๊ฐ•์˜

๋ฉ˜ํ† ๋ง

๋กœ๋“œ๋งต

Inflearn brand logo image

Security Reader(์‹œ๋ฆฌ) : ๋ณด์•ˆ์„ ์ฝ์–ด์ฃผ๋Š” ํšฝ

[์ฃผ์š” ๊ฒฝ๋ ฅ]

(็พ) ๊ธˆ์œตํšŒ์‚ฌ IT๋ณด์•ˆ๋‹ด๋‹น&๊ธฐํš, ๊ณผํ•™๊ธฐ์ˆ ์ •๋ณดํ†ต์‹ ๋ถ€ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ์ „๋ฌธ๋‹จ

ํ•œ๊ตญ์ •๋ณด๊ณตํ•™๊ธฐ์ˆ ์‚ฌํšŒ ๋ธ”๋ฃจ๋ณด๋“œ์œ„์›ํšŒ ์œ„์›์žฅ

๊ธˆ์œต๋ณด์•ˆ์›, ํ•œ๊ตญ์ธํ„ฐ๋„ท์ง„ํฅ์›(KISA) ๊ฐ•์‚ฌ & ๊ต์œก๊ณผ์ • ์ž๋ฌธ์œ„์›

๊ตญ๊ฐ€์ง๋ฌดํ‘œ์ค€(NCS) ์ •๋ณด๋ณดํ˜ธ, ๊ฐœ์ธ์ •๋ณด ๊ฐœ๋ฐœ์œ„์›

์ฐจ์„ธ๋Œ€ ๋ณด์•ˆ๋ฆฌ๋” ์–‘์„ฑ ํ”„๋กœ๊ทธ๋žจ(BoB, Best of Best) ๋ฉ˜ํ† 

๊ณต๊ณต๊ธฐ๊ด€ ์ œ์•ˆํ‰๊ฐ€ ํ‰๊ฐ€์œ„์›(KISA, ํ•œ๊ตญ๋ฌด์—ญ๋ณดํ—˜๊ณต์‚ฌ ๋“ฑ)

IT๊ธฐ์ˆ ์‚ฌํšŒ & ํ•œ๊ตญ์ƒ์‚ฐ์„ฑ๋ณธ๋ถ€(KPC) ๊ฐ•์‚ฌ(์ •๋ณด๋ณด์•ˆ, ๊ธฐ์ˆ ์‚ฌ)

๊ธฐ์—… ๋ณด์•ˆ ๊ฐ•์˜ & ์ž๋ฌธ์œ„์›(SK Telecom, SK ๊ณ„์—ด์‚ฌ, LG CNS, ์—ฐ์„ธ๋Œ€ ๋“ฑ)

(ๅ‰) LG CNS ๋ณด์•ˆ์ปจ์„คํŒ…(๋ชจ์˜ํ•ดํ‚น, ์นจํ•ด์‚ฌ๊ณ ๋Œ€์‘, ๋ณด์•ˆ SI, ISMS ์ปจ์„คํŒ… ๋“ฑ)

ํ•œ๊ตญ์ •๋ณด๊ณตํ•™๊ธฐ์ˆ ์‚ฌํšŒ ์ •์ฑ…๋ฒ•์ œ์œ„์›ํšŒ ์œ„์›

[์ฃผ์š” ์ž๊ฒฉ]

์ •๋ณด๊ด€๋ฆฌ๊ธฐ์ˆ ์‚ฌ, ์ •๋ณด์‹œ์Šคํ…œ ์ˆ˜์„๊ฐ๋ฆฌ์›, ISMS-P ์ธ์ฆ์‹ฌ์‚ฌ์›, ISO27001 ์ธ์ฆ์‹ฌ์‚ฌ์›, AWS Security Specialty, PIA, CISSP, CEH(์œค๋ฆฌ์  ํ•ด์ปค), ์ •๋ณด๋ณด์•ˆ๊ธฐ์‚ฌ, K-Shield(์ตœ์ •์˜ˆ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ์ „๋ฌธ๊ฐ€), CPPG ๋“ฑ ์ •๋ณด๋ณด์•ˆ & IT ๋ถ„์•ผ 20์—ฌ๊ฐœ ์ž๊ฒฉ์ฆ ๋ณด์œ 

[์ฃผ์š” ์ €์ˆ ]

