¡á »ó¼¼ À̹ÌÁö
¡á Ã¥ÀÇ Æ¯Â¡
1. º» µµ¼¿¡´Â ¼öÇèÀÚÀÇ È¿À²ÀûÀÎ ÇнÀÀ» À§ÇØ Àú°¡°¡ Á÷Á¢ °ÀÇÇÏ´Â À¯·á µ¿¿µ»ó °ÀǸ¦ ½ºÅ͵ð ³ëÆ® »çÀÌÆ®(https://studynote.co.kr)¿¡¼ Á¦°øÇÕ´Ï´Ù.
2. ÀÌ Ã¥Àº ¡¸Á¤º¸º¸¾È±â»ç․»ê¾÷±â»ç¡¹¿Í ¡¸Àü»êÁ÷ Á¤º¸º¸È£·Ð¡¹ ±âÃâ¹®Á¦¸¦ Áß½ÉÀ¸·Î ³»¿ëÀ» ±¸¼ºÇØ È¿À²ÀûÀ¸·Î µÎ ½ÃÇèÀ» ´ëºñÇÒ ¼ö ÀÖ½À´Ï´Ù.
3. º»¹®ÀÇ ³»¿ëÀ» Á» ´õ ÀÌÇØÇϱ⠽±µµ·Ï ÇØ´ç ³»¿ëÀ» ±×¸²À¸·Î ÀÚ¼¼È÷ ¼³¸íÇÏ¿© ÇнÀÀÇ È¿À²À» ³ô¿´½À´Ï´Ù.
4. ÇнÀÇÑ ³»¿ëÀ» ½ÇÁ¦ ±âÃâ¹®Á¦¸¦ Ç®¾îº¸¸é¼ º¹½ÀÇÒ ¼ö ÀÖµµ·Ï ±âÃâÈ®Àι®Á¦¸¦ ¾ö¼±ÇÏ¿© ¼ö·ÏÇÏ¿´°í, ÃֽбâÃâ¹®Á¦¸¦ Ç®¾îº½À¸·Î½á ÃÖ±Ù ÃâÁ¦°æÇâÀ» ÆÄ¾ÇÇÏ°í ¼ö°ËÀÚÀÇ ½Ç·ÂÀ» È®ÀÎÇÒ ¼ö ÀÖµµ·Ï ÇÏ¿´½À´Ï´Ù.
¡á ÀúÀÚ
ÀÓÀç¼±(jslim3327@gmail.com)
ÀúÀÚ ¿î¿µ Ä«Æä: http://cafe.naver.com/securitydata.cafe
ÀúÀÚ´Â 20³â ÀÌ»ó ÇÁ·Î±×·¥ °³¹ß ¹× º¸¾È°ü¸® ¾÷¹«¸¦ ¼öÇàÇÏ¿´À¸¸ç, ±â¼ú»ç Ãëµæ ÈÄ °¨¸®¾÷¹«¸¦ ¼öÇàÇÏ¸é¼ ±â¼ú»ç, Á¤º¸º¸È£·Ð, Á¤º¸º¸¾È±â»ç °ÀǸ¦ Çϰí ÀÖ½À´Ï´Ù.
Á¤º¸Åë½Å±â¼ú»ç(105ȸ)
ºÎõ´ëÇб³ °âÀÓ±³¼ö
CISSP(±¹Á¦°øÀÎÁ¤º¸½Ã½ºÅÛ º¸¾ÈÀü¹®°¡)
MCP(Microsoft certified professional)
MCDBA(Microsoft Certified Database Administrator)
MCSE(Microsoft Certified System Engineer)
±èÇüÁÖ(kh4444@naver.com)
ÀúÀÚ´Â 20³â °¡±îÀÌ ÇÁ·Î±×·¥ °³¹ß ¹× º¸¾È¾÷¹«¸¦ ¼öÇàÇÏ¿´À¸¸ç, ºÎõ´ë, Àç´É´ë, ÀÎÇϰø¾÷Àü¹®´ë, ¼ÀÏ´ë, ¼ö¿ø´ë, ¼±¹®´ë, Çѱ¹ Æú¸®ÅØ 2´ëÇÐ ³²ÀÎõķÆÛ½º Ãâ°°ú ±â´É´ëȸ °ü·Ã ½É»çÀ§¿ø, ½É»çÀå, ºÐ°úÀåÀ¸·Î Ȱµ¿Çϰí ÀÖÀ¸¸ç, ÀÏ ÇнÀ º´ÇàÁ¦, °úÁ¤Æò°¡Çü ½ÃÇè ÃâÁ¦, °¨µ¶, äÁ¡À§¿øÀ¸·Î Ȱµ¿Çϰí ÀÖ½À´Ï´Ù.
