- ÇöÀç À§Ä¡
- home > ÄÄÇ»ÅÍ¡¤ICT¡¤¾îÇÐ > ÄÄÇ»ÅÍ¡¤IT ¼öÇè¼ > ¿öµå/ÄÄÈ°/»ç¹«ÀÚµ¿È > ÃÖÀûÇÕ Á¤º¸º¸¾È±â»ç»ê¾÷±â»ç Çʱâ[¼º¾È´ç]
Á¤º¸º¸¾È±â»ç.»ê¾÷±â»ç¿Í Àü»êÁ÷ Á¤º¸º¸È£·Ð ±âÃâ¹®Á¦¸¦ Áß½ÉÀ¸·Î ³»¿ëÀ» ±¸¼ºÇÑ ¼öÇè¼´Ù. ÇØ´ç ³»¿ëÀ» ±×¸²À¸·Î ÀÚ¼¼È÷ ¼³¸íÇÏ¿© ÇнÀÀÇ È¿À²À» ³ô¿´°í, ½ÇÁ¦ ±âÃâ¹®Á¦¸¦ Ç®¾îº¸¸é¼ º¹½ÀÇÒ ¼ö ÀÖµµ·Ï ±âÃâÈ®Àι®Á¦¸¦ ¾ö¼±ÇÏ¿© ¼ö·ÏÇÏ¿´´Ù. ÃֽŠ±âÃâ¹®Á¦¸¦ Ç®¾îº½À¸·Î½á ÃÖ±Ù ÃâÁ¦°æÇâÀ» ÆľÇÇÏ°í ¼ö°ËÀÚÀÇ ½Ç·ÂÀ» È®ÀÎÇÒ ¼ö ÀÖ´Ù.
ÀúÀÚ: ÀÓÀç¼±
Part 01 Á¤º¸º¸È£ ÀϹÝ
SECTION 01 Á¤º¸º¸È£ °ü¸®
1. º¸¾È ±â¼ú
2. Á¤º¸º¸È£ÀÇ ¸ñÇ¥(3´ë ¸ñÇ¥, 3¿øÄ¢)
3. À§Çèµµ »êÁ¤ ½Ã °í·ÁÇÒ ±¸¼º ¿ä¼Ò
4. º¸¾È ¿ë¾î ¼³¸í
5. º¸¾È°ø°Ý(Security Attack)ÀÇ Á¾·ù
SECTION 2 Á¤º¸º¸È£ ´ëÃ¥
1. °³¿ä
2. ±â¼úÀû º¸¾È
3. °ü¸®Àû º¸¾È
4. ¹°¸®Àû º¸¾È
[PART 01 ±âÃâÈ®Àι®Á¦]
Part 02 º¸¾È°ú ¾ÏÈ£(Cryptography)
SECTION 01 ¾ÏÈ£ÇÐÀÇ ÀÌÇØ
1. ¾ÏÈ£ÀÇ °³¿ä
SECTION 02 ¾ÏÈ£ ±â¹ýÀÇ ºÐ·ù
1. ÀüÄ¡¿Í ´ëÄ¡(ġȯ)
2. ½ºÆ®¸² ¾ÏÈ£¿Í ºí·Ï¾ÏÈ£
SECTION 03 ÇØÄ¿ÀÇ ¾ÏÈ£°ø°Ý ¹æ¹ý
1. º¸¾È°ø°Ý
2. °ø°Ý ¹æ½Ä
3. ¾ÏÈ£ ¾Ë°í¸®ÁòÀÇ ¾ÈÀü¼º Æò°¡
SECTION 04 ´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£È
1. ¾ÏÈ£ÀÇ ÀÇÀÇ
2. ´ëĪŰ ¾ÏÈ£(Symmetric Cryptography)
3. °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£½Ã½ºÅÛ
4. ´ëĪŰ¿Í °ø°³Å° ºñ±³
5. ´ëĪŰ¿Í °ø°³Å°(ºñ´ëĪŰ) ¹æ½Ä ºñ±³
6. ÇÏÀ̺긮µå ¹æ½Ä(´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) È¥ÇÕ)
7. ÇؽÃÇÔ¼ö
SECTION 05 ÀüÀÚ¼¸í°ú °ø°³Å° ±â¹Ý ±¸Á¶(PKI)
1. ÀüÀÚ¼¸í(µðÁöÅÐ ¼¸í: Digital Signature)
2. PKI(Public Key Interface, °ø°³Å° ±â¹Ý ±¸Á¶)
3. Å°, ³¼ö
SECTION 06 ÀüÀÚ»ó°Å·¡ º¸¾È
1. ÀüÀÚ»ó°Å·¡ º¸¾È °³¿ä
2. ÀüÀÚ»ó°Å·¡ º¸¾È ¿ä±¸»çÇ×
3. ÀüÀÚ»ó°Å·¡ º¸¾È °ø°Ý À¯Çü
4. ÆǸÅÀÚ ¿ä±¸»çÇ×
5. ±¸¸ÅÀÚ ¿ä±¸»çÇ×
6. PKIÀÇ ÀÀ¿ë ¸ðµ¨ÀÎ SET(Secure Electronic Transaction)
7. ÀüÀÚÈÆó(Electronic Cash) º¸¾È
8. °¡»óÈÆó, ºñÆ®ÄÚÀÎ
9. ºí·ÏüÀÎ(Block Chain)
SECTION 07 ±âŸ ¿ë¾î ¼³¸í
[PART 02 ±âÃâÈ®Àι®Á¦]
Part 03 Á¢±ÙÅëÁ¦
SECTION 01 Á¢±ÙÅëÁ¦ °³¿ä
1. Á¢±ÙÅëÁ¦(Á¢±ÙÁ¦¾î, Access Control)
2. Á¢±ÙÅëÁ¦ ±âº» ¿øÄ¢
SECTION 02 ÀÎÁõ
1. °³³ä
2. »ç¿ëÀÚ ÀÎÁõ°ú ¸Þ½ÃÁö ÀÎÁõ
