- ÇöÀç À§Ä¡
- home > °ø¹«¿ø¡¤°í½Ã > ±â¼úÁ÷ > Àü»êÁ÷/Á¤º¸º¸È£Á÷ > 2024 ÃÖÀûÇÕ 9±Þ.7±Þ Àü»êÁ÷ °ø¹«¿ø ½ÃÇè´ëºñ Á¤º¸º¸È£·Ð[¼º¾È´ç]
Á¤º¸º¸¾È ºÐ¾ß´Â ¹üÀ§°¡ ³Ð°í ³»¿ëÀÌ ¾î·Á¿ö ºñÀü°øÀڵ鿡°Ô´Â Á¢±ÙÇϱâ Èûµç °ú¸ñÀÔ´Ï´Ù. ¶ÇÇÑ, ´Ü¼ø ¾Ï±â·Î´Â ´Ù¾çÇÑ ÀÀ¿ë¹®Á¦¸¦ Ç® ¼ö ¾ø¾î ÀÔ¹®ÀÚµéÀ» ¸Á¼³ÀÌ°Ô ÇÕ´Ï´Ù. ÀÌ Ã¥Àº º¸¾ÈÀ» óÀ½ ½ÃÀÛÇÏ´Â ¼öÇè»ýÀ» À§ÇØ ³×Æ®¿öÅ©¿¡ ´ëÇÑ ÀÌÇظ¦ ¹ÙÅÁÀ¸·Î ±âÃʺÎÅÍ ÀÀ¿ë±îÁö ÇнÀÇÒ ¼ö ÀÖµµ·Ï ±¸¼ºÇß½À´Ï´Ù. ?
ÀúÀÚ: ÀÓÀç¼± (ÁöÀºÀÌ)
Part 01 Á¤º¸º¸È£ ÀϹÝ
SECTION 01 Á¤º¸º¸È£ °ü¸®
1. º¸¾È ±â¼ú
2. Á¤º¸º¸È£ÀÇ ¸ñÇ¥(3´ë ¸ñÇ¥, 3¿øÄ¢)
3. À§Çèµµ »êÁ¤ ½Ã °í·ÁÇÒ ±¸¼º ¿ä¼Ò
4. º¸¾È ¿ë¾î ¼³¸í
5. º¸¾È°ø°Ý(Security Attack)ÀÇ Á¾·ù
SECTION 2 Á¤º¸º¸È£ ´ëÃ¥
1. °³¿ä
2. ±â¼úÀû º¸¾È
3. °ü¸®Àû º¸¾È
4. ¹°¸®Àû º¸¾È
[PART 01 ±âÃâÈ®Àι®Á¦]
Part 02 º¸¾È°ú ¾ÏÈ£(Cryptography)
SECTION 01 ¾ÏÈ£ÇÐÀÇ ÀÌÇØ
1. ¾ÏÈ£ÀÇ °³¿ä
SECTION 02 ¾ÏÈ£ ±â¹ýÀÇ ºÐ·ù
1. ÀüÄ¡¿Í ´ëÄ¡(ġȯ)
2. ½ºÆ®¸² ¾ÏÈ£¿Í ºí·Ï¾ÏÈ£
SECTION 03 ÇØÄ¿ÀÇ ¾ÏÈ£°ø°Ý ¹æ¹ý
1. º¸¾È°ø°Ý
2. °ø°Ý ¹æ½Ä
3. ¾ÏÈ£ ¾Ë°í¸®ÁòÀÇ ¾ÈÀü¼º Æò°¡
SECTION 04 ´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£È
1. ¾ÏÈ£ÀÇ ÀÇÀÇ
2. ´ëĪŰ ¾ÏÈ£(Symmetric Cryptography)
3. °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£½Ã½ºÅÛ
4. ´ëĪŰ¿Í °ø°³Å° ºñ±³
5. ´ëĪŰ¿Í °ø°³Å°(ºñ´ëĪŰ) ¹æ½Ä ºñ±³
6. ÇÏÀ̺긮µå ¹æ½Ä(´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) È¥ÇÕ)
7. ÇؽÃÇÔ¼ö
SECTION 05 ÀüÀÚ¼¸í°ú °ø°³Å° ±â¹Ý ±¸Á¶(PKI)
1. ÀüÀÚ¼¸í(µðÁöÅÐ ¼¸í: Digital Signature)
2. PKI(Public Key Interface, °ø°³Å° ±â¹Ý ±¸Á¶)
3. Å°, ³¼ö
SECTION 06 ÀüÀÚ»ó°Å·¡ º¸¾È
1. ÀüÀÚ»ó°Å·¡ º¸¾È °³¿ä
2. ÀüÀÚ»ó°Å·¡ º¸¾È ¿ä±¸»çÇ×
3. ÀüÀÚ»ó°Å·¡ º¸¾È °ø°Ý À¯Çü
4. ÆǸÅÀÚ ¿ä±¸»çÇ×
5. ±¸¸ÅÀÚ ¿ä±¸»çÇ×
6. PKIÀÇ ÀÀ¿ë ¸ðµ¨ÀÎ SET(Secure Electronic Transaction)
7. ÀüÀÚÈÆó(Electronic Cash) º¸¾È
8. °¡»óÈÆó, ºñÆ®ÄÚÀÎ
9. ºí·ÏüÀÎ(Block Chain)
SECTION 07 ±âŸ ¿ë¾î ¼³¸í
[PART 02 ±âÃâÈ®Àι®Á¦]
Part 03 Á¢±ÙÅëÁ¦
SECTION 01 Á¢±ÙÅëÁ¦ °³¿ä
1. Á¢±ÙÅëÁ¦(Á¢±ÙÁ¦¾î, Access Control)
2. Á¢±ÙÅëÁ¦ ±âº» ¿øÄ¢
SECTION 02 ÀÎÁõ
1. °³³ä
2. »ç¿ëÀÚ ÀÎÁõ°ú ¸Þ½ÃÁö ÀÎÁõ
