¡¡

¡¡

 

2021³â

 

 

2020³â

2019³â

2018³â

  • ¿¬¼¼´ë Ư°­
  • ÇѾç´ë Ư°­

2017³â

  • KAIST Ư°­
  • °í·Á´ë Ư°­

 

2014³â

  • KISA Ư°­
  • IBM ÄÁÆÛ·±½º
  • ±¹¹æÄÁÆÛ·±½º
  • ¿ì¸®±ÝÀ¶ÁöÁÖ Æ¯°­
  • ¼º±Õ°ü´ë Ư°­

2013³â

  • ±ÝÀ¶º¸¾È¿¬±¸¿ø ´ëÇлýÄ·ÇÁ Ư°­
  • Á¤º¸Åë½Å ±â¹Ý½Ã¼³ ÄÁÆÛ·±½º Ư°­
  • ³óÇùÁ¤º¸½Ã½ºÅÛ Æ¯°­
  • ±³À°ºÎ Ư°­
  • Çö´ëÄ«µå Ư°­
  • Çö´ë¶óÀÌÇÁ Ư°­
  • ÁÖÅðø»ç Ư°­
  • »ï¼º»ý¸í Ư°­

2012³â

  • °í·Á´ëÇпø Ư°­
  • ¿¬¼¼´ëÇпø Ư°­
  • ¼­¿ï´ëÇб³ Ư°­
  • ½ÅÇÑ»ý¸í Ư°­
  • °Ç°­º¸Çè°ø´Ü Ư°­
  • ±â¾÷ÀºÇà Æ¯°­
  • SKI Ư°­
  • ½º¸¶ÀϰÔÀÌÆ® Ư°­
  • ±ÝÀ¶º¸¾ÈÄÁÆÛ·±½º ÆÐ³Î
  • Á¤Ã¥±ÝÀ¶°ø»ç Ư°­
  • º¸°Çº¹ÁöºÎ Ư°­
  • ¿¬±Ý°ø´Ü Ư°­

¡¡

2011³â

  • »õ¸¶À»±Ý°í¿¬ÇÕȸ Ư°­
  • IBK Ư°­
  • ¸Þ¸®Ã÷±ÝÀ¶±×·ì Ư°­
  • Èï±¹±ÝÀ¶±×·ì Ư°­
  • °Ç°­º¸Çè°ø´Ü Ư°­
  • ±ÝÀ¶º¸¾ÈÄÁÆÛ·±½º Ư°­
  • ÀÇ·á¿ø¿¬ÇÕȸ Ư°­
  • ¿ì¸®±ÝÀ¶ÁöÁÖÆ¯°­
  • ±³º¸»ý¸íƯ°­
  • Çö´ëijÇÇÅ» Ư°­
  • ±¹ÅäÇØ¾çºÎ Ư°­
  • Çѱ¹ÀåÇÐÀç´Ü Ư°­
  • ±âȹÀçÁ¤ºÎ Ư°­
  • ¼öÃâÀÔÀºÇà Æ¯°­

¡¡

2010³â

  • NHN Ư°­-2010/9
  • ºÎõ½Ãû Ư°­-2010/9
  • Áß±âû Ư°­-2010/7
  • ÀÎÆ÷¼½ ⸳ 10ÁÖ³â ÄÁÆÛ·±½º Ư°­-2010/6
  • ¼­¿ï¿©´ë Ư°­-2010/5
  • ISMS ±¸ÃàÀ» À§ÇÑ ±â¼úÀû ÇÙ½ÉÀ̽´- 2010/4
  • SK China ¼¼¹Ì³ª- 2010/3
  • Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ º¸¾È- Ŭ¶ó¿ìµå ÄÄÇ»ÆÃ Çùȸ 2010/2
  • ÀÎÆ÷¼½ ½Å³â ÇÏ·Êȸ 2010/1

¡¡

     (2010 ½Å³â ÇÏ·Êȸ)

2009³â

  • ÄÁ¹öÀü½º ½Ã´ë¿¡¼­ÀÇ Á¤º¸º¸È£ Àü·«- CONCERT ÇØÅ·¹æÁö ¿öÅ©¼Ê- 2009/11
  • ISEC 2009 -2009/9
  • ³óÇù ¼¼¹Ì³ª-2009/6
  • ±×·ì CIO ´ë»ó ¼¼¹Ì³ª-2009/5
  • KISA Á÷¿ø´ë»ó ¼¼¹Ì³ª-2009/4
  • Çѱ¹ CISSPÇùȸ 2009³â 1,2ȸ ¼¼¹Ì³ª-2009/2, 3
  • SK±×·ì ¼¼¹Ì³ª-2009/1

¡¡

2008³â

 

 

2007³â

¡¡

2006³â

¡¡

IT Security Á¤Ã¥/Áöħ/ÀýÂ÷- ÄÁ¼³ÆÃ¿¡¼­ »ç¿ëÇÑ Áöħ/ÀýÂ÷¸¦ ÀϺΠOPENÇÕ´Ï´Ù....(** »ó¾÷Àû ¸ñÀûÀ¸·Î´Â »ç¿ëÀº ºÒÇãÇÕ´Ï´Ù.)

¡¡

2005³â

¡¡

2004³â

  • Á¤º¸º¸È£°ü¸®Ã¼°è ¼ö¸³ ¹æ¹ý·Ð(2004/12-KISA¼¼¹Ì³ª- ¼¶À¯¼¾ÅÍ)
  • Á¤º¸º¸È£±â¼úµ¿Çâ°ú ±â¾÷ÀÇ Á¤º¸º¸È£´ëÀÀ»ç·Ê(2004/12-Ä«µå»ç¼¼¹Ì³ª- Á¦ÁÖµµ)
  • Á¤º¸º¸È£±â¼úµ¿Çâ°ú ±â¾÷ÀÇ Á¤º¸º¸È£´ëÀÀ»ç·Ê(2004/12-º¸Çè»ç¼¼¹Ì³ª-Á¦ÁÖµµ)
  • Á¤º¸º¸È£±â¼ú µ¿Çâ(2004/10- SKT ÆÀÀå-Á¦ÁÖµµ)
  • Á¤º¸º¸È£µ¿Çâ°ú Ä§ÇØ´ëÀÀ Àü·«(2004/9-ISS¼¼¹Ì³ª- ÀÎÅÍÄÜÆ¼³ÙŻȣÅÚ)
  • º¸¾È°ü¸®(È¿°úÀûÀÎ Á¤º¸º¸È£¸¦ À§ÇÑ ½ÇÇà ¹× ¹æÇâ)(Á¦ 9ȸ Á¤º¸º¸È£½ÉÆ÷Áö¿ò SIS2004 -·Ôµ¥È£ÅÚ)
  • Á¤º¸º¸º¸ µ¿Çâ(2004/7-Çѱ¹ HP)
  • Á¤º¸º¸È£´ëÀÀÀü·« ¹× ½Çõ»ç·Ê(2004/6-SK)
  • ½Ã½ºÅÛ °³¹ß/¿î¿µ°úÁ¤ ÁßÀÇ °í°´Á¤º¸º¸È£Ã¼°è ¼ö¸³ »ç·Ê(Çѱ¹ SIÇÐȸ 2004 Ãá°èÇмú´ëȸ)
  • ¾ÈÀüÁø´Ü ±âÁØ (2004/5-Á¤ÅëºÎ-ÀºÇàȸ°ü)
  • OCTAVE Methodology (2004/2-KISA)
  • ÀÀ¿ë½Ã½ºÅÛ °³¹ß°úÁ¤ Áß º¸¾È ¹æ¹ý·Ð(2004/1- KISA)

