Á¤º¸¾È³»°øÁö»çÇ×
ISACA ±Û·Î¹ú Áö½Ä ÀÚ·á ¹ø¿ª ¾È³» 
 

¾È³çÇϽʴϱî?

 

¿ì¸®Çùȸ ÇмúºÎ¹® ±Û·Î¹ú Áö½Ä°øÀ¯´Â ÇöÀç ISACA HQÀÇ ÀÚ·á Áß¿¡¼­ ÃÖ±Ù Æ®·£µå¿Í ȸ¿øµéÀÇ °ü½Éµµ°¡ ³ôÀº ÀÚ·áµéÀ» ¼±º°ÇÏ¿© ÇØ´ç ÀÚ·áµéÀ» ¿¬±¸ÇÏ°í ÇѱÛÈ­ÇÏ´Â µ¥¿¡ ±× ÃëÁö¸¦ °¡Áö°í ÀÖ½À´Ï´Ù.

 

ÃÖ±Ù Æ®·£µå ÀÚ·á Áß ¿©·¯ ¾ð¾î·Î ¹ø¿ªµÈ ÀڷḦ ¼±Á¤ÇÏ¿© ÇѱÛÈ­ ÀÛ¾÷À» ÁøÇàÇÏ¿´°í, ÇöÀç ISACA HO ȨÆäÀÌÁö¿¡ °Ô½ÃµÇ¾ú½À´Ï´Ù.

 

¹ø¿ª ÀÚ·á(ÀÚ¼¼È÷ º¸±â Ŭ¸¯)

¡×           µðÁöÅÐ Æ÷·»½Ä °³¿ä(Overview of Digital Forensics)

           ¹ø¿ª : À±¿ìÈñ (±Û·Î¹úÁö½Ä°øÀ¯ °£»ç / Çѱ¹IBM)

           °Ë¼ö : À̼ø±¸ (¹ø¿ªÀÌ»ç / ¢ßÇѱ¹Á¤º¸±â¼ú´Ü)

           ÀÚ·á ´Ù¿î·Îµå Ŭ¸¯

¡×           »ç¹°ÀÎÅͳÝ: ¸®½ºÅ© ¹× °¡Ä¡¿¡ ´ëÇÑ °í·Á»çÇ×(Internet of Things: Risk and Value Considerations)

           ¹ø¿ª : À±¿ìÈñ (±Û·Î¹úÁö½Ä°øÀ¯ °£»ç / Çѱ¹IBM)

           °Ë¼ö : À̼ø±¸ (¹ø¿ªÀÌ»ç / ¢ßÇѱ¹Á¤º¸±â¼ú´Ü)

           ÀÚ·á ´Ù¿î·Îµå Ŭ¸¯

¡×           DevOps Overview

           ¹ø¿ª : ¹èÇѼö (±Û·Î¹úÁö½Ä°øÀ¯ °£»ç / »ï¼ºSDS)

           °Ë¼ö : À̼ø±¸ (¹ø¿ªÀÌ»ç / ¢ßÇѱ¹Á¤º¸±â¼ú´Ü)

           ÀÚ·á ´Ù¿î·Îµå Ŭ¸¯

¡×           »çÀ̹öº¸¾È: ÀÌ»çȸ°¡ ¿äûÇØ¾ß ÇÏ´Â °Íµé(Cybersecurity: What the Board of Directors Needs to Ask)

           ¹ø¿ª : ¾ç¼öÁ¤ (±Û·Î¹úÁö½Ä°øÀ¯ ÀÌ»ç / ½ÃÅ¥¾î¿ø)

           °Ë¼ö : À̼ø±¸ (¹ø¿ªÀÌ»ç / ¢ßÇѱ¹Á¤º¸±â¼ú´Ü)

           ÀÚ·á ´Ù¿î·Îµå Ŭ¸¯

¡×           ºòµ¥ÀÌÅÍ ºÐ¼®À» ÅëÇÑ °¡Ä¡ âÃâ(Generating Value From Big Data Analytics)

           ¹ø¿ª : Á¤½Â¿ø (±Û·Î¹úÁö½Ä°øÀ¯ °£»ç / »ï¼ºSDS)

           °Ë¼ö : À̼ø±¸ (¹ø¿ªÀÌ»ç / ¢ßÇѱ¹Á¤º¸±â¼ú´Ü)

           ÀÚ·á ´Ù¿î·Îµå Ŭ¸¯

 

¾ÕÀ¸·Î Æ®·»µå ÀÚ·á¿¡ ´ëÇÑ ÇѱÛÈ­¸¦ Á¡ÁøÀûÀ¸·Î È®´ëÇØ °¡°íÀÚ ÇÕ´Ï´Ù.

ȸ¿øºÐµéÀÇ ¸¹Àº °ü½É°ú Âü¿© ºÎŹµå¸³´Ï´Ù.

 

°¨»çÇÕ´Ï´Ù.