 |
 |
 |
|
³×Æ®¿öÅ© ÀÔ¹® |
1ÀÏÂ÷ |
³×Æ®¿öÅ© ±¸¼º¿ä¼Ò ¹× ±âº» Àåºñ ³×Æ®¿öÅ© ÇÁ·Î±×·¥ ³×Æ®¿öÅ© ±âº» µ¿ÀÛ ¹× ½ÅÈ£ÀÇ Á¾·ù |
| 2ÀÏÂ÷ |
³×Æ®¿öÅ©ÀÇ Á¾·ù ÅäÆú·ÎÁö ÀÌ´õ³ÝÀÇ Á¾·ù |
| 3ÀÏÂ÷ |
OSI 7°èÃþ TCP/IP ÆÐŶ ºÐ¼® ±â¹ý |
| 4ÀÏÂ÷ |
IP¿Í ARP ¶ó¿ìÆÃ Å×ÀÌºí ¼ºê³ÝÆÃ°ú ¼öÆÛ³×ÆÃ |
| 5ÀÏÂ÷ |
¶ó¿ìÆÃ ÇÁ·ÎÅäÄÝ DNS ±¸Á¶ ¹× ¿ªÇÒ¿¡ µû¸¥ Á¾·ù DHCP ±¸Á¶ ¹× ±â´É |
|
À©µµ¿ì¼¹ö |
6ÀÏÂ÷ |
À©µµ¿ì ¼¹ö ¼Ò°³ ¹× ¼³Ä¡ À©µµ¿ì »ç¿ë ¹× ȯ°æ ¼³Á¤ |
| 7ÀÏÂ÷ |
»ç¿ëÀÚ °èÁ¤ °ü¸® ±×·ì »ç¿ë°ú °ü¸® |
| 8ÀÏÂ÷ |
NTFS »ç¿ë ±ÇÇѰú °ü¸® °øÀ¯ »ç¿ë ±ÇÇѰú °ü¸® |
| 9ÀÏÂ÷ |
µ¥ÀÌÅÍ ÀúÀå °ü¸® µ¥ÀÌÅÍ ¹é¾÷°ú ½Ã½ºÅÛ º¹±¸ |
| 10ÀÏÂ÷ |
µð½ºÅ© ±¸¼º ¹× °ü¸® À©µµ¿ì ¼¹ö ¿ø°Ý °ü¸® |
|
À©µµ¿ì ¼¹ö ÀÎÇÁ¶ó |
11ÀÏÂ÷ |
DHCP ¼ºñ½º¸¦ ÀÌ¿ëÇÑ IP ÁÖ¼Ò ÀÚµ¿ ÇÒ´ç DHCP °ü¸® ¹× ¸ð´ÏÅ͸µ |
| 12ÀÏÂ÷ |
Resolving Names DNS¸¦ ÀÌ¿ëÇÑ È£½ºÆ® À̸§ Ç®ÀÌ DNS °ü¸® ¹× ¸ð´ÏÅ͸µ |
| 13ÀÏÂ÷ |
WINS ¼ºñ½º¸¦ ÀÌ¿ëÇÑ NetBIOS À̸§ Ç®ÀÌ IPsec°ú ÀÎÁõ¼¸¦ ÀÌ¿ëÇÑ ¾ÈÀüÇÑ ³×Æ®¿öÅ© Àü¼Û ±¸Çö |
| 14ÀÏÂ÷ |
Designing the Physical Network Designing for Network Connectivity |
| 15ÀÏÂ÷ |
VPN , Dial-up , wireless Ŭ¶óÀÌ¾ðÆ® Áö¿ø ³×Æ®¿öÅ© ¾×¼¼½º °ü¸® ¹× ¸ð´ÏÅ͸µ |
|
¸®´ª½º ¾îµå¹Î °úÁ¤ |
16ÀÏÂ÷ |
¸®´ª½º °³¿ä ¸®´ª½º ¼³Ä¡ »ç¿ëÀÚ »ý¼º ¹× °ü¸® |
| 17ÀÏÂ÷ |
ÆÛ¹Ì¼Ç°ú ¼ÒÀ¯±Ç ÆÄÀϽýºÅÛ »ý¼º ¹× °ü¸® |
| 18ÀÏÂ÷ |
³×Æ®¿öÅ© ±¸¼º ¹× °ü¸® ºÎÆ®·Î´õ ¹× ºÎÆÃ ÇÁ·Î¼¼½º |
| 19ÀÏÂ÷ |
ÆÐŰÁö, ÆÐÄ¡ °ü¸® ÀÛ¾÷ ½ºÄÉÁ층 ½Ã½ºÅÛ ·Î±× ±¸¼º ¹× °ü¸® |
| 20ÀÏÂ÷ |
LVM ±¸¼º ¹× °ü¸® ¹é¾÷ ¹× º¹±¸ Ä¿³Î ÄÄÆÄÀÏ |