¢ß¾ÆÀÌ¿£¿¡½ºÄÄÆÛ´Ï ´ëÇ¥ÀÌ»ç
Çѱ¹»ê¾÷Àη°ø´Ü IT ºÐ¾ß Àü¹®À§¿ø Ȱµ¿(½ÃÇè ÃâÁ¦, °¨µ¶ µî)
ÀÎõÁö¿ª ÀÎÀûÀÚ¿ø°³¹ßÀ§¿øÈ¸ À§¿ø ¹× 4Â÷ »ê¾÷ºÐ°ú À§¿øÀå
±¹¸³ ÀÎõ´ëÇб³ ÀϹݴëÇпø ÄÄÇ»ÅͰøÇÐ ¹Ú»ç ÀçÇÐ
2009³â ¼¿ïµðÀÚÀμ¾ÅÍ À¥µðÀÚÀÎ ºÐ¾ß ÃÖ¿ì¼ö»ó ¼ö»ó
2013³â ´ëÇѹα¹¹ß¸í°¡ ´ë»ó ¼ÒÇÁÆ®¿þ¾î ºÐ¾ß ´ë»ó ¼ö»ó
2012³â ¼®Å¾»ê¾÷ÈÆÀå ¼öÈÆ
2013³â º§±â¿¡ ½´¹ß¸®¿¡ ÈÆÀå
Part 01 Á¤º¸º¸È£ ÀϹÝ
SECTION 01 Á¤º¸º¸È£ °ü¸®
1. º¸¾È ±â¼ú
2. Á¤º¸º¸È£ÀÇ ¸ñÇ¥(3´ë ¸ñÇ¥, 3¿øÄ¢)
3. À§Çèµµ »êÁ¤ ½Ã °í·ÁÇÒ ±¸¼º ¿ä¼Ò
4. º¸¾È ¿ë¾î ¼³¸í
5. º¸¾È°ø°Ý(Security Attack)ÀÇ Á¾·ù
SECTION 2 Á¤º¸º¸È£ ´ëÃ¥
1. °³¿ä
2. ±â¼úÀû º¸¾È
3. °ü¸®Àû º¸¾È
4. ¹°¸®Àû º¸¾È
[PART 01 ±âÃâÈ®Àι®Á¦]
Part 02 º¸¾È°ú ¾ÏÈ£(Cryptography)
SECTION 01 ¾ÏÈ£ÇÐÀÇ ÀÌÇØ
1. ¾ÏÈ£ÀÇ °³¿ä
SECTION 02 ¾ÏÈ£ ±â¹ýÀÇ ºÐ·ù
1. ÀüÄ¡¿Í ´ëÄ¡(ġȯ)
2. ½ºÆ®¸² ¾ÏÈ£¿Í ºí·Ï¾ÏÈ£
SECTION 03 ÇØÄ¿ÀÇ ¾ÏÈ£°ø°Ý ¹æ¹ý
1. º¸¾È°ø°Ý
2. °ø°Ý ¹æ½Ä
3. ¾ÏÈ£ ¾Ë°í¸®ÁòÀÇ ¾ÈÀü¼º Æò°¡
SECTION 04 ´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£È
1. ¾ÏÈ£ÀÇ ÀÇÀÇ
2. ´ëĪŰ ¾ÏÈ£(Symmetric Cryptography)
3. °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£½Ã½ºÅÛ
4. ´ëĪŰ¿Í °ø°³Å° ºñ±³
5. ´ëĪŰ¿Í °ø°³Å°(ºñ´ëĪŰ) ¹æ½Ä ºñ±³
6. ÇÏÀ̺긮µå ¹æ½Ä(´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) È¥ÇÕ)
7. ÇØ½ÃÇÔ¼ö
SECTION 05 ÀüÀÚ¼¸í°ú °ø°³Å° ±â¹Ý ±¸Á¶(PKI)
1. ÀüÀÚ¼¸í(µðÁöÅÐ ¼¸í: Digital Signature)
2. PKI(Public Key Interface, °ø°³Å° ±â¹Ý ±¸Á¶)
3. Ű, ³¼ö
SECTION 06 ÀüÀÚ»ó°Å·¡ º¸¾È
1. ÀüÀÚ»ó°Å·¡ º¸¾È °³¿ä