3. »ç¿ëÀÚ ÀÎÁõ±â¼ú(User Authentication)
4. ÅëÇÕÀÎÁõü°è
SECTION 03 Á¢±ÙÅëÁ¦ º¸¾È¸ðµ¨
SECTION 04 Á¢±ÙÅëÁ¦ º¸¾ÈÀ§Çù
1. Æнº¿öµå Å©·¡Ä¿(Password Cracker)
[PART 03 ±âÃâÈ®Àι®Á¦]
PART 04 ³×Æ®¿öÅ© º¸¾È
SECTION 01 ³×Æ®¿öÅ© °³¿ä
1. ³×Æ®¿öÅ© °³¿ä
2. OSI 7 Layer¿Í TCP/IP
3. TCP¼¼±×¸ÕÆ®, IP ÆÐŶ, MACÇÁ·¹ÀÓ ±¸Á¶
SECTION 02 ÀÎÅͳÝ
1. ÀÎÅͳÝ
2. ARP¿Í RARP
3. TCP 3-way Hand Shake
4. ¸µÅ©¿Í Á¾´Ü °£ ´ã´ç
5. ¹Ý¼ÛÆÄ °¨Áö ´ÙÁßÁ¢¼Ó(Carrier Sense Multiple Access)
6. ³×Æ®¿öÅ© °èÃþ(3°èÃþ)ÀÇ IPv4 Addressing
7. DHCP¿Í NAT
SECTION 03 ¶ó¿ìÅÍ¿Í ¶ó¿ìÆà ÇÁ·ÎÅäÄÝ
1. ¶ó¿ìÅÍ
2. ¶ó¿ìÆÃ(Routing) ÇÁ·ÎÅäÄÝ
3. IP ±â¹Ý Åë½ÅÀÇ QoSº¸Àå ¹æ¾È
4. Giga ÀÎÅͳÝ
SECTION 04 ¹«¼±Åë½Å º¸¾È
1. ¹«¼± ·£ Á¾·ù¿Í º¸¾È
2. ¹«¼± ·£ÀÇ À§Ç輺
3. ¹«¼±°ø°ÝÀÇ À¯Çü
4. µð¹ÙÀ̽º ÀÎÁõ
5. Mobile IP
6. ³×Æ®¿öÅ© ÅäÆú·ÎÁö(Network Topology)
7. ȸ¼±±³È¯, ¸Þ½ÃÁö ±³È¯, ÆÐŶ±³È¯
SECTION 05 ³×Æ®¿öÅ© º¸¾È°ú ¹æȺ®
1. ³×Æ®¿öÅ© º¸¾È°ú ¹æȺ®
2. ¸Á °ü¸® ÇÁ·ÎÅäÄÝ
3. ij½ºÆà ¸ðµå(Casting Mode)
4. IGMP(Internet Group Management Protocol)
SECTION 06 ³×Æ®¿öÅ© ±â¹Ý º¸¾È°ø°Ý
1. ¼ºñ½º °ÅºÎ °ø°Ý °³¿ä
2. DoS, DDoS, DRDoS
3. °ø°³ ÇØÅ·µµ±¸ Á¾·ù
4. ³×Æ®¿öÅ© Ãë¾àÁ¡ ½ºÄ³´× °ø°Ý
5. APT °ø°Ý(Áö´ÉÇü Áö¼Ó À§Çù °ø°Ý: Advance Persistent Threat)
6. »çȸ°øÇÐÀû ¹æ¹ý
7. Ransomware(·£¼¶¿þ¾î)
SECTION 07 ÇØÅ·°ú ´ëÃ¥
1. ³×Æ®¿öÅ© ȯ°æ
2. Sniffing(½º´ÏÇÎ)
3. Spoofing(½ºÇªÇÎ)
4. ¼¼¼Ç ÇÏÀÌÀçÅ·(TCP Session Hijacking)
5. Phishing(ÇǽÌ)
6. ÁøÈÇÏ´Â ´Ù¾çÇÑ ÇǽÌ
7. Pharming(ÆĹÖ)
8. Smishing(½º¹Ì½Ì)
9. ¸Þ¸ð¸® ÇØÅ·
10. ¸Á ºÐ¸®
11. ±âŸ º¸¾È ħÇØ °ü·Ã ¿ë¾î
[PART 04 ±âÃâÈ®Àι®Á¦]
PART 05 ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
SECTION 01 À̸ÞÀÏ º¸¾È
1. À̸ÞÀÏ °ü·Ã ÇÁ·ÎÅäÄÝ
2. ÀüÀÚ¿ìÆí º¸¾ÈÅë½Å±Ô¾à(ºñ¹Ð¼º, ¹«°á¼º, ÀÎÁõ, ºÎÀιæÁö ±â´É Áö¿ø)
3. ½ºÆÔ¸ÞÀÏ ´ëÃ¥
SECTION 02 FTP º¸¾È
1. FTP(File Transfer Protocol: FileÀ» Àü´ÞÇÏ´Â ÇÁ·ÎÅäÄÝ)
SECTION 03 À¥ º¸¾È(Web Security)
1. Web
2. HTTP ÇÁ·ÎÅäÄÝ
3. SSL(Secure Socket Layer)
4. IPSec(IP Secure)
5. VPN(Virtual Private Network)
6. VLAN(Virtual LAN)
7. DNS(Domain Name System) º¸¾È
