°³°ÀÏ | [1Â÷] 04¿ù 28ÀÏ(¿ù), [2Â÷] 06¿ù 02ÀÏ(¿ù) |
---|---|
¼ö°·á | ¼ö°·áÁ¶È¸ ¢º * 100% ±¹ºñÁö¿ø + ÈÆ·Ã Àå·Á±Ý ÃÖ´ë 41¸¸ 6õ¿ø Áö¿ø |
ÈÆ·Ã±â°£ | ÃÑ 5ÁÖ |
ÀÚ°ÝÁõ ÃëµæÀ» À§ÇÑ ÇÙ½É ºñ¹ý°ú ½Ç¹« ÇöÀå¿¡¼ ¹Ù·Î Ȱ¿ë °¡´ÉÇÑ Point TIP ¸¸À» È®½ÇÇÏ°Ô Àü¼öÇÕ´Ï´Ù.
ÀÚ½ÅÀÇ ½ºÅ³¾÷À» Áõ¸íÇØÁÙ ÀÚ°ÝÁõ ÃëµæÀ¸·Î Ãë¾÷/ÀÌÁ÷ÀÌ ÈξÀ À¯¸®ÇØÁö¸ç,
ÇãÀüÇϰí ÃʶóÇÑ À̷¼¿¡ Çʼö ÇÙ½É ÀÚ°ÝÁõÀÌ ½ÅÀÔ/°æ·Â »ç¿øÀÇ °¡Ä¡¸¦ ³ô¿©ÁÝ´Ï´Ù.
2003³âºÎÅÍ ½ÃÀÛµÈ ´õÁ¶Àº¸¸ÀÇ ¸ÂÃãÇü Ä¿¸®Å§·³À¸·Î
ÀÌ¹Ì Àü±¹ 27¸¸ ÇÕ°Ý»ýÀÌ Àü ºÐ¾ß¿¡¼ ÀÚ°ÝÁõ Ãëµæ¿¡ °ÇÑ ÇпøÀÓÀ» Áõ¸íÇϰí ÀÖ½À´Ï´Ù.
±¹°¡ IT ±â¼ú °æÀï·Â Á¦°í ¹× ±Þº¯ÇÏ´Â Á¤º¸È ȯ°æ¿¡ ´ëóÇϱâ À§ÇØ
½Ç¹« Áß½ÉÀÇ ¾÷¹« ´É·Â µîÀ» Æò°¡ÇÏ´Â ´Ù¾çÇÑ IT ¾÷°è ÀÚ°ÝÁõÀ» ¼Ò°³ÇÕ´Ï´Ù.
Certified Information System Security ProfessionalÀÇ ¾àÀÚ·Î ±¹Á¦°øÀÎÁ¤º¸½Ã½ºÅÛ º¸¾ÈÀü¹®°¡¸¦ ÀǹÌÇϰí,
³¯ÀÌ °¥¼ö·Ï Áö´ÉÈ, ¾Ç¼ºÈ, ±¹Á¦È µÇ°í ÀÖ´Â »çÀ̹ö ¹üÁË ¾ïÁ¦¿Í IT ¹× Á¤º¸ º¸È£ÀÇ Àü¹®¼ºÀ» °®Ãá
»çȸÀû, ±¹°¡Àû °øÀÎÀ¸·Î¼ÀÇ ¿ªÇÒÀ» ¼öÇàÇÕ´Ï´Ù.
½ÃÇè°ú¸ñÀº ½Ã½ºÅÛ Á¢±ÙÅëÁ¦ ¹× ¹æ¹ý·Ð, Åë½Å¸Á ¹× ³×Æ®¿öÅ© º¸¾È, º¸¾È °ü¸®, ¹°¸®Àû º¸¾È, ÀÀ¿ëÇÁ·Î±×·¥ ¹× ½Ã½ºÅÛ °³¹ß, ¾ÏÈ£ÇÐ, º¸¾È ¾ÆÅ°ÅØÃ³ ¹× ¸ðµ¨, ½Ã½ºÅÛ ¿î¿µ º¸¾È, »ç¾÷Áö¼Ó°èȹ ¹× ºñ»óº¹±¸°èȹ, °ü·Ã ¹ý·ü, »ç°íÁ¶»ç±â¹ý, À±¸®
ÃÑ 10°ú¸ñÀ¸·Î ±¸¼ºµÇ¾î ÀÖ½À´Ï´Ù.
