Online Education Program for Creative Talent
Be the true leader of this era who practices love.
Training information security experts to respond to cyber attacks
The educational objective of the department is to train experts through the use of practical theoretical and application that will enable them to discover vulnerabilities in information systems and determine appropriate security measures.
The educational objective of the Department of Hacking and Security is to cultivate experts who possess the theoretical knowledge and practical skills needed to create defense measures by discovering vulnerabilities in information systems, and to train information protection experts who can respond to cyber attacks by providing cyber infringement and personal information infringement incident responses, cyber infringement evidence collection, information protection consulting, and the appropriate security control personnel.
Training multi-disciplinary information
security experts with theoretical and practical skills
Qualification | Summary | Related Subjects |
---|---|---|
Information Security Engineer Information Security Industry Engineer | A national official private certificate that certifies the capabilities of the recipient to develop information security systems and solutions, operate and manage major computer operating systems, work with network equipment and information security equipment, establish information security policies for each field, and create and manage security measures all in compliance with laws and regulations related to information protection based on theoretical and practical knowledge of information security | Security Element Technology, Network Security, Application Security, Hacking and Security, Information Security Management and Regulations, Information Security Practice |
CISSP (Certified Information System Security Professional) | An internationally recognized certificate that certifies the recipient’s ability to lead and unify the work of eight business areas including security and risk management, asset security, security engineering, communications and network security, identity and access management, security assessment, security operations, and software development security, and to maintain professionalism through continuous education | Computer Networks, Network Security, Hacking and Security, Security Element Technology, Encryption Basic Technology, Information Security Audit |
CISM (Certified Information Security Manager) | The recipient possesses common knowledge of systems of information security and fully understands and can apply mutatis mutandis for information security management. Information security management is an internationally recognized certificate that certifies the work ability of the recipient for information risk management, information security governance, information security program development management, incident response and management. | Security Control and Consulting Techniques, Security Evaluation and Analysis Techniques, Information Security Audit |
ISMS (Informaion Security Management System) | A nationally recognized private certificate that certifies the ability to conduct certification screening by participating as an examine in the process by which the Internet Promotion Agency or the certification body checks whether the information protection management system of the certification applying agency meets the certification standards through written and on-site examination | Security Control and Consulting TechniqueS, Security Evaluation and Analysis TechniqueS, Information Security Audit |
PIMS (Personal Information Security Management System) | A nationally recognized private certificate that certifies the ability of the recipient to conduct certification screening by participating as an examiner in the process by which the Internet Promotion Agency or the certification body checks whether the information protection management system of the certification applying agency meets the certification standards through written and on-site examination | Personal Information and Copyright Protection, Security Control and Consulting Techniques, Security Evaluation and Analysis Techniques, Information Security Audit |
Hacking Security Expert Level 1, Level 2, Level 3 | A private certificate, and Level 1 certifies the recipient’s technical work skills such as planning, research, analysis, investigating, and technology management based on advanced professional knowledge and practical experience; Level 2 certifies the possession of complex functional work skills based on basic theoretical knowledge of hacking security and skilled functions required for practical practice; Level 3 certifies the possession of real-life information protection skills based on basic knowledge of hacking and security, legal system, and ethics | Security Element Technology, Network Security, Application Security, Hacking and Security, Information Security Management and Regulations, Information Security Practice, Information Security Audit |
GCIH (GIAC Certified Incident Handler) | An internationally recognized certificate that certifies the recipient’s ability to appropriately respond to incidents including detection of malicious applications and network activities, identification of system hacking techniques, detection and analysis of system and network vulnerabilities, identification of causes of accidents, and improvement of business processes based on knowledge of common attack techniques, vectors, and tools | Hacking Response Practice, Information Security Practice, Security Element Technology, System Hacking Practice, Encryption Basic Technology |
CPPG (Certified Privacy Protection General) | A private certificate that certifies the recipient’s ability to establish personal information protection policies of companies and public institutions based on knowledge of personal information protection-related laws and technologies, and certifies the recipient’s knowledge of personal information handling and management capabilities | Privacy and Copyright Protection |
CEH (Certified Ethical Hacker) | An internationally recognized certificate that certifies that the recipient is an ethical hacker who is employed by an institution and is suitable to conduct legitimate penetration tests and/or mock hacking | System Hacking Practice, Hacking Response Practice, Security Element Technology, Encryption Basic Technology, Network Security, Network Attack Technique |
Digital Forensics Expert Level 1 | A private certificate that certifies the ability of the recipient to command and manage tasks such as disk forensics, DB forensics, network forensics, mobile forensics, and application of evidence law | Introduction to Cyber Investigation, Digital Forensics, Information Security Audit, Information Security Management and Regulations |
Digital Forensics Expert Level 2 | A private certificate that certifies the ability of the recipient to collect digital evidence based on the knowledge of laws related to digital forensics, computer structure, digital storage medium, operating systems, file systems, application programs, computer networks, databases, and ability to produce valid outcomes as evidence of the trial process by creating copy images | Introduction to Cyber Investigation, Digital Forensics, Information Security Audit, Information Security Management and Regulations, Operating System, Linux, Database |
CCFP (Certified Cyber Forensic Professional) | An internationally recognized certificate that certifies the ability of the recipient to command and control work such as support for crime investigation and law enforcement, respond to cyber crimes targeting public and private organizations, corporate information security, e-discovery necessary for litigation, cyber confidentiality analysis based on knowledge of principles of law and ethics, investigation, forensic science, digital forensics, applied forensics, and the latest convergence security technologies | Introduction to Cyber Investigation, Digital Forensics, Information Security Audit, Information Security Management and Regulations, Operating Systems, Linux, database |
Engineer Information Processing, Industrial Engineer Information Processing | A national certificate that certifies the ability of the recipient to perform tasks such as planning, analysis, design, implementation, testing, operation, maintenance, etc. as a and performs project work throughout the life cycle of information systems | General Information on Electronic Calculators, Operating Systems, Computer Structure Theory, Data Structure Theory, Database Practice, Algorithm Practice, Computer Networks |
CCNA (Certified Computer Network Architect) | An international private certificate that certifies the ability of the recipient to install, operate, and repair small and medium-sized corporate networks based on knowledge and skills such as WAN access, network security, network type and media type selection, routing and switching, TCP/IP protocol stack, IP address management, networking equipment configuration and operation, VLAN, IP routing, IP traffic management, IP access control, P2P connection, frame relay connection, etc. | Computer Networks |
There is increasing demand for information security experts due to rapid growth of domestic and overseas information security markets
HYCU ON/OFFLINE
Programs
Online Education Program for Creative Talent
Professional Human Networks via OFFLINE Support System
Office Tel. +82-2-2290-0850