8. Wep App °£ Åë½Å±â¼ú
SECTION 04 µ¥ÀÌÅͺ£À̽º º¸¾È
1. µ¥ÀÌÅͺ£À̽º(Database) ±âº» °³³ä
2. µ¥ÀÌÅͺ£À̽º º¸¾È ÅëÁ¦
SECTION 05 µðÁöÅÐ ÄÜÅÙÃ÷ º¸È£ ¹æ¾È
1. µðÁöÅÐ ÄÜÅÙÃ÷
2. ¿öÅ͸¶Å©(WaterMark)
3. ÇΰÅÇÁ¸°ÆÃ(FingerPrinte)
4. ¿öÅ͸¶Å©¿Í ÇΰÅÇÁ¸°Æà ºñ±³
5. DRM
6. MPEG21
7. ½ºÅ×°¡³ë±×·¡ÇÇ(Steganography)
SECTION 06 º¸¾È Ãë¾àÁ¡ Á¤º¸ Á¦°ø
1. OWASP(The Open Web Application Security Project)
[PART 05 ±âÃâÈ®Àι®Á¦]
PART 06 ½Ã½ºÅÛ º¸¾È
SECTION 01 ¿î¿µÃ¼Á¦ °³¿ä
1. ¿î¿µÃ¼Á¦(Operating System) °³¿ä
2. ¿î¿µÃ¼Á¦ÀÇ ±¸Á¶(Operating System Structures)
3. ¿î¿µÃ¼Á¦ÀÇ ±â¼ú ¹ßÀü È帧
4. ¿î¿µÃ¼Á¦ÀÇ ÀÔ¡¤Ãâ·Â ¹æ½Ä
SECTION 02 ¿î¿µÃ¼Á¦ ÁÖ¿ä ±¸¼º±â¼ú
1. ÇÁ·Î¼¼½º °ü¸®
2. ¸Þ¸ð¸®(±â¾ïÀåÄ¡) °ü¸®
3. ½Ã½ºÅÛ È£Ãâ(System Call)
4. ÀåÄ¡°ü¸®
SECTION 03 º¸¾È ¿î¿µÃ¼Á¦
1. º¸¾È ¿î¿µÃ¼Á¦ °³¿ä
2. º¸¾È ¿î¿µÃ¼Á¦ÀÇ ÁÖ¿ä Á¦°ø ±â´É
3. º¸¾È ¿î¿µÃ¼Á¦
4. ½Å·Ú Ç÷§Æû ¸ðµâ(TPM: Trusted Platform Module)
5. HSM(Hardware Security Module)
SECTION 04 Ŭ¶óÀ̾ðÆ® º¸¾È
1. ¾Ç¼º ¼ÒÇÁÆ®¿þ¾î(¾Ç¼ºÄÚµå)
2. ´Ù¾çÇÑ À¥ °ø°Ý ¹æ¹ý
3. ÀÎÅÍ³Ý È°¿ë º¸¾È
4. ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
5. ±âŸ
SECTION 05 À©µµ¿ì ¼¹ö º¸¾È
1. À©µµ¿ì °³¿ä
2. À©µµ¿ì º¸¾È
3. À©µµ¿ì ¿î¿µÃ¼Á¦ ¸í·É¾î
4. Windows ½Ã½ºÅÛ À̺¥Æ® ·Î±× Á¾·ù
5. Windows ½Ã½ºÅÛ ÇÁ·Î¼¼½º
6. À©µµ¿ì ¹× À¯´Ð½º ·Î±× ÆÄÀÏ Á¾·ù ¹× ºÐ¼®
7. Windows ±¸Á¶
SECTION 06 UNIX ¼¹ö º¸¾È
1. À¯´Ð½º °³¿ä
2. UNIX ±âº» »ç¿ë¹ý
3. À¯´Ð½º(¼Ö¶ó¸®½º) ¸í·É¾î ¹× ·Î±× ÆÄÀÏ
4. UNIX ¼¹ö º¸¾È
5. UNIX ÆÄÀÏ ½Ã½ºÅÛ
SECTION 07 ¸®´ª½º(Linux) ¼¹ö º¸¾È
SECTION 08 ¼¹ö º¸¾È °ü¸®
1. ¼¹ö°ü¸®ÀÚÀÇ ¾÷¹«
SECTION 09 °¢Á¾ ½Ã½ºÅÛ º¸¾ÈÀ§Çù ¹× ´ëÀÀÃ¥
1. ¹öÆÛ ¿À¹öÇ÷Î(Buffer Overflow) °ø°Ý
2. Æ÷¸Ë ½ºÆ®¸µ(Format String) °ø°Ý
3. ·¹À̽º ÄÁµð¼Ç(Race Condition) °ø°Ý
4. ±ÇÇÑ »ó½Â °ø°Ý(Privilege Escalation Attack)
5. ±âŸ ¿ë¾î
6. ¸ð¹ÙÀÏ ¿î¿µÃ¼Á¦(Mobile OS)
SECTION 10 Ãë¾àÁ¡ Á¡°Ë
1. Ãë¾àÁ¡ °³¿ä
2. ħÀÔ»ç½Ç È®ÀÎ
[PART 06 ±âÃâÈ®Àι®Á¦]
PART 07 Á¤º¸º¸¾È °ü¸®
SECTION 01 Á¤º¸º¸È£ Á¤Ã¥ ¹× Á¶Á÷
1. Á¤º¸º¸È£ Á¤Ã¥
2. IT º¸¾È °ü¸®
3. Á¤º¸ ½Ã½ºÅÛ °¨»ç(Information System Audit)
SECTION 02 À§Çè°ü¸®(Risk Management)