ํ‚ค์›Œ๋“œ๋กœ ์ •๋ฆฌํ•˜๋Š” ์ •๋ณด๋ณด์•ˆ 119 (์ œ์ดํŽ) ์ถœ์‹œ ํ›„ 3๋‹ฌ ๊ฐ„ ๋ณด์•ˆ ๋ถ„์•ผ 1์œ„

์‚๋ฝ€์‚๋ฝ€ ๋ณด์•ˆ 119 (์ œ์ดํŽ) 2023๋…„ ์„ธ์ข…๋„์„œ ํ•™์ˆ ๋ถ€๋ฌธ ์šฐ์ˆ˜๋„์„œ(๊ตญ๋‚ด ์ž‘๊ฐ€ ์ถœ์‹œ ๋ณด์•ˆ ๋„์„œ ์ค‘ ์œ ์ผ)

Open source ๊ธฐ๋ฐ˜ ์ •๋ณด๋ณดํ˜ธ ๊ด€๋ฆฌ์ฒด๊ณ„ ๊ตฌ์ถ• ๊ฐ€์ด๋“œ๋ผ์ธ (์‚ฌ์ด๋ฒ„๋ณด์•ˆ์ „๋ฌธ๋‹จ, KISA)

[์ฃผ์š” ํ”„๋กœ์ ํŠธ]

๊ธˆ์œต(๋ฉ”ํŠธ๋ผ์ดํ”„, ์‹ ์˜์ฆ๊ถŒ), ๊ณต๊ณต(์ธ์ฒœ๊ณตํ•ญ๊ณต์‚ฌ, ๊ตญํ† ๊ตํ†ต๋ถ€), ํ†ต์‹ /์ „์ž(LG U+, LG์ „์ž), ์ œ์กฐ(LGํ™”ํ•™, FILA Korea), ์„œ๋น„์Šค ๊ธฐ์—…(์šฐ์•„ํ•œํ˜•์ œ๋“ค, ์•„์‚ฐ๋ณ‘์›) ๋“ฑ

[์ฃผ์š” ์ˆ˜์ƒ]

์‚ฐ์—…ํ†ต์ƒ์ž์›๋ถ€์žฅ๊ด€ ํ‘œ์ฐฝ(๊ธฐ์ˆ ์‚ฌ์˜ ๋‚  ์œ ๊ณต์ž, 2022.2)

๊ธˆ์œต๊ฐ๋…์›์žฅ ํ‘œ์ฐฝ(๊ธˆ์œต์ •๋ณด๋ณดํ˜ธํ˜‘์˜ํšŒ ์ •๋ณด๋ณดํ˜ธ์œ ๊ณต์ž, 2020.12)

์šฐ์ˆ˜์ƒ(์‚ฌ์ด๋ฒ„๋ณด์•ˆ์ „๋ฌธ๋‹จ ์ •๋ณด๋ณดํ˜ธ ํ™œ๋™ ํ”„๋กœ์ ํŠธ-KISA, 2020.11)

* ๋ธ”๋กœ๊ทธ : https://blog.naver.com/security_reader

* ์œ ํŠœ๋ธŒ : https://www.youtube.com/์‹œ๋ฆฌํด๋ž˜์Šค

* ์ €์„œ: https://book.naver.com/bookdb/book_detail.nhn?bid=16381897

 

 

Courses

Reviews

  • Thumbnail image of the Become a true security expert (the present and future of information security)

    par4486991

    ยท

    Become a true security expert (the present and future of information security)
    Become a true security expert (the present and future of information security)

    This was a lecture where I could learn more details about security.

  • Thumbnail image of the Become a true security expert (the present and future of information security)

    shjeong2549

    ยท

    Become a true security expert (the present and future of information security)
    Become a true security expert (the present and future of information security)
  • Thumbnail image of the Become a true security expert (the present and future of information security)

    kch2078

    ยท

    Become a true security expert (the present and future of information security)
    Become a true security expert (the present and future of information security)
  • Thumbnail image of the Become a true security expert (the present and future of information security)

    mkhong7206

    ยท

    Become a true security expert (the present and future of information security)
    Become a true security expert (the present and future of information security)
  • Thumbnail image of the Become a true security expert (the present and future of information security)

    imjbw21c8556

    ยท

    Become a true security expert (the present and future of information security)
    Become a true security expert (the present and future of information security)