½ÃÇèÇÕ°ÝÁ¡¼ö´Â Á¶Á¤Á¡¼ö 700Á¡ ÀÌ»óÀ̸é Çʱâ½ÃÇè ÇÕ°ÝÀÔ´Ï´Ù. ÇÕ°Ý ÈÄ º¸Áõ¼·ù (Endorsement Form)¸¦ Á¦ÃâÇØ¾ßÇϸç,
À̶§ ´Ù¸¥ CISSP ¶Ç´Â Á¤º¸º¸È£½Ã½ºÅÛ °ü¸®Àü¹®°¡ ÀÇ Ãßõ¼µµ µ¿½Ã¿¡ Á¦ÃâÇØ¾ßÇÕ´Ï´Ù
$599 (ÇÑÈ ¾à 66¸¸¿ø)
CISSP | º¸¾È°ú À§Çè °ü¸® ¹× Àڻ꺸¾È | Confidentiality, integrity, and availability concepts |
---|---|---|
Security governance principles | ||
Compliance | ||
Legal and regulatory issues | ||
Professional ethic | ||
Security policies, standards, procedures and guidelines | ||
Information and asset classification | ||
Ownership (e.g. data owners, system owners) | ||
Protect privacy | ||
Appropriate retention | ||
Data security controls | ||
Handling requirements (e.g. markings, labels, storage) | ||
º¸¾È¿£Áö´Ï¾î¸µ, Åë½Å°ú ³×Æ®¿öÅ© º¸¾È | Engineering processes using secure design principles | |
Security models fundamental concepts | ||
Security evaluation models | ||
Security capabilities of information systems | ||
Security architectures, designs, and solution elements vulnerabilities | ||
Web-based systems vulnerabilities | ||
Mobile systems vulnerabilities | ||
Embedded devices and cyber-physical systems vulnerabilities | ||
Cryptography | ||
Site and facility design secure principles | ||
Physical security | ||
Secure network architecture design (e.g. IP & non-IP protocols, segmentation) | ||
Secure network components | ||
Secure communication channels | ||
Network attacks | ||
½Å¿ø Á¢±Ù°ü¸® ¹× º¸¾ÈÆò°¡ | Physical and logical assets control | |
Identification and authentication of people and devices | ||
Identity as a service (e.g. cloud identity) | ||
Third-party identity services (e.g. on-premise) | ||
Access control attacks | ||
Identity and access provisioning lifecycle (e.g. provisioning review) | ||
Assessment and test strategies | ||
Security process data (e.g. management and operational controls) | ||
Security control testing | ||
Test outputs (e.g. automated, manual) | ||
Security architectures vulnerabilities | ||
¿î¿µº¸¾È | Investigations support and requirements | |
Logging and monitoring activities | ||
Provisioning of resources | ||
Foundational security operations concepts | ||
Resource protection techniques | ||
Incident management | ||
Preventative measures | ||
Patch and vulnerability management | ||
Change management processes | ||
Recovery strategies | ||
Disaster recovery processes and plans | ||
Business continuity planning and exercises | ||
Physical security | ||
Personnel safety concerns | ||
¼ÒÇÁÆ®¿þ¾î °³¹ß º¸¾È | Security in the software development lifecycle | |
Development environment security controls | ||
Software security effectiveness | ||
Acquired software security impact |
Ãë¾÷ÀÇ ¹®À» µÎµå¸°´Ù!
