Home > Àüü±â»ç

[°³Á¤ÃÖ½ÅÆÇ] Á¤º¸º¸È£ Àü¹®°¡ÀÇ CISSP ³ëÆ®

ÀÔ·Â : 2016-02-11 17:42
ÆäÀ̽ººÏ º¸³»±â Æ®À§ÅÍ º¸³»±â ³×À̹ö ¹êµå º¸³»±â Ä«Ä«¿À ½ºÅ丮 º¸³»±â ³×À̹ö ºí·Î±× º¸³»±â
(ISC)2ÀÇ °³Á¤ ±âÁØ ¹Ý¿µÇÑ CISSP ÀÚ°Ý Ãëµæ ´ëºñ¼­ Ãâ°£

[º¸¾È´º½º ±è°æ¾Ö] (ISC)2ÀÇ »õ·Î¿î °³Á¤ ±âÁØÀ» ¹Ý¿µÇÑ ±¹³» À¯ÀÏÀÇ CISSP ÀÚ°Ý Ãëµæ ´ëºñ¼­ ¡®Á¤º¸º¸È£ Àü¹®°¡ÀÇ CISSP³ëÆ®¡¯ °³Á¤ÃÖ½ÅÆÇÀÌ Ãâ°£µÅ À̸ñÀÌ ÁýÁߵǰí ÀÖ´Ù.

(ISC)2¿¡¼­´Â 2015³â 3¿ù¿¡ CBK(Common Body of Knowledge)ÀÇ °³Á¤ÆÇÀ» ¹ßÇ¥ÇØ ±âÁ¸ÀÇ ³»¿ëÀ» ¾÷µ¥ÀÌÆ®Çß´Ù. ¾÷µ¥ÀÌÆ® °á°ú, ±âÁ¸ 10°³ÀÇ µµ¸ÞÀÎÀÌ 8°³ÀÇ µµ¸ÞÀÎÀ¸·Î º¯°æµÇ¾ú´Ù. À̹ø¿¡ Ãâ°£µÈ CISSP ³ëÆ®´Â °³Á¤µÈ (ISC)2ÀÇ 8°¡Áö µµ¸ÞÀÎÀ» ¿Ïº®ÇÏ°Ô ºÐ¼®ÇÏ°í, °³Á¤ ³»¿ë¿¡ µû¸¥ ÃâÁ¦ ¿¹»ó 230¹®Á¦¸¦ ¼ö·ÏÇß´Ù.

CISSP ÀÚ°ÝÀÎÁõÀº Á¤º¸º¸È£ Àü¹®°¡¿¡°Ô ÇÊ¿äÇÑ Áö½ÄÀ» Á¦´ë·Î ½ÀµæÇÏ°í ÀÖ´ÂÁö, Á¤º¸º¸È£ Àü¹®°¡·Î¼­ÀÇ ¿ªÇÒÀ» ´ã´çÇÒ ¼ö ÀÖ´ÂÁö¿¡ ´ëÇÑ Æò°¡ ±âÁØÀ¸·Î Áß¿äÇÑ Àǹ̰¡ ÀÖ´Ù. ±×·± Ãø¸é¿¡¼­ ÀÌ Ã¥Àº ±â¾÷ÀÇ º¸¾È ÇöÀå¿¡¼­ º¸¾ÈÀü¹®°¡°¡ ¹Ýµå½Ã ¾Ë¾Æ¾ß ÇÒ Á¤º¸º¸È£ÀÇ Ã¼°è¸¦ ¾î¶°ÇÑ °üÁ¡¿¡¼­ ¼ö¸³ÇØ¾ß ÇÏ´ÂÁö¸¦ ´Ù·ç°í ÀÖ´Ù.

º¸¾ÈÀü¹®°¡·Î ±¸¼ºµÈ ÀúÀÚµéÀº Àü¹® Áö½Ä°ú °æÇèÀ» ¹ÙÅÁÀ¸·Î CISSP ÀÚ°Ý Ãëµæ»Ó¸¸ ¾Æ´Ï¶ó, º¸¾È ºÐ¾ß¿¡ ¸ö´ã°í Àְųª °ü½ÉÀÌ ÀÖ´Â ¸ðµç »ç¶÷ÀÌ ÀÌÇØÇϱ⠽±µµ·Ï ¼³¸íÇÏ°í ÀÖ´Ù.