3. »ç¿ëÀÚ ÀÎÁõ±â¼ú(User Authentication)
4. ÅëÇÕÀÎÁõü°è
SECTION 03 Á¢±ÙÅëÁ¦ º¸¾È¸ðµ¨
SECTION 04 Á¢±ÙÅëÁ¦ º¸¾ÈÀ§Çù
1. Æнº¿öµå Å©·¡Ä¿(Password Cracker)
[PART 03 ±âÃâÈ®Àι®Á¦]
PART 04 ³×Æ®¿öÅ© º¸¾È
SECTION 01 ³×Æ®¿öÅ© °³¿ä
1. ³×Æ®¿öÅ© °³¿ä
2. OSI 7 Layer¿Í TCP/IP
3. TCP¼¼±×¸ÕÆ®, IP ÆÐŶ, MACÇÁ·¹ÀÓ ±¸Á¶
SECTION 02 ÀÎÅͳÝ
1. ÀÎÅͳÝ
2. ARP¿Í RARP
3. TCP 3-way Hand Shake
4. ¸µÅ©¿Í Á¾´Ü °£ ´ã´ç
5. ¹Ý¼ÛÆÄ °¨Áö ´ÙÁßÁ¢¼Ó(Carrier Sense Multiple Access)
6. ³×Æ®¿öÅ© °èÃþ(3°èÃþ)ÀÇ IPv4 Addressing
7. DHCP¿Í NAT
SECTION 03 ¶ó¿ìÅÍ¿Í ¶ó¿ìÆà ÇÁ·ÎÅäÄÝ
1. ¶ó¿ìÅÍ
2. ¶ó¿ìÆÃ(Routing) ÇÁ·ÎÅäÄÝ
3. IP ±â¹Ý Åë½ÅÀÇ QoSº¸Àå ¹æ¾È
4. Giga ÀÎÅͳÝ
SECTION 04 ¹«¼±Åë½Å º¸¾È
1. ¹«¼± ·£ Á¾·ù¿Í º¸¾È
2. ¹«¼± ·£ÀÇ À§Ç輺
3. ¹«¼±°ø°ÝÀÇ À¯Çü
4. µð¹ÙÀ̽º ÀÎÁõ
5. Mobile IP
6. ³×Æ®¿öÅ© ÅäÆú·ÎÁö(Network Topology)
7. ȸ¼±±³È¯, ¸Þ½ÃÁö ±³È¯, ÆÐŶ±³È¯
SECTION 05 ³×Æ®¿öÅ© º¸¾È°ú ¹æȺ®
1. ³×Æ®¿öÅ© º¸¾È°ú ¹æȺ®
2. ¸Á °ü¸® ÇÁ·ÎÅäÄÝ
3. ij½ºÆà ¸ðµå(Casting Mode)
4. IGMP(Internet Group Management Protocol)
SECTION 06 ³×Æ®¿öÅ© ±â¹Ý º¸¾È°ø°Ý
1. ¼ºñ½º °ÅºÎ °ø°Ý °³¿ä
2. DoS, DDoS, DRDoS
3. °ø°³ ÇØÅ·µµ±¸ Á¾·ù
4. ³×Æ®¿öÅ© Ãë¾àÁ¡ ½ºÄ³´× °ø°Ý
5. APT °ø°Ý(Áö´ÉÇü Áö¼Ó À§Çù °ø°Ý: Advance Persistent Threat)
6. »çȸ°øÇÐÀû ¹æ¹ý
7. Ransomware(·£¼¶¿þ¾î)
SECTION 07 ÇØÅ·°ú ´ëÃ¥
1. ³×Æ®¿öÅ© ȯ°æ
2. Sniffing(½º´ÏÇÎ)
3. Spoofing(½ºÇªÇÎ)
4. ¼¼¼Ç ÇÏÀÌÀçÅ·(TCP Session Hijacking)
5. Phishing(ÇǽÌ)
6. ÁøÈÇÏ´Â ´Ù¾çÇÑ ÇǽÌ
7. Pharming(ÆĹÖ)
8. Smishing(½º¹Ì½Ì)
9. ¸Þ¸ð¸® ÇØÅ·
10. ¸Á ºÐ¸®
11. ±âŸ º¸¾È ħÇØ °ü·Ã ¿ë¾î
[PART 04 ±âÃâÈ®Àι®Á¦]
PART 05 ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
SECTION 01 À̸ÞÀÏ º¸¾È
1. À̸ÞÀÏ °ü·Ã ÇÁ·ÎÅäÄÝ
2. ÀüÀÚ¿ìÆí º¸¾ÈÅë½Å±Ô¾à(ºñ¹Ð¼º, ¹«°á¼º, ÀÎÁõ, ºÎÀιæÁö ±â´É Áö¿ø)
3. ½ºÆÔ¸ÞÀÏ ´ëÃ¥
SECTION 02 FTP º¸¾È
1. FTP(File Transfer Protocol: FileÀ» Àü´ÞÇÏ´Â ÇÁ·ÎÅäÄÝ)
SECTION 03 À¥ º¸¾È(Web Security)
1. Web
2. HTTP ÇÁ·ÎÅäÄÝ
3. SSL(Secure Socket Layer)
4. IPSec(IP Secure)
5. VPN(Virtual Private Network)
6. VLAN(Virtual LAN)
7. DNS(Domain Name System) º¸¾È
8. Wep App °£ Åë½Å±â¼ú
SECTION 04 µ¥ÀÌÅͺ£À̽º º¸¾È
1. µ¥ÀÌÅͺ£À̽º(Database) ±âº» °³³ä
2. µ¥ÀÌÅͺ£À̽º º¸¾È ÅëÁ¦
SECTION 05 µðÁöÅÐ ÄÜÅÙÃ÷ º¸È£ ¹æ¾È
1. µðÁöÅÐ ÄÜÅÙÃ÷
2. ¿öÅ͸¶Å©(WaterMark)
3. ÇΰÅÇÁ¸°ÆÃ(FingerPrinte)
4. ¿öÅ͸¶Å©¿Í ÇΰÅÇÁ¸°Æà ºñ±³
5. DRM
6. MPEG21
7. ½ºÅ×°¡³ë±×·¡ÇÇ(Steganography)
SECTION 06 º¸¾È Ãë¾àÁ¡ Á¤º¸ Á¦°ø
1. OWASP(The Open Web Application Security Project)
[PART 05 ±âÃâÈ®Àι®Á¦]
PART 06 ½Ã½ºÅÛ º¸¾È
SECTION 01 ¿î¿µÃ¼Á¦ °³¿ä
1. ¿î¿µÃ¼Á¦(Operating System) °³¿ä
2. ¿î¿µÃ¼Á¦ÀÇ ±¸Á¶(Operating System Structures)
3. ¿î¿µÃ¼Á¦ÀÇ ±â¼ú ¹ßÀü È帧
4. ¿î¿µÃ¼Á¦ÀÇ ÀÔ¡¤Ãâ·Â ¹æ½Ä
SECTION 02 ¿î¿µÃ¼Á¦ ÁÖ¿ä ±¸¼º±â¼ú
1. ÇÁ·Î¼¼½º °ü¸®
2. ¸Þ¸ð¸®(±â¾ïÀåÄ¡) °ü¸®
3. ½Ã½ºÅÛ È£Ãâ(System Call)
4. ÀåÄ¡°ü¸®
SECTION 03 º¸¾È ¿î¿µÃ¼Á¦
1. º¸¾È ¿î¿µÃ¼Á¦ °³¿ä
2. º¸¾È ¿î¿µÃ¼Á¦ÀÇ ÁÖ¿ä Á¦°ø ±â´É
3. º¸¾È ¿î¿µÃ¼Á¦
4. ½Å·Ú Ç÷§Æû ¸ðµâ(TPM: Trusted Platform Module)
5. HSM(Hardware Security Module)
SECTION 04 Ŭ¶óÀ̾ðÆ® º¸¾È
1. ¾Ç¼º ¼ÒÇÁÆ®¿þ¾î(¾Ç¼ºÄÚµå)
2. ´Ù¾çÇÑ À¥ °ø°Ý ¹æ¹ý
3. ÀÎÅÍ³Ý È°¿ë º¸¾È
4. ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
5. ±âŸ
SECTION 05 À©µµ¿ì ¼¹ö º¸¾È
1. À©µµ¿ì °³¿ä
2. À©µµ¿ì º¸¾È
3. À©µµ¿ì ¿î¿µÃ¼Á¦ ¸í·É¾î
4. Windows ½Ã½ºÅÛ À̺¥Æ® ·Î±× Á¾·ù
5. Windows ½Ã½ºÅÛ ÇÁ·Î¼¼½º
6. À©µµ¿ì ¹× À¯´Ð½º ·Î±× ÆÄÀÏ Á¾·ù ¹× ºÐ¼®
7. Windows ±¸Á¶
SECTION 06 UNIX ¼¹ö º¸¾È
1. À¯´Ð½º °³¿ä
2. UNIX ±âº» »ç¿ë¹ý
3. À¯´Ð½º(¼Ö¶ó¸®½º) ¸í·É¾î ¹× ·Î±× ÆÄÀÏ
4. UNIX ¼¹ö º¸¾È
5. UNIX ÆÄÀÏ ½Ã½ºÅÛ
SECTION 07 ¸®´ª½º(Linux) ¼¹ö º¸¾È
SECTION 08 ¼¹ö º¸¾È °ü¸®
1. ¼¹ö°ü¸®ÀÚÀÇ ¾÷¹«
SECTION 09 °¢Á¾ ½Ã½ºÅÛ º¸¾ÈÀ§Çù ¹× ´ëÀÀÃ¥
1. ¹öÆÛ ¿À¹öÇ÷Î(Buffer Overflow) °ø°Ý
2. Æ÷¸Ë ½ºÆ®¸µ(Format String) °ø°Ý
3. ·¹À̽º ÄÁµð¼Ç(Race Condition) °ø°Ý
4. ±ÇÇÑ »ó½Â °ø°Ý(Privilege Escalation Attack)
5. ±âŸ ¿ë¾î
6. ¸ð¹ÙÀÏ ¿î¿µÃ¼Á¦(Mobile OS)
SECTION 10 Ãë¾àÁ¡ Á¡°Ë
1. Ãë¾àÁ¡ °³¿ä
2. ħÀÔ»ç½Ç È®ÀÎ
[PART 06 ±âÃâÈ®Àι®Á¦]
PART 07 Á¤º¸º¸¾È °ü¸®
SECTION 01 Á¤º¸º¸È£ Á¤Ã¥ ¹× Á¶Á÷
1. Á¤º¸º¸È£ Á¤Ã¥
2. IT º¸¾È °ü¸®