1. À§Çè°ü¸®(Risk Management)
2. À§ÇèºÐ¼®
3. À§ÇèÆò°¡
4. À§Çè´ëÃ¥
5. ÀçÇغ¹±¸°èȹ°ú RTO(Recovery Time Objective)
SECTION 03 BCP(Business Continuity Planning)
1. BCP(Business Continuity Planning)
2. ¾÷¹«¿µÇâºÐ¼®(BIA: Business Impact Assessment)
SECTION 04 ħÇØ»ç°í ´ëÀÀ
1. ħÇØ»ç°í ´ëÀÀ°ú Æ÷·»½Ä
2. ħÇØ»ç°í ´ëÀÀ
SECTION 05 ±¹Á¦/±¹°¡ Ç¥ÁØ ¹× ÀÎÁõü°è
1. º¸¾È Á¦Ç° Æò°¡¹æ¹ý ¹× ±âÁØ
2. Á¤º¸º¸È£°ü¸®Ã¼°è(ISMS) ÀÎÁõ
3. PIMS(Personal Information Management System)
4. ±¹³» º¸¾ÈÀÎÁõ ü°è ¹× ÇýÅà ºñ±³
5. ±¹³» °³ÀÎÁ¤º¸ º¸È£ °ü·ÃÁ¦µµ ÇöȲ
6. PDCA(Plan Do Check Action)
SECTION 06 ¿ë¾î Á¤ÀÇ
[PART 07 ±âÃâÈ®Àι®Á¦]
PART 08 Á¤º¸º¸È£ °ü·Ã ¹ý±Ô
SECTION 01 ¹ý·üÀÇ ÀÌÇØ
1. ¹ý·ü Àû¿ëÀÇ ¿ì¼±¼øÀ§
2. °³ÀÎÁ¤º¸ º¸È£¹ý¿¡¼ ¹Î°¨Á¤º¸¿Í °íÀ¯½Äº°Á¤º¸ÀÇ Â÷ÀÌÁ¡
3. OECD °¡À̵å¶óÀÎ
SECTION 02 Á¤º¸º¸¾È °ü·Ã ¹ý±Ô
1. Á¤º¸Åë½Å¸Á ÀÌ¿ëÃËÁø ¹× Á¤º¸º¸È£ µî¿¡ °üÇÑ ¹ý·ü(¾àĪ: Á¤º¸Åë½Å¸Á¹ý)
2. Á¤º¸Åë½Å ±â¹Ý º¸È£¹ý
3. ÀüÀÚ¼¸í¹ý
4. °³ÀÎÁ¤º¸ º¸È£¹ý
5. °³ÀÎÁ¤º¸ º¸È£¹ý ½ÃÇà·É
6. °³ÀÎÁ¤º¸ÀÇ ¾ÈÀü¼º È®º¸Á¶Ä¡ ±âÁØ
7. ÀüÀÚÁ¤ºÎ¹ý
8. ±¹°¡Á¤º¸È ±âº»¹ý
9. ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·ü(¾àĪ: ÀüÀÚ»ó°Å·¡¹ý)
[PART 08 ±âÃâÈ®Àι®Á¦]
PART 09 ±âÃâ¹®Á¦
2018³â 2ȸ Á¤º¸º¸¾È±â»ç
2019³â 2ȸ Á¤º¸º¸¾È±â»ç
SECTION 01 Á¤º¸º¸È£ °ü¸®
1. º¸¾È ±â¼ú
2. Á¤º¸º¸È£ÀÇ ¸ñÇ¥(3´ë ¸ñÇ¥, 3¿øÄ¢)
3. À§Çèµµ »êÁ¤ ½Ã °í·ÁÇÒ ±¸¼º ¿ä¼Ò
4. º¸¾È ¿ë¾î ¼³¸í
5. º¸¾È°ø°Ý(Security Attack)ÀÇ Á¾·ù
SECTION 2 Á¤º¸º¸È£ ´ëÃ¥
1. °³¿ä
2. ±â¼úÀû º¸¾È
3. °ü¸®Àû º¸¾È
4. ¹°¸®Àû º¸¾È
[PART 01 ±âÃâÈ®Àι®Á¦]
Part 02 º¸¾È°ú ¾ÏÈ£(Cryptography)
SECTION 01 ¾ÏÈ£ÇÐÀÇ ÀÌÇØ
1. ¾ÏÈ£ÀÇ °³¿ä
SECTION 02 ¾ÏÈ£ ±â¹ýÀÇ ºÐ·ù
1. ÀüÄ¡¿Í ´ëÄ¡(ġȯ)
2. ½ºÆ®¸² ¾ÏÈ£¿Í ºí·Ï¾ÏÈ£
SECTION 03 ÇØÄ¿ÀÇ ¾ÏÈ£°ø°Ý ¹æ¹ý
1. º¸¾È°ø°Ý
2. °ø°Ý ¹æ½Ä
3. ¾ÏÈ£ ¾Ë°í¸®ÁòÀÇ ¾ÈÀü¼º Æò°¡
SECTION 04 ´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£È
1. ¾ÏÈ£ÀÇ ÀÇÀÇ
2. ´ëĪŰ ¾ÏÈ£(Symmetric Cryptography)
3. °ø°³Å°(ºñ´ëĪŰ) ¾ÏÈ£½Ã½ºÅÛ
4. ´ëĪŰ¿Í °ø°³Å° ºñ±³
5. ´ëĪŰ¿Í °ø°³Å°(ºñ´ëĪŰ) ¹æ½Ä ºñ±³
6. ÇÏÀ̺긮µå ¹æ½Ä(´ëĪŰ, °ø°³Å°(ºñ´ëĪŰ) È¥ÇÕ)
