top of page

Together with Core Security Co., Ltd.

Facing changing cyber threats

Build an elite team

Solution

Online education and training platform

As cyber threats become increasingly sophisticated and diverse, it is essential for both individuals and organizations to strengthen their cybersecurity capabilities. In this context, online platforms enable the simultaneous learning of effective cybersecurity theory and practice without the constraints of time and space.

Real-time attack and defense training platform
(Cyber Range)

Through the real-time attack and defense training system, security personnel can gain practical experience with the latest attack techniques. By mastering not only theoretical knowledge but also response methods in actual attack situations, they can enhance their practical defense capabilities.

Through regular training, we foster security awareness among organizational members and contribute to the formation of a company-wide security culture. This is a security element just as important as technical defense mechanisms.

Incident Investigation Automation Tool

By utilizing automation tools equipped with features such as automated evidence collection, various artifacts, and centralized management, it is possible to quickly and accurately secure necessary evidence in the event of a security breach, enabling efficient cause analysis and response.

Vulnerability Analysis Automation Tool

The OT/IoT environment has characteristics different from existing IT systems, so a professional approach is essential.

Operational Technology (OT) and Internet of Things (IoT) environments play a key role in various industrial sectors such as manufacturing, energy, utilities, and healthcare, but they are facing serious threats as they become targets of cyber attacks.

These environments have distinct characteristics compared to IT environments, such as real-time control, integration with physical processes, equipment lifecycles, and safety requirements, making it difficult to provide effective protection using existing security methods.

ITRAINING Online Education & Training Platform

ITRAINING

You can effectively improve your cyber threat response capabilities, which are insufficient with theoretical learning alone.

Theoretical and practical training

  • Prevention, Detection, Response, and Recovery fields

  • Providing content that reflects the latest cyber threats and technology trends

  • Repetitive learning and personalized feedback

Cyber Range Real-time Attack & Defense Training Platform

CoreCyberRange (CCR)

Strengthening organizational resilience through real-time cyberattack defense training for organizations and individuals

Scenario Training

  • Cyber Attack Simulation Training (Red Team / Blue Team Training)
  • Technical training to enhance recovery capabilities
  • Organizational threat response system training
  • Deriving points for improvement through evaluation and feedback
    (Team/Individual Performance Analysis Report)
Intelligent CCTV Incident Investigation Automation Tool

Intelligent CCTV Incident Investigation Automation Tool

  • Extensive compatibility: Full support for over 40 models from domestic and international manufacturers

  • Advanced Network Scanning: CCTV and IoT Automatic Detection Scanning

  • Integrated Web Access System: Rapid Analysis of Intelligent CCTV Web Server Connections

  • In-depth Vulnerability Analysis: CVE Database-Based Automated Vulnerability Diagnosis

  • Security certification verification
    Thorough inspection of RTSP authentication system vulnerabilities through advanced password dictionary matching

  • Artifact extraction and collection system, rapid collection and analysis of core data such as important files, networks, and logs

Home IoT Incident Investigation Artifact Collection Automation Tool

Home IoT Incident Investigation Artifact Collection Automation Tool

  • Home IoT Incident Investigation Automation Tool

  • Support for various devices: Compatible with over 240 types of network equipment

  • Automated Digital Forensics: Automatic Collection of Digital Artifacts from Routers/NAS

  • Comprehensive Data Extraction: System Information, Key Files, Network, Files, Processes,
    Comprehensive data extraction, such as logs

  • One-Click Solution: Automatic evidence collection with just one click

Smart Ship Infrastructure Vulnerability Check Solution

Smart Ship Infrastructure Vulnerability Check Solution

  • Checking requirements according to international security standards

  • Administrative, technical, and physical infrastructure diagnosis based on international standards IEC 62443, UR E26, and E27

  • Proactive Blocking of Security Threats: Real-time Vulnerability Matching – Presenting Immediate Response Measures Through Automatic Identification of Known Vulnerabilities

Solution Inquiry

Multiple selections are allowed.
white.png

서울본사 

​서울특별시 송파구 법원로 8길 9 청림타워 10층  

​부산지사  

부산광역시 해운대구 우2동 센텀중앙로 55 8층 

세종지사 

​세종특별자치시 조치원읍 군청로 95 세종테크노파크 2층 

​연락처

이메일 

coresec@coresec.co.kr 

 

 Tel : 

+82-2-3453-6630

서비스

사이버보안 교육/훈련 (온/오프라인) 
OT/IoT 취약점 점검 (Red Team 서비스)  
FDA eSTAR 인증 컨설팅 (의료기기 인증) 
산업제어시스템 컨설팅 (IEC 62443) 
​가상자산 조사/분석 (체이널리시스 총판)

© 2023 by Coresecurity

bottom of page