3. Á¤º¸ ½Ã½ºÅÛ °¨»ç(Information System Audit)
SECTION 02 À§Çè°ü¸®(Risk Management)
1. À§Çè°ü¸®(Risk Management)
2. À§ÇèºÐ¼®
3. À§ÇèÆò°¡
4. À§Çè´ëÃ¥
5. ÀçÇغ¹±¸°èȹ°ú RTO(Recovery Time Objective)
SECTION 03 BCP(Business Continuity Planning)
1. BCP(Business Continuity Planning)
2. ¾÷¹«¿µÇâºÐ¼®(BIA: Business Impact Assessment)
SECTION 04 ħÇØ»ç°í ´ëÀÀ
1. ħÇØ»ç°í ´ëÀÀ°ú Æ÷·»½Ä
2. ħÇØ»ç°í ´ëÀÀ
SECTION 05 ±¹Á¦/±¹°¡ Ç¥ÁØ ¹× ÀÎÁõü°è
1. º¸¾È Á¦Ç° Æò°¡¹æ¹ý ¹× ±âÁØ
2. Á¤º¸º¸È£°ü¸®Ã¼°è(ISMS) ÀÎÁõ
3. PIMS(Personal Information Management System)
4. ±¹³» º¸¾ÈÀÎÁõ ü°è ¹× ÇýÅà ºñ±³
5. ±¹³» °³ÀÎÁ¤º¸ º¸È£ °ü·ÃÁ¦µµ ÇöȲ
6. PDCA(Plan Do Check Action)
SECTION 06 ¿ë¾î Á¤ÀÇ
[PART 07 ±âÃâÈ®Àι®Á¦]
PART 08 Á¤º¸º¸È£ °ü·Ã ¹ý±Ô
SECTION 01 ¹ý·üÀÇ ÀÌÇØ
1. ¹ý·ü Àû¿ëÀÇ ¿ì¼±¼øÀ§
2. °³ÀÎÁ¤º¸ º¸È£¹ý¿¡¼ ¹Î°¨Á¤º¸¿Í °íÀ¯½Äº°Á¤º¸ÀÇ Â÷ÀÌÁ¡
3. OECD °¡À̵å¶óÀÎ
SECTION 02 Á¤º¸º¸¾È °ü·Ã ¹ý±Ô
1. Á¤º¸Åë½Å¸Á ÀÌ¿ëÃËÁø ¹× Á¤º¸º¸È£ µî¿¡ °üÇÑ ¹ý·ü(¾àĪ: Á¤º¸Åë½Å¸Á¹ý)
2. Á¤º¸Åë½Å ±â¹Ý º¸È£¹ý
3. ÀüÀÚ¼¸í¹ý
4. °³ÀÎÁ¤º¸ º¸È£¹ý
5. °³ÀÎÁ¤º¸ º¸È£¹ý ½ÃÇà·É
6. °³ÀÎÁ¤º¸ÀÇ ¾ÈÀü¼º È®º¸Á¶Ä¡ ±âÁØ
7. ÀüÀÚÁ¤ºÎ¹ý
8. ±¹°¡Á¤º¸È ±âº»¹ý
9. ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·ü(¾àĪ: ÀüÀÚ»ó°Å·¡¹ý)
[PART 08 ±âÃâÈ®Àι®Á¦]
PART 09 ±âÃâ¹®Á¦
2019³â ±¹°¡Á÷ 9±Þ Á¤º¸º¸È£·Ð
2019³â ±¹°¡Á÷ 9±Þ ³×Æ®¿öÅ© º¸¾È
2019³â ±¹°¡Á÷ 9±Þ Á¤º¸½Ã½ºÅÛ º¸¾È
2019³â ¼¿ï½Ã 9±Þ Á¤º¸º¸È£·Ð
2019³â Áö¹æÁ÷ 9±Þ Á¤º¸º¸È£·Ð
2020³âµµ ±¹°¡Á÷ 7±Þ Á¤º¸º¸È£·Ð
2020³âµµ ±¹°¡Á÷ 9±Þ Á¤º¸½Ã½ºÅÛ º¸¾È
2020³âµµ Áö¹æÁ÷ 9±Þ Á¤º¸º¸È£·Ð
2020³âµµ ½ÃµµÁö¹æÁ÷ 9±Þ Á¤º¸½Ã½ºÅÛ º¸¾È
2021³âµµ ±¹°¡Á÷ 7±Þ Á¤º¸º¸È£·Ð
2021³âµµ ±¹°¡Á÷ 9±Þ Á¤º¸º¸È£·Ð
2022³âµµ ±¹°¡Á÷ 9±Þ Á¤º¸½Ã½ºÅÛ º¸¾È
2023³âµµ ±¹°¡Á÷ 7±Þ Á¤º¸º¸È£·Ð
2023³âµµ ±¹°¡Á÷ 9±Þ Á¤º¸º¸È£·Ð
SECTION 01 Á¤º¸º¸È£ °ü¸®
1. º¸¾È ±â¼ú
2. Á¤º¸º¸È£ÀÇ ¸ñÇ¥(3´ë ¸ñÇ¥, 3¿øÄ¢)
3. À§Çèµµ »êÁ¤ ½Ã °í·ÁÇÒ ±¸¼º ¿ä¼Ò
4. º¸¾È ¿ë¾î ¼³¸í
5. º¸¾È°ø°Ý(Security Attack)ÀÇ Á¾·ù
SECTION 2 Á¤º¸º¸È£ ´ëÃ¥
1. °³¿ä
2. ±â¼úÀû º¸¾È
3. °ü¸®Àû º¸¾È
4. ¹°¸®Àû º¸¾È
