プロンプトエンジニアリング完全攻略
arigaram
この講義は大規模言語モデル(LLM)や生成型人工知能を効果的に活用するための核心技術であるプロンプトエンジニアリングを体系的に学習する過程です。 基礎理論から実戦技法、そして最新応用事例とセキュリティ・倫理問題まで幅広く扱い、LLMベースサービス開発者・データサイエンティスト・AI企画者すべてに実質的な助けを提供します。
中級以上
prompt engineering
This lecture is designed for understanding even if you have no prior knowledge of what Secure Coding (Security Coding) is. After covering basic security coding concepts, it focuses on web service security. This was a special lecture presented under the auspices of OO University. It presents over 160 source codes with rich comments, pinpointing core topics and techniques immediately applicable in practice.
You can thoroughly understand secure coding.
You can learn web security, authentication and authorization, and code review methods for security.
You can learn language-specific security flaws & solutions.
I am currently in the process of completing this course. I plan to gradually adjust the price as the course progresses toward completion. Therefore, those who purchase earlier can buy at a relatively lower price, but will have the disadvantage of having to wait longer until the course is fully completed (though I will continuously add supplementary content). Please consider this when making your purchase decision.
September 18, 2025
I've added the precautions and change history to the detailed introduction page.
In modern software development, security is not an option but a necessity. This course enables you to systematically learn and practice secure coding techniques, which are core competencies for developing secure software. Designed for all IT professionals interested in security, including developers, security personnel, and QA engineers, this course is excellent for use in security education. (Keywords: security education, penetration testing, security)
Chapter 1. Orientation
Chapter 2. The Three Key Elements of Information Security
Chapter 3. The Role of Security in Software Development
Chapter 4. Case Study: Analysis of Famous Security Incidents
Chapter 5. The Concept of Threat Modeling
Chapter 6. Introduction to the STRIDE Model
Chapter 7. Introduction to the DREAD Model
Chapter 8. Threat Modeling Tools
Chapter 9. Practice: Threat Modeling Application Examples
10. Secure Coding Standards (CERT, OWASP, etc.)
11-1. Guidelines for Secure Coding
11-2. Input Validation and Clean Code Writing
11-3. Practice: Writing Secure Input Processing Code
Chapter 12. Security Vulnerabilities in C/C++
Chapter 13. Java Security Vulnerabilities
Chapter 14. Security Vulnerabilities in Python
Chapter 15. Memory Management and Buffer Overflow
Chapter 16. Format String Vulnerability
Chapter 17. Practice: Writing Safe Memory Management Code
Chapter 18. Object Serialization and Security
Chapter 19. SQL Injection and Countermeasures
Chapter 20. Practice: Writing SQL Injection Defense Code
Chapter 21. Dynamic Typing and Security
Chapter 22. Security Issues with the Pickle Module
Chapter 23. Practice: Writing Secure Data Serialization Code
24. The Importance of Web Security
Chapter 25. OWASP Top 10 Overview
Chapter 26. Concept and Types of XSS
Chapter 27. XSS Defense Techniques
28. Hands-on: Writing XSS Vulnerability Defense Code
Chapter 29. CSRF Concepts and Attack Methods
30. CSRF Defense Techniques
Chapter 31. Practice: Writing CSRF Defense Code
Chapter 32. How to Configure Security Headers
Chapter 33. The Importance of HTTPS and Configuration Methods
34. The Difference Between Authentication and Authorization
Chapter 35. Secure Authentication Methods
36-1. Understanding Passwords and Salt
36-2. Secure Password Storage Techniques
Chapter 37. Practice: Password Management through Hashing and Salting
Chapter 38. OAuth Concepts and Use Cases
Chapter 39. The Concept and Usage of JWT (Java Web Token)
Chapter 40. Implementing Authentication Using JWT
Chapter 41. Secure Session Management Techniques
Chapter 42. Session Hijacking Prevention Methods
Chapter 43. The Importance of Code Review
Chapter 44. Utilizing Static Analysis Tools
Chapter 45. The Concept of Dynamic Analysis
46-1. Penetration Testing Tools
46-2. Penetration Testing Execution Phases
Chapter 47. Practice: Simple Penetration Test Simulation
Rich annotated code with over 160 examples is provided.
We present both vulnerable code and code with reinforced security measures together. Since specific countermeasures for strengthening vulnerabilities are provided, you can apply them directly to practical work.
For example, Example Code 13-6 contains code with vulnerabilities.
Meanwhile, example code 13-7 contains code that reinforces the vulnerabilities.
Acquiring basic principles and practical skills for writing secure code
Understanding and securing capabilities to respond to security vulnerabilities by language and platform
Strengthening Key Threat Response Capabilities for Web Security and Authentication/Authorization
Acquiring Practical Knowledge for Establishing a Security Culture Within Development Organizations
Prevention is the best approach to security incidents. Start now.
Take your first step into secure coding with this course!
Who is this course right for?
A person who wants to know what Secure Coding is
Person wanting to solidify Secure Coding fundamentals
Someone who must immediately patch web application vulnerabilities
A person eager to learn immediately practical techniques.
Need to know before starting?
It's a plus if you understand one or two of C, Java, Python, Javascript languages.
560
Learners
29
Reviews
2
Answers
4.5
Rating
17
Courses
IT가 취미이자 직업인 사람입니다.
다양한 저술, 번역, 자문, 개발, 강의 경력이 있습니다.
All
209 lectures ∙ (18hr 18min)
Course Materials:
All
8 reviews
5.0
8 reviews
Reviews 2
∙
Average Rating 5.0
Reviews 1
∙
Average Rating 5.0
Reviews 1
∙
Average Rating 5.0
Reviews 2
∙
Average Rating 5.0
$77.00
Check out other courses by the instructor!
Explore other courses in the same field!