2. ÀüÀÚ»ó°Å·¡ º¸¾È ¿ä±¸»çÇ×
3. ÀüÀÚ»ó°Å·¡ º¸¾È °ø°Ý À¯Çü
4. ÆÇ¸ÅÀÚ ¿ä±¸»çÇ×
5. ±¸¸ÅÀÚ ¿ä±¸»çÇ×
6. PKIÀÇ ÀÀ¿ë ¸ðµ¨ÀÎ SET(Secure Electronic Transaction)
7. ÀüÀÚÈÆó(Electronic Cash) º¸¾È
8. °¡»óÈÆó, ºñÆ®ÄÚÀÎ
9. ºí·ÏüÀÎ(Block Chain)
SECTION 07 ±âŸ ¿ë¾î ¼³¸í
[PART 02 ±âÃâÈ®Àι®Á¦]
Part 03 Á¢±ÙÅëÁ¦
SECTION 01 Á¢±ÙÅëÁ¦ °³¿ä
1. Á¢±ÙÅëÁ¦(Á¢±ÙÁ¦¾î, Access Control)
2. Á¢±ÙÅëÁ¦ ±âº» ¿øÄ¢
SECTION 02 ÀÎÁõ
1. °³³ä
2. »ç¿ëÀÚ ÀÎÁõ°ú ¸Þ½ÃÁö ÀÎÁõ
3. »ç¿ëÀÚ ÀÎÁõ±â¼ú(User Authentication)
4. ÅëÇÕÀÎÁõü°è
SECTION 03 Á¢±ÙÅëÁ¦ º¸¾È¸ðµ¨
SECTION 04 Á¢±ÙÅëÁ¦ º¸¾ÈÀ§Çù
1. ÆÐ½º¿öµå Å©·¡Ä¿(Password Cracker)
[PART 03 ±âÃâÈ®Àι®Á¦]
PART 04 ³×Æ®¿öÅ© º¸¾È
SECTION 01 ³×Æ®¿öÅ© °³¿ä
1. ³×Æ®¿öÅ© °³¿ä
2. OSI 7 Layer¿Í TCP/IP
3. TCP¼¼±×¸ÕÆ®, IP ÆÐŶ, MACÇÁ·¹ÀÓ ±¸Á¶
SECTION 02 ÀÎÅͳÝ
1. ÀÎÅͳÝ
2. ARP¿Í RARP
3. TCP 3-way Hand Shake
4. ¸µÅ©¿Í Á¾´Ü °£ ´ã´ç
5. ¹Ý¼ÛÆÄ °¨Áö ´ÙÁßÁ¢¼Ó(Carrier Sense Multiple Access)
6. ³×Æ®¿öÅ© °èÃþ(3°èÃþ)ÀÇ IPv4 Addressing
7. DHCP¿Í NAT
SECTION 03 ¶ó¿ìÅÍ¿Í ¶ó¿ìÆÃ ÇÁ·ÎÅäÄÝ
1. ¶ó¿ìÅÍ
2. ¶ó¿ìÆÃ(Routing) ÇÁ·ÎÅäÄÝ
3. IP ±â¹Ý Åë½ÅÀÇ QoSº¸Àå ¹æ¾È
4. Giga ÀÎÅͳÝ
SECTION 04 ¹«¼±Åë½Å º¸¾È
1. ¹«¼± ·£ Á¾·ù¿Í º¸¾È
2. ¹«¼± ·£ÀÇ À§Ç輺
3. ¹«¼±°ø°ÝÀÇ À¯Çü
4. µð¹ÙÀ̽º ÀÎÁõ
5. Mobile IP
6. ³×Æ®¿öÅ© ÅäÆú·ÎÁö(Network Topology)
7. ȸ¼±±³È¯, ¸Þ½ÃÁö ±³È¯, ÆÐŶ±³È¯
SECTION 05 ³×Æ®¿öÅ© º¸¾È°ú ¹æÈº®
1. ³×Æ®¿öÅ© º¸¾È°ú ¹æÈº®
2. ¸Á °ü¸® ÇÁ·ÎÅäÄÝ
3. ij½ºÆÃ ¸ðµå(Casting Mode)
4. IGMP(Internet Group Management Protocol)
