Skills You’ll Learn

Process analysis using EDR solutions

System inspection method using carbon black

Virtual Hacking Incident Response Practice

Practice responding to hacking incidents using virtual machines

Reproducing a web hacking incident

The hacking process is reproduced using a web vulnerability.

Note) An example link to a well-written selling page

Photographer Chosun Hee's perspective on the subject <flower>

Monthly profit of 5 million won! Epoxy line construction that anyone can do

Class introduction

Example) Please enter as much detail as possible about what you learn in the class and about the creator.

Final Cut Pro announces the latest Hangul version of the 2022 class. I share all the know-how I've gained from practicing video editing, with 4 years on YouTube, over 500 Final Cut Pro edits alone. Edit videos using Final Cut Pro, which has an intuitive interface and overwhelming work speed compared to comparable PCs! I'll teach you the basics in detail so that even beginners can easily follow along.

Hello, this is Song Dae-geun.

The AhnLab (AhnLab) CERT team was responsible for investigating various hacking incidents that occurred in private companies and public institutions. I was in charge of the SOC construction project and operation project PM at IBM Korea. If a hacking incident occurs through a class, I will tell you the know-how to analyze the cause of the attack.

If you don't have experience dealing with hacking incidents, you're often at a loss as to what to do when an incident occurs. For those who lack experience in dealing with incidents, I will tell you how to analyze infringement incidents from a practical perspective necessary to respond to corporate hacking incidents. We will understand hacking incidents through practical exercises and teach you about infringement incident response procedures through simulated incident response training. I will explain technical measures to identify the cause of the accident and take measures to prevent the same accident from happening again.

Course effect

Example) “Please write 3 or more course effects in the bullet points below.”

  • Even beginners who don't know anything about video editing can easily learn the video editing process and skills.

  • You can learn about the chroma key functions that are commonly used in private broadcasts.

  • You can create more colorful videos in a short time through paid template purchase sites and usage methods.

  • You can learn how to distinguish processes infected with malware.

  • I will explain how to identify the extent of damage by checking file access history.

  • You can learn the process of analyzing hacking incidents through log analysis.

  • I will explain how to create an infringement incident analysis report.

  • By verifying vulnerabilities, you can learn how to prevent hacking incidents from being repeated.

Recommended target

Example) “Please fill in at least 3 groups of recommended targets in the bullet points below.”

  • Those who have a MAC and are interested in video editing

  • Those who bought Final Cut Pro but left it unattended

  • Those who have Final Cut Pro and only use cut editing and subtitles

  • Those who have no experience in dealing with hacking incidents

  • Those who want to practice actual cases where hacking incidents occurred

  • If you are curious about how to write an infringement incident analysis report

Pre-course notes

Example) “Please enter recommended PC specifications or the program version you are using.”

  • This class will be held in the Korean version of Final Cut Pro 10.6.4.

  • Practice is only possible with a MAC PC and Final Cut Pro.

  • The virtual machine used by the class (Oracle VirtualBox, VMware Player) must be installed separately.

  • The sample log used in the lab is for lab purposes only and redistribution or unauthorized reproduction is restricted.

N reasons why this class is special

❶ Learn a sense of realism by recreating accidents that occur in real fields.

Through classes, you can practice the same hacking case as an accident that actually occurred in the field. In a virtual environment for practical use, it is possible to analyze a system that has been reproduced in the same way as a real case.

실행 완료.png

log 파일.png

❶ From analysis of the causes of hacking incidents to countermeasures to prevention of recurrence

I will explain in detail the process of conducting an investigation from the cause of the hacking incident. I will tell you the architectural design know-how necessary to prevent the same hacking incident from happening again.



<insert 2 or more images or videos>

  • The image should focus on the result after creating the class.

  • If you would like to add a personal portfolio, please fill in the details below.

  • Example) Chapter 1-3. Example image of creating a portfolio

❷ Learn the competencies required for practical use through application vulnerability verification training

You can learn how to build a test system to verify vulnerabilities. Install an application to reproduce the incident system and apply application weak settings.

By understanding the impact of weak settings on applications and learning how to eliminate vulnerabilities, you can learn the technical competencies required for practical work.


Screen Shot 2020-05-11 at 7.02.14 PM.png

View similar classes you might also like

The Secret to Becoming a Popular Artist Revealed by COAX!

Concept Art  |  COAX



Analysis tips through infringement incident response cases


Infringement incident response practice


Reproducing a system vulnerable to PHP injection


Class finish




We analyzed and responded to security breaches by private companies and public institutions, and carried out various types of security incident responses, including 3.20 cyber attacks, community portals, and online shopping mall infringement incident investigations.

While in charge of technical work in the security division of IBM and Cisco (Cisco), a global security company, I carried out security projects for corporate customers. We share the knowledge and competencies required by corporate security personnel based on experience in dealing with various security issues and project construction/operation experience.

Key work experience

  • Security consultant: design/construction/operation of security enhancement strategies through security infrastructure consulting

  • Security Control Consulting: Conducting SOC construction consulting and operation tasks

  • Security Service Product Development: Next Generation Security Control Solution & Service Development

  • Response to infringement incidents: many military, public, private companies, etc.

  • 2014 KISA K-Shield Security Course Instructor (Instructor in charge of AhnLab network forensics training)

  • 2016 Personal Information Security (PIS) FAIR/ Presentation Topic 'Security Intelligence'


SupportOffice hours: M-F 10:00-16:00 (KST)
1201 North Market St. Suite 111, Wilmington, DE, 19801