Â÷·Ê
Chapter 1 Á¤º¸º¸¾È°ú À§Çè °ü¸®(Information Security and Risk Management)
Section 01 Á¤º¸º¸¾È(Information Security) °³¿ä
Section 02 Á¤º¸º¸¾ÈÀÇ ÇÙ½É ¿øÄ¢
Section 03 Á¤º¸º¸È£ °Å¹ö³Í½º(Information Security Governance)
Section 04 ±â¾÷°ú Á¶Á÷ÀÇ Çൿ¾ç½Ä
Section 05 º¸¾ÈÀνÄ- È°µ¿/ÈÆ·Ã/±³À°
Section 06 À§Çè°ü¸®
Section 07 ÄÄÇ»ÅÍ À±¸®
Section 08 ÄÄÇ»ÅÍ ¹üÁË
Section 09 ÁÖ¿ä ¹ý·ü ü°è
Section 10 À±¸® ¹× Àǹ«
Section 11 ÄÄÇ»ÅÍ ¹üÁË Á¶»ç
Section 12 ÄÄÇ»ÅÍ Æ÷·»½Ä
Section 13 CERT
¿¬½À¹®Á¦

Chapter 2 Àڻ꺸¾È(Asset Security)
Section 01 Á¢±ÙÅëÁ¦ÀÇ Á¤ÀÇ ¹× ÁÖ¿ä °³³ä
Section 02 Á¢±ÙÅëÁ¦ Ä«Å×°í¸®¿Í À¯Çü
Section 03 Á¢±ÙÅëÁ¦¿¡ ´ëÇÑ À§Çù
Section 04 ½Ã½ºÅÛ¿¡ ´ëÇÑ Á¢±Ù
Section 05 ÅëÇÕ ÀÎÁõ ü°è
Section 06 µ¥ÀÌÅÍ¿¡ ´ëÇÑ Á¢±Ù
Section 07 Áß¾ÓÁýÁßÇü Á¢±ÙÅëÁ¦
Section 08 ½Ã½ºÅÛ¿¡ ´ëÇÑ Á¢±Ù
Section 09 Á¢±ÙÅëÁ¦¿¡ ´ëÇÑ º¸Áõ
¿¬½À¹®Á¦

Chapter 3 º¸¾È ¿£Áö´Ï¾î¸µ(Security Engineering)
Section 01 ¾ÏÈ£ÇÐÀÇ ±âº» °³³ä ¹× ¿ë¾î
Section 02 ¾Ïȣȭ ¹æ½Ä
Section 03 ¾ÏÈ£ ½Ã½ºÅÛ
Section 04 ¾ÏÈ£ ¾Ë°í¸®Áò
Section 05 Å° °ü¸® ¹æ¹ý
Section 06 ¸Þ½ÃÁö ¹«°á¼º ÅëÁ¦ ¹× µðÁöÅÐ ¼­¸í
Section 07 ¾ÏÈ£Çص¶°ú °ø°Ý
Section 08 ¾ÏȣȭÀÇ ¿ëµµ
¿¬½À¹®Á¦

Chapter 4 Åë½Åº¸¾È ¹× ³×Æ®¿öÅ© º¸¾È(Communication and Network Security)
Section 01 ±âº» °³³ä
Section 02 Layer 1 : ¹°¸®Àû °èÃþ
Section 03 Layer 2 : µ¥ÀÌÅ͸µÅ© °èÃþ
Section 04 Layer 3 : ³×Æ®¿öÅ© °èÃþ
Section 05 Layer 4 : Àü¼Û °èÃþ
Section 06 Layer 5 : ¼¼¼Ç °èÃþ
Section 07 Layer 6 : ÇÁ·¹Á¨Å×ÀÌ¼Ç °èÃþ
Section 08 Layer 7 : ÀÀ¿ë °èÃþ
Section 09 ½º¸¶Æ®Æù ±â¹ÝÀÇ º¸¾È À§Çù ¹× ´ëÀÀÃ¥
¿¬½À¹®Á¦

Chapter 5 º¸¾È½Äº° ¹× Á¢±Ù °ü¸®(Identity and Access Management)
Section 01 ¹°¸®Àû º¸¾È °³¿ä¿Í µµÀü °úÁ¦
Section 02 ½Ã¼³ À§Ä¡ ¹× ¼³°è
Section 03 °Ç¹°°ú ¿Ü°û °æ°è
Section 04 ³»ºÎ Áö¿ø ½Ã½ºÅÛ
Section 05 ÀÔ±¸ ÅëÁ¦ ¹× ÀÚ»ê º¸È£
Section 06 Á¤º¸º¸È£¿Í °ü¸®¼­ºñ½º ¹× ±âŸ
¿¬½À¹®Á¦

