top of page

Strengthening Resilience Through Cybersecurity Education/Training

The Real-time Attack and Defense Training System (CoreCyberRange) is a training program designed to virtually recreate actual cyberattack scenarios, allowing employees or security personnel to experience and master the processes of attack detection, response, and recovery as if in a real-world situation.

Beyond simple theoretical training, we provide feedback focused on enhancing response capabilities in cyber crisis situations and the overall cyber resilience of the organization.

Cybersecurity Simulation Training

Our Services

Incident Investigation/Analysis Technology

  • A method to quickly identify and classify malicious files among numerous legitimate files existing on a host

  • How to utilize automation tools and sandbox systems to rapidly identify malware behaviors and maximize analysis efficiency

  • Methods to extract and analyze obfuscated or encrypted JavaScript/shellcode/executable files from malware

  • Normalization of various log types, extraction of key security logs, and timeline-based analysis methods

  • Method for analyzing modification and creation times of related files through file system metadata analysis

  • Method for identifying and tracking the initial intrusion path (malware entry path)

  • Method for analyzing intrusion traces on network and system artifacts using Python scripts

  • Method for Collecting System Live Data and Analyzing Traces of Malicious Script Execution Using PowerShell Scripts

Penetration testing and vulnerability assessment technology

  • Universally applicable systematic procedures and methodologies

  • Provision of various practice equipment necessary for analyzing device and wireless network vulnerabilities

  • Training on attack systems based on "MITRE ATT&CK" target attack indicators

  • Training on dependencies and linkage methods between unit technologies for vulnerability attacks, and automation methods.

  • Providing a network infrastructure environment with diverse penetration paths to learn various penetration scenarios.

Malware investigation and analysis technology

  • Sandbox Utilization and Tuning Techniques for Malware Behavior Analysis

  • Techniques for Creating and Utilizing IDA Scripts and Python Script Plugins for Automated Malware Code Analysis

  • Not only system-level operational processes but also the structure of the C2 infrastructure and communication mechanisms

  • Various types of transmitted and received data encryption and rootkit technology used by malware to maximize survivability

  • Windows-based executable file and document-based malware analysis techniques

  • Android Platform-Based Malicious App Analysis Techniques

Cybersecurity Education Field

Real-time attack and defense scenario training

Situational Training

훈련 목표에 맞춰 훈련 인프라를 자율적으로 구성함으로써 특정 시나리오에 제한되지 않고 다양한 기술훈련을 통한 목표 달성

Training scenario

Prevention, Detection, Response, Recovery

Possesses various training scenarios

Multi-faceted training status monitoring

Trainee network status. Visualization of training status by team. Training event status. Monitor of training progress by team.

Post-feedback (review)

Reproduction of training performance indicators, training activities, status (team/individual), training scores, and training events

Provision of post-training briefings and reports through detailed analysis of the training situation

Services We Provide

online services

  • 교육컨설팅 요청 

  • 학습일정, 참여인원,일정 협의 

  • 온라인 서비스 오픈 

  • 진행상황 일일 보고서 제공 

  • ​학습 결과 분석 보고서 제공 

Offline advanced training

  • Learning content organized to match goals

  • Schedule coordination

Scenario Training

  • Cloud service (subscription type)

  • On-premise (on-premise)

  • Provides scenarios tailored to training objectives

  • White Team, Green Team Support

  • Support upon RedTeam request (separate)

Post-briefing

  • Training Results Analysis and Post-Training Briefing

  • Provide result report

Education and training services

Desired field
How to participate
Online subscription service
Offline education services
Training Service - Subscription Service
Construction of a training ground
white.png

서울본사 

​서울특별시 송파구 법원로 8길 9 청림타워 10층  

​부산지사  

부산광역시 해운대구 우2동 센텀중앙로 55 8층 

세종지사 

​세종특별자치시 조치원읍 군청로 95 세종테크노파크 2층 

​연락처

이메일 

coresec@coresec.co.kr 

 

 Tel : 

+82-2-3453-6630

서비스

사이버보안 교육/훈련 (온/오프라인) 
OT/IoT 취약점 점검 (Red Team 서비스)  
FDA eSTAR 인증 컨설팅 (의료기기 인증) 
산업제어시스템 컨설팅 (IEC 62443) 
​가상자산 조사/분석 (체이널리시스 총판)

© 2023 by Coresecurity

bottom of page