¡¡
2021³â
2020³â
2019³â
2018³â
2017³â
2014³â
- KISA Ư°
- IBM ÄÁÆÛ·±½º
- ±¹¹æÄÁÆÛ·±½º
- ¿ì¸®±ÝÀ¶ÁöÁÖ Æ¯°
- ¼º±Õ°ü´ë Ư°
2013³â
- ±ÝÀ¶º¸¾È¿¬±¸¿ø ´ëÇлýÄ·ÇÁ Ư°
- Á¤º¸Åë½Å ±â¹Ý½Ã¼³ ÄÁÆÛ·±½º Ư°
- ³óÇùÁ¤º¸½Ã½ºÅÛ Æ¯°
- ±³À°ºÎ Ư°
- Çö´ëÄ«µå Ư°
- Çö´ë¶óÀÌÇÁ Ư°
- ÁÖÅðø»ç Ư°
- »ï¼º»ý¸í Ư°

2012³â
- °í·Á´ëÇпø Ư°
- ¿¬¼¼´ëÇпø Ư°
- ¼¿ï´ëÇб³ Ư°
- ½ÅÇÑ»ý¸í Ư°
- °Ç°º¸Çè°ø´Ü Ư°
- ±â¾÷ÀºÇà Æ¯°
- SKI Ư°
- ½º¸¶ÀϰÔÀÌÆ® Ư°
- ±ÝÀ¶º¸¾ÈÄÁÆÛ·±½º ÆÐ³Î
- Á¤Ã¥±ÝÀ¶°ø»ç Ư°
- º¸°Çº¹ÁöºÎ Ư°
- ¿¬±Ý°ø´Ü Ư°
¡¡
2011³â
- »õ¸¶À»±Ý°í¿¬ÇÕȸ Ư°
- IBK Ư°
- ¸Þ¸®Ã÷±ÝÀ¶±×·ì Ư°
- Èï±¹±ÝÀ¶±×·ì Ư°
- °Ç°º¸Çè°ø´Ü Ư°
- ±ÝÀ¶º¸¾ÈÄÁÆÛ·±½º Ư°
- ÀÇ·á¿ø¿¬ÇÕȸ Ư°
- ¿ì¸®±ÝÀ¶ÁöÁÖÆ¯°
- ±³º¸»ý¸íƯ°
- Çö´ëijÇÇÅ» Ư°
- ±¹ÅäÇØ¾çºÎ Ư°
- Çѱ¹ÀåÇÐÀç´Ü Ư°
- ±âȹÀçÁ¤ºÎ Ư°
- ¼öÃâÀÔÀºÇà Æ¯°
¡¡
2010³â
- NHN Ư°-2010/9
- ºÎõ½Ãû Ư°-2010/9
- Áß±âû Ư°-2010/7
- ÀÎÆ÷¼½ ⸳
10ÁÖ³â ÄÁÆÛ·±½º Ư°-2010/6
- ¼¿ï¿©´ë Ư°-2010/5
- ISMS ±¸ÃàÀ» À§ÇÑ ±â¼úÀû ÇÙ½ÉÀ̽´- 2010/4
- SK China ¼¼¹Ì³ª-
2010/3
- Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ º¸¾È- Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ Çùȸ 2010/2
- ÀÎÆ÷¼½ ½Å³â ÇÏ·Êȸ
2010/1
¡¡
(2010
½Å³â ÇÏ·Êȸ)
2009³â
- ÄÁ¹öÀü½º ½Ã´ë¿¡¼ÀÇ Á¤º¸º¸È£ Àü·«- CONCERT ÇØÅ·¹æÁö ¿öÅ©¼Ê- 2009/11
- ISEC 2009
-2009/9
- ³óÇù ¼¼¹Ì³ª-2009/6
- ±×·ì CIO ´ë»ó
¼¼¹Ì³ª-2009/5
- KISA Á÷¿ø´ë»ó ¼¼¹Ì³ª-2009/4
- Çѱ¹ CISSPÇùȸ
2009³â 1,2ȸ ¼¼¹Ì³ª-2009/2,
3
- SK±×·ì ¼¼¹Ì³ª-2009/1
¡¡
2008³â
2007³â
¡¡
2006³â
¡¡
IT Security Á¤Ã¥/Áöħ/ÀýÂ÷- ÄÁ¼³ÆÃ¿¡¼ »ç¿ëÇÑ Áöħ/ÀýÂ÷¸¦ ÀϺΠOPENÇÕ´Ï´Ù....(** »ó¾÷Àû ¸ñÀûÀ¸·Î´Â »ç¿ëÀº ºÒÇãÇÕ´Ï´Ù.)
