Ã¥¼Ò°³
´ëÇѹα¹Àº ¼¼°èÀÇ IT »ê¾÷À» À̲ø¾î°¡´Â °±¹ÀÌ´Ù. ÇÏÁö¸¸ Àü ¼¼°èÀûÀ¸·Î ÇØÅ·±â¼úÀÇ ¹ßÀüÀ¸·Î ÄÄÇ»ÅÍ ¹üÁË µî Á¤º¸È¿¡ µû¸¥ »çȸÀû ¿ª±â´ÉÀÌ ¹ß»ýÇÏ°í ÀÖ´Ù. ƯÈ÷ °ø°ø±â°ü ¹× ±â¾÷¿¡¼´Â ±× ÇÇÇØ°¡ ¸·´ëÇÏ´Ù. ÀÌ·¯ÇÑ ½ÃÁ¡¿¡¼ Á¤º¸º¸¾È Àü¹®°¡ÀÇ Á߿伺°ú ±× ¿ªÇÒÀÌ ºÎ°¢µÇ°í ÀÖ´Ù. Á¤º¸º¸¾È Àü¹®°¡°¡ µÇ±â À§ÇÑ À̵éÀ» À§Çؼ ±âº» °¡À̵带 Á¦½ÃÇÏ´Â ÇÑÆí CISSP ÀÚ°ÝÁõÀ» ÃëµæÇÏ´Â À̵éÀ» À§Çؼ´Â ÁÖ¿ä ³»¿ë, ¹®Á¦, ¹®Á¦Ç®ÀÌ µîÀ» Æ÷ÇÔÇÏ°í ÀÖ´Ù. ºÎ·ÏÀ¸·Î´Â CISSP ½ÇÀü ¸ðÀÇ°í»ç¸¦ ¼ö·ÏÇÏ¿© ¼öÇè»ýÀÇ È¿À²¼ºÀ» ³ô¿´´Ù.
ÀúÀÚ¼Ò°³
¼¿ï»ê¾÷´ë ¹Ú»ç°úÁ¤À» ¼ö·áÇÏ¿´´Ù. IBM ÄÁ¼³Æüºñ½º Â÷Àå, µ¿¾çÁ¾ÇÕ±ÝÀ¶Áõ±Ç °úÀåÀ» ¿ªÀÓÇÏ¿´´Ù. ÇöÀç SPE ±â¼ú»ç ÄÁ¼³Æà CEOÀ̸ç, Çѱ¹°øÀΰ¨¸®´Ü ºñ»ó±Ù °¨¸®¿øÀÌ´Ù. 74ȸ Á¤º¸°ü¸®±â¼ú»ç, ¼ö¼®°¨¸®¿ø, PMP, ITIL, MCSE, OCP, ÅõÀÚ»ó´ã»ç, ±³¿øÀÚ°ÝÀ» º¸À¯ÇÏ°í ÀÖ´Ù.
µ¿¾çÁ¾ÇÕ±ÝÀ¶Áõ±Ç ÀçÁ÷½ÃÀý Â÷¼¼´ë ±ÝÀ¶½Ã½ºÅÛ(ISP/EA/SOA), Ȩ Æ®·¹À̵ù ½Ã½ºÅÛ, °í°´Á¢Á¡ CRM, ¿Â¶óÀÎ °æ¿µÁ¤º¸½Ã½ºÅÛ ¿Ü ´Ù¼öÀÇ ÇÁ·ÎÁ§Æ®¸¦ ¼öÇàÇÏ¿´´Ù. ÀÌÈÄ °Ç°º¸Çè½É»ç Æò°¡¿ø Â÷¼¼´ë DW ÄÁ¼³ÆÃ, ÀϺ» NTT Data, NTT DoCoMo CTI ÇÁ·ÎÁ§Æ®¸¦ ¼öÇàÇÏ¿´°í, ÅäÁö°³¹ß°ø»ç, ¼Ò¹æ¹æÀçû ¿Ü ´Ù¼ö °¨¸® °æ·Âµµ ÀÖ´Ù.
ȨÆäÀÌÁö(www.serigisulsa.com)¿¡¼ Á¤º¸Ã³¸®±â¼ú»ç, Á¤º¸½Ã½ºÅÛ°¨¸®»ç µî Àü¹® ÀÚ°ÝÁõÀ» ÃëµæÇÏ·Á´Â »ç¶÷µéÀ» ´ë»óÀ¸·Î ÇÑ ±³À°°úÁ¤À» Á¦°øÇÏ°í ÀÖ´Ù. Àú¼·Î´Â ¡ºAdvanced Oracle Database È°¿ë°ú Æ©´×¡», ¡ºµðÁöÅÐ µ¥ÀÌÅÍ ¸Å´ÏÁö¸ÕÆ®¡», ¡ºÁ¤º¸Ã³¸®±â¼ú»ç ¼ö°ËÀü·«¡», ¡ºÁ¤º¸Ã³¸®±â¼ú»ç ±âÃâ¹®Á¦ Çؼ³Áý¡», ¡ºÁ¤º¸ ½Ã½ºÅÛ °¨¸®»ç ÇÕ°Ý Àü·«¼¡», ¡ºÁ¤º¸Ã³¸® ±â¼ú»ç ÇÕ°Ý Àü·«¼¡», ¡ºÁ¤º¸Ã³¸®±â¼ú»ç Çٽɹ®Á¦ Çؼ³Áý¡»¡ºÀÓº£½ºÆ® Á¤º¸Åë½Å ±â¼ú»ç Åë½ÅÀÌ·ÐÆí¡» µîÀÌ ÀÖ´Ù.