|
¸®´ª½º ³×Æ®¿öÅ© ¾îµå¹Î |
21ÀÏÂ÷ |
TCP/IP ¼Ò°³ µ¥¸ó Á¾·ù ¹× ±â´É ¼Ò°³ ½Ã½ºÅÛ ¼ºñ½º ¼Ò°³ |
| 22ÀÏÂ÷ |
ÆÄÀÏ °øÀ¯ ¼ºñ½º (NFS, FTP,SAMBA) ±¸Ãà ¹× ¼³Á¤ ¿ø°Ý Á¢¼Ó ¼ºñ½º ( telnet ,ssh ) ¼³Á¤ ¹× ±¸¼º |
| 23ÀÏÂ÷ |
DNS Client DNS master Server DNS slave Server |
| 24ÀÏÂ÷ |
Apache Web Server Apache Web Server ȯ°æ ¼³Á¤ |
| 25ÀÏÂ÷ |
DHCP
º¸¾È ¼ºñ½º ¹× º¸¾È ³×Æ®¿öÅ© ±¸¼º ½Ã½ºÅÛ ¸ð´ÏÅ͸µ |
|
Áß¼Ò±Ô¸ð³×Æ®¿öÅ© ¿î¿µ ±â¼ú |
26ÀÏÂ÷ |
¶ó¿ìÅÍ ±¸¼º ¹× µ¿ÀÛ Static and connected routes ¼³Á¤ ¹× °ü¸® |
| 27ÀÏÂ÷ |
RIP ¼³Á¤ ¹× °ü¸® OSPF ¼³Á¤ ¹× °ü¸® |
| 28ÀÏÂ÷ |
EIGRP ±¸¼º ¹× °ü¸® Switch ÀÛµ¿ ¹× ±â´É |
| 29ÀÏÂ÷ |
STP VLAN
|
| 30ÀÏÂ÷ |
IP Á¢±ÙÁ¦¾î¸ñ·Ï ³×Æ®¿öÅ© ÁÖ¼Ò º¯È¯ÇÁ·ÎÅäÄÝ |
|
¶ó¿ìÆÃ ¹× ½ºÀ§Äª °í±Þ ±â¼ú |
31ÀÏÂ÷ |
´ÙÁß¿µ¿ª OSPF RIP / OPSF / EIGRP ÀÎÁõ RIP / OSPF / EIGRP ÀçºÐ¹è |
| 32ÀÏÂ÷ |
BGP ISISOSPF ¼³Á¤ ¹× °ü¸® |
| 33ÀÏÂ÷ |
IPv6 Address IPv6 routing |
| 34ÀÏÂ÷ |
Multiple spanning Tree Protocol HSRP |
| 35ÀÏÂ÷ |
VRRP GLBP |
|
µ¥ÀÌÅͺ£À̽º ¿î¿µ ¹× °³¹ß ±âÃÊ |
36ÀÏÂ÷ |
µ¥ÀÌÅͺ£À̽º º¸¾È ±âº» °³¿ä SQL ±¸¹®ÀÇ ±âÃÊ ±¸Á¶ |
| 37ÀÏÂ÷ |
µ¥ÀÌÅͺ£À̽º º° ¾ÆÅ°ÅØÃ³ µ¥ÀÌÅͺ£À̽º º° ³×Æ®¿öÅ© ±¸Á¶µµ |
| 38ÀÏÂ÷ |
SQL Injection °ø°Ý ±â¹ýÀÇ ´ëÇ¥ÀûÀÎ ÄÚµå WEB ¾ÖÇø®ÄÉÀ̼ÇÀÇ ´ëÇ¥ÀûÀÎ Ãë¾àÁ¡ SQL ÄÚµå ºÐ¼®À» ÅëÇÑ Injection Ãë¾àÁ¡ ºÐ¼® |
| 39ÀÏÂ÷ |
SQL Injection ±â¹ý Blind SQL Injection ±â¹ý |
| 40ÀÏÂ÷ |
¿î¿µÃ¼Á¦ °ø°Ý±â¹ý µ¥ÀÌÅͺ£À̽º º° Æ¯ÈµÈ °ø°Ý±â¹ý |
|
µ¥ÀÌÅͺ£À̽º º¸¾È ½Ç¹« |
