approach of automation + manual analysis
✅ Full-process training including result reviews


🎓 Recommended for the following people

👨‍💻 Developers who want to grow into security practitioners
🛡️ Beginners in information security
🧑‍💼 Job seekers preparing for security roles
🏢 Corporate security managers
📚 Learners who want practical, hands-on training
🔍 Those who want to learn penetration testing structurally


✨ One-line Summary

“This is not a course about learning how to use tools, but a course where you
understand the actual structure of hacking and execute real-world inspection processes.

Recommended for
these people

Who is this course right for?

  • Information security beginners, including penetration testers

  • Experienced professional with penetration testing experience

Need to know before starting?

  • Attended the first lecture on penetration testing

  • Attended the first lecture on penetration testing

Hello
This is

177

Learners

12

Reviews

4.3

Rating

26

Courses

보안컨설팅

Curriculum

All

4 lectures ∙ (7min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

Limited time deal

$15,400.00

30%

$17.60

jueygrace's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!