강의

멘토링

커뮤니티

Security & Network

/

Computer Security

Management and Physical Risk Assessment for Critical Information and Communication Infrastructure (2026 Version)

Developed to submit annual performance records, including the establishment of information security regulations and the preparation of various activity evidence, by applying domestic and international certification standards for Information Security Management Systems (ISMS) and internal/external audit criteria to the revised Risk Assessment standards for the Management and Physical sectors of Critical Information and Communication Infrastructure in the second half of 2025. The plan is designed to prepare for changes in the external environment (AI, etc.), internal environment (new systems and changes in employees/external staff), and new evaluation indicators and legal amendments. It aims to establish activity plans to advance information security levels compared to the previous year. Specifically, it involves objectively and meticulously inspecting various activities to strengthen accident prevention systems—such as personal information leaks caused by hacking—and establishing plans for the headquarters to supervise all departments and ensure the secure management of contractors. This includes operating DevSecOps systems following the introduction of AI systems and implementing Privacy by Design (PbD) adequacy review frameworks. The execution is based on expanding monitoring and periodic inspection report areas, external disclosure areas, data linkage system inspections (API, MyData, etc.), establishing network separation improvement plans according to N2SF, and advancing Zero Trust implementation. *Possessing over 150 references for establishing and applying the world's first and highest-level information security and personal information protection activities and system enhancement plans.

10 learners are taking this course

Level Intermediate

Course period 6 months

  • jueygrace
정보보호
정보보호
정보보안
정보보안
정보보안기사
정보보안기사
cppg(개인정보관리사)
cppg(개인정보관리사)
개인정보
개인정보
Penetration Testing
Penetration Testing
ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security
security training
security training
정보보호
정보보호
정보보안
정보보안
정보보안기사
정보보안기사
cppg(개인정보관리사)
cppg(개인정보관리사)
개인정보
개인정보
Penetration Testing
Penetration Testing
ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security
security training
security training

What you will gain after the course

  • Establish a world-class information security management system based on the 2025 revised standards for Critical Information and Communications Infrastructure and derive improvement plans through risk assessments.

  • Contributed to establishing world-class physical security systems (FACE, fingerprint, card, CCTV, disaster prevention facilities, etc.) by applying implementation methods, risk assessments, and improvement plans based on the 2025 Critical Information and Communication Infrastructure revision standards.

📌 2025 Second Half Training on Risk Assessment and Improvement Plan Derivation for Administrative and Physical Sectors of Critical Information and Communications Infrastructure

This training is designed with a focus on the Administrative and Physical sectors of Critical Information and Communication Infrastructure revised in the second half of 2025, aiming to enhance the job performance of information security officers and establish improvement plans. As a practical-oriented program covering the establishment of information security management systems, preparation of annual activity results, risk assessment, and derivation of improvement plans, it provides an opportunity to further advance the level of information protection for each institution and enterprise.

🛡 Training Coverage and Learning Points

1⃣ Information Security Management System Certification and Audit-based TrainingĐào tạo dựa trên chứng nhận và kiểm soát hệ thống quản lý an toàn thông tin

  • By applying domestic and international information security certification standards (ISMS-P, ISO27001, etc.) and internal/external audit standards, we provide practical guidance on establishing information security regulations and securing evidence.

  • You can learn through case studies how to record annual information security activity results, prepare inspection logs, and develop audit response strategies.

2⃣ Strategies for Responding to Internal and External Environmental Changes

  • We provide methods for establishing activity plans that reflect changes in the internal environment, such as new systems and employee turnover, as well as the rapidly changing external environment, including AI.

  • You will learn strategies for designing an information security level advancement plan through practice-oriented training to prepare for legislative amendments and the introduction of new evaluation indicators.

3⃣ Strengthening Incident Prevention Systems and Central Management Supervision

  • We provide training on how to establish a detailed inspection system to prevent security incidents such as hacking and personal information leaks, as well as how to establish plans for secure management and supervision from the central headquarters to all departments and contractors.

  • We provide practical guidance on the latest security operation cases, such as DevSecOps operations when establishing new AI systems and the operation of Privacy by Design (PbD) adequacy review frameworks.

4⃣ Responding to Expanding Monitoring and Inspection Areas

  • You will learn case-based methods for writing periodic inspection reports, inspecting externally exposed areas, and inspecting data linkage systems such as APIs and MyData.

  • We provide the latest security strategies, including establishing network separation improvement plans based on N2SF (Next-Generation Network Security Framework) and advancing Zero Trust implementation, along with practical application cases.

💡 Key Features of the Training

  • Practical-focused: Case-based training to enhance the professional capabilities of information security officers

  • thoughtful 1) Reflecting Latest Trends: Application of the latest security environments such as AI, DevSecOps, and Zero Trust.​Substitute "Reflecting Latest Trends" with "Incorporating Latest Trends" if preferred, but "Reflecting" is a standard translation. Let's go with "Reflecting". Final check: Reflecting Latest Trends: Application of the latest security environments such as AI, DevSecOps, and Zero Trust. Wait, "Applying the latest security environments" or "Application of..." "Applying the latest security environments" sounds more natural for a feature list. Reflecting Latest Trends: Applying the latest security environments including AI, DevSecOps, and Zero Trust. Let's stick to a direct yet natural flow. Reflecting Latest Trends: Applying the latest security environments such as AI, DevSecOps, and Zero Trust.Reflecting Latest Trends: Applying the latest security environments such as AI, DevSecOps, and Zero Trust.

  • Comprehensive Risk Management: Deriving comprehensive risk assessments and improvement plans covering both administrative and physical sectors: Đánh giá rủi ro tổng hợp bao gồm cả lĩnh vực quản lý và vật lý, đồng thời đưa ra kế hoạch cải thiện. turnover_secret_key_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001_001

📊 Training participants can acquire competencies that are immediately applicable to practical work, such as strengthening the ability to establish information security management systems, understanding laws, regulations, and evaluation criteria, and designing incident prevention and central management supervision systems.

Recommended for
these people

Who is this course right for?

  • Over 10 years of experience in information security

  • Over 15 years of experience in fields other than information security

Hello
This is

177

Learners

12

Reviews

4.3

Rating

26

Courses

보안컨설팅

Curriculum

All

3 lectures ∙ (1hr 1min)

Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

$17.60

jueygrace's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!