¡¡
2005³â
- ISP/IDC¸¦ À§ÇÑ Á¤º¸¼¼¹Ì³ª(KISAÁÖ°ü ûÆòdz¸²Äܵµ-2005/12)
- ´ëÇÐÀ» À§ÇÑ Á¤º¸º¸È£ Àü·«(¸Þ¸®¿ÊÈ£ÅÚ-2005/12¿ù)
- Á¤º¸º¸¾È µ¿Çâ(CISSPÇùȸ-2005/12¿ù )
- ´ë°ËÀ» À§ÇÑ ¼¼¹Ì³ª(´ë°Ë-2005/11¿ù )
- ±â¾÷ÀÇ ºñ¿ëÈ¿°úÀû Á¤º¸º¸È£ÅõÀÚ¹æ¾È(CONCERT-2005/11)NEW
- ´ëÇÐÁ¤º¸º¸È£¼öÁØÇâ»óÀ» À§ÇÑ ¹®ÈÇü¼ºÀÇ Çʿ伺(¼¿ï´ë-2005/11)
- KB»ç¿ëÀÚ¸¦ À§ÇÑ ¼¼¹Ì³ª(2005/11)
- ¹üÁ¤ºÎ ITA- º¸¾È ¾ÆÅ°ÅØÃÄ(õ¾È°ø¹«¿ø¿¬¼ö¿ø-2005/10,11)NEW
- ±â¾÷Á¤º¸º¸È£ ÇÙ½É ¹× ´ëÀÀÀü·« (µÎ»ê±×·ì - 2005/10)
- º´¿ø Á¤º¸º¸È£ Àü·«(º´¿øÇùÀÇȸ -2005/9)
- º¸¾È»ç°í »õ·Î¿î °üÁ¡[µðÁöÅПÀÓÁî 2005/9]
- ITIL º¸¾È(2005/6)
- Enterprise
Architecture¿Í Security Architecture¿ÍÀÇ ¿¬°è(2005/7)
- Privacy ´ëÀÀÀ» À§ÇÑ
IT ¼³°è (KCB-2005/7)
- Çö´ëȨ ¼¼¹Ì³ª(2005/5)
- ITIL°ú Security Process(2005/3)
- LG±×·ì º¸¾È´ã´çÀÚµéÀ» À§ÇÑ ¼¼¹Ì³ª(LG-CNS 2005/2)
¡¡
2004³â
- Á¤º¸º¸È£°ü¸®Ã¼°è ¼ö¸³ ¹æ¹ý·Ð(2004/12-KISA¼¼¹Ì³ª- ¼¶À¯¼¾ÅÍ)
- Á¤º¸º¸È£±â¼úµ¿Çâ°ú ±â¾÷ÀÇ Á¤º¸º¸È£´ëÀÀ»ç·Ê(2004/12-Ä«µå»ç¼¼¹Ì³ª- Á¦ÁÖµµ)
- Á¤º¸º¸È£±â¼úµ¿Çâ°ú ±â¾÷ÀÇ Á¤º¸º¸È£´ëÀÀ»ç·Ê(2004/12-º¸Çè»ç¼¼¹Ì³ª-Á¦ÁÖµµ)
- Á¤º¸º¸È£±â¼ú µ¿Çâ(2004/10- SKT ÆÀÀå-Á¦ÁÖµµ)
- Á¤º¸º¸È£µ¿Çâ°ú Ä§ÇØ´ëÀÀ Àü·«(2004/9-ISS¼¼¹Ì³ª- ÀÎÅÍÄÜÆ¼³ÙŻȣÅÚ)
- º¸¾È°ü¸®(È¿°úÀûÀÎ
Á¤º¸º¸È£¸¦ À§ÇÑ ½ÇÇà ¹× ¹æÇâ)(Á¦ 9ȸ
Á¤º¸º¸È£½ÉÆ÷Áö¿ò SIS2004 -·Ôµ¥È£ÅÚ)
- Á¤º¸º¸º¸ µ¿Çâ(2004/7-Çѱ¹ HP)
- Á¤º¸º¸È£´ëÀÀÀü·« ¹× ½Çõ»ç·Ê(2004/6-SK)
- ½Ã½ºÅÛ °³¹ß/¿î¿µ°úÁ¤
ÁßÀÇ °í°´Á¤º¸º¸È£Ã¼°è ¼ö¸³ »ç·Ê(Çѱ¹ SIÇÐȸ 2004 Ãá°èÇмú´ëȸ)
- ¾ÈÀüÁø´Ü ±âÁØ
(2004/5-Á¤ÅëºÎ-ÀºÇàȸ°ü)
- OCTAVE
Methodology (2004/2-KISA)
- ÀÀ¿ë½Ã½ºÅÛ °³¹ß°úÁ¤ Áß º¸¾È ¹æ¹ý·Ð(2004/1- KISA)
¡¡
¿¬±¸°úÁ¦