Chapter 6 º¸¾ÈÆò°¡ ¹× Å×½ºÆÃ(Security Assessment and Testing)
Section 01 º¸¾È ¾ÆÅ°ÅØóÀÇ °³¿ä
Section 02 ÄÄÇ»ÅÍ ¾ÆÅ°ÅØó
Section 03 ÀϹÝÀûÀÎ ¾ÆÅ°ÅØó ÇÁ·¹ÀÓ¿öÅ©
Section 04 º¸¾È µðÀÚÀÎ ÄÄÆ÷³ÍÆ®¿Í ¿øÄ¢
Section 05 º¸¾È ¸ðµ¨°ú ¾ÆÅ°ÅØó ÀÌ·Ð
Section 06 º¸¾È Á¦Ç° Æò°¡ ¹æ¹ý ¹× ±âÁØ
¿¬½À¹®Á¦

Chapter 7 º¸¾È ¿î¿µ(Security Operations)
Section 01 º¸¾È¿î¿µÀÇ °³¿ä ¹× Ư±Ç°³Ã¼ ÅëÁ¦
Section 02 ÀÚ¿øº¸È£(Resource Protection)
Section 03 ¿î¿µ¿¬¼Ó¼º(Continuity of Operations)
Section 04 º¯°æ ÅëÁ¦ °ü¸®
Section 05 ºñÁî´Ï½º ¿¬¼Ó¼º °èȹ°ú Àç³­ º¹±¸
Section 06 BCP ÇÁ·Î¼¼½º
Section 07 ºñÁî´Ï½º ¿µÇâºÐ¼®(Business Impact Analysis)
Section 08 Àü·« °³¹ß ´Ü°è
Section 09 µ¥ÀÌÅÍÀÇ º¹±¸¿Í ȸº¹
¿¬½À¹®Á¦

Chapter 8 ¼ÒÇÁÆ®¿þ¾î °³¹ß º¸¾È(Software Development security)
Section 01 ¼ÒÇÁÆ®¿þ¾î °³¹ß ȯ°æÀÇ ±âº»°³³ä
Section 02 ÀÀ¿ë ÇÁ·Î±×·¥ ȯ°æ¿¡¼­ º¸¾È À§Çù ¹× ´ëÃ¥
Section 03 ¾Ç¼ºÄÚµå(Malware)
Section 04 °¨»ç, º¸Áõ ¸ÞÄ¿´ÏÁò
Section 05 µ¥ÀÌÅͺ£À̽º
Section 06 À¥ ÀÀ¿ë ÇÁ·Î±×·¥ ȯ°æ
¿¬½À¹®Á¦

[µµ¼­Á¤º¸]
ÀúÀÚ: Á¶ÈñÁØ, ÀÌÁ¤±¸, ÇãÁ¾¿À, ³²°æ½Ä
ÃâÆÇ:ÀÎÆ÷´õºÏ½º
ÆÇÇü:185¡¿245mm(472ÂÊ)
°¡°Ý:38,000¿ø

[ÀúÀÚ¼Ò°³]
ÀúÀÚ : Á¶ÈñÁØ(josephc@korea.ac.kr)
-úÞ) ITÄÁ¼³ÆÃ/°¨¸®¹ýÀÎ ¢ß¾¾¿¡ÀÌ¿¡½º ÄÁ¼³Æà »ó¹«ÀÌ»ç
-°­¿ø´ëÇб³ °âÀÓ±³¼ö¡¤´ë±¸Ä«Å縯´ëÇб³ »êÇÐÇù·Â±³¼ö
-¼¼Á¾»çÀ̹ö´ëÇб³ ¿Ü·¡±³¼ö¡¤¼­¿ïµðÁöÅдëÇб³ Ãʺù±³¼ö
-¶óÀÌÁö¿ò Æò»ý±³À°¿ø ÀüÀÓ±³¼ö
-ÇàÁ¤ÀÚÄ¡ºÎ °³ÀÎÁ¤º¸º¸È£ Àü¹®°­»ç´Ü
-ISACA Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦Çùȸ ÀÓ¿ø
-(ISC)2 Çѱ¹Á¤º¸½Ã½ºÅÛÁ¤º¸º¸¾ÈÇùȸ ÀÓ¿ø