¡¡

¿¬±¸°úÁ¦

  • »ý¸íÁÖ±â Á¤º¸º¸È£Æò°¡ Ç׸ñ ¿¬±¸(KISA)-with ±èÁ¤´ö±³¼ö, È«±âÇâ ¹Ú»ç
  • ¾ÈÀüÁø´Ü ±âÁØ, Áöħ ÃʾÈÀÛ¾÷(KISA)

2003³â

 ¿¬±¸°úÁ¦

  • Á¤º¸º¸È£ Ãë¾à¼º Æò°¡ºÐ¼® ǰÁú°ü¸® ¹æ¾È(KISA) with Ȳ°æÅ±³¼ö, ¿À°æÈñ»çÀå
  • Á¤º¸º¸È£ ÀÎÁõ Á¦µµ ¿¬±¸ (KISA) with Àü¿µÇÏ´ëÇ¥

2002³â

¿¬±¸°úÁ¦

  • Á¤º¸º¸È£ °ü¸®Ã¼°è ÀÎÁõ ½É»ç±âÁØ(KISA) with ±èÁ¤´ö±³¼ö, ¿À°æÈñ»çÀå
  • Á¤º¸º¸È£ °ü¸®Ã¼°è ÀÎÁõ µ¿Çâ(KISA) with ±èÁ¤´ö±³¼ö, ¿À°æÈñ»çÀå

2001³â

  • LGÀüÀÚ IT Security Seminar(2001/3 LGÀüÀÚ)
  • »ï¼ºÄ«µå IT Control Seminar(2001/3 »ï¼ºÄ«µå)
  • IT Control & Security Seminar(E-BIZ world Conference) (2001/2 COEX)
  • SK»ý¸í IT Outsourcing, Control and Security Seminar(2001/1 SK»ý¸í)
  • COBIT±¸Á¶¿¡ ÀÖ´Â º¸¾È processÀÇ °ËÅä
  • Business Continuity Plan ¹× IT Security Plan ¼ö¸³À» À§ÇÑ °øÅë Risk Assessment Framework
  • Object Oriented Security Issue
  • ÀÏ¹Ý ±â¾÷¿¡¼­ÀÇ Quantitative Risk Assessment Àû¿ë½ÃÀÇ ¹®Á¦¿Í turnaround
  • Business- Asset RelationshipÀ» ÀÌ¿ëÇÑ Business Risk µµÃâ½ÃÀÇ °í·Á»çÇ×

¡¡

2000³â

  • IT Security Seminar(2000/1 ÈúưȣÅÚ)
  • CRM Seminar(2000/2 ¹üÇÑ¿©Çà»ç)
  • µ¿ºÎÈ­Àç IT Security Seminar(2000/4 µ¿ºÎÈ­Àç)
  • Èï±¹»ý¸í IT Security Seminar(2000/6 Èï±¹»ý¸í)
  • E-BIZ Security Conference(2000/7 ÈúưȣÅÚ)
  • »ý¸íº¸Çè»ç IT Control & Security Seminar(2000/10 »ýº¸Çùȸ)

¡¡

Classes

´ëÇб³, HP±³À°¼¾ÅÍ, »ï¼ºSDS, »ç³» µî¿¡¼­ Á¦°øÇÑ °­ÀÇ, ¼ö¾÷ µéÀÔ´Ï´Ù.

  • Security: ±â¾÷Á¤º¸º¸È£ ¾ÆÅ°ÅØÃÄ, Á¤º¸º¸È£ÄÁ¼³ÆÃ·Ð, Á¤º¸º¸È£ À§ÇèÆò°¡·Ð, º¸¾È°øÇÐ, ½Ã½ºÅÛ º¸¾È
  • UNIX: ³»ºÎ±¸Á¶, Unix Security, UNIX Administration & Advanced Administration µî
  • ¾ð¾î: C++, Object Oriented Methodology & Modeling

¡¡


Copyright © 2001