- »ý¸íÁÖ±â Á¤º¸º¸È£Æò°¡ Ç׸ñ ¿¬±¸(KISA)-with ±èÁ¤´ö±³¼ö, È«±âÇâ ¹Ú»ç
- ¾ÈÀüÁø´Ü ±âÁØ,
Áöħ ÃʾÈÀÛ¾÷(KISA)
2003³â
¿¬±¸°úÁ¦
- Á¤º¸º¸È£ Ãë¾à¼º Æò°¡ºÐ¼® ǰÁú°ü¸® ¹æ¾È(KISA) with Ȳ°æÅ±³¼ö, ¿À°æÈñ»çÀå
- Á¤º¸º¸È£ ÀÎÁõ Á¦µµ ¿¬±¸ (KISA) with Àü¿µÇÏ´ëÇ¥
2002³â
¿¬±¸°úÁ¦
- Á¤º¸º¸È£ °ü¸®Ã¼°è ÀÎÁõ ½É»ç±âÁØ(KISA) with ±èÁ¤´ö±³¼ö, ¿À°æÈñ»çÀå
- Á¤º¸º¸È£ °ü¸®Ã¼°è ÀÎÁõ µ¿Çâ(KISA) with ±èÁ¤´ö±³¼ö, ¿À°æÈñ»çÀå
2001³â
- LGÀüÀÚ IT
Security Seminar(2001/3 LGÀüÀÚ)
- »ï¼ºÄ«µå IT
Control Seminar(2001/3 »ï¼ºÄ«µå)
- IT Control
& Security Seminar(E-BIZ world Conference) (2001/2 COEX)
- SK»ý¸í IT Outsourcing,
Control and Security Seminar(2001/1 SK»ý¸í)
- COBIT±¸Á¶¿¡ ÀÖ´Â º¸¾È processÀÇ °ËÅä
- Business
Continuity Plan ¹× IT Security Plan ¼ö¸³À» À§ÇÑ °øÅë Risk Assessment Framework
- Object
Oriented Security Issue
- ÀÏ¹Ý ±â¾÷¿¡¼ÀÇ
Quantitative Risk Assessment Àû¿ë½ÃÀÇ ¹®Á¦¿Í turnaround
- Business-
Asset RelationshipÀ» ÀÌ¿ëÇÑ Business Risk µµÃâ½ÃÀÇ °í·Á»çÇ×
¡¡
2000³â
- IT Security
Seminar(2000/1 ÈúưȣÅÚ)
- CRM
Seminar(2000/2 ¹üÇÑ¿©Çà»ç)
- µ¿ºÎÈÀç IT
Security Seminar(2000/4 µ¿ºÎÈÀç)
- Èï±¹»ý¸í IT
Security Seminar(2000/6 Èï±¹»ý¸í)
- E-BIZ Security
Conference(2000/7 ÈúưȣÅÚ)
- »ý¸íº¸Çè»ç IT
Control & Security Seminar(2000/10 »ýº¸Çùȸ)
¡¡
Classes
´ëÇб³,
HP±³À°¼¾ÅÍ, »ï¼ºSDS, »ç³» µî¿¡¼
Á¦°øÇÑ °ÀÇ, ¼ö¾÷ µéÀÔ´Ï´Ù.
- Security: ±â¾÷Á¤º¸º¸È£ ¾ÆÅ°ÅØÃÄ, Á¤º¸º¸È£ÄÁ¼³ÆÃ·Ð, Á¤º¸º¸È£ À§ÇèÆò°¡·Ð, º¸¾È°øÇÐ, ½Ã½ºÅÛ º¸¾È
- UNIX: ³»ºÎ±¸Á¶,
Unix Security, UNIX Administration & Advanced Administration µî
- ¾ð¾î: C++,
Object Oriented Methodology & Modeling
¡¡
|