[PART 01 ±âÃâÈ®Àι®Á¦]
Part 02 º¸¾È°ú ¾ÏÈ£(Cryptography)
SECTION 01 ¾ÏÈ£ÇÐÀÇ ÀÌÇØ
1. ¾ÏÈ£ÀÇ °³¿ä
SECTION 02 ¾ÏÈ£ ±â¹ýÀÇ ºÐ·ù
1. ÀüÄ¡¿Í ´ëÄ¡(ġȯ)
2. ½ºÆ®¸² ¾ÏÈ£¿Í ºí·Ï¾ÏÈ£
SECTION 03 ÇØÄ¿ÀÇ ¾ÏÈ£°ø°Ý ¹æ¹ý
1. º¸¾È°ø°Ý
2. °ø°Ý ¹æ½Ä
3. ¾ÏÈ£ ¾Ë°í¸®ÁòÀÇ ¾ÈÀü¼º Æò°¡
SECTION 04 ´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£È
1. ¾ÏÈ£ÀÇ ÀÇÀÇ
2. ´ëĪŰ ¾ÏÈ£(Symmetric Cryptography)
3. °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£½Ã½ºÅÛ
4. ´ëĪŰ¿Í °ø°³Å° ºñ±³
5. ´ëĪŰ¿Í °ø°³Å°(ºñ´ëĪŰ) ¹æ½Ä ºñ±³
6. ÇÏÀ̺긮µå ¹æ½Ä(´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) È¥ÇÕ)
7. ÇؽÃÇÔ¼ö
SECTION 05 ÀüÀÚ¼¸í°ú °ø°³Å° ±â¹Ý ±¸Á¶(PKI)
1. ÀüÀÚ¼¸í(µðÁöÅÐ ¼¸í: Digital Signature)
2. PKI(Public Key Interface, °ø°³Å° ±â¹Ý ±¸Á¶)
3. Å°, ³¼ö
SECTION 06 ÀüÀÚ»ó°Å·¡ º¸¾È
1. ÀüÀÚ»ó°Å·¡ º¸¾È °³¿ä
2. ÀüÀÚ»ó°Å·¡ º¸¾È ¿ä±¸»çÇ×
3. ÀüÀÚ»ó°Å·¡ º¸¾È °ø°Ý À¯Çü
4. ÆǸÅÀÚ ¿ä±¸»çÇ×
5. ±¸¸ÅÀÚ ¿ä±¸»çÇ×
6. PKIÀÇ ÀÀ¿ë ¸ðµ¨ÀÎ SET(Secure Electronic Transaction)
7. ÀüÀÚÈÆó(Electronic Cash) º¸¾È
8. °¡»óÈÆó, ºñÆ®ÄÚÀÎ
9. ºí·ÏüÀÎ(Block Chain)
SECTION 07 ±âŸ ¿ë¾î ¼³¸í
[PART 02 ±âÃâÈ®Àι®Á¦]
Part 03 Á¢±ÙÅëÁ¦
SECTION 01 Á¢±ÙÅëÁ¦ °³¿ä
1. Á¢±ÙÅëÁ¦(Á¢±ÙÁ¦¾î, Access Control)
2. Á¢±ÙÅëÁ¦ ±âº» ¿øÄ¢
SECTION 02 ÀÎÁõ
1. °³³ä
2. »ç¿ëÀÚ ÀÎÁõ°ú ¸Þ½ÃÁö ÀÎÁõ
3. »ç¿ëÀÚ ÀÎÁõ±â¼ú(User Authentication)
4. ÅëÇÕÀÎÁõü°è
SECTION 03 Á¢±ÙÅëÁ¦ º¸¾È¸ðµ¨
SECTION 04 Á¢±ÙÅëÁ¦ º¸¾ÈÀ§Çù
1. Æнº¿öµå Å©·¡Ä¿(Password Cracker)
[PART 03 ±âÃâÈ®Àι®Á¦]
PART 04 ³×Æ®¿öÅ© º¸¾È
SECTION 01 ³×Æ®¿öÅ© °³¿ä
1. ³×Æ®¿öÅ© °³¿ä
2. OSI 7 Layer¿Í TCP/IP
3. TCP¼¼±×¸ÕÆ®, IP ÆÐŶ, MACÇÁ·¹ÀÓ ±¸Á¶
SECTION 02 ÀÎÅͳÝ
1. ÀÎÅͳÝ
2. ARP¿Í RARP
3. TCP 3-way Hand Shake
4. ¸µÅ©¿Í Á¾´Ü °£ ´ã´ç
5. ¹Ý¼ÛÆÄ °¨Áö ´ÙÁßÁ¢¼Ó(Carrier Sense Multiple Access)
6. ³×Æ®¿öÅ© °èÃþ(3°èÃþ)ÀÇ IPv4 Addressing
7. DHCP¿Í NAT
SECTION 03 ¶ó¿ìÅÍ¿Í ¶ó¿ìÆà ÇÁ·ÎÅäÄÝ
1. ¶ó¿ìÅÍ
2. ¶ó¿ìÆÃ(Routing) ÇÁ·ÎÅäÄÝ
3. IP ±â¹Ý Åë½ÅÀÇ QoSº¸Àå ¹æ¾È
4. Giga ÀÎÅͳÝ
SECTION 04 ¹«¼±Åë½Å º¸¾È
1. ¹«¼± ·£ Á¾·ù¿Í º¸¾È
2. ¹«¼± ·£ÀÇ À§Ç輺