¸ñÂ÷
1 STEP Á¢±ÙÅëÁ¦(Access Control)
1. Á¢±ÙÀÇ °³¿ä
2. ÀüÈÁ¢¼Ó Á¢±Ù
3. ½Äº°°ú ÀÎÁõ
4. ÀÎÁõ °ü¸®¸¦ À§ÇÑ SSO(Single Sign On)
5. Á¢±Ù ÅëÁ¦ °ü¸®¿Í ÀÎÁõ ÇÁ·ÎÅäÄÝ
6. Data ±â¹Ý Á¢±Ù ÅëÁ¦ ±â¼ú
7. Á¢±ÙÅëÁ¦ º¸¾È ¸ðµ¨
8. °ø°Ý(Attacks)
9. ¹æ¾î
2 STEP Åë½Å
1. OSI 7Layer(Open System Interconnection)
2. VPN(Virtual Private Network)
3. Wireless LAN
3 STEP º¸¾È°ü¸®
1. º¸¾È°ü¸® °³³ä ¹× ¿øÄ¢
2. µ¥ÀÌÅÍ ºÐ·ù(Data Classification)
3. Policy, Standard, Guideline, Procedure
4. À§Çè°ü¸®
5. º¸¾È ÀÎ½Ä ±³À°°ú °³ÀÎ º¸¾È
6. »çȸ °øÇÐ(Social Engineering)
4 STEP ÀÀ¿ë°³¹ß
1. Application ȯ°æ
2. DataBase & Data Warehouse
3. SDLC(Software Development Life Cycle) ¸ðµ¨°ú °´Ã¼ÁöÇâ
4. Application ÅëÁ¦¿Í ¾Ç¼ºÄÚµå, °ø°ÝÀÚ ºÐ·ù
5 STEP ¾ÏÈ£ÇÐ(Cryptography)
1. ¾ÏÈ£ÇÐ
2. ¾ÏÈ£ÀÇ Á¾·ù
3. ´ëĪŰ ¾ÏÈ£È
4. ºñ´ëĪ ¾ÏÈ£È(Asymmetric Cryptography)
5. Hash ¾Ë°í¸®Áò, MAC
6. µðÁöÅÐ ¼¸í°ú PKI
7. ¾ÏÈ£ ½Ã½ºÅÛÀÇ °ø°Ý À¯Çü
8. OSI 7Layer¿¡¼ÀÇ ¾ÏÈ£È
9. À̸ÞÀÏ º¸¾È
10. ±âŸ ¾ÏÈ£ °ü·Ã »çÇ×
6 STEP º¸¾È±¸Á¶ ¹× ¸ðµ¨
1. ÄÄÇ»ÅÍ ±¸Á¶
2. OS º¸¾È ¸ÞÄ¿´ÏÁò
3. º¸¾È ¸ðµ¨
4. ½Ã½ºÅÛ Æò°¡ ±âÁØ
7 STEP ¿î¿µº¸¾ÈÅëÁ¦
1. ÅëÁ¦(Control)
8 STEP BCP/DRP(ºñ»ó°èȹ)
1. BCP/DRP °³³ä
2. BIA(Business Impact Analysis, »ç¾÷¿µÇâºÐ¼®)
3. º¹±¸ Àü·«
4. º¹±¸¿Í ȸº¹
5. CPP(Continuty Planning Process, ¿¬¼Ó¼º °èȹ ÇÁ·Î¼¼½º)
9 STEP ¹ý ¼ö»ç ¹× À±¸®ÇÐ
1. ÄÄÇ»ÅÍ ¹üÁË¿Í »çÀ̹ö ¹üÁË
2. ÄÄÇ»ÅÍ Ä§ÇØ
3. ÄÄÇ»ÅÍ ¹üÁË ¼ö»ç(Computer Forensics)
4. Áõ°Å(Evidence)
5. ¹ý(Law)°ú º¸¾È ¿øÄ¢
6. ±âŸ
10 STEP ¹°¸®Àû º¸¾È
1. ¹°¸®Àû º¸¾ÈÀÇ °³¿ä
2. ½Ã¼³°ü¸®
3. Àü·Â ¹× ȯ°æ º¸¾È
4. ÈÀ翹¹æ ŽÁö Áø¾Ð
5. °æ°è º¸¾È(Perimeter Security)
ºÎ·Ï: CISSP ½ÇÀü ¸ðÀÇ°í»ç