Strengthening Resilience Through Cybersecurity Education/Training
The Real-time Attack and Defense Training System (CoreCyberRange) is a training program designed to virtually recreate actual cyberattack scenarios, allowing employees or security personnel to experience and master the processes of attack detection, response, and recovery as if in a real-world situation.
Beyond simple theoretical training, we provide feedback focused on enhancing response capabilities in cyber crisis situations and the overall cyber resilience of the organization.
Cybersecurity Simulation Training
Our Services
Incident Investigation/Analysis Technology
A method to quickly identify and classify malicious files among numerous legitimate files existing on a host
How to utilize automation tools and sandbox systems to rapidly identify malware behaviors and maximize analysis efficiency
Methods to extract and analyze obfuscated or encrypted JavaScript/shellcode/executable files from malware
Normalization of various log types, extraction of key security logs, and timeline-based analysis methods
Method for analyzing modification and creation times of related files through file system metadata analysis
Method for identifying and tracking the initial intrusion path (malware entry path)
Method for analyzing intrusion traces on network and system artifacts using Python scripts
Method for Collecting System Live Data and Analyzing Traces of Malicious Script Execution Using PowerShell Scripts
Penetration testing and vulnerability assessment technology
Universally applicable systematic procedures and methodologies
Provision of various practice equipment necessary for analyzing device and wireless network vulnerabilities
Training on attack systems based on "MITRE ATT&CK" target attack indicators
Training on dependencies and linkage methods between unit technologies for vulnerability attacks, and automation methods.
Providing a network infrastructure environment with diverse penetration paths to learn various penetration scenarios.
Malware investigation and analysis technology
Sandbox Utilization and Tuning Techniques for Malware Behavior Analysis
Techniques for Creating and Utilizing IDA Scripts and Python Script Plugins for Automated Malware Code Analysis
Not only system-level operational processes but also the structure of the C2 infrastructure and communication mechanisms
Various types of transmitted and received data encryption and rootkit technology used by malware to maximize survivability
Windows-based executable file and document-based malware analysis techniques
Android Platform-Based Malicious App Analysis Techniques
Cybersecurity Education Field
Real-time attack and defense scenario training
Situational Training
훈련 목표에 맞춰 훈련 인프라를 자율적으로 구성함으로써 특정 시나리오에 제한되지 않고 다양한 기술훈련을 통한 목표 달성
Training scenario
Prevention, Detection, Response, Recovery
Possesses various training scenarios
Multi-faceted training status monitoring
Trainee network status. Visualization of training status by team. Training event status. Monitor of training progress by team.
Post-feedback (review)
Reproduction of training performance indicators, training activities, status (team/individual), training scores, and training events
Provision of post-training briefings and reports through detailed analysis of the training situation
Services We Provide
online services
-
교육컨설팅 요청
-
학습일정, 참여인원,일정 협의
-
온라인 서비스 오픈
-
진행상황 일일 보고서 제공
-
학습 결과 분석 보고서 제공
Offline advanced training
Learning content organized to match goals
Schedule coordination
Scenario Training
Cloud service (subscription type)
On-premise (on-premise)
Provides scenarios tailored to training objectives
White Team, Green Team Support
Support upon RedTeam request (separate)
Post-briefing
Training Results Analysis and Post-Training Briefing
Provide result report

서울본사
서울특별시 송파구 법원로 8길 9 청림타워 10층
부산지사
부산광역시 해운대구 우2동 센텀중앙로 55 8층
세종지사
세종특별자치시 조치원읍 군청로 95 세종테크노파크 2층
연락처
서비스
사이버보안 교육/훈련 (온/오프라인)
OT/IoT 취약점 점검 (Red Team 서비스)
FDA eSTAR 인증 컨설팅 (의료기기 인증)
산업제어시스템 컨설팅 (IEC 62443)
가상자산 조사/분석 (체이널리시스 총판)
© 2023 by Coresecurity