SECTION 06 ³×Æ®¿öÅ© ±â¹Ý º¸¾È°ø°Ý
1. ¼ºñ½º °ÅºÎ °ø°Ý °³¿ä
2. DoS, DDoS, DRDoS
3. °ø°³ ÇØÅ·µµ±¸ Á¾·ù
4. ³×Æ®¿öÅ© Ãë¾àÁ¡ ½ºÄ³´× °ø°Ý
5. APT °ø°Ý(Áö´ÉÇü Áö¼Ó À§Çù °ø°Ý: Advance Persistent Threat)
6. »çȸ°øÇÐÀû ¹æ¹ý
7. Ransomware(·£¼¶¿þ¾î)
SECTION 07 ÇØÅ·°ú ´ëÃ¥
1. ³×Æ®¿öÅ© ȯ°æ
2. Sniffing(½º´ÏÇÎ)
3. Spoofing(½ºÇªÇÎ)
4. ¼¼¼Ç ÇÏÀÌÀçÅ·(TCP Session Hijacking)
5. Phishing(ÇǽÌ)
6. ÁøÈÇÏ´Â ´Ù¾çÇÑ ÇǽÌ
7. Pharming(ÆÄ¹Ö)
8. Smishing(½º¹Ì½Ì)
9. ¸Þ¸ð¸® ÇØÅ·
10. ¸Á ºÐ¸®
11. ±âŸ º¸¾È Ä§ÇØ °ü·Ã ¿ë¾î
[PART 04 ±âÃâÈ®Àι®Á¦]
PART 05 ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
SECTION 01 À̸ÞÀÏ º¸¾È
1. À̸ÞÀÏ °ü·Ã ÇÁ·ÎÅäÄÝ
2. ÀüÀÚ¿ìÆí º¸¾ÈÅë½Å±Ô¾à(ºñ¹Ð¼º, ¹«°á¼º, ÀÎÁõ, ºÎÀιæÁö ±â´É Áö¿ø)
3. ½ºÆÔ¸ÞÀÏ ´ëÃ¥
SECTION 02 FTP º¸¾È
1. FTP(File Transfer Protocol: FileÀ» Àü´ÞÇÏ´Â ÇÁ·ÎÅäÄÝ)
SECTION 03 À¥ º¸¾È(Web Security)
1. Web
2. HTTP ÇÁ·ÎÅäÄÝ
3. SSL(Secure Socket Layer)
4. IPSec(IP Secure)
5. VPN(Virtual Private Network)
6. VLAN(Virtual LAN)
7. DNS(Domain Name System) º¸¾È
8. Wep App °£ Åë½Å±â¼ú
SECTION 04 µ¥ÀÌÅͺ£À̽º º¸¾È
1. µ¥ÀÌÅͺ£À̽º(Database) ±âº» °³³ä
2. µ¥ÀÌÅͺ£À̽º º¸¾È ÅëÁ¦
SECTION 05 µðÁöÅÐ ÄÜÅÙÃ÷ º¸È£ ¹æ¾È
1. µðÁöÅÐ ÄÜÅÙÃ÷
2. ¿öÅ͸¶Å©(WaterMark)
3. ÇΰÅÇÁ¸°ÆÃ(FingerPrinte)
4. ¿öÅ͸¶Å©¿Í ÇΰÅÇÁ¸°ÆÃ ºñ±³
5. DRM
6. MPEG21
7. ½ºÅ×°¡³ë±×·¡ÇÇ(Steganography)
SECTION 06 º¸¾È Ãë¾àÁ¡ Á¤º¸ Á¦°ø
1. OWASP(The Open Web Application Security Project)
[PART 05 ±âÃâÈ®Àι®Á¦]