3. ¹«¼±°ø°ÝÀÇ À¯Çü
4. µð¹ÙÀ̽º ÀÎÁõ
5. Mobile IP
6. ³×Æ®¿öÅ© ÅäÆú·ÎÁö(Network Topology)
7. ȸ¼±±³È¯, ¸Þ½ÃÁö ±³È¯, ÆÐŶ±³È¯
SECTION 05 ³×Æ®¿öÅ© º¸¾È°ú ¹æȺ®
1. ³×Æ®¿öÅ© º¸¾È°ú ¹æȺ®
2. ¸Á °ü¸® ÇÁ·ÎÅäÄÝ
3. ij½ºÆà ¸ðµå(Casting Mode)
4. IGMP(Internet Group Management Protocol)
SECTION 06 ³×Æ®¿öÅ© ±â¹Ý º¸¾È°ø°Ý
1. ¼ºñ½º °ÅºÎ °ø°Ý °³¿ä
2. DoS, DDoS, DRDoS
3. °ø°³ ÇØÅ·µµ±¸ Á¾·ù
4. ³×Æ®¿öÅ© Ãë¾àÁ¡ ½ºÄ³´× °ø°Ý
5. APT °ø°Ý(Áö´ÉÇü Áö¼Ó À§Çù °ø°Ý: Advance Persistent Threat)
6. »çȸ°øÇÐÀû ¹æ¹ý
7. Ransomware(·£¼¶¿þ¾î)
SECTION 07 ÇØÅ·°ú ´ëÃ¥
1. ³×Æ®¿öÅ© ȯ°æ
2. Sniffing(½º´ÏÇÎ)
3. Spoofing(½ºÇªÇÎ)
4. ¼¼¼Ç ÇÏÀÌÀçÅ·(TCP Session Hijacking)
5. Phishing(ÇǽÌ)
6. ÁøÈÇÏ´Â ´Ù¾çÇÑ ÇǽÌ
7. Pharming(ÆĹÖ)
8. Smishing(½º¹Ì½Ì)
9. ¸Þ¸ð¸® ÇØÅ·
10. ¸Á ºÐ¸®
11. ±âŸ º¸¾È ħÇØ °ü·Ã ¿ë¾î
[PART 04 ±âÃâÈ®Àι®Á¦]
PART 05 ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
SECTION 01 À̸ÞÀÏ º¸¾È
1. À̸ÞÀÏ °ü·Ã ÇÁ·ÎÅäÄÝ
2. ÀüÀÚ¿ìÆí º¸¾ÈÅë½Å±Ô¾à(ºñ¹Ð¼º, ¹«°á¼º, ÀÎÁõ, ºÎÀιæÁö ±â´É Áö¿ø)
3. ½ºÆÔ¸ÞÀÏ ´ëÃ¥
SECTION 02 FTP º¸¾È
1. FTP(File Transfer Protocol: FileÀ» Àü´ÞÇÏ´Â ÇÁ·ÎÅäÄÝ)
SECTION 03 À¥ º¸¾È(Web Security)
1. Web
2. HTTP ÇÁ·ÎÅäÄÝ
3. SSL(Secure Socket Layer)
4. IPSec(IP Secure)
5. VPN(Virtual Private Network)
6. VLAN(Virtual LAN)
7. DNS(Domain Name System) º¸¾È
8. Wep App °£ Åë½Å±â¼ú
SECTION 04 µ¥ÀÌÅͺ£À̽º º¸¾È
1. µ¥ÀÌÅͺ£À̽º(Database) ±âº» °³³ä
2. µ¥ÀÌÅͺ£À̽º º¸¾È ÅëÁ¦
SECTION 05 µðÁöÅÐ ÄÜÅÙÃ÷ º¸È£ ¹æ¾È
1. µðÁöÅÐ ÄÜÅÙÃ÷
2. ¿öÅ͸¶Å©(WaterMark)
3. ÇΰÅÇÁ¸°ÆÃ(FingerPrinte)
4. ¿öÅ͸¶Å©¿Í ÇΰÅÇÁ¸°Æà ºñ±³
5. DRM
6. MPEG21
7. ½ºÅ×°¡³ë±×·¡ÇÇ(Steganography)
SECTION 06 º¸¾È Ãë¾àÁ¡ Á¤º¸ Á¦°ø
1. OWASP(The Open Web Application Security Project)
[PART 05 ±âÃâÈ®Àι®Á¦]
PART 06 ½Ã½ºÅÛ º¸¾È
SECTION 01 ¿î¿µÃ¼Á¦ °³¿ä
1. ¿î¿µÃ¼Á¦(Operating System) °³¿ä
2. ¿î¿µÃ¼Á¦ÀÇ ±¸Á¶(Operating System Structures)
3. ¿î¿µÃ¼Á¦ÀÇ ±â¼ú ¹ßÀü È帧
4. ¿î¿µÃ¼Á¦ÀÇ ÀÔ¡¤Ãâ·Â ¹æ½Ä
SECTION 02 ¿î¿µÃ¼Á¦ ÁÖ¿ä ±¸¼º±â¼ú
1. ÇÁ·Î¼¼½º °ü¸®
2. ¸Þ¸ð¸®(±â¾ïÀåÄ¡) °ü¸®
3. ½Ã½ºÅÛ È£Ãâ(System Call)
4. ÀåÄ¡°ü¸®
SECTION 03 º¸¾È ¿î¿µÃ¼Á¦
1. º¸¾È ¿î¿µÃ¼Á¦ °³¿ä
2. º¸¾È ¿î¿µÃ¼Á¦ÀÇ ÁÖ¿ä Á¦°ø ±â´É
3. º¸¾È ¿î¿µÃ¼Á¦
4. ½Å·Ú Ç÷§Æû ¸ðµâ(TPM: Trusted Platform Module)
5. HSM(Hardware Security Module)
SECTION 04 Ŭ¶óÀ̾ðÆ® º¸¾È
1. ¾Ç¼º ¼ÒÇÁÆ®¿þ¾î(¾Ç¼ºÄÚµå)
2. ´Ù¾çÇÑ À¥ °ø°Ý ¹æ¹ý
3. ÀÎÅÍ³Ý È°¿ë º¸¾È
4. ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
5. ±âŸ
SECTION 05 À©µµ¿ì ¼¹ö º¸¾È
1. À©µµ¿ì °³¿ä
2. À©µµ¿ì º¸¾È
3. À©µµ¿ì ¿î¿µÃ¼Á¦ ¸í·É¾î
4. Windows ½Ã½ºÅÛ À̺¥Æ® ·Î±× Á¾·ù
5. Windows ½Ã½ºÅÛ ÇÁ·Î¼¼½º
6. À©µµ¿ì ¹× À¯´Ð½º ·Î±× ÆÄÀÏ Á¾·ù ¹× ºÐ¼®
7. Windows ±¸Á¶
SECTION 06 UNIX ¼¹ö º¸¾È
1. À¯´Ð½º °³¿ä
2. UNIX ±âº» »ç¿ë¹ý
3. À¯´Ð½º(¼Ö¶ó¸®½º) ¸í·É¾î ¹× ·Î±× ÆÄÀÏ
4. UNIX ¼¹ö º¸¾È
5. UNIX ÆÄÀÏ ½Ã½ºÅÛ
SECTION 07 ¸®´ª½º(Linux) ¼¹ö º¸¾È
SECTION 08 ¼¹ö º¸¾È °ü¸®
1. ¼¹ö°ü¸®ÀÚÀÇ ¾÷¹«
SECTION 09 °¢Á¾ ½Ã½ºÅÛ º¸¾ÈÀ§Çù ¹× ´ëÀÀÃ¥
1. ¹öÆÛ ¿À¹öÇ÷Î(Buffer Overflow) °ø°Ý
2. Æ÷¸Ë ½ºÆ®¸µ(Format String) °ø°Ý
3. ·¹À̽º ÄÁµð¼Ç(Race Condition) °ø°Ý
4. ±ÇÇÑ »ó½Â °ø°Ý(Privilege Escalation Attack)
5. ±âŸ ¿ë¾î
6. ¸ð¹ÙÀÏ ¿î¿µÃ¼Á¦(Mobile OS)
SECTION 10 Ãë¾àÁ¡ Á¡°Ë
1. Ãë¾àÁ¡ °³¿ä
2. ħÀÔ»ç½Ç È®ÀÎ
[PART 06 ±âÃâÈ®Àι®Á¦]
PART 07 Á¤º¸º¸¾È °ü¸®
SECTION 01 Á¤º¸º¸È£ Á¤Ã¥ ¹× Á¶Á÷
1. Á¤º¸º¸È£ Á¤Ã¥
2. IT º¸¾È °ü¸®
3. Á¤º¸ ½Ã½ºÅÛ °¨»ç(Information System Audit)
SECTION 02 À§Çè°ü¸®(Risk Management)
1. À§Çè°ü¸®(Risk Management)
2. À§ÇèºÐ¼®
3. À§ÇèÆò°¡
4. À§Çè´ëÃ¥
5. ÀçÇغ¹±¸°èȹ°ú RTO(Recovery Time Objective)
SECTION 03 BCP(Business Continuity Planning)
1. BCP(Business Continuity Planning)
2. ¾÷¹«¿µÇâºÐ¼®(BIA: Business Impact Assessment)
SECTION 04 ħÇØ»ç°í ´ëÀÀ
1. ħÇØ»ç°í ´ëÀÀ°ú Æ÷·»½Ä
2. ħÇØ»ç°í ´ëÀÀ
SECTION 05 ±¹Á¦/±¹°¡ Ç¥ÁØ ¹× ÀÎÁõü°è
1. º¸¾È Á¦Ç° Æò°¡¹æ¹ý ¹× ±âÁØ
2. Á¤º¸º¸È£°ü¸®Ã¼°è(ISMS) ÀÎÁõ
3. PIMS(Personal Information Management System)
4. ±¹³» º¸¾ÈÀÎÁõ ü°è ¹× ÇýÅà ºñ±³
5. ±¹³» °³ÀÎÁ¤º¸ º¸È£ °ü·ÃÁ¦µµ ÇöȲ
6. PDCA(Plan Do Check Action)
SECTION 06 ¿ë¾î Á¤ÀÇ
[PART 07 ±âÃâÈ®Àι®Á¦]
PART 08 Á¤º¸º¸È£ °ü·Ã ¹ý±Ô
