인프런 영문 브랜드 로고
인프런 영문 브랜드 로고
Security & Network

/

Computer Security

Developer/Operator Security Training - Hacking Response and Security Enhancement Strategies

Cyber security threats are increasing every year, targeting external services and internal system penetration and personal information theft. This article covers basic security activities that developers and operators must perform to operate, develop, and protect infrastructure, applications, and the cloud.

21 students are taking this course

security training
Thumbnail

This course is prepared for Beginners.

What you will learn!

  • Cyber Security Issues

  • Application Security

  • Cloud Security

  • Infrastructure Security

  • OSINT Security

"Information Security Lecture" that Developers and Operators Must Take

  • We cover security threat cases and utilization methods that can be derived from the development and operation stages using OSINT search services.

  • We cover the main application vulnerabilities and countermeasures that must be observed during the development of external services.

  • It addresses the importance of security enhancement during the security design phase and covers business processes that can be applied in practice.

  • We cover key security items and cyber hacking cases that must be observed during the development and operation of cloud services.

  • We present methods for strengthening log file analysis and monitoring during the operation of cloud services.

Learn about these things

Strengthening web application security

This explains application security that must be observed during the development and operation of external services based on the OWASP TOP 10 major items, and presents security response measures for each case.

Importance of Strengthening Security in Design and Development Phases

If you address important security issues from the service design stage, you can significantly reduce costs. We present a business process method that can eliminate potential security vulnerabilities.

Strengthen system security and detect suspicious processes

We present a method to quickly detect and monitor malicious intrusions that may occur during system operation. We introduce examples of automatic analysis services and tools that can be utilized in practice.

Cloud Service Integrated Log Security Monitoring

We introduce a case of integrated logging and security monitoring of various infrastructure logs generated in the process of operating a cloud service. Strengthening major attack monitoring within a large amount of logs is a very important security activity.

Recommended for
these people!

Who is this course right for?

  • Developer, Infrastructure Operations

  • External Service Security Officer

  • If you want to understand the latest security issues

  • If you want to understand basic security activities

Need to know before starting?

  • The mindset of maintaining basic security

Hello
This is

102,244

Students

2,787

Reviews

426

Answers

4.7

Rating

68

Courses

보안프로젝트 ( www.boanproject.com )는 IT보안, 빅데이터, 머신러닝, IoT 등 다양한 분야의 온라인 강의, 그룹 강의를 진행하고 있습니다. 

Curriculum

All

6 lectures ∙ (1hr 12min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

Not enough reviews.
Become the author of a review that helps everyone!