41ÀÏÂ÷ |
ÇÁ·Î±×·¥ Äڵ带 ÅëÇÑ ¹æ¾î±â¹ý Ç÷§Æû º° ¹æ¾î±â¹ý |
| 42ÀÏÂ÷ |
Á¢¼Ó ¹× ÀÎÁõÅëÁ¦ À¯Àú °èÁ¤ º¸¾È |
| 43ÀÏÂ÷ |
°´Ã¼ °ü¸® ¹× ÄÚµå ½ÇÇà µ¥ÀÌÅÍÀÇ µ¶¸³È ¹× ¾ÏÈ£È |
| 44ÀÏÂ÷ |
µ¥ÀÌÅͺ£À̽º º¸¾È ¹× °¨»ç ¼³Á¤ |
| 45ÀÏÂ÷ |
µ¥ÀÌÅͺ£À̽º Æ÷·»½Ä |
|
Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ ¿î¿µ ±â¼ú |
46ÀÏÂ÷ |
Ŭ¶ó¿ìµå ÀÌÇØ ¹× °¡»óÈ ±â¼ú ¼Ò°³ µ¥½ºÅ©Å¾ °¡»óÈ ±â¼ú |
| 47ÀÏÂ÷ |
¾îÇø®ÄÉÀÌ¼Ç °¡»óÈ ±â¼ú ¼Ö¶ó¸®½º ÄÁÅ×ÀÌ³Ê ¹× ZONE±â¼ú |
| 48ÀÏÂ÷ |
ÇÏÀÌÆÛ V 2.0 ¼Ò°³ °¡»ó ³×Æ®¿öÅ© ¹× °¡»ó ½ºÅ丮Áö ±¸¼º ¼¹ö °¡»óÈ ±â¼úÀ» ÀÌ¿ëÇÑ °¡»ó¸Ó½Å ¿î¿µ |
| 49ÀÏÂ÷ |
°í°¡¿ë¼º °¡»ó¸Ó½ÅÀ» À§ÇÑ Live Migration VMM À» ÀÌ¿ëÇÑ ÅëÇտ °ü¸® |
| 50ÀÏÂ÷ |
·¹°Å½Ã ȯ°æÀ» À§ÇÑ ÅëÇÕ ¿î¿µ °¡»óÈ º¸¾È ±â¼ú |
|
¼¹ö º¸¾È ±â¼ú |
51ÀÏÂ÷ |
ÇØÅ· ¿ª»ç ¹× º¸¾È ±³À°ÀÇ Çʿ伺 ÆÐ½º¿öµå Å©·¡Å· |
| 52ÀÏÂ÷ |
SETUID ¹éµµ¾îÀÇ ÀÌÇØ |
| 53ÀÏÂ÷ |
À©µµ¿ì º¸¾È ¼³Á¤ °èÁ¤°ü¸® µ¥¸ó°ü¸® |
| 54ÀÏÂ÷ |
À¯´Ð½º º¸¾È ¼³Á¤ °èÁ¤°ü¸® , ¼ºñ½º °ü¸®, ÆÐÄ¡ °ü¸® Á¢±Ù Á¦¾î |
| 55ÀÏÂ÷ |
½Ã½ºÅÛ ·Î±× ºÐ¼® ¿î¿µÃ¼Á¦º° ÈçÀû Á¦°Å¿Í ħÀÔ ÃßÀû |
|
³×Æ®¿öÅ© ÇØÅ· ±â¼ú ¹× À¯ÇØ Æ®·¡ÇÈ ºÐ¼® |
56ÀÏÂ÷ |
³×Æ®¿öÅ© ÇØÅ· ±â¼ú °³¿ä Footprinting |
| 57ÀÏÂ÷ |
scanning ±â¹ýÀÇ ÀÌÇØ °øÀ¯ÀÚ¿ø ¸ñ·ÏÈ |
| 58ÀÏÂ÷ |
½ºÇªÇÎ ( IP, ARP,DNS ½ºÇªÇÎ) DOS, Ddos °ø°Ý |
| 59ÀÏÂ÷ |
À¯ÇØ Æ®·¡ÇÈ ºÐ¼® ¹× ½Ã±×´ÏÃÄ ÀÌÇØ ¹«¼±³×Æ®¿öÅ©ÀÇ ¹®Á¦Á¡°ú ´ëÀÀÃ¥ ¹æÈº® Á¾·ù¿Í ¼³Á¤ |
| 60ÀÏÂ÷ |
ħÀÔŽÁö ½Ã½ºÅÛ ¼³Á¤ Çã´ÏÆÌ ±¸Ãà |
|
À¥ ÇØÅ· ¹× º¸¾È ±â¼ú |
61ÀÏÂ÷ |
À¥ ÇØÅ·ÀÇ Á߿伺 ¹× °ø°Ý ¹üÀ§ À¥ ¾îÇø®ÄÉÀÌ¼Ç ±¸Á¶ ÀÌÇØ |
