OWL Academy
In order to strengthen the technology of partner engineers,
we share the latest information about the product through regular technical training, seminars,
and meetings every year.
OWL Systems provides high-quality technical support services through a certified partner's professional engineer.
Partner engineers provide customers with the same level of technology as OWL Systems through the technical certification of OWL Systems.
If you need support from OWL Systems, we provide fast and rapid technical support with a 24-hour response system through a close partnership.
View Product Partners -
Technical training for customers and partners
OWL Systems provides dense technical training on security based on its products.
Depending on the purpose, there are regular technical training for partners and customer training for customers.

-
1. Curriculum Introduction
In addition to the introduction of information protection solutions to minimize the damage caused by adverse function that can
cause tremendous damage to the Internet in all industrial fields, This is a course to acquire practical knowledge of encryption
technology and database encryption for information protection through the practical application test of the concept and related
laws and regulations necessary for database security and the practical application of the DB encryption solution (PrivacyDB)
applied to actual practice.
-
2. Period
3-day curriculum (8 hours per day)
-
3. Target
Government Public institutions / Defense / Finance / Corporate executives and employees
-
4. After completion, the company's certificate of completion and a small gift is presented
-
5. Education Expenses
Free support provided by the company (including educational materials, lunch, and parking permit)
-
6. Education place
Company-designated education place (in-house education center OWL Academy)
-
7. Education content
the following
Time table |
Day 1 |
09:00 ~ 09:50 |
The concept of information security management |
10:00 ~ 10:50 |
Information Security Risk Management |
11:00 ~ 11:50 |
Information Security Certification System (KCMVP, CC) |
12:00 ~ 13:00 |
Lunch time (using the in-house designated restaurant) |
13:00 ~ 13:50 |
Information protection laws |
14:00 ~ 14:50 |
Personal Information Protection Act |
15:00 ~ 15:50 |
Cryptography Overview and History |
16:00 ~ 16:50 |
Symmetric Key Encryption Method |
17:00 ~ 17:50 |
Asymmetric Key Encryption Method |
18:00 |
Review of educational content and end of lecture |
Time table |
Day 2 |
09:00 ~ 09:50 |
What is DB Security? |
10:00 ~ 10:50 |
Encryption method using hash function |
11:00 ~ 11:50 |
Understanding digital signatures and PKI |
12:00 ~ 13:00 |
Lunch time (using the in-house designated restaurant) |
13:00 ~ 13:50 |
KCMVP-based encryption/decryption key and random number generation method |
14:00 ~ 14:50 |
Introduction to encryption algorithms (SEED, ARIA, SHA, etc.) |
15:00 ~ 15:50 |
Understanding structured and unstructured data encryption methods |
16:00 ~ 16:50 |
DB encryption application method based on D-cloud |
17:00 ~ 17:50 |
DB encryption application method in big data Hadoop environment |
18:00 |
Review of educational content and end of lecture |
Time table |
Day 3 |
09:00 ~ 09:50 |
Understanding DB Encryption Hybrid Method (API, Plug-in) |
10:00 ~ 10:50 |
Encryption key management life cycle management |
11:00 ~ 11:50 |
DB encryption server installation practice |
12:00 ~ 13:00 |
Lunch time (using the in-house designated restaurant) |
13:00 ~ 13:50 |
API method installation practice |
14:00 ~ 14:50 |
Plug-in method installation practice |
15:00 ~ 15:50 |
Understanding Migration, Migration Methods, DML, Constraints |
16:00 ~ 16:50 |
Understanding View/Trigger Method |
17:00 ~ 17:50 |
Indexing (Function/Domain index), Question |
18:00 |
Review of educational content and end of lecture |