강의

멘토링

커뮤니티

Security & Network

/

Computer Security

Breaking Down Secure Coding

This lecture is designed to be easily understood even if you have no prior knowledge of Secure Coding. After covering fundamental secure coding concepts, it focuses on web service security. This course was originally conducted as a special lecture hosted by OO University. It provides over 160 source codes with extensive comments, pinpointing core topics and techniques that can be applied immediately in the field.

(5.0) 8 reviews

91 learners

Level Basic

Course period Unlimited

  • arigaram
security training
security training
Penetration Testing
Penetration Testing
security
security
security training
security training
Penetration Testing
Penetration Testing
security
security

What you will gain after the course

  • You can gain a comprehensive understanding of secure coding.

  • You can learn web security, authentication and authorization, and code review methods for security.

  • You can learn about security vulnerabilities and countermeasures for each language.

🧭Important Notes

The course is currently in the process of being completed. There is a downside in that you may have to wait a long time until it is fully finished (though I will be adding supplements frequently). Please take this into consideration when making your purchase decision.

📋Change History

  • January 22, 2026

    • I have uploaded videos explaining all the code up to Section 12. I will also gradually upload explanation videos for the code in the remaining sections (13 - 19).

  • September 18, 2025

    • I have added the precautions and change history to the detailed description page.

🔐 Course Introduction

In modern software development, security is a necessity, not an option. This course allows you to systematically learn and practice secure coding techniques, a core competency for developing secure software. Designed for all IT professionals interested in security—including developers, security managers, and QA engineers—this course is ideal for security training. (Keywords: security training, penetration testing, security)))

📘 Course Structure

Part 1. Basic Understanding of Secure Coding

Section 1. Course Introduction

  • Chapter 1. Orientation

Section 2. The Importance of Secure Coding

  • Chapter 2. The Three Elements of Information Security

  • Chapter 3. The Role of Security in Software Development

  • Chapter 4. Case Study: Analysis of Famous Security Incidents

Section 3. Threat Modeling

  • Chapter 5. Concept of Threat Modeling

  • Chapter 6. Introduction to the STRIDE Model

  • Chapter 7. Introduction to the DREAD Model

  • Chapter 8. Threat Modeling Tools

  • Chapter 9. Lab: Threat Modeling Application Examples

Section 4. Coding Standards and Guidelines

  • Chapter 10. Secure Coding Standards (CERT, OWASP, etc.)

  • Chapter 11-1. Secure Coding Guidelines

Section 5. Basic Practice - Secure Input Handling

  • Chapter 11-2. Input Validation and Writing Clean Code

  • Chapter 11-3. Practice: Writing Secure Input Handling Code


Part 2. Language-specific Security Vulnerabilities and Countermeasures

Section 6. Overview of Language-Specific Security Vulnerabilities

  • Chapter 12. Security Vulnerabilities in C/C++

  • Chapter 13. Security Vulnerabilities in Java

  • Chapter 14. Security Vulnerabilities in Python

Section 7. Secure Coding in C and C++

  • Chapter 15. Memory Management and Buffer Overflow

  • Chapter 16. Format String Vulnerability

  • Chapter 17. Practice: Writing Secure Memory Management Code

Section 8. Java Secure Coding

  • Chapter 18. Object Serialization and Security

  • Chapter 19. SQL Injection and Countermeasures

  • Chapter 20. Lab: Writing SQL Injection Defense Code

Section 9. Python Secure Coding

  • Chapter 21. Dynamic Typing and Security

  • Chapter 22. Security Issues with the Pickle Module

  • Chapter 23. Lab: Writing Secure Data Serialization Code

Part 3. Web Application Security

Section 10. Web Application Security Overview

  • Chapter 24. Importance of Web Security

  • Chapter 25. OWASP Top 10 Overview


Section 11. Cross-Site Scripting (XSS)

  • Chapter 26. XSS Concepts and Types

  • Chapter 27. XSS Defense Techniques

  • Chapter 28. Practice: Writing XSS Vulnerability Defense Code

Section 12. Cross-Site Request Forgery (CSRF)

  • Chapter 29. CSRF Concepts and Attack Methods

  • Chapter 30. CSRF Defense Techniques

  • Chapter 31. Practice: Writing CSRF Defense Code

Section 13. Security Headers and HTTPS (Chapters 32-33)

  • Chapter 32. How to Configure Security Headers

  • Chapter 33. Importance and Configuration of HTTPS

Part 4. Authentication and Authorization

Section 14. Basics of Authentication and Authorization

  • Chapter 34. Differences between Authentication and Authorization

  • Chapter 35. Secure Authentication Methods

Section 15. Password Management

  • Chapter 36-1. Understanding Passwords and Salt

  • Chapter 36-2. Secure Password Storage Techniques

  • Chapter 37. Practice: Password Management through Hashing and Salting

Section 16. OAuth and JWT

  • Chapter 38. OAuth Concepts and Use Cases

  • Chapter 39. Concepts and Usage of JWT (Java Web Token)

  • Chapter 40. Implementing Authentication with JWT

Section 17. Session Management

  • Chapter 41. Secure Session Management Techniques

  • Chapter 42. Session Hijacking Prevention Methods

Part 5. Security Application and Review Methods

Section 18. Code Review and Static Analysis Tools

  • Chapter 43. The Importance of Code Review

  • Chapter 44. Utilization of Static Analysis Tools

Section 19. Dynamic Analysis and Penetration Testing

  • Chapter 45. Concepts of Dynamic Analysis

  • Chapter 46-1. Pentest (Penetration Testing) Tools

  • Chapter 46-2. Penetration Testing Stages

  • Chapter 47. Hands-on: Simple Pentest Simulation

📘 Example screens and example code

Over 160 richly commented code examples are provided.

Both vulnerable and patched code are presented together. Detailed countermeasures for addressing vulnerabilities are provided, making them directly applicable to real-world practice.

For example, Example Code 13-6 contains vulnerable code.

Meanwhile, Example Code 13-7 contains the code with the vulnerabilities addressed.

🎯 Learning Objectives

  • Acquiring basic principles and practical skills for writing secure code

  • Acquiring understanding and response capabilities for language- and platform-specific security vulnerabilities

  • Strengthening response capabilities for major threats related to web security and authentication/authorization

  • Acquire practical knowledge to establish a security culture within development organizations

Prevention is the best defense against security incidents. Start now.
Take your first step toward secure coding with this course!

Recommended for
these people

Who is this course right for?

  • Someone who wants to know what secure coding is

  • Those who want to build a strong foundation in secure coding

  • Those who need to fix web application vulnerabilities immediately

  • Someone who wants to learn techniques for immediate practical application.

Need to know before starting?

  • It is helpful to have an understanding of one or two languