inflearn logo
inflearn logo

Management and Physical Risk Assessment for Critical Information and Communication Infrastructure (2026 Version)

Developed to submit annual performance records, including the establishment of information security regulations and the preparation of various activity evidence, by applying domestic and international certification standards for Information Security Management Systems (ISMS) and internal/external audit criteria to the revised Risk Assessment standards for the Management and Physical sectors of Critical Information and Communication Infrastructure in the second half of 2025. The plan is designed to prepare for changes in the external environment (AI, etc.), internal environment (new systems and changes in employees/external staff), and new evaluation indicators and legal amendments. It aims to establish activity plans to advance information security levels compared to the previous year. Specifically, it involves objectively and meticulously inspecting various activities to strengthen accident prevention systems—such as personal information leaks caused by hacking—and establishing plans for the headquarters to supervise all departments and ensure the secure management of contractors. This includes operating DevSecOps systems following the introduction of AI systems and implementing Privacy by Design (PbD) adequacy review frameworks. The execution is based on expanding monitoring and periodic inspection report areas, external disclosure areas, data linkage system inspections (API, MyData, etc.), establishing network separation improvement plans according to N2SF, and advancing Zero Trust implementation. *Possessing over 150 references for establishing and applying the world's first and highest-level information security and personal information protection activities and system enhancement plans.

10 learners are taking this course

Level Intermediate

Course period 6 months

Penetration Testing
Penetration Testing
ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security
security training
security training
Penetration Testing
Penetration Testing
ISMS-P
ISMS-P
CPPG
CPPG
Engineer information security
Engineer information security
security training
security training
날개 달린 동전

Recommend Course to grow and earn commission!

날개 달린 동전

Marketing Partners

Recommend Course to grow and earn commission!

What you will gain after the course

  • Establish a world-class information security management system based on the 2025 revised standards for Critical Information and Communications Infrastructure and derive improvement plans through risk assessments.

  • Contributed to establishing world-class physical security systems (FACE, fingerprint, card, CCTV, disaster prevention facilities, etc.) by applying implementation methods, risk assessments, and improvement plans based on the 2025 Critical Information and Communication Infrastructure revision standards.

📌 2025 Second Half Major Information and Communication Infrastructure Administrative/Physical Sector Risk Assessment and Improvement Plan Development Training (No Audio)

This training is designed to focus on the administrative and physical sectors of critical information and communications infrastructure revised for the second half of 2025, with the goal of improving the performance of information security personnel and establishing improvement plans. As a practical training program covering the establishment of information security management systems, preparation of annual activity results, risk assessment, and derivation of improvement plans, it provides an opportunity to further advance the level of information protection for each organization and enterprise.

🛡 Included Training Content & Learning Points

1⃣ Information Security Management System Certification and Audit-Based Training

  • By applying domestic and international information security certification standards (ISMS-P, ISO27001, etc.) and internal/external audit standards, we provide practical guidance on establishing information security regulations and securing evidence.

  • You can learn through case studies how to record annual information security activity results, prepare inspection details, and develop audit response strategies.

2⃣ Strategies for Responding to Internal and External Environmental Changes

  • We provide methods for establishing activity plans that reflect internal environment changes, such as new systems and employee turnover, as well as rapidly changing external environments like AI.

  • You will learn through practice-oriented strategies for designing information security level advancement plans in preparation for legislative amendments and the introduction of new evaluation indicators.

3⃣ Strengthening Incident Prevention Systems and Central Management & Supervision

  • We provide training on how to establish a detailed inspection system to prevent security incidents such as hacking and personal information leaks, as well as how to establish plans for secure management and supervision from the headquarters across all departments and outsourced vendors.

  • We provide practical guidance on the latest security operation cases, such as DevSecOps operations for new AI system implementations and the operation of Privacy by Design (PbD) adequacy review systems.

4⃣ Responding to Expanding Monitoring and Inspection Areas

  • You will learn case-based methods for preparing regular inspection reports, inspecting externally exposed areas, and inspecting data linkage systems such as APIs and MyData.

  • We provide the latest security strategies, such as establishing network separation improvement plans according to N2SF (Next-Generation Network Security Framework) and advancing Zero Trust implementation, along with practical application cases.

💡 Key Features of the Training

  • Practical-focused: Case-based training to strengthen the professional capabilities of information security officers

  • Reflecting Latest Trends: Application of the latest security environments such as AI, DevSecOps, and Zero Trust

  • Comprehensive Risk Management: Deriving comprehensive risk assessments and improvement plans covering both administrative and physical sectors

📊 Training participants can acquire practical skills that are immediately applicable, such as strengthening information security management system establishment capabilities, understanding laws, regulations, and evaluation standards, and designing incident prevention and central management supervision systems.

Recommended for
these people

Who is this course right for?

  • Over 10 years of experience in information security

  • Over 15 years of experience in fields other than information security

Hello
This is jueygrace

189

Learners

13

Reviews

4.2

Rating

26

Courses

Security Consulting

Curriculum

All

3 lectures ∙ (1hr 1min)

Published: 
Last updated: 

Reviews

Not enough reviews.
Please write a valuable review that helps everyone!

jueygrace's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!

$17.60