7. ÇؽÃÇÔ¼ö
SECTION 05 ÀüÀÚ¼¸í°ú °ø°³Å° ±â¹Ý ±¸Á¶(PKI)
1. ÀüÀÚ¼¸í(µðÁöÅÐ ¼¸í: Digital Signature)
2. PKI(Public Key Interface, °ø°³Å° ±â¹Ý ±¸Á¶)
3. Å°, ³¼ö
SECTION 06 ÀüÀÚ»ó°Å·¡ º¸¾È
1. ÀüÀÚ»ó°Å·¡ º¸¾È °³¿ä
2. ÀüÀÚ»ó°Å·¡ º¸¾È ¿ä±¸»çÇ×
3. ÀüÀÚ»ó°Å·¡ º¸¾È °ø°Ý À¯Çü
4. ÆǸÅÀÚ ¿ä±¸»çÇ×
5. ±¸¸ÅÀÚ ¿ä±¸»çÇ×
6. PKIÀÇ ÀÀ¿ë ¸ðµ¨ÀÎ SET(Secure Electronic Transaction)
7. ÀüÀÚÈÆó(Electronic Cash) º¸¾È
8. °¡»óÈÆó, ºñÆ®ÄÚÀÎ
9. ºí·ÏüÀÎ(Block Chain)
SECTION 07 ±âŸ ¿ë¾î ¼³¸í
[PART 02 ±âÃâÈ®Àι®Á¦]
Part 03 Á¢±ÙÅëÁ¦
SECTION 01 Á¢±ÙÅëÁ¦ °³¿ä
1. Á¢±ÙÅëÁ¦(Á¢±ÙÁ¦¾î, Access Control)
2. Á¢±ÙÅëÁ¦ ±âº» ¿øÄ¢
SECTION 02 ÀÎÁõ
1. °³³ä
2. »ç¿ëÀÚ ÀÎÁõ°ú ¸Þ½ÃÁö ÀÎÁõ
3. »ç¿ëÀÚ ÀÎÁõ±â¼ú(User Authentication)
4. ÅëÇÕÀÎÁõü°è
SECTION 03 Á¢±ÙÅëÁ¦ º¸¾È¸ðµ¨
SECTION 04 Á¢±ÙÅëÁ¦ º¸¾ÈÀ§Çù
1. Æнº¿öµå Å©·¡Ä¿(Password Cracker)
[PART 03 ±âÃâÈ®Àι®Á¦]
PART 04 ³×Æ®¿öÅ© º¸¾È
SECTION 01 ³×Æ®¿öÅ© °³¿ä
1. ³×Æ®¿öÅ© °³¿ä
2. OSI 7 Layer¿Í TCP/IP
3. TCP¼¼±×¸ÕÆ®, IP ÆÐŶ, MACÇÁ·¹ÀÓ ±¸Á¶
SECTION 02 ÀÎÅͳÝ
1. ÀÎÅͳÝ
2. ARP¿Í RARP
3. TCP 3-way Hand Shake
4. ¸µÅ©¿Í Á¾´Ü °£ ´ã´ç
5. ¹Ý¼ÛÆÄ °¨Áö ´ÙÁßÁ¢¼Ó(Carrier Sense Multiple Access)
6. ³×Æ®¿öÅ© °èÃþ(3°èÃþ)ÀÇ IPv4 Addressing
7. DHCP¿Í NAT
SECTION 03 ¶ó¿ìÅÍ¿Í ¶ó¿ìÆà ÇÁ·ÎÅäÄÝ
1. ¶ó¿ìÅÍ
2. ¶ó¿ìÆÃ(Routing) ÇÁ·ÎÅäÄÝ
3. IP ±â¹Ý Åë½ÅÀÇ QoSº¸Àå ¹æ¾È
4. Giga ÀÎÅͳÝ
SECTION 04 ¹«¼±Åë½Å º¸¾È
1. ¹«¼± ·£ Á¾·ù¿Í º¸¾È
2. ¹«¼± ·£ÀÇ À§Ç輺
3. ¹«¼±°ø°ÝÀÇ À¯Çü
4. µð¹ÙÀ̽º ÀÎÁõ
5. Mobile IP
6. ³×Æ®¿öÅ© ÅäÆú·ÎÁö(Network Topology)
7. ȸ¼±±³È¯, ¸Þ½ÃÁö ±³È¯, ÆÐŶ±³È¯
SECTION 05 ³×Æ®¿öÅ© º¸¾È°ú ¹æȺ®
1. ³×Æ®¿öÅ© º¸¾È°ú ¹æȺ®
2. ¸Á °ü¸® ÇÁ·ÎÅäÄÝ
3. ij½ºÆà ¸ðµå(Casting Mode)
4. IGMP(Internet Group Management Protocol)
SECTION 06 ³×Æ®¿öÅ© ±â¹Ý º¸¾È°ø°Ý
1. ¼ºñ½º °ÅºÎ °ø°Ý °³¿ä
2. DoS, DDoS, DRDoS
3. °ø°³ ÇØÅ·µµ±¸ Á¾·ù
4. ³×Æ®¿öÅ© Ãë¾àÁ¡ ½ºÄ³´× °ø°Ý
5. APT °ø°Ý(Áö´ÉÇü Áö¼Ó À§Çù °ø°Ý: Advance Persistent Threat)
6. »çȸ°øÇÐÀû ¹æ¹ý
7. Ransomware(·£¼¶¿þ¾î)
SECTION 07 ÇØÅ·°ú ´ëÃ¥
1. ³×Æ®¿öÅ© ȯ°æ
2. Sniffing(½º´ÏÇÎ)
3. Spoofing(½ºÇªÇÎ)
4. ¼¼¼Ç ÇÏÀÌÀçÅ·(TCP Session Hijacking)
