Skip to content

Busan · English cohorts · KR learners welcome

630+ mentor feedback threads logged across cohorts since 2019

We teach cybersecurity craft with named modules, visible rubrics, and limitations stated upfront. No checkout here—only schedules, prices as reference points, and humans on the ground in Seo-gu.

Browse cohort catalog Ask enrollment

Abstract warm-toned security operations backdrop

Signals we track (public-facing)

7

years running hybrid labs

19

people across teaching & ops

94%

survey respondents citing clearer artifacts

3

languages supported in glossaries

120k–2.4M

KRW reference price span

Inclusions that survive scrutiny

We bias toward documents you can forward: triage write-ups, IAM matrices with rollback owners, phishing tabletop consent sheets.
Marketing stays descriptive—no scripted income arcs.

  • Named modules with week-by-week deliverables
  • Mentor markup on one portfolio-grade artifact
  • English-friendly live sessions with KR scheduling offsets
  • Optional employer briefings for corporate tracks

Cohort previews

Editorial layout—wide tiles alternate with compact rows. Prices are informational until your enrollment email confirms details.

Visual treatment for Foundations of Network Defense
Beginner Cybersecurity

Foundations of Network Defense

Packet-level thinking for newcomers: segmentation, monitoring basics, and incident triage without drowning in jargon.

Visual treatment for Phishing Lab & Human Risk Drills
Beginner Cybersecurity

Phishing Lab & Human Risk Drills

Build phishing-aware simulations, measure click paths ethically, and brief stakeholders without fear-based messaging.

Visual treatment for Cloud IAM & Least-Privilege Sprint
Intermediate Cybersecurity

Cloud IAM & Least-Privilege Sprint

Tighten identity planes across common cloud consoles with audit trails you can show auditors without buzzwords.

Visual treatment for GRC Foundations for Builders
Intermediate Cybersecurity

GRC Foundations for Builders

Translate frameworks into engineering tickets—controls become backlog items with owners, not shelf PDFs.

Full catalog with filters

The flow (no numbered stickers)

  1. Fit call — Enrollment Advisor maps your weekly bandwidth to cohort intensity.
  2. Artifact sprint zero — You ship a baseline doc so mentors calibrate tone early.
  3. Live labs + async markup — Sessions are conversational; written feedback carries weight.
  4. Portfolio checkpoint — Career Coach joins if you opt into job-search mode.

From our cohorts

Foundations of Network Defense forced me to annotate east-west assumptions on a diagram I thought was “done.” The VLAN critique felt harsh for ten minutes, then obvious for the rest of the cohort.
Selene Park — Ops analyst · Regional retail collective
Phishing Lab tabletop script is pinned above my desk—metrics without shame language finally.
Hyun · Busan
Cloud IAM sprint break-glass drill exposed how leisurely our revocation story was. Still rebuilding automation, but the evidence index page template sped up auditor questions.
Marisol Vega · 5/5 · verified survey
GRC Foundations backlog mapping workshop surfaced how often we reused “high risk” without owners. Client in logistics.
Anonymous note

Quick clarifications

Do you guarantee job placement?

No. We document skills and feedback loops honestly. Hiring outcomes depend on market movement and your interview process.

Are prices final on this website?

Listed KRW amounts are reference points. Binding figures arrive in your enrollment documentation after we confirm cohort seat and any employer subsidies.

What is not included?

We do not ship exam vouchers unless explicitly purchased, and we do not provide proprietary vendor certifications beyond what each syllabus states.

Field notes

Latest posts from mentors—no funnels, just craft notes.

Read the archive

Want the syllabus packet?

We send detailed weekly breakdowns by email—no payment links inside the PDF, just scope and time estimates so your manager can read it.