Cybersecurity Teaching Portfolio — Dr. Kim
Cybersecurity Teaching Portfolio
Offensive Cybersecurity · Consulting · Penetration Testing · Career Road‑map · Cybercrime & Cybersecurity · Network Forensics
Teaching History
2025 current
- Spring semester — Network Forensics, NAUSS
- Fall semester — Malware Analysis, Lecture Note
2024
- Spring semester — Network Forensics, NAUSS
- Fall semester — Cybercrime and Cybersecurity
- Fall semester — Malware Analysis
2023
- Spring semester — Network Forensics, NAUSS
- Fall semester — Cybercrime and Cybersecurity
- Fall semester — Malware Analysis
2022
- Spring semester — Network Forensics, NAUSS
- Fall semester — Cybercrime and Cybersecurity
- Fall semester — Malware Analysis
- Saudi Arabia — Cybercrime Investigator Training Program — Arab News article
2021
- Spring semester — Network Forensics, NAUSS
- Fall semester — Cybercrime and Cybersecurity
2020
- Nov 28 — BISC (BoB Information Security Conference) — Saudi Arabia, Arab World, Cybersecurity and Me
- Nov 18 — Speaker, INTERPOL 4th Global Conference on Criminal Finances and Cryptocurrencies — How money laundering happened via Virtual Assets – a white‑hat view on state‑sponsored APT — Letter of Appreciation from INTERPOL
- Fall — Cybersecurity and Cybercrime — Cybercrime and Network Forensics Resources; Preparation_VMWareWorkstation_Kali.pdf
- Spring — Advanced Hacking Practice (Korea University, undergraduate)
- Spring — Practical Cybersecurity (Korea University, graduate)
- Spring — Theory & Practice of Hacking Defense (Korea University, undergraduate)
2019
- Fall — Basic Hacking Practice (Korea University, undergraduate)
- Fall — Code name subject 66 (Dept. of Cyber Defense, Korea Univ.) — Awarded for excellent teaching — Top 5% of professors
- Fall — Practical Cybersecurity (Korea University, graduate)
- August — 4‑day special lectures: Hacking Big Picture (Seoul Women’s University)
- July — Mock Lecture on cybersecurity — Expert workshop for UNODC Education for Justice (Tashkent, Uzbekistan) — E4J — Workshop page — Certification
- Spring — Advanced Hacking Practice (Korea University, undergraduate)
- Spring — Practical Cybersecurity (Korea University, graduate)
- January — Lecturing for GCC camp; Committee member of Global Cybersecurity Camp (GCC)
- Related: div0.sg/gcc, security‑camp.or.jp, mk.co.kr article
2018
- Fall — Basic Hacking Practice (Korea University, undergraduate)
- Fall — Code name subject 66 (Dept. of Cyber Defense, Korea Univ.) — Award — Top 5% of professors
- Spring — Advanced Hacking Practice (Korea University, undergraduate)
- Spring — Practical Cybersecurity (Korea University, graduate)
2017
- Fall — Basic Hacking Practice (Korea University, undergraduate)
- Fall — Code name subject 66 (Dept. of Cyber Defense, Korea Univ.) — Award — Top 5% of professors
- August — Web Security & Hacking — Taiwan AIS Program (Taipei, Taichung, Kaohsiung)
- Spring — Advanced Hacking Practice (Korea University, undergraduate)
- Spring — Practical Cybersecurity (Korea University, graduate)
2016
- Fall — Basic Hacking Practice (Korea University, undergraduate)
- August — Web Security & Hacking — Taiwan AIS Program (Taipei, Taichung, Kaohsiung)
- Spring — Hacking and Security (Korea University, undergraduate)
Highlights
- Malware Analysis (NAUSS) — latest note: Lecture Note
- INTERPOL — Talk & Letter of Appreciation
- UNODC Education for Justice — Program page & Certification
Course Contents — Basic Hacking Practice (Offensive Security Big Picture)
Week 1: Big Picture of Offensive Security / The Birth of a Hacker
Week 2: The Birth of a Hacker Group
Case studies and early organization patterns.
Week 3: Threat Actors — Nation‑Sponsored Hacker Group
Week 4: Encryption Hacking
- Additional reading
Week 5: Network Security and Hacking
Week 6: Web Hacking I
OWASP Top 10 and lab setup.
Week 7: Web Hacking II
Auth, sessions, and business logic flaws.
Week 8: Interim War‑game Testing
Mid‑term CTF style assessment.
Week 9: Malware / Reverse Engineering I
Static analysis fundamentals.
Week 10: Malware / Reverse Engineering II
Dynamic analysis and evasion basics.
Week 11: System Hacking I
Week 13: Mobile Security & Hacking
Android/iOS attack surfaces.
Week 14: Wireless Security & Hacking
802.11, Bluetooth, BLE.
Week 15: CPS/IoT, AI Security & Hacking
Smart home/city and ML attack overview.
Week 16: Final War‑game Testing
Comprehensive CTF covering the entire course.