5. Phishing(ÇǽÌ)
6. ÁøÈÇÏ´Â ´Ù¾çÇÑ ÇǽÌ
7. Pharming(ÆĹÖ)
8. Smishing(½º¹Ì½Ì)
9. ¸Þ¸ð¸® ÇØÅ·
10. ¸Á ºÐ¸®
11. ±âŸ º¸¾È ħÇØ °ü·Ã ¿ë¾î
[PART 04 ±âÃâÈ®Àι®Á¦]
PART 05 ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
SECTION 01 À̸ÞÀÏ º¸¾È
1. À̸ÞÀÏ °ü·Ã ÇÁ·ÎÅäÄÝ
2. ÀüÀÚ¿ìÆí º¸¾ÈÅë½Å±Ô¾à(ºñ¹Ð¼º, ¹«°á¼º, ÀÎÁõ, ºÎÀιæÁö ±â´É Áö¿ø)
3. ½ºÆÔ¸ÞÀÏ ´ëÃ¥
SECTION 02 FTP º¸¾È
1. FTP(File Transfer Protocol: FileÀ» Àü´ÞÇÏ´Â ÇÁ·ÎÅäÄÝ)
SECTION 03 À¥ º¸¾È(Web Security)
1. Web
2. HTTP ÇÁ·ÎÅäÄÝ
3. SSL(Secure Socket Layer)
4. IPSec(IP Secure)
5. VPN(Virtual Private Network)
6. VLAN(Virtual LAN)
7. DNS(Domain Name System) º¸¾È
8. Wep App °£ Åë½Å±â¼ú
SECTION 04 µ¥ÀÌÅͺ£À̽º º¸¾È
1. µ¥ÀÌÅͺ£À̽º(Database) ±âº» °³³ä
2. µ¥ÀÌÅͺ£À̽º º¸¾È ÅëÁ¦
SECTION 05 µðÁöÅÐ ÄÜÅÙÃ÷ º¸È£ ¹æ¾È
1. µðÁöÅÐ ÄÜÅÙÃ÷
2. ¿öÅ͸¶Å©(WaterMark)
3. ÇΰÅÇÁ¸°ÆÃ(FingerPrinte)
4. ¿öÅ͸¶Å©¿Í ÇΰÅÇÁ¸°Æà ºñ±³
5. DRM
6. MPEG21
7. ½ºÅ×°¡³ë±×·¡ÇÇ(Steganography)
SECTION 06 º¸¾È Ãë¾àÁ¡ Á¤º¸ Á¦°ø
1. OWASP(The Open Web Application Security Project)
[PART 05 ±âÃâÈ®Àι®Á¦]
PART 06 ½Ã½ºÅÛ º¸¾È
SECTION 01 ¿î¿µÃ¼Á¦ °³¿ä
1. ¿î¿µÃ¼Á¦(Operating System) °³¿ä
2. ¿î¿µÃ¼Á¦ÀÇ ±¸Á¶(Operating System Structures)
3. ¿î¿µÃ¼Á¦ÀÇ ±â¼ú ¹ßÀü È帧
4. ¿î¿µÃ¼Á¦ÀÇ ÀÔ¡¤Ãâ·Â ¹æ½Ä
SECTION 02 ¿î¿µÃ¼Á¦ ÁÖ¿ä ±¸¼º±â¼ú
1. ÇÁ·Î¼¼½º °ü¸®
2. ¸Þ¸ð¸®(±â¾ïÀåÄ¡) °ü¸®
3. ½Ã½ºÅÛ È£Ãâ(System Call)
4. ÀåÄ¡°ü¸®
SECTION 03 º¸¾È ¿î¿µÃ¼Á¦
1. º¸¾È ¿î¿µÃ¼Á¦ °³¿ä
2. º¸¾È ¿î¿µÃ¼Á¦ÀÇ ÁÖ¿ä Á¦°ø ±â´É
3. º¸¾È ¿î¿µÃ¼Á¦
4. ½Å·Ú Ç÷§Æû ¸ðµâ(TPM: Trusted Platform Module)
5. HSM(Hardware Security Module)
SECTION 04 Ŭ¶óÀ̾ðÆ® º¸¾È
1. ¾Ç¼º ¼ÒÇÁÆ®¿þ¾î(¾Ç¼ºÄÚµå)
2. ´Ù¾çÇÑ À¥ °ø°Ý ¹æ¹ý
3. ÀÎÅÍ³Ý È°¿ë º¸¾È
4. ¾ÖÇø®ÄÉÀÌ¼Ç º¸¾È
5. ±âŸ
SECTION 05 À©µµ¿ì ¼¹ö º¸¾È
1. À©µµ¿ì °³¿ä
2. À©µµ¿ì º¸¾È
3. À©µµ¿ì ¿î¿µÃ¼Á¦ ¸í·É¾î
4. Windows ½Ã½ºÅÛ À̺¥Æ® ·Î±× Á¾·ù
5. Windows ½Ã½ºÅÛ ÇÁ·Î¼¼½º
6. À©µµ¿ì ¹× À¯´Ð½º ·Î±× ÆÄÀÏ Á¾·ù ¹× ºÐ¼®
7. Windows ±¸Á¶
SECTION 06 UNIX ¼¹ö º¸¾È
1. À¯´Ð½º °³¿ä
2. UNIX ±âº» »ç¿ë¹ý
3. À¯´Ð½º(¼Ö¶ó¸®½º) ¸í·É¾î ¹× ·Î±× ÆÄÀÏ
4. UNIX ¼¹ö º¸¾È
5. UNIX ÆÄÀÏ ½Ã½ºÅÛ
SECTION 07 ¸®´ª½º(Linux) ¼¹ö º¸¾È
SECTION 08 ¼¹ö º¸¾È °ü¸®
1. ¼¹ö°ü¸®ÀÚÀÇ ¾÷¹«
SECTION 09 °¢Á¾ ½Ã½ºÅÛ º¸¾ÈÀ§Çù ¹× ´ëÀÀÃ¥
1. ¹öÆÛ ¿À¹öÇ÷Î(Buffer Overflow) °ø°Ý
2. Æ÷¸Ë ½ºÆ®¸µ(Format String) °ø°Ý
3. ·¹À̽º ÄÁµð¼Ç(Race Condition) °ø°Ý
4. ±ÇÇÑ »ó½Â °ø°Ý(Privilege Escalation Attack)
5. ±âŸ ¿ë¾î
6. ¸ð¹ÙÀÏ ¿î¿µÃ¼Á¦(Mobile OS)
SECTION 10 Ãë¾àÁ¡ Á¡°Ë
1. Ãë¾àÁ¡ °³¿ä
2. ħÀÔ»ç½Ç È®ÀÎ
[PART 06 ±âÃâÈ®Àι®Á¦]
PART 07 Á¤º¸º¸¾È °ü¸®
SECTION 01 Á¤º¸º¸È£ Á¤Ã¥ ¹× Á¶Á÷
1. Á¤º¸º¸È£ Á¤Ã¥
2. IT º¸¾È °ü¸®
3. Á¤º¸ ½Ã½ºÅÛ °¨»ç(Information System Audit)
SECTION 02 À§Çè°ü¸®(Risk Management)
1. À§Çè°ü¸®(Risk Management)
2. À§ÇèºÐ¼®
3. À§ÇèÆò°¡
4. À§Çè´ëÃ¥
5. ÀçÇغ¹±¸°èȹ°ú RTO(Recovery Time Objective)
SECTION 03 BCP(Business Continuity Planning)
1. BCP(Business Continuity Planning)
2. ¾÷¹«¿µÇâºÐ¼®(BIA: Business Impact Assessment)
SECTION 04 ħÇØ»ç°í ´ëÀÀ
1. ħÇØ»ç°í ´ëÀÀ°ú Æ÷·»½Ä
2. ħÇØ»ç°í ´ëÀÀ
SECTION 05 ±¹Á¦/±¹°¡ Ç¥ÁØ ¹× ÀÎÁõü°è
1. º¸¾È Á¦Ç° Æò°¡¹æ¹ý ¹× ±âÁØ
2. Á¤º¸º¸È£°ü¸®Ã¼°è(ISMS) ÀÎÁõ
3. PIMS(Personal Information Management System)
4. ±¹³» º¸¾ÈÀÎÁõ ü°è ¹× ÇýÅà ºñ±³
5. ±¹³» °³ÀÎÁ¤º¸ º¸È£ °ü·ÃÁ¦µµ ÇöȲ
6. PDCA(Plan Do Check Action)
SECTION 06 ¿ë¾î Á¤ÀÇ
[PART 07 ±âÃâÈ®Àι®Á¦]
PART 08 Á¤º¸º¸È£ °ü·Ã ¹ý±Ô
SECTION 01 ¹ý·üÀÇ ÀÌÇØ
1. ¹ý·ü Àû¿ëÀÇ ¿ì¼±¼øÀ§
2. °³ÀÎÁ¤º¸ º¸È£¹ý¿¡¼ ¹Î°¨Á¤º¸¿Í °íÀ¯½Äº°Á¤º¸ÀÇ Â÷ÀÌÁ¡
3. OECD °¡À̵å¶óÀÎ
SECTION 02 Á¤º¸º¸¾È °ü·Ã ¹ý±Ô
1. Á¤º¸Åë½Å¸Á ÀÌ¿ëÃËÁø ¹× Á¤º¸º¸È£ µî¿¡ °üÇÑ ¹ý·ü(¾àĪ: Á¤º¸Åë½Å¸Á¹ý)
2. Á¤º¸Åë½Å ±â¹Ý º¸È£¹ý
3. ÀüÀÚ¼¸í¹ý
4. °³ÀÎÁ¤º¸ º¸È£¹ý
5. °³ÀÎÁ¤º¸ º¸È£¹ý ½ÃÇà·É
6. °³ÀÎÁ¤º¸ÀÇ ¾ÈÀü¼º È®º¸Á¶Ä¡ ±âÁØ
7. ÀüÀÚÁ¤ºÎ¹ý
8. ±¹°¡Á¤º¸È ±âº»¹ý
9. ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·ü(¾àĪ: ÀüÀÚ»ó°Å·¡¹ý)
[PART 08 ±âÃâÈ®Àι®Á¦]
PART 09 ±âÃâ¹®Á¦
2018³â 2ȸ Á¤º¸º¸¾È±â»ç
2019³â 2ȸ Á¤º¸º¸¾È±â»ç
¡á Ã¥ÀÇ Æ¯Â¡
1. º» µµ¼¿¡´Â ¼öÇèÀÚÀÇ È¿À²ÀûÀÎ ÇнÀÀ» À§ÇØ Àú°¡°¡ Á÷Á¢ °ÀÇÇÏ´Â À¯·á µ¿¿µ»ó °ÀǸ¦ ½ºÅ͵ð ³ëÆ® »çÀÌÆ®(https://studynote.co.kr)¿¡¼ Á¦°øÇÕ´Ï´Ù.
2. ÀÌ Ã¥Àº ¡¸Á¤º¸º¸¾È±â»ç?»ê¾÷±â»ç¡¹¿Í ¡¸Àü»êÁ÷ Á¤º¸º¸È£·Ð¡¹ ±âÃâ¹®Á¦¸¦ Áß½ÉÀ¸·Î ³»¿ëÀ» ±¸¼ºÇØ È¿À²ÀûÀ¸·Î µÎ ½ÃÇèÀ» ´ëºñÇÒ ¼ö ÀÖ½À´Ï´Ù.
3. º»¹®ÀÇ ³»¿ëÀ» Á» ´õ ÀÌÇØÇϱ⠽±µµ·Ï ÇØ´ç ³»¿ëÀ» ±×¸²À¸·Î ÀÚ¼¼È÷ ¼³¸íÇÏ¿© ÇнÀÀÇ È¿À²À» ³ô¿´½À´Ï´Ù.
4. ÇнÀÇÑ ³»¿ëÀ» ½ÇÁ¦ ±âÃâ¹®Á¦¸¦ Ç®¾îº¸¸é¼ º¹½ÀÇÒ ¼ö ÀÖµµ·Ï ±âÃâÈ®Àι®Á¦¸¦ ¾ö¼±ÇÏ¿© ¼ö·ÏÇÏ¿´°í, ÃֽŠ±âÃâ¹®Á¦¸¦ Ç®¾îº½À¸·Î½á ÃÖ±Ù ÃâÁ¦°æÇâÀ» ÆľÇÇÏ°í ¼ö°ËÀÚÀÇ ½Ç·ÂÀ» È®ÀÎÇÒ ¼ö ÀÖµµ·Ï ÇÏ¿´½À´Ï´Ù.
1. º» µµ¼¿¡´Â ¼öÇèÀÚÀÇ È¿À²ÀûÀÎ ÇнÀÀ» À§ÇØ Àú°¡°¡ Á÷Á¢ °ÀÇÇÏ´Â À¯·á µ¿¿µ»ó °ÀǸ¦ ½ºÅ͵ð ³ëÆ® »çÀÌÆ®(https://studynote.co.kr)¿¡¼ Á¦°øÇÕ´Ï´Ù.
2. ÀÌ Ã¥Àº ¡¸Á¤º¸º¸¾È±â»ç?»ê¾÷±â»ç¡¹¿Í ¡¸Àü»êÁ÷ Á¤º¸º¸È£·Ð¡¹ ±âÃâ¹®Á¦¸¦ Áß½ÉÀ¸·Î ³»¿ëÀ» ±¸¼ºÇØ È¿À²ÀûÀ¸·Î µÎ ½ÃÇèÀ» ´ëºñÇÒ ¼ö ÀÖ½À´Ï´Ù.
3. º»¹®ÀÇ ³»¿ëÀ» Á» ´õ ÀÌÇØÇϱ⠽±µµ·Ï ÇØ´ç ³»¿ëÀ» ±×¸²À¸·Î ÀÚ¼¼È÷ ¼³¸íÇÏ¿© ÇнÀÀÇ È¿À²À» ³ô¿´½À´Ï´Ù.
4. ÇнÀÇÑ ³»¿ëÀ» ½ÇÁ¦ ±âÃâ¹®Á¦¸¦ Ç®¾îº¸¸é¼ º¹½ÀÇÒ ¼ö ÀÖµµ·Ï ±âÃâÈ®Àι®Á¦¸¦ ¾ö¼±ÇÏ¿© ¼ö·ÏÇÏ¿´°í, ÃֽŠ±âÃâ¹®Á¦¸¦ Ç®¾îº½À¸·Î½á ÃÖ±Ù ÃâÁ¦°æÇâÀ» ÆľÇÇÏ°í ¼ö°ËÀÚÀÇ ½Ç·ÂÀ» È®ÀÎÇÒ ¼ö ÀÖµµ·Ï ÇÏ¿´½À´Ï´Ù.