SECTION 01 ¹ý·üÀÇ ÀÌÇØ
1. ¹ý·ü Àû¿ëÀÇ ¿ì¼±¼øÀ§
2. °³ÀÎÁ¤º¸ º¸È£¹ý¿¡¼ ¹Î°¨Á¤º¸¿Í °íÀ¯½Äº°Á¤º¸ÀÇ Â÷ÀÌÁ¡
3. OECD °¡À̵å¶óÀÎ
SECTION 02 Á¤º¸º¸¾È °ü·Ã ¹ý±Ô
1. Á¤º¸Åë½Å¸Á ÀÌ¿ëÃËÁø ¹× Á¤º¸º¸È£ µî¿¡ °üÇÑ ¹ý·ü(¾àĪ: Á¤º¸Åë½Å¸Á¹ý)
2. Á¤º¸Åë½Å ±â¹Ý º¸È£¹ý
3. ÀüÀÚ¼¸í¹ý
4. °³ÀÎÁ¤º¸ º¸È£¹ý
5. °³ÀÎÁ¤º¸ º¸È£¹ý ½ÃÇà·É
6. °³ÀÎÁ¤º¸ÀÇ ¾ÈÀü¼º È®º¸Á¶Ä¡ ±âÁØ
7. ÀüÀÚÁ¤ºÎ¹ý
8. ±¹°¡Á¤º¸È ±âº»¹ý
9. ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·ü(¾àĪ: ÀüÀÚ»ó°Å·¡¹ý)
[PART 08 ±âÃâÈ®Àι®Á¦]
PART 09 ±âÃâ¹®Á¦
2019³â ±¹°¡Á÷ 9±Þ Á¤º¸º¸È£·Ð
2019³â ±¹°¡Á÷ 9±Þ ³×Æ®¿öÅ© º¸¾È
2019³â ±¹°¡Á÷ 9±Þ Á¤º¸½Ã½ºÅÛ º¸¾È
2019³â ¼¿ï½Ã 9±Þ Á¤º¸º¸È£·Ð
2019³â Áö¹æÁ÷ 9±Þ Á¤º¸º¸È£·Ð
2020³âµµ ±¹°¡Á÷ 7±Þ Á¤º¸º¸È£·Ð
2020³âµµ ±¹°¡Á÷ 9±Þ Á¤º¸½Ã½ºÅÛ º¸¾È
2020³âµµ Áö¹æÁ÷ 9±Þ Á¤º¸º¸È£·Ð
2020³âµµ ½ÃµµÁö¹æÁ÷ 9±Þ Á¤º¸½Ã½ºÅÛ º¸¾È
2021³âµµ ±¹°¡Á÷ 7±Þ Á¤º¸º¸È£·Ð
2021³âµµ ±¹°¡Á÷ 9±Þ Á¤º¸º¸È£·Ð
2022³âµµ ±¹°¡Á÷ 9±Þ Á¤º¸½Ã½ºÅÛ º¸¾È
2023³âµµ ±¹°¡Á÷ 7±Þ Á¤º¸º¸È£·Ð
2023³âµµ ±¹°¡Á÷ 9±Þ Á¤º¸º¸È£·Ð
1. º» µµ¼¿¡´Â ¼öÇèÀÚÀÇ È¿À²ÀûÀÎ ÇнÀÀ» À§ÇØ ÀúÀÚ°¡ Á÷Á¢ °ÀÇÇÏ´Â ¹«·á µ¿¿µ»óÀÌ Á¦°øµË´Ï´Ù.
2. ÇнÀ È¿À²À» ³ôÀ̱â À§ÇØ °ø¹«¿ø ½ÃÇè°ú Á¤º¸º¸¾È±â»ç¿¡ ÃâÁ¦µÈ ³»¿ëÀº »öÀ» ±¸ºÐÇØ Ç¥½ÃÇÏ¿´½À´Ï´Ù. »ö»óÀ¸·Î ±¸ºÐÇÑ ºÎºÐÀº ¹Ýµå½Ã ÇнÀÇϱ⠹ٶø´Ï´Ù.
3. º» µµ¼ ¿Ü¿¡ º°µµ·Î Ãâ°£µÈ ¡¸±âÃâ¹®Á¦Áý¡¹À» ÇÔ²² °øºÎÇÏ¸é ´õ È¿À²ÀûÀ¸·Î ½ÃÇè¿¡ ´ëºñÇÒ ¼ö ÀÖ½À´Ï´Ù. ¡¸Á¤º¸º¸È£·Ð¡¹°ú ¡¸Á¤º¸º¸¾È±â»ç¡¹ ÃֽŠ±âÃâ¹®Á¦¸¦ ÀÌ Ã¥ÀÇ ¸ñÂ÷¿Í ÀÏÄ¡Çϵµ·Ï ¼ø¼¸¦ Á¤¸®Çß½À´Ï´Ù. ±âÃâ¹®Á¦¸¦ Ç®¸é¼ ÀÌ Ã¥À» ÅëÇØ °³³äÀ» È®ÀÎÇØ °£´Ù¸é º¯ÇüµÈ ¹®Á¦¸¦ Ǫ´Â µ¥ Å« ÈûÀÌ µÉ °ÍÀÔ´Ï´Ù.
2. ÇнÀ È¿À²À» ³ôÀ̱â À§ÇØ °ø¹«¿ø ½ÃÇè°ú Á¤º¸º¸¾È±â»ç¿¡ ÃâÁ¦µÈ ³»¿ëÀº »öÀ» ±¸ºÐÇØ Ç¥½ÃÇÏ¿´½À´Ï´Ù. »ö»óÀ¸·Î ±¸ºÐÇÑ ºÎºÐÀº ¹Ýµå½Ã ÇнÀÇϱ⠹ٶø´Ï´Ù.
3. º» µµ¼ ¿Ü¿¡ º°µµ·Î Ãâ°£µÈ ¡¸±âÃâ¹®Á¦Áý¡¹À» ÇÔ²² °øºÎÇÏ¸é ´õ È¿À²ÀûÀ¸·Î ½ÃÇè¿¡ ´ëºñÇÒ ¼ö ÀÖ½À´Ï´Ù. ¡¸Á¤º¸º¸È£·Ð¡¹°ú ¡¸Á¤º¸º¸¾È±â»ç¡¹ ÃֽŠ±âÃâ¹®Á¦¸¦ ÀÌ Ã¥ÀÇ ¸ñÂ÷¿Í ÀÏÄ¡Çϵµ·Ï ¼ø¼¸¦ Á¤¸®Çß½À´Ï´Ù. ±âÃâ¹®Á¦¸¦ Ç®¸é¼ ÀÌ Ã¥À» ÅëÇØ °³³äÀ» È®ÀÎÇØ °£´Ù¸é º¯ÇüµÈ ¹®Á¦¸¦ Ǫ´Â µ¥ Å« ÈûÀÌ µÉ °ÍÀÔ´Ï´Ù.