정보보호대학원에서는 9월 20일 오후 4시에 아래와 같이 콜로퀴움을 개최하고자 합니다. 많은 참석 부탁드립니다.
o 일 시: 22.9.20(화) 16:00~
o 주 제: What you learn！= what you need: How free vocational training can bridge the gap for landing US jobs
o 강 사: Xeno Kovah (OpenSecurityTraining2, Founder)
o 장 소: 카이스트본원IT융합빌딩(N1) 110호
※ 세미나 시작시간 5분전에 준비하여 주세요.
♣ Title: What you learn ！= what you need: How free vocational training can bridge the gap for landing US jobs
The computer security field is currently enjoying a period of rapid growth. And with that grown comes specialization in job roles. In the same way that an anesthesiologist cannot and should not do the job of a radiologist, a web application security specialist should not attempt the job of a hardware security specialist. While all jobs begin from the understanding of some common knowledge, the kind that you learn in college, the actual day to day practice of the jobs grows ever further apart and more specialized. It therefore becomes necessary to rely on specialized vocational education to bring specialists up to speed. The majority of vocational education is currently provided via paid training at conferences or via private engagements. But this is cost-prohibitive and doesn't scale. It also further exacerbates income inequality, with only those lucky few who have the leisure time for extensive self study, or the money to take paid trainings, with adequate access to the knowledge. And smaller companies ultimately end up lacking high skilled workers, because they migrate to the large companies that can pay for them to level up and get even further ahead.
OpenSecurityTraining2 (https://ost2.fyi) was launched as a nonprofit in 2021 to deliver the same high quality, deeply technical, vocational training that is taught in paid venues, but for free, online. In this talk, I will show how I and others are making available the specialist knowledge that allows us to work in extremely well-paying high-end jobs.
Xeno began leading Windows kernel-mode rootkit detection and defense research projects at MITRE in 2009, before moving into research on BIOS security in 2011. His team's first public talks started appearing in 2013, which led to a flurry of presentations on BIOS-level vulnerabilities up through 2014. In 2015 he co-founded LegbaCore. And after presenting a firmware worm that could spread between Macs via Apple's EFI-based BIOS and Thunderbolt Ethernet adapters, he ended up working for Apple. There he worked on securing all the lesser-known firmwares on Macs and peripherals - everything from 3rd party GPUs to SecureBoot for monitors！ He worked on the x86-side of the T2 SecureBoot architecture, and his final project was leading the M1 SecureBoot architecture - being directly responsible for designing a system that could provide iOS-level security, while still allowing customer choice to trust arbitrary non-Apple code such as Linux bootloaders. He left Apple in Dec 2020 after the M1 Macs shipped, so he could work full time on OpenSecurityTraining2.