교육연수

Learning & Development

  • 직무전문가교육
  • 국내/해외 연수
  • 공공부문 특화교육
  • 맞춤형교육
  • 온라인교육
  • 컨퍼런스
  • 세미나
  • 교육사업 제휴
  • CUSTOMER SERVICE

공개교육

인적자원 양성 및 역량강화, 최신 트렌드와 이슈를 제시하는 KMAC 교육연수
  • 교육연수
  • 공개교육
  • 디지털/IT

[IT전문가_보안자격] CompTIA CySA+ 자격증 취득대비

보안분석, 침입 및 대응을 다루는 성능 기반의 보안 애널리스트 인증

  • PS적용
교육시간 09:00~18:00 [4일 / 32시간]
교육비
환금액 (예정) 고용보험 비환급
교육장 .
교육담당자 전승희 / 02-3786-0772 / jsh90325@kmac.co.kr
송민수 / 02-3786-0178 / hollymounts@kmac.co.kr

교육신청

일정선택
교육대상 선택
얼리버드 패키지 신청

교육신청 방법 안내

부문별 당월교육

이전 다음

교육과정소개

[교육목적]

★ CompTIA CySA+ 자격증을 취득할 수 있다.
 - 데이터 분석을 수행하고 결과를 해석하여 조직의 취약성 및 위험을 식별할 수 있다.
 - 위협 탐지 도구를 구성하고 사용할 수 있다.
 - 조직 내의 응용 프로그램과 시스템 보호할 수 있다.

[교육특징]

※ 본 교육과정은 기업/기관 맞춤형 교육(In-house)으로 온라인·오프라인 형태로 협의 운영 가능하니 문의바랍니다.

교육일정 및 내용

일시 세부내용
00월 00일
09시00분 ~ 18시00분

Threat Management
 

Apply environmental

Reconnaissance techniques using appropriate tools and processes

Analyze the results of a network reconnaissance

A network-based threat, implement or recommend the appropriate response and countermeasure

Explain the purposeof practices used to secure a corporate environment

• Procedures/common tasks

• Variables

• Tools

• Point-in-time data analysis

• Data correlation and analytics

• Data output

• Network segmentation

• Honeypot

• Endpoint security

• Group policies

• ACLs

• Hardening
and so on
 

00월 00일
09시00분 ~ 18시00분

Vulnerability Management
 

Implement an information Security vulnerability management process

Analyze the output resulting

from a vulnerability scan

Compare and contrast common vulnerabilities found in the following targets within an organization

• Identification of requirements

• Establish scanning frequency

• Configure tools to perform scans according to specification

• Execute scanning

• Generate reports

• Remediation

• Analyze reports from a vulnerability scan
and so on
 

00월 00일
09시00분 ~ 18시00분

Cyber Incident Response
 

Distinguish threat data or behavior to determine the impact of an incident

Prepare a toolkit and use appropriate forensics tools during an investigation

Explain the importance of communication during the incident response process

Analyze common symptoms to select the best course of action to support incident response

Summarize the incident recovery and post-incident response process

• Threat classification

• Factors contributing to incident severity and prioritization

• Forensics kit

• Forensic investigation suite

• Stakeholders

• Purpose of communication processes

• Role-based responsibilities

• Common network-related symptoms

• Common host-related symptoms

• Common application-related symptoms
and so on
 

00월 00일
09시00분 ~ 18시00분

Security Architecture and Tool Sets
 

Explain the relationship between frameworks,

common policies, controls, and procedures

Use data to recommend remediation of security issues related to identity and access management.

Review security architecture and makerecommendations to implement compensating controls

Use application security best practices while participating in the Software Development Life Cycle (SDLC)

Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies

• Regulatory compliance

• Frameworks

• Policies

• Controls

• Procedures

• Verifications and quality control

• Security issues associated with context-based authentication

• Security issues associated with identities

• Security issues associated with identity repositories

• Security issues associated with federation and single sign-on

• Exploits

• Security data analytics

• Manual review

• Defense in depth

• Best practices during software development

• Secure coding best practices