
Spring-based REST API development
whiteship
This course develops a REST API that satisfies Self-Descriptive Message and HATEOAS (Hypermedia as the engine of application state) using various Spring technologies.
Intermediate
Spring, REST API, Java
Understand the operating principles and structure of Spring Security and learn how to set up authentication and authorization features required for web applications by utilizing the various functions provided by Spring Security.

Reviews from Early Learners
5.0
JuNu
After taking Mr. Kiseon's Spring Security class, I gained a deeper understanding of security and also got hints on how to study. In practice, when there was a problem with the security part, there were many cases where I couldn't find the debugging point, but after understanding the Spring Security architecture explained by Mr. Kiseon, it helped me a lot in practice. Also, I felt that development focused on what was working was just a shell, and the part where he taught the operating principles of each by finding the debugging point in the divide and conquer method and combining the principles in the latter part really made me hit my knees. It was the best lecture that allowed me to realize that if I start studying on my own in the future, I should study in this way. I highly recommend it to those who are new to Spring Security👍🏻
5.0
두램
It was a great help in understanding security that I had only used without understanding it properly. I have taken many of Baek Gi-seon's lectures, but I am personally very satisfied with this security lecture. Thank you~~
5.0
jiny
I only listened to 50% of it, but it was good because I could easily understand the overall architecture while simply debugging a huge amount. Of course, I think it would be better to follow along in the middle. There are parts that go by too quickly, so if you don't understand for a moment, I think you will definitely understand if you take your time and try it out yourself. (I think you should definitely know Java and SPRING to some extent.) I was worried because there were people who said it was good and people who said it was bad, but I think I will definitely get more out of it. I first started with Ki-seon's lecture on security, and I think I will pay for the next lecture as well (It's too expensive for me though.. ㅜ)
You can add authentication and authorization features to your web applications.
You can understand the Spring Security architecture.
You can learn how to write tests when applying Spring Security.
The security of the app I created
I have to take responsibility 💪
Let's say you're creating a bulletin board. Unless it's an anonymous bulletin board, you need to know which user is currently posting. You need a feature that is commonly called "login" and in Spring Security it's called Authentication or " authentication ."
Also, users who can edit a post must have at least the author or administrator rights for that post. At this time, as a developer, you must implement a function to apply the "Authorization " or "Access Control " function to your application so that only users with the appropriate rights can edit the post.
If it is a web application, it is also essential to respond to various web security related issues such as CSRF, XXS, session tampering, and Clickjacking.
This course covers the various features provided by Spring Security and understands the Spring Security architecture by applying them to form-based web applications.
Rather than simply applying the functions, you will learn the internal structure of how Spring Security works in servlet-based web applications . It will be very helpful in learning the internal structure of Spring Security, such as AuthenticationManager, AccessDecisionManager, and FilterChainProxy.
This lecture mainly covers servlet-based applications using Thymeleaf as a view template . It does not cover features supporting ACL, OAuth2, Reactive (WebFlux), and WebSockets, and briefly covers method security. However, if you study this lecture thoroughly , you will easily learn features not covered here.
You can learn how I learn by watching all my courses that I have made and will make in the future. I always value testing, but I am not obsessed with TDD (although I sometimes get feedback that it seems that way). I verify all the features by coding them myself, and I use the debugger for parts that I don't understand or want to look at in more detail.
In this course, you will also learn how to write test code and analyze it using a debugger when applying Spring Security.
💡 Note
This course is designed with the assumption that students have the following prerequisite knowledge. If there are any courses you have not taken or topics you have not studied yet, please make sure to study them before taking this course.
Who is this course right for?
Students or developers who want to implement form-based authentication and authorization functionality in their web applications.
Students or developers who want to understand Spring Security architecture.
Need to know before starting?
Spring Web MVC
Spring Boot
Spring Framework Core Technologies
Spring Data JPA (optional)
92,862
Learners
4,296
Reviews
2,010
Answers
4.8
Rating
20
Courses
Having worked at Naver and Amazon, I am currently working as a Senior Software Engineer at Microsoft.
Einstein once said, "Education is not the learning of facts, but the training of the mind to think." I create my lectures with deep resonance for those words.
YouTube: Sharing useful knowledge and career advice for developers on the 'Keesun Baik' channel
Translation: Translated numerous books related to Spring and Hibernate
Author: Easy-to-Follow Java Web Development
All
48 lectures ∙ (8hr 4min)
All
147 reviews
4.7
147 reviews
Reviews 5
∙
Average Rating 5.0
5
After taking Mr. Kiseon's Spring Security class, I gained a deeper understanding of security and also got hints on how to study. In practice, when there was a problem with the security part, there were many cases where I couldn't find the debugging point, but after understanding the Spring Security architecture explained by Mr. Kiseon, it helped me a lot in practice. Also, I felt that development focused on what was working was just a shell, and the part where he taught the operating principles of each by finding the debugging point in the divide and conquer method and combining the principles in the latter part really made me hit my knees. It was the best lecture that allowed me to realize that if I start studying on my own in the future, I should study in this way. I highly recommend it to those who are new to Spring Security👍🏻
Reviews 2
∙
Average Rating 4.5
4
It was very helpful in understanding the Spring Security architecture. However, I wish there was more time spent on practical application rather than debugging almost all filters and covering the source level in depth. For example, I wish there were more examples of how to manage user authorization information and resource access information by authorization as a database and apply them, and more examples of various applications in the latter part of the lecture. I think it would have been possible to reduce unnecessary time if the part where you create a new project every time the lecture starts was omitted.
Reviews 1
∙
Average Rating 5.0
Reviews 28
∙
Average Rating 5.0
5
I only listened to 50% of it, but it was good because I could easily understand the overall architecture while simply debugging a huge amount. Of course, I think it would be better to follow along in the middle. There are parts that go by too quickly, so if you don't understand for a moment, I think you will definitely understand if you take your time and try it out yourself. (I think you should definitely know Java and SPRING to some extent.) I was worried because there were people who said it was good and people who said it was bad, but I think I will definitely get more out of it. I first started with Ki-seon's lecture on security, and I think I will pay for the next lecture as well (It's too expensive for me though.. ㅜ)
Reviews 9
∙
Average Rating 5.0
5
I think I learned about the working principles of Spring Security and how to customize it over the course of a month. When I was working on a Spring Framework project without knowing about security, I implemented HandlerInterceptor to handle authentication/authorization using the user information and authority (Integer value) contained in the Session. I learned about security as well, and I plan to change the authentication/authorization method of the existing toy project. Thank you for the great lecture and knowledge sharing. I think I should watch this lecture again to review after taking the REST API lecture.
$68.20
Check out other courses by the instructor!
Explore other courses in the same field!