¾È³çÇϽʴϱî?
¿ì¸®Çùȸ ÇмúºÎ¹® ±Û·Î¹ú Áö½Ä°øÀ¯´Â ÇöÀç ISACA HQÀÇ ÀÚ·á Áß¿¡¼ ÃÖ±Ù Æ®·£µå¿Í ȸ¿øµéÀÇ °ü½Éµµ°¡ ³ôÀº ÀÚ·áµéÀ» ¼±º°ÇÏ¿© ÇØ´ç ÀÚ·áµéÀ» ¿¬±¸ÇÏ°í ÇѱÛÈÇÏ´Â µ¥¿¡ ±× ÃëÁö¸¦ °¡Áö°í ÀÖ½À´Ï´Ù.
ÃÖ±Ù Æ®·£µå ÀÚ·á Áß ¿©·¯ ¾ð¾î·Î ¹ø¿ªµÈ ÀڷḦ ¼±Á¤ÇÏ¿© ÇѱÛÈ ÀÛ¾÷À» ÁøÇàÇÏ¿´°í, ÇöÀç ISACA HO ȨÆäÀÌÁö¿¡ °Ô½ÃµÇ¾ú½À´Ï´Ù.
¹ø¿ª ÀÚ·á(ÀÚ¼¼È÷ º¸±â Ŭ¸¯)
¡× µðÁöÅÐ Æ÷·»½Ä °³¿ä(Overview of Digital Forensics)
¹ø¿ª : À±¿ìÈñ (±Û·Î¹úÁö½Ä°øÀ¯ °£»ç / Çѱ¹IBM)
°Ë¼ö : À̼ø±¸ (¹ø¿ªÀÌ»ç / ¢ßÇѱ¹Á¤º¸±â¼ú´Ü)
ÀÚ·á ´Ù¿î·Îµå Ŭ¸¯
¡× »ç¹°ÀÎÅͳÝ: ¸®½ºÅ© ¹× °¡Ä¡¿¡ ´ëÇÑ °í·Á»çÇ×(Internet of Things: Risk and Value Considerations)
¹ø¿ª : À±¿ìÈñ (±Û·Î¹úÁö½Ä°øÀ¯ °£»ç / Çѱ¹IBM)
°Ë¼ö : À̼ø±¸ (¹ø¿ªÀÌ»ç / ¢ßÇѱ¹Á¤º¸±â¼ú´Ü)
ÀÚ·á ´Ù¿î·Îµå Ŭ¸¯
¡× DevOps Overview
¹ø¿ª : ¹èÇѼö (±Û·Î¹úÁö½Ä°øÀ¯ °£»ç / »ï¼ºSDS)
°Ë¼ö : À̼ø±¸ (¹ø¿ªÀÌ»ç / ¢ßÇѱ¹Á¤º¸±â¼ú´Ü)
ÀÚ·á ´Ù¿î·Îµå Ŭ¸¯
¡× »çÀ̹öº¸¾È: ÀÌ»çȸ°¡ ¿äûÇØ¾ß ÇÏ´Â °Íµé(Cybersecurity: What the Board of Directors Needs to Ask)
¹ø¿ª : ¾ç¼öÁ¤ (±Û·Î¹úÁö½Ä°øÀ¯ ÀÌ»ç / ½ÃÅ¥¾î¿ø)
°Ë¼ö : À̼ø±¸ (¹ø¿ªÀÌ»ç / ¢ßÇѱ¹Á¤º¸±â¼ú´Ü)
ÀÚ·á ´Ù¿î·Îµå Ŭ¸¯
¡× ºòµ¥ÀÌÅÍ ºÐ¼®À» ÅëÇÑ °¡Ä¡ âÃâ(Generating Value From Big Data Analytics)
¹ø¿ª : Á¤½Â¿ø (±Û·Î¹úÁö½Ä°øÀ¯ °£»ç / »ï¼ºSDS)
°Ë¼ö : À̼ø±¸ (¹ø¿ªÀÌ»ç / ¢ßÇѱ¹Á¤º¸±â¼ú´Ü)
ÀÚ·á ´Ù¿î·Îµå Ŭ¸¯
¾ÕÀ¸·Î Æ®·»µå ÀÚ·á¿¡ ´ëÇÑ ÇѱÛȸ¦ Á¡ÁøÀûÀ¸·Î È®´ëÇØ °¡°íÀÚ ÇÕ´Ï´Ù.
ȸ¿øºÐµéÀÇ ¸¹Àº °ü½É°ú Âü¿© ºÎŹµå¸³´Ï´Ù.
°¨»çÇÕ´Ï´Ù.
|