References
- K. J. Seo, J. E. Choi & H. W. Kim. (2015). An Exploratory Study on Development of Information Security Manpower. Journal of Association Of Information Systems, 24(2), 73-96. DOI : 10.5859/KAIS.2015.24.2.73
- K. T. Park, H. J. Jun & T. S. Kim. (2016). A Study on the Cybersecurity Workforce Training Program Development by Level of a Characteristic of Training Program. Journal of Information Technology Applications & Management, 23(4), 127-138. DOI : 10.21219/JITAM.2016.23.4.127
- J. M. Yang. (2018). A Study on Development of Standard Modeling Education Program in Information Security : Focusing on Domestic University Cases. Journal of Convergence Security Association, 18(5), 99-104.
- S. M. JIN, L. W. DING, D. R. LIU & H. Y. LI. (2020). Research on Training Strategy of Information Technology Application Ability of Normal University Students. International Journal of Advanced Science and Convergence, 2(4), 17-24. DOI : 10.22662/IJASC.2020.2.4.017
- J. H. Song & H. R. Kim. (2016). A Study on the NCS based Curriculum for Educating Information Security Manpower. Journal of the Korea Academia-Industrial cooperation Society, 17(11), 537-544. DOI: 10.5762/KAIS.2016.17.11.537
- J. H. Jung & C. M. Jung. (2019). An Analysis of Industrial Security Curriculum's in Colleges. Journal of Society for e-Business Studies, 24(2), 29-53. DOI : 10.7838/jsebs.2019.24.2.029
- J. S. Park. (2019). A Study on the Improvement of Curriculum for Human Resources Development in the Industrial Security. Journal of Association for Industrial Security, 9(1), 141-163.
- M. G. Lee. (2017). A Development of Curriculum for Information Security Professional Manpower Training. Journal of the Institute of Electronics and Information Engineers, 54(1), 46-52. DOI : 10.5573/ieie.2017.54.1.046
- W. H. Park & S. J. Ahn. (2017). Enhancing Education Curriculum of Cyber Security Based on NICE. KIPS Transactions on Computer and Communication Systems, 6(7), 321-328. DOI : 10.3745/KTCCS.2017.6.7.321
- C. B. Kim. (2020). An Analysis of Information Security Curriculum in Elementary School practical arts, Secondary School Informatics Teaching and Suggestions for Improvement. Journal of Society of Computer and Information, 25(10), 69-75. DOI : 10.9708/jksci.2020.25.10.069
- S. J. Kim & Y. H. Jung. (2020). A Study on the Improvement of Industrial Security Curriculum Based on Industrial Demand: A Survey on IPA for Industrial Security Officers. Journal of Korean Industrial Security, 10(3), 169-186. DOI : 10.33388/kais.2020.10.3.169
- Korea Internet & Security Agency. Annual training at KISA Cyber Security Talent Center, Cyber Security Manpower Training (K-Shield) Regular Course, Retrieved from http://academy.kisa.or.kr
- Korea Information Security Education Center. KISEC Information Security Expert Course, Retrieved from https://www.kisec.com
- Korea Information Technology Research Institute. KITRI Academy - Security Field, Retrieved from http://academy.kitri.re.kr
- Korea Information Security Industry Association. KISIA Talent Support Education Project - Security, Retrieved from https://www.kisia.or.kr
- Global IT Human Resources Development Institute. Global IT - National-based strategic training, Retrieved from http://www.gith.co.kr
- Korea Information Security Education Institute. Cloud Security Expert Training Course, Retrieved from http://www.keduit.com
- Ministry of Education. Guidelines for business processing related to credit recognition, etc. [Ministry of Education Notification No. 2021-9, 2021.2.19., partially revised], Retrieved from https://www.moe.go.kr
- E. S. Jang. (2020). A Case Study on the Operation of Artificial Intelligence in a Liberal Arts Mandatory Curriculum, Journal of General Education, 14(5), 137-148. DOI : 10.46392/kjge.2020.14.5.137
- R. W. Tyler. (2013). Basic principles of curriculum and instruction. University of Chicago press.
- W. H. Park & S. J. Ahn. (2017). Enhancing Education Curriculum of Cyber Security Based on NICE. KIPS Transactions on Computer and Communication Systems, 6(7), 321-328. DOI : 10.3745/KTCCS.2017.6.7.321
- M. J. Choi & D, Y. Jeong. (2013). A Study on Effect of the Cognitive Style of Field Dependence/Independence to the Information-Seeking Behavior of Undergraduate Students. Journal of the Korean Society for Library and Information Science, 47(1), 125-147. DOI : 10.4275/KSLIS.2013.47.1.125
- Ministry of Public Administration and Security. Secure Coding Guide(C, Java), Retrieved from https://www.mois.go.kr/
- Oracle. The CERT Oracle Secure Coding Standard for Java, Retrieved from https://www.oracle.com/
- Eclipse Foundation. Eclipse IDE, Retrieved from https://www.eclipse.org/
- Microsoft. Microsoft Visual Studio, Retrieved from https://visualstudio.microsoft.com/
- Philippe Arteau. FindSecurityBugs, Retrieved from https://find-sec-bugs.github.io/
- OWASP. OWASP® Zed Attack Proxy, Retrieved from https://www.zaproxy.org/
- OffSec Services. Kali Linux, Retrieved from https://www.kali.org/
- Wireshark Foundation. Wireshark, Retrieved from https://www.wireshark.org/
- C. Sanders. (2017). Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World Network Problems. Seoul : acorn Publishing.
- L. Chappell, (2014). Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide. Problems. Seoul : acorn Publishing.
- Tenable. Nessus, Retrieved from https://www.tenable.com/
- Metasploit. Metasploit Tools, Retrieved from https://www.metasploit.com/
- Openwall. John the Ripper, Retrieved from https://www.openwall.com/john/
- Willie L. Pritchett. (2014). Kali Linux Cookbook. Seoul : acorn Publishing.
- L. Allen. (2015). Kali Linux - assuring security by penetration testing :master the art of penetration testing with Kali Linux(2nd ed.). Seoul : acorn Publishing.
- DVWA. Damn Vulnerable Web App, Retrieved from https://dvwa.co.uk/
- Digital Forensic Center. (Investigation form) Evidence analysis(Appendix No. 11 form), Retrieved from http://cfpa.or.kr/