강의

멘토링

커뮤니티

Security & Network

/

Computer Security

Complete Conquest of Electronic Financial Supervisory Regulations: The Expert's Choice for Financial Security

The core content of the Electronic Financial Supervision Regulations has been well-organized and infused with practical experience. Understand complex regulations clearly and grow as a financial security expert. The main content of the Electronic Financial Supervision Regulations revised on February 5, 2025 is also included in the lecture. Please refer to it.

(4.9) 7 reviews

64 learners

Level Basic

Course period Unlimited

  • zeroday
Engineer information security
Engineer information security
security training
security training
Engineer information security
Engineer information security
security training
security training

What you will gain after the course

  • Understanding the Key Security Controls Required for Electronic Financial Transactions

  • How to design an internal control system to comply with director regulations

  • Financial Supervisory Service Inspection Response Strategy

  • Regulatory Application Cases According to the Latest Financial Regulatory Trends and Technological Changes

Electronic Financial Supervision Regulations, this is what we learn

(Updated to include the February 2025 amendments to the Electronic Financial Supervision Regulations.))

1. Electronic financial auxiliary service provider, electronic financial accident liability insurance, personnel, organization and budget

The Electronic Financial Supervision Regulations contain detailed provisions delegated by Article 21 of the Electronic Financial Transactions Act regarding safety and security obligations, and are currently the core framework for financial companies' security systems. This section explains the scope of electronic financial auxiliary service providers, insurance coverage, CISO designation, personnel, organization, and budget requirements.

2. Terminal, Computer Data, and Information Processing System Protection Measures

In this lecture, you can learn how the Electronic Financial Supervision Regulations establish protections for terminals, electronic data, and information processing systems to ensure security. This can be considered a core part of financial security.

3. Cloud Service Usage Procedures, Hacking Prevention Measures

This explains the procedures for using cloud services and financial network separation, which are currently issues in financial security. By taking this course, you will gain a deep understanding of why cloud services and network separation are becoming problematic.

4. Malware infection prevention measures, public web server management, information technology department planning document, emergency response training

This explains malware infection prevention measures and public web server management, which are among the key measures for ensuring security. It also covers information technology sector internal controls such as information technology sector plans, information security education, and emergency response training, which is becoming increasingly important.

5. Segregation of duties, computerized ledger, programs, batch processing controls, key management and password management

I will discuss the remaining control areas that fall under information technology internal controls. You can learn how to manage electronic ledgers, how to configure CI/CD Pipeline according to electronic financial supervision regulations, how to manage encryption key management, and more.

6. Electronic financial infrastructure vulnerability inspection, external orders, electronic financial incident reporting

This explains the vulnerability analysis and evaluation of electronic financial infrastructure as stipulated in the Electronic Financial Transactions Act, various standards and control measures for external orders, and finally the practical aspects of electronic financial incident reporting.

Practice Environment

  • Operating System and Version (OS): OS types and versions such as Windows, macOS, Linux, Ubuntu, Android, iOS, etc.

  • Tools Used: Software/hardware versions and billing plans required for the practice, whether virtual machines are used, etc.

  • PC Specifications: CPU, memory, disk, graphics card, and other recommended specifications for running programs

Learning Materials

  • Types of learning materials provided (PPT, cloud links, text, source code, assets, programs, example problems, etc.)

  • Volume and capacity, characteristics and precautions for other learning materials, etc.

Prerequisites and Important Notes

  • Whether essential prerequisite knowledge is required considering learning difficulty

  • Course video quality (audio/video quality) and other content directly related to taking the course, as well as recommended learning methods

  • Questions/Answers and Future Update Related Content

  • Notice Regarding Copyright of Lectures and Learning Materials

Recommended for
these people

Who is this course right for?

  • Security experts who want to fully understand financial security compliance

  • Developers and security engineers who want to design the security of electronic financial systems

  • Security practitioners who want to understand the latest financial regulations and technology trends and expand their careers

  • Security experts who want to transfer to a financial company or electronic financial business

Hello
This is

122

Learners

18

Reviews

2

Answers

4.9

Rating

2

Courses

I am currently serving as the CISO of a financial institution. I have consistently worked as a security professional within the security teams of financial companies and electronic financial service providers, primarily focusing on the interpretation and application of legal regulations related to information security and financial compliance. I manage various security certifications, including the Information Security Management System (ISMS-P), international standards (ISO 27001/27701/27017/27018), and PCI-DSS, while striving to balance the requirements of financial regulatory authorities with the company's strategic interests.

I graduated with a Master's degree in Information Security and am currently conducting academic research to resolve information security issues faced by financial companies. Based on my practical field experience and academic knowledge, I designed this course to help provide a deep understanding and practical application of the Electronic Financial Transactions Act and the Electronic Financial Supervisory Regulations.

I hope this will be helpful to many people.

Curriculum

All

9 lectures ∙ (5hr 45min)

Published: 
Last updated: 

Reviews

All

7 reviews

4.9

7 reviews

  • vltlswk2460님의 프로필 이미지
    vltlswk2460

    Reviews 1

    Average Rating 5.0

    5

    67% enrolled

    • kjlee5117님의 프로필 이미지
      kjlee5117

      Reviews 3

      Average Rating 5.0

      5

      100% enrolled

      • thyoo1852님의 프로필 이미지
        thyoo1852

        Reviews 3

        Average Rating 5.0

        5

        67% enrolled

        • jongmyunglee8349님의 프로필 이미지
          jongmyunglee8349

          Reviews 3

          Average Rating 4.7

          4

          67% enrolled

          • thxwelchs0914님의 프로필 이미지
            thxwelchs0914

            Reviews 1

            Average Rating 5.0

            5

            67% enrolled

            $26.40

            zeroday's other courses

            Check out other courses by the instructor!

            Similar courses

            Explore other courses in the same field!