1:1 ¸ÂÃãÇü Ãë¾÷ Àü·« ½Ã½ºÅÛ
ä¿ë Àοø, ³»¿ë, ´ë»óÀÚ µîÀÇ
¼¼ºÎ ³»¿ë ÇùÀÇ
»ó´ã & ¸éÁ¢À» ÅëÇÑ
Â÷º°ÈµÈ ±³À°´ë»ó ¼±¹ß
Çлý °³°³Àκ°¿¡ ¸Â´Â
Á÷¾÷´É·Â°³¹ßÈÆ·Ã ÁøÇà
ä¿ë±â¾÷°ú ÇÔ²²ÇÏ´Â
½Ç¹« ÇÁ·ÎÁ§Æ® ¹ßǥȸ
¼±¹ßµÈ ¿ì¼öÇлý
¸çÁ¢ ¹× ä¿ë ÁøÇà
´õÁ¶ÀºIT¾ÆÄ«µ¥¹ÌÀÇ ¸ðµç ±³À°°úÁ¤Àº ½Ã°£°»ç Á¦µµ°¡ ¾Æ´Ñ IT¡¤ÇÁ·Î±×·¡¹Ö ºÐ¾ß ½Ç¹«ÇöÀå¿¡¼ 10³â ÀÌ»ó ±Ù¹«ÇÑ ½Ç·Â ÀÖ´Â Àü¹®°¡µéÀ» ÀüÀÓ°»ç·Î ¹èÄ¡Çϸç, ´©±¸¿¡°Ô³ª ÆòµîÇÑ ±³À°À» Á¦°øÇϱâ À§ÇØ ÇлýÀÇ ¼öÁØ¿¡ ¸ÂÃá 1:1 ±³À°À» Á¦°øÇϰí ÀÖ½À´Ï´Ù. ¶ÇÇÑ, ¼ö½Ã·Î º¯ÈÇÏ´Â IT¾÷Á¾¿¡ Æ®·£µðÇÔÀ» À¯ÁöÇϱâÀ§ÇØ °»çÁø¿¡°Ôµµ ¿ÜºÎ ±³À°À» Áö¿øÇÏ¸ç ²ÙÁØÈ÷ ±³À°ÀÇ ÁúÀ» Çâ»ó½Ã۰í ÀÖ½À´Ï´Ù.
¹«±Ã¹«ÁøÇÑ ¹ßÀüÀÇ °¡´É¼ºÀ» °¡Áø IT¾÷°èÀÎ ¸¸Å Ç×»ó ¹ß ºü¸£°Ô ÆÄ¾ÇÇϱâ À§ÇØ ´õÁ¶ÀºIT¾ÆÄ«µ¥¹Ì¿¡¼´Â ¼ö½Ã·Î Çù·Â±â¾÷ü¿¡¼ ±Ù¹« ÁßÀÎ ºÐµé°úÀÇ ÇùÀǸ¦ ÅëÇØ Çлýµé¿¡°Ô Ãë¾÷¿¡ µµ¿òÀÌ µÇ´Â ½Ç¹« ¸ÂÃã Ä¿¸®Å§·³À» ±¸¼ºÇÏ¿© ¼ö¾÷À» ÁøÇàÇϰí ÀÖ½À´Ï´Ù.
´õÁ¶ÀºIT¾ÆÄ«µ¥¹Ì¿¡¼´Â Çлýµé¿¡°Ô º¸´Ù ÁÁÀº Ãë¾÷ȯ°æ°ú ´Ù¾çÇÑ ÀÏÀÚ¸®¸¦ Á¦°øÇϱâ À§ÇØ ¿©·¯ ¾÷ü¿ÍÀÇ »êÇÐÇù·ÂÀ» ÅëÇØ ³×Æ®¿öÅ©¸¦ ±¸Ãà Çϰí ÀÖÀ¸¸ç, ¾ðÁ¦³ª ¿·ÁÀÖ´Â Ãë¾÷Áö¿ø ¼¾Å͸¦ ¿î¿µÇϰí ÀÖ½À´Ï´Ù. ¶ÇÇÑ ÀڽŸ¸ÀÇ °æÀï·ÂÀ» °ÈÇϱâ À§ÇØ °³Àκ° À̷¼ÄÉ¾î ¹× ¸ðÀǸéÁ¢ÀÇ ±âȸ¸¦ Á¦°øÇϰí ÀÖ½À´Ï´Ù.
»êÇÐÇù·Â ¾÷üÀÇ ½Ç¹«°³¹ßÀÚ¸¦ ÃʺùÇÑ Æ¯°À» ÁøÇàÇÏ¿© Çлýµé¿¡°Ô´Â ¸·¿¬Çϱ⸸ÇÑ ½Ç¹«¿¡ ´ëÇÑ ±Ã±ÝÁõÀ» Ç® ±âȸ¸¦ Á¦°øÇص帮¸ç, ½Ç¹«¸¦ ±â¹ÝÀ¸·ÎÇÑ ÆÀ ÇÁ·ÎÁ§Æ®¸¦ ÁøÇàÇÏ¿© ÇÁ¸®Á¨Å×À̼ǿ¡ ´ëÇÑ Àڽۨ Çâ»ó ¹× ½Ç¹«´É·ÂÀ» ¹è¾çÇÒ ¼ö ÀÖ°í, ä¿ë ±â¾÷ ¿¬°è ¹ßǥȸ¸¦ ÅëÇÑ ¹«±Ã¹«ÁøÇÑ Ãë¾÷ °¡´É¼ºÀ» ¿¾îµå¸®°í ÀÖ½À´Ï´Ù.