| 62ÀÏÂ÷ |
Æ÷Æ®½ºÄ³´×
µð·ºÅ丮/ÆÄÀÏ ¸ñ·ÏÈ ÆÄÀÏ Ã³¸® ±â´ÉÀÇ Á¸Àç ¿©ºÎ |
| 63ÀÏÂ÷ |
SQL injection Cross-Site Scripting(XSS) |
| 64ÀÏÂ÷ |
Cookie Á¶ÀÛ Get/Post Á¶ÀÛ Session ID Hijacking |
| 65ÀÏÂ÷ |
»çȸÀû ±â¹ý À¥ÆäÀÌÁö ÄÚµù ½Ã À¯ÀÇ »çÇ× ºÎÀûÀýÇÑ È¯°æ ¼³Á¤ ¹× ¿À·ù ó¸® |
|
º¸¾È ¼Ö·ç¼Ç ¿î¿µ ±â¼ú |
66ÀÏÂ÷ |
º¸¾È ¼Ö·ç¼ÇÀÇ Á¾·ù¿Í ±â´É ¼Ò°³ ¹æÈº® ¼³Ä¡ ¹× ±¸¼º |
| 67ÀÏÂ÷ |
¹æÈº® ·ê ¼³Á¤ ¹æÈº® Á¤Ã¥ ¼³Á¤ ¹æ¹ý ¹æÈº® ACL ±â¹Ý Á¢±Ù Á¦¾î |
| 68ÀÏÂ÷ |
ħÀÔŽÁö / ħÀÔÂ÷´Ü½Ã½ºÅÛ ¼³Ä¡ ħÀÔÂ÷´Ü ½Ã½ºÅÛ ·ê ¼³Á¤ ¹× ±¸¼º |
| 69ÀÏÂ÷ |
VPN ¼³Ä¡ ¹× ±¸¼º VPN G/W ¸¦ ÀÌ¿ëÇÑ Site VPN ±¸¼º VPN Åͳθµ |
| 70ÀÏÂ÷ |
½Ã³ª¸®¿À¿¡ µû¸¥ º¸¾È ¼Ö·ç¼Ç ½Ç¹« ȯ°æ ±¸¼º ÇÁ·ÎÁ§Æ® ÀÎÇÁ¶ó º¸¾È °¨»ç |
|
ÇØÅ· »ç°í Ä§ÇØ ´ëÀÀ ¹× Æ÷·»½Ä |
71ÀÏÂ÷ |
ÇØÅ· »ç°í ´ëÀÀÆÀ ±¸¼º CERT ±¸Ãà ¹× ¿î¿µ »ç°í ó¸® ´ëÀÀ ÀýÂ÷ |
| 72ÀÏÂ÷ |
À¯´Ð½º ÇÇÇØ ½Ã½ºÅÛ ºÐ¼®
|
| 73ÀÏÂ÷ |
À©µµ¿ì ÇÇÇØ ½Ã½ºÅÛ ºÐ¼® ÇØÅ· ÇÁ·Î±×·¥ ¹× ¾Ç¼ºÄÚµå ºÐ¼® |
| 74ÀÏÂ÷ |
°ø°ÝÀÚ ¸ð´ÏÅ͸µ ¹× °ø°ÝÀÚ ¿ªÃßÀû |
| 75ÀÏÂ÷ |
µðÁöÅÐ Áõ°Å ºÐ¼® ±â¹ý |
| CISSP |
76ÀÏÂ÷ |
Security Management Practices Access Control Systems and Methodology |
| 77ÀÏÂ÷ |
Telecommunication and Network Security Cryptography |
| 78ÀÏÂ÷ |
Security Architecture and Models Business Continuity Planning and Disaster Recovery Planning |
| 79ÀÏÂ÷ |
Application and System Development Security Operation Security |
| 80ÀÏÂ÷ |
Physical Security Laws, Investigation, and Ethics |