All Pass

Get access to all ViBLE classes for 1 year (8,250 won/month, billed annually)

Auto-renewal after 1 year

50% OFF !

₩ 199,000

₩ 99,000

Single Pass

Watch a single class for 1 year without limitation

₩ 50,000

· This is a limited-time offer and the price may change later

Park Chanam demonstrates white-hat hacking techniques

In this class,

You can learn how to be a white hacker and how to protect your information by strengthening your daily cybersecurity.

All Lessons : 15 | 1:30:31

Free 1st lesson after sign up!

Lesson 1

02:31

Intro

The hacker Park Chanam, Forbes 30 Under 30 Asia in 2018. Park Chanam reavels how he was able to become a "CEO of Stealien, entrepreneur Park Chan-am" in "genius hacker" at ViBLE.

The hacker Park Chanam, Forbes 30 Under 30 Asia in 2018. Park Chanam reavels how he was able to become a "CEO of Stealien, entrepreneur Park Chan-am" in "genius hacker" at ViBLE.

Free 1st lesson after sign up!

Lesson 2

09:38

Hacking in Daily Life – Demonstration

Cyberterrorism in everyday life penetrating an advanced network society. Through a demonstration by white hacker Park Chanam, he tells you about simple hacking that can cause fatal damage.

Cyberterrorism in everyday life penetrating an advanced network society. Through a demonstration by white hacker Park Chanam, he tells you about simple hacking that can cause fatal damage.

Lesson 3

04:27

About Hacker

‘Hacking’, which began with the meaning of 'a person who enjoys computers.' Park Chan-am, a white hacker and security expert, explains the concept of "hacker" and the difference between a white hacker and a black hacker.

‘Hacking’, which began with the meaning of 'a person who enjoys computers.' Park Chan-am, a white hacker and security expert, explains the concept of "hacker" and the difference between a white hacker and a black hacker.

Lesson 4

09:30

The World of White-Hat Hacker

Black hackers' attacks and white hackers' defenses in shade and light. Park Chanam tells episodes about areas where white hackers work, such as cybercrime and information warfare between countries.

Black hackers' attacks and white hackers' defenses in shade and light. Park Chanam tells episodes about areas where white hackers work, such as cybercrime and information warfare between countries.

Lesson 5

05:18

How to Become a Hacker

How to become a hacker? Park Chanam shares his trial and error and experience, ranging from stories about self-study, academy, and specific study methods.

How to become a hacker? Park Chanam shares his trial and error and experience, ranging from stories about self-study, academy, and specific study methods.

Lesson 6

05:48

Hacker's Qualities

For white hackers, ethics are more important than skills and skills. Park Chanam explains the hacker's mindset through a story that he accidentally made the entire internet café shut down.

For white hackers, ethics are more important than skills and skills. Park Chanam explains the hacker's mindset through a story that he accidentally made the entire internet café shut down.

Lesson 7

04:15

Practice Hacking Legally

Stricter cybercrime laws. Park Chanam introduces how to practice hacking legally. He introduces ways to practice in the same situation as reality, such as hacking competitions, establishing a working environment, and hacking projects.

Stricter cybercrime laws. Park Chanam introduces how to practice hacking legally. He introduces ways to practice in the same situation as reality, such as hacking competitions, establishing a working environment, and hacking projects.

Lesson 8

07:35

Tips for Beginner

There are many ways to become a hacker. Park Chanam shares some tips for those who want to be hackers. He tells his process and efforts to become a genius hacker, including having a mentor, program development, and interaction with people.

There are many ways to become a hacker. Park Chanam shares some tips for those who want to be hackers. He tells his process and efforts to become a genius hacker, including having a mentor, program development, and interaction with people.

Lesson 9

08:28

Hacking Competition

Hacking competitions, the best festival of hackers to help learn not just mere competition. Park Chanam tells the type of hacking competition, the way it held, the type of problem, and the know-how that he could actually win.

Hacking competitions, the best festival of hackers to help learn not just mere competition. Park Chanam tells the type of hacking competition, the way it held, the type of problem, and the know-how that he could actually win.

Lesson 10

08:48

Hacking Demonstration

Hacking in everyday life. What kinds of hacking can cause us direct damage? Park Chanam reveals various hacking technologies through demonstrations. He also demonstrates mock hacking and leaking confidential documents.

Hacking in everyday life. What kinds of hacking can cause us direct damage? Park Chanam reveals various hacking technologies through demonstrations. He also demonstrates mock hacking and leaking confidential documents.

Lesson 11

03:56

Credentials and Portfolio

Skills, the most important qualification for hackers. Park Chanam, the hacker and entrepreneur, tells an episode that actually hired a hacker and how to prepare a portfolio based on his portfolio.

Skills, the most important qualification for hackers. Park Chanam, the hacker and entrepreneur, tells an episode that actually hired a hacker and how to prepare a portfolio based on his portfolio.

Lesson 12

03:44

Hacker and Getting a Job

What kind of job a hacker can have, and how to get a job. Park Chanam introduces occupations such as security developers, security consultants, mock hacking and national research/development, and explains preference about generalists and specialists.

What kind of job a hacker can have, and how to get a job. Park Chanam introduces occupations such as security developers, security consultants, mock hacking and national research/development, and explains preference about generalists and specialists.

Lesson 13

06:16

Hacker as an Occupation

Park Chanam, who made 10 billion won in his bank accounts through ATM hacking. Let's take a look at his occupational consciousness as a hacker, including stability, communication, ethical awareness, and compatibility.

Park Chanam, who made 10 billion won in his bank accounts through ATM hacking. Let's take a look at his occupational consciousness as a hacker, including stability, communication, ethical awareness, and compatibility.

Lesson 14

06:00

Hacker and Launching Business

Started business with the question, "Why aren't there any hackers among the CEO of hacking/security companies?“, Park Chanam introduces the business using hacking/security technology, and presents problems, and solutions he experienced when he started his own business as a hacker.

Started business with the question, "Why aren't there any hackers among the CEO of hacking/security companies?“, Park Chanam introduces the business using hacking/security technology, and presents problems, and solutions he experienced when he started his own business as a hacker.

Lesson 15

04:17

Outro

There is no perfect security, but the best possible security does exist. Park Chanam finishes his hacking lecture, reminding precautions to protect personal information in real life.

There is no perfect security, but the best possible security does exist. Park Chanam finishes his hacking lecture, reminding precautions to protect personal information in real life.

Recommended to

People who wish to learn about white hat hackers

Security professionals

Those who want to start a business

Those who are interested in the world of hacking

MASTER STORY

Hacking, about that interesting world

 

Forbes 30 Under 30 Asia in 2018

Winner of various domestic and international hacking defense competitions

The first hacker named in a high school textbook,

Park Chanam, white-hat hacker representing Korea.

 

Currently, he is the chief executive of the cybersecurity firm STEALIEN, which is in charge of security and advisory services for the National Police Agency, the prosecution office, the Defense Ministry and financial companies.

 

As a genius white-hat hacker,

and as a hacker-turned-entrepreneur,

he tells a professional and honest story about hacking

that takes place throughout everyday life and industry.

 

The risks and benefits of hacking will be explained through demonstration.

And from how to become a white-hat hacker to how to start a business.

 

This will be the best bible for you, who want to be white-hat hackers

or who are already information security professionals,

and also who are interested in hacking.

Q & A

Q. What is the difference between white hat hackers and other hackers?

Hacking, which essentially means to discover the vulnerabilities while staying within the legal boundary, is a totally different thing to that of an act of gaining unauthorized access illegally to cause damage. A white hacker finds vulnerabilities regarding security with good intentions and proposes solutions for them. So the term is used to describe these sorts of ethical hackers.

Q. What is the most important thing for white hat hackers?

This may sound cliché, but having ethics and morals, and following the law are the most essential for hackers. No matter how good someone's skills are, they are meaningless if the person is not ethical. Although skills can be improved by putting the time into learning, ethics are difficult to restore once breached. Make sure that you thoroughly understand this and be particularly careful.

Q. What kind of job opportunities are there as hackers?

Hackers fundamentally have an incredibly deep understanding of computers so, they can pursue various careers in IT. Hackers can become security developers who develop security products or pursue careers in mock hacking and security consulting. In finance, there would be things like banks, cards, stocks, and insurance. These days, nearly all important information is stored in cyberspace, such as PCs and smartphones, so we must have the technologies for analyzing and tracing that.

Q. Finally, what would you say to people who take this class?

There is no such thing as perfect security. Since humans are imperfect, the things humans make are bound to have flaws. Developing a system without a single vulnerability is, realistically speaking, impossible. Still, there's no reason for you to worry too much. Even if there is no perfect security, the best possible security does exist. Aside from companies and institutes, individuals also need to make a habit of ensuring security. There is nothing more important than protecting your valuable information.

COMMENTS

Write

Be the first to leave a comment on this class.

Recommended Class
Kim Eana

Lyrics Class

Park Chanam

World of White-hat hacker