ÀúÀÚ : ÀÌÁ¤±¸(rusita@korea.ac.kr)
-Çѱ¹HP±³À°¼¾ÅÍ Àü¹®°­»ç
-Çѱ¹À¶ÇÕ±â¼úÁøÈï¿ø À¶ÇÕÄÜÅÙÃ÷ ±âȹº»ºÎÀå
-°í·Á´ëÇб³ µðÁöÅа濵Çаú(¹Ú»ç°úÁ¤)
-MBA(Master of Business Administration)
-Çѱ¹Á¤º¸½Ã½ºÅÛ°¨»çÅëÁ¦Çùȸ ÀÓ¿ø
-EXIN Accredited Trainer
-ITIL Expert
-ISO/IEC 27001(P.A)
-HP-UX CSA/CSE

ÀúÀÚ : ÇãÁ¾¿À(maha96@naver.com)
-¾Èö¼ö¿¬±¸¼Ò ÇÁ·ÎÁ§Æ® °ü¸®ÀÚ
-Áö½Ä°æÁ¦ºÎ ¼ÒÇÁÆ®¿þ¾î ¸¶¿¡½ºÆ®·Î ¸àÅä
-(ISC)2 Çѱ¹CISSPÇùȸ ÀÌ»ç
-(ISC)2 °øÀÎ Instructor
-±¹Á¦±â¼ú»ç(Á¤º¸°øÇÐ)
-ÀüÀÚ°è»ê±â±â¼ú»ç
-Á¤º¸Åë½Å Ư±Þ °¨¸®¿ø
-(ISC)2 ISLA °ø·Î»ó(Á¤º¸º¸¾È½Ç¹«ÀÚ ºÎ¹® : ÃÖ¿ì¼ö»ó, 2011³â)
-Áö½Ä°æÁ¦ºÎ ÇÑÀÌÀ½ IT ¸àÅ丵 ¿ì¼ö¸àÅä»ó ¼ö»ó(2010³â)
-(ISC)2 Çѱ¹ CISSP Çùȸ °ø·Î»ó(2009³â)
-¼¼°è 3´ë Àθí»çÀü ABI¿¡ 21¼¼±â À§´ëÇÑ Áö¼ºÀ¸·Î µîÀç(2009³â)

ÀúÀÚ : ³²°æ½Ä(nks94@naver.com)
-Çö´ë ¿ÀÅä¿¡¹ö Ç°ÁúÇõ½ÅÆÀ
-(ISC)2 Çѱ¹CISSPÇùȸ °£»ç
-(ISC)2 °øÀÎ Instructor
-ÀüÀÚ°è»êÁ¶Á÷ÀÀ¿ë ±â¼ú»ç
-Á¤º¸½Ã½ºÅÛ °¨¸®»ç
-Áö½Ä°æÁ¦ºÎ ÁöÁ¤ Çѱ¹Á¤º¸»ê¾÷¿¬ÇÕȸ ÇÑÀÌÀ½ IT ¸àÅä
[±è°æ¾Ö ±âÀÚ(boan3@boannews.com)]

<ÀúÀÛ±ÇÀÚ: º¸¾È´º½º(www.boannews.com) ¹«´ÜÀüÀç-Àç¹èÆ÷±ÝÁö>

  •  
  • 3
  • ÆäÀ̽ººÏ º¸³»±â Æ®À§ÅÍ º¸³»±â ³×À̹ö ¹êµå º¸³»±â Ä«Ä«¿À ½ºÅ丮 º¸³»±â ³×À̹ö ºí·Î±× º¸³»±â

  • ¡°
  •  SNS¿¡¼­µµ º¸¾È´º½º¸¦ ¹Þ¾Æº¸¼¼¿ä!! 
  • ¡±
 ÇÏÀÌÁ¨ ÆÄ¿öºñÁî 23³â 11¿ù 16ÀÏ~2024³â 11¿ù 15ÀϱîÁö ¾Æ½ºÆ®·Ð½ÃÅ¥¸®Æ¼ ÆÄ¿öºñÁî 2023³â2¿ù23ÀÏ ½ÃÀÛ À§Áîµð¿£¿¡½º 2018 ³Ý¾Øµå ÆÄ¿öºñÁî ÁøÇà 2020³â1¿ù8ÀÏ ½ÃÀÛ~2021³â 1¿ù8ÀϱîÁö
¼³¹®Á¶»ç
³»³â ȸ»ç¿¡ ²À µµÀÔÇÏ°í ½ÍÀº º¸¾È ¼Ö·ç¼Ç ¶Ç´Â Ç÷§ÆûÀº ¹«¾ùÀΰ¡¿ä?
XDR
EDR
AI º¸¾È
Á¦·ÎÆ®·¯½ºÆ®
°ø±Þ¸Á º¸¾È ü°è(SBOM)
Ŭ¶ó¿ìµå º¸¾È ¼Ö·ç¼Ç
±âŸ(´ñ±Û·Î)