(주)코어시큐리티 :::Global Security Contents Leader:::
Phone: 02-3453-6630 Email: coresec@coresec.co.kr

SPCIALIZED GOVERNMENT TAINING PROGRAM

10 Years Government Security Expert Training Program

Core Security has a 10 years contract with Korean government KISA and developed certified training courses to cultivate cyber security specialists since 2013.

100 Hours Fundamental Training at Core Security
Curriculum is developed By Core Security Core Security conducts & manages the whole fundanmental training

100 Hours Advanced Training at KISA
Virtual cyber security training with various training scenarios

Courses Cover: Network penetration testing with Metasploit / Network traffic analysis / Web application vulnerability analysis and attack techniques / Detecting and tracking down malware / Malware analysis techniques / Analysis of cyber security incidents

What is K-Shield?

- 200 Hours annual cyber security training program

- 200 participants trained annually

- 120 security experts certified

Courses Cover: APT attack scenario training, ICS/SCADA incident response scenario training, Real-time attack and defense training, and so on.


National Police Agency Cyber Bureau (CSRT) Training Program

Core Security has been training National police agency cyber security specialists since 2008.

Specialized Digital Forensic Course
Analysis of Digital Evidences Course
Cyber Crime Investigation Course

Advanced course for cyber terrorism investigation

  • Malware concepts & basic malware analysis
  • Malware detection through HDD analysis
  • Malware detection through memory analysis\
  • Analyzing & tracking down malicious documents
  • Dynamic malware analysis
  • Analysis of malicious apk files
  • Introduction to static analysis & advanced dynamic analysis

Digital Forensics Specialist Course

  • SSD/HDD/Linux Forensics
  • Analysis of changes in file time attributes
  • Advanced Windows forensic data analysis & recovery
  • Mac OS X, IOS forensic data analysis & recovery
  • Analysis & recovery of document files like HWP and MS-Office
  • EnScript programming for effective analysis
  • Getting CHFI certification

Contracting for Cyber Security Training

Tracking Techniques
Network security : Packet analysis & Wireless hacking System security : Windows, Linux, and DB Penetration testing : Information gathering & Log analysis Web application hacking
Advanced Course for Digital Forensics
Types of incident response & how to respond Digital evidence gathering techniques Memory forensics Timeline analysis Intrusion artifacts
Digital Forensics Course
Windows registry User account analysis Volume analysis File system analysis File creation & deletion history analysis USB connection history analysis Download file history analysis Windows memory forensics Linux memory forensics Unix/Linux forensics