PART 06 ½Ã½ºÅÛ º¸¾È
SECTION 01 ¿î¿µÃ¼Á¦ °³¿ä
1. ¿î¿µÃ¼Á¦(Operating System) °³¿ä
2. ¿î¿µÃ¼Á¦ÀÇ ±¸Á¶(Operating System Structures)
3. ¿î¿µÃ¼Á¦ÀÇ ±â¼ú ¹ßÀü È帧
4. ¿î¿µÃ¼Á¦ÀÇ ÀÔ¡¤Ãâ·Â ¹æ½Ä
SECTION 02 ¿î¿µÃ¼Á¦ ÁÖ¿ä ±¸¼º±â¼ú
1. ÇÁ·Î¼¼½º °ü¸®
2. ¸Þ¸ð¸®(±â¾ïÀåÄ¡) °ü¸®
3. ½Ã½ºÅÛ È£Ãâ(System Call)
4. ÀåÄ¡°ü¸®
SECTION 03 º¸¾È ¿î¿µÃ¼Á¦
1. º¸¾È ¿î¿µÃ¼Á¦ °³¿ä
2. º¸¾È ¿î¿µÃ¼Á¦ÀÇ ÁÖ¿ä Á¦°ø ±â´É
3. º¸¾È ¿î¿µÃ¼Á¦
4. ½Å·Ú Ç÷§Æû ¸ðµâ(TPM: Trusted Platform Module)
5. HSM(Hardware Security Module)
SECTION 04 Ŭ¶óÀÌ¾ðÆ® º¸¾È
1. ¾Ç¼º ¼ÒÇÁÆ®¿þ¾î(¾Ç¼ºÄÚµå)
2. ´Ù¾çÇÑ À¥ °ø°Ý ¹æ¹ý
3. ÀÎÅÍ³Ý È°¿ë º¸¾È
4. ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
5. ±âŸ
SECTION 05 À©µµ¿ì ¼¹ö º¸¾È
1. À©µµ¿ì °³¿ä
2. À©µµ¿ì º¸¾È
3. À©µµ¿ì ¿î¿µÃ¼Á¦ ¸í·É¾î
4. Windows ½Ã½ºÅÛ À̺¥Æ® ·Î±× Á¾·ù
5. Windows ½Ã½ºÅÛ ÇÁ·Î¼¼½º
6. À©µµ¿ì ¹× À¯´Ð½º ·Î±× ÆÄÀÏ Á¾·ù ¹× ºÐ¼®
7. Windows ±¸Á¶
SECTION 06 UNIX ¼¹ö º¸¾È
1. À¯´Ð½º °³¿ä
2. UNIX ±âº» »ç¿ë¹ý
3. À¯´Ð½º(¼Ö¶ó¸®½º) ¸í·É¾î ¹× ·Î±× ÆÄÀÏ
4. UNIX ¼¹ö º¸¾È
5. UNIX ÆÄÀÏ ½Ã½ºÅÛ
SECTION 07 ¸®´ª½º(Linux) ¼¹ö º¸¾È
SECTION 08 ¼¹ö º¸¾È °ü¸®
1. ¼¹ö°ü¸®ÀÚÀÇ ¾÷¹«
SECTION 09 °¢Á¾ ½Ã½ºÅÛ º¸¾ÈÀ§Çù ¹× ´ëÀÀÃ¥
1. ¹öÆÛ ¿À¹öÇ÷Î(Buffer Overflow) °ø°Ý
2. Æ÷¸Ë ½ºÆ®¸µ(Format String) °ø°Ý
3. ·¹À̽º ÄÁµð¼Ç(Race Condition) °ø°Ý
4. ±ÇÇÑ »ó½Â °ø°Ý(Privilege Escalation Attack)
5. ±âŸ ¿ë¾î
6. ¸ð¹ÙÀÏ ¿î¿µÃ¼Á¦(Mobile OS)
SECTION 10 Ãë¾àÁ¡ Á¡°Ë
1. Ãë¾àÁ¡ °³¿ä
2. ħÀÔ»ç½Ç È®ÀÎ
[PART 06 ±âÃâÈ®Àι®Á¦]
PART 07 Á¤º¸º¸¾È °ü¸®
SECTION 01 Á¤º¸º¸È£ Á¤Ã¥ ¹× Á¶Á÷
1. Á¤º¸º¸È£ Á¤Ã¥
2. IT º¸¾È °ü¸®
3. Á¤º¸ ½Ã½ºÅÛ °¨»ç(Information System Audit)
SECTION 02 À§Çè°ü¸®(Risk Management)
1. À§Çè°ü¸®(Risk Management)
2. À§ÇèºÐ¼®
3. À§ÇèÆò°¡
4. À§Çè´ëÃ¥
5. ÀçÇØº¹±¸°èȹ°ú RTO(Recovery Time Objective)
SECTION 03 BCP(Business Continuity Planning)
1. BCP(Business Continuity Planning)
2. ¾÷¹«¿µÇâºÐ¼®(BIA: Business Impact Assessment)
SECTION 04 Ä§ÇØ»ç°í ´ëÀÀ
1. Ä§ÇØ»ç°í ´ëÀÀ°ú Æ÷·»½Ä
2. Ä§ÇØ»ç°í ´ëÀÀ
SECTION 05 ±¹Á¦/±¹°¡ Ç¥ÁØ ¹× ÀÎÁõü°è
1. º¸¾È Á¦Ç° Æò°¡¹æ¹ý ¹× ±âÁØ
2. Á¤º¸º¸È£°ü¸®Ã¼°è(ISMS) ÀÎÁõ
3. PIMS(Personal Information Management System)
4. ±¹³» º¸¾ÈÀÎÁõ ü°è ¹× ÇýÅà ºñ±³
5. ±¹³» °³ÀÎÁ¤º¸ º¸È£ °ü·ÃÁ¦µµ ÇöȲ
6. PDCA(Plan Do Check Action)
SECTION 06 ¿ë¾î Á¤ÀÇ
[PART 07 ±âÃâÈ®Àι®Á¦]
PART 08 Á¤º¸º¸È£ °ü·Ã ¹ý±Ô
SECTION 01 ¹ý·üÀÇ ÀÌÇØ
1. ¹ý·ü Àû¿ëÀÇ ¿ì¼±¼øÀ§
2. °³ÀÎÁ¤º¸ º¸È£¹ý¿¡¼ ¹Î°¨Á¤º¸¿Í °íÀ¯½Äº°Á¤º¸ÀÇ Â÷ÀÌÁ¡
3. OECD °¡À̵å¶óÀÎ
SECTION 02 Á¤º¸º¸¾È °ü·Ã ¹ý±Ô
1. Á¤º¸Åë½Å¸Á ÀÌ¿ëÃËÁø ¹× Á¤º¸º¸È£ µî¿¡ °üÇÑ ¹ý·ü(¾àĪ: Á¤º¸Åë½Å¸Á¹ý)
2. Á¤º¸Åë½Å ±â¹Ý º¸È£¹ý
3. ÀüÀÚ¼¸í¹ý
4. °³ÀÎÁ¤º¸ º¸È£¹ý
5. °³ÀÎÁ¤º¸ º¸È£¹ý ½ÃÇà·É
6. °³ÀÎÁ¤º¸ÀÇ ¾ÈÀü¼º È®º¸Á¶Ä¡ ±âÁØ
7. ÀüÀÚÁ¤ºÎ¹ý
8. ±¹°¡Á¤º¸È ±âº»¹ý
9. ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·ü(¾àĪ: ÀüÀÚ»ó°Å·¡¹ý)
[PART 08 ±âÃâÈ®Àι®Á¦]
PART 09 ±âÃâ¹®Á¦
2018³â 2ȸ Á¤º¸º¸¾È±â»ç
2019³â 2ȸ Á¤º¸º¸¾È±â»ç
27,000¿ø
|
17,100¿ø
|
25,200¿ø
|
13,500¿ø
|
22,500¿ø
|