主題論壇
Cyber License Day (Cyber Talent)
Cyber License Day (Cyber Talent)

想要躍升成為專業資安人才?這裡有滿滿的資源補充戰力! Cyber Talent 專區邀請多個專業資安培訓單位,現場提供實用資安課程與證照資源情報,協助有志之士充實資安職能,不論求職或轉職,都能為您的資安履歷加分。

More
TIME & LOCATION
05/11 (Thu.) 10:00 - 16:00
AGENDA
10:00 - 10:30

As the "Tears of the Kingdom" goes on sale, the skills and items Link must master become more complex, just like a day in the life of a cybersecurity expert. The only constant is change, whether it's the red team honing their offensive skills, or the blue team specializing in configuration, vulnerability assessments, and patching. The ultimate trials always come unexpectedly. Whether you're experiencing a millennia-long awakening or seeking a breakthrough in your career, certification is the top choice for many!

Having taken exams my entire life, I've never seen a single certificate that can be hailed as the ultimate certification by everyone. Each year, we are reminded not to take more exams, but we can't help but click on the registration pages for various certifications. It's not that I want to take exams! It's just that this industry requires continuous improvement! Each year, we point newcomers in the right direction to strive for success. Go forth! Complete your own ultimate sword trial!

More
Chien-Sheng Huang (Jason Abbot) iTop Digital Technology Co., Ltd. General Manager (ISC)2 Chapter Taipei Membership Chair
Security Training Certification
10:30 - 10:45

This session will cover how to become an excellent program security expert, the importance of being a security expert, and how to develop the necessary skills and knowledge. The talk will be conducted in a Q&A format, answering questions related to program security, helping attendees to gain a deeper understanding of program security and its importance. Whether you are a programmer, business owner, security professional, or someone interested in information security, you will benefit from this talk. We will also share practical tips and resources to help you better handle program security challenges in your daily work and bring more career development opportunities.

More
Sola Chen Galaxy Software Services Corporation
Dell Chang Galaxy Software Services Corporation
Security Training Secure Coding
10:45 - 11:00
鄭瑋 國家資通安全研究院 人才培力中心主任
Security Awareness
11:00 - 11:30

OSCP is one of the requirements for hiring red teaming professionals. At the beginning of 2022, the OSCP exam content added an Active Directory section, making the passing threshold more stringent. This session aims to introduce the new version of the OSCP exam content, and share experiences on preparing for and taking the exam, in order to help those taking the exam better prepare for and respond to it.

More
Yen-Chun Shen ZUSO Generation Security Researcher
Certification Penetration Testing Red Team
11:30 - 11:45
魏銪志 台北科技大學 資訊與財金管理系 副教授 台灣數位鑑識發展協會 秘書長
Security Training
11:45 - 12:00

TeamT5 focuses on the research of national-level cyber attacks. Do you know the the purpose, and methods behind each attack? 

Welcome to join TeamT5 and let us protect world from the chaotic world.

More
Turkey Li TeamT5 D39 Vulnerability Research Team Project Manager
Threat Intelligence Hackers & Threats Career Path
14:00 - 14:30

There is many of CyberSecurity certificate, the smart choice will be vendor free, powerful, and ethical organiztion. 

Certificate is the prove of work on what you have done by trusted third party.


You can split CyberSecurity in two parts in a organization, Business value and Risk management.

Security is the concept of protection, but if your are protecting non-valuable object, what is the purpose to do that?

Identify organization assests is crucial for anyone who are starting your CyberSecurity journey.

When we can sorting our assets by different senerio and architechture to rank each assets then we can start risk assesment to adress different mechanism to start your protection for organization.

This is the value of CyberSecurity, a professional can impact business in many ways.


This certificate is a process to verify how knowlege you absorb on CyberSecurity.

We can dinefine few things:

1. Percentage of each domain from Exam Outline 

2. Those books are dictionary, why you need to remember it all? 

3. Knowlege can be two parts, Define and Explanation

4. Books not always right, explanation not always the best from book.

5. Draw you knowlege map.


2 day to finished CC is a process to understand CC outline.

When you can draw your map to explain your understanding of CyberSecurity,

you are finished your first stage of study CC.

More
Carter Lai ViewSonic Cyber Security Engineer
14:30 - 14:45

ACAD designs, plans, and offers professional cyber security training courses with practical application as the main focus, in response to the needs of cyber security talents in various industries and in line with the national information and communications security development policy. ACAD cultivates cyber security technology and management talents required by all industries and take action to support the government's policy of "Cyber Security is National Security," and assist in solving the huge manpower gap of cyber security professionals in the country.

This program introduces ACAD's current main educational training services. Regardless of whether it is for the government or enterprises, ACAD provides optimized training course content based on the different needs of organizations, employee responsibilities, and task differences, and offer cyber security general education or professional competency training necessary for enterprise operations management or internal cybersecurity talent development.

More
Piner Liu ACSI Cyber Security Academy Chief Operation Officer
Security Training Career Path
14:45 - 15:00
Jason Shen Leukocyte-Lab Co., Ltd. CEO
Purple Team
15:00 - 15:30
Certification Network Security Career Path
15:30 - 15:45

2023 Cybersecurity and Network Top-Level Certifications Strategies and Analysis: Integrating Information Security Risk Control for Clients and IT Service Management

More
Ji Hong-yi Ainetwork Lecturer
Security Training
15:45 - 16:00

A skill is essential for cybersecurity professionals and researchers, and it affects various aspects, from business negotiations to team collaborations. The impact is enormous and cannot be underestimated. People are often exhausted and helpless in the face of this issue and only realize that they are distant from it when they come into contact with it. Today, let me lead you to explore what kind of skill can have such an impact and, through my experience, discuss how to change your perspective and solve this headache-inducing problem with you.

More
Fei Lin Kiwis Chief Executive Officer National Taiwan University of Science and Technology Information Security Club Director / Cybersecurity instructor
Security Job Security Training Cyber Range