최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기산업융합연구 = Journal of industrial convergence, v.20 no.3, 2022년, pp.23 - 31
Recently, the importance of the role of the university information security department in nurturing security experts to defend against cyber attacks is increasing day by day. The current university security curriculum has a problem in that the proportion of theoretical education is high and the prof...
J. M. Yang. (2018). A Study on Development of Standard Modeling Education Program in Information Security : Focusing on Domestic University Cases. Journal of Convergence Security Association, 18(5), 99-104.
J. S. Park. (2019). A Study on the Improvement of Curriculum for Human Resources Development in the Industrial Security. Journal of Association for Industrial Security, 9(1), 141-163.
S. J. Kim & Y. H. Jung. (2020). A Study on the Improvement of Industrial Security Curriculum Based on Industrial Demand: A Survey on IPA for Industrial Security Officers. Journal of Korean Industrial Security, 10(3), 169-186. DOI : 10.33388/kais.2020.10.3.169
Korea Internet & Security Agency. Annual training at KISA Cyber Security Talent Center, Cyber Security Manpower Training (K-Shield) Regular Course, Retrieved from http://academy.kisa.or.kr
Korea Information Security Education Center. KISEC Information Security Expert Course, Retrieved from https://www.kisec.com
Korea Information Technology Research Institute. KITRI Academy - Security Field, Retrieved from http://academy.kitri.re.kr
Korea Information Security Industry Association. KISIA Talent Support Education Project - Security, Retrieved from https://www.kisia.or.kr
Global IT Human Resources Development Institute. Global IT - National-based strategic training, Retrieved from http://www.gith.co.kr
Korea Information Security Education Institute. Cloud Security Expert Training Course, Retrieved from http://www.keduit.com
Ministry of Education. Guidelines for business processing related to credit recognition, etc. [Ministry of Education Notification No. 2021-9, 2021.2.19., partially revised], Retrieved from https://www.moe.go.kr
E. S. Jang. (2020). A Case Study on the Operation of Artificial Intelligence in a Liberal Arts Mandatory Curriculum, Journal of General Education, 14(5), 137-148. DOI : 10.46392/kjge.2020.14.5.137
R. W. Tyler. (2013). Basic principles of curriculum and instruction. University of Chicago press.
Ministry of Public Administration and Security. Secure Coding Guide(C, Java), Retrieved from https://www.mois.go.kr/
Oracle. The CERT Oracle Secure Coding Standard for Java, Retrieved from https://www.oracle.com/
Eclipse Foundation. Eclipse IDE, Retrieved from https://www.eclipse.org/
Microsoft. Microsoft Visual Studio, Retrieved from https://visualstudio.microsoft.com/
Philippe Arteau. FindSecurityBugs, Retrieved from https://find-sec-bugs.github.io/
OWASP. OWASP® Zed Attack Proxy, Retrieved from https://www.zaproxy.org/
OffSec Services. Kali Linux, Retrieved from https://www.kali.org/
Wireshark Foundation. Wireshark, Retrieved from https://www.wireshark.org/
C. Sanders. (2017). Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World Network Problems. Seoul : acorn Publishing.
L. Chappell, (2014). Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide. Problems. Seoul : acorn Publishing.
Tenable. Nessus, Retrieved from https://www.tenable.com/
Metasploit. Metasploit Tools, Retrieved from https://www.metasploit.com/
Openwall. John the Ripper, Retrieved from https://www.openwall.com/john/
Willie L. Pritchett. (2014). Kali Linux Cookbook. Seoul : acorn Publishing.
L. Allen. (2015). Kali Linux - assuring security by penetration testing :master the art of penetration testing with Kali Linux(2nd ed.). Seoul : acorn Publishing.
DVWA. Damn Vulnerable Web App, Retrieved from https://dvwa.co.uk/
Digital Forensic Center. (Investigation form) Evidence analysis(Appendix No. 11 form), Retrieved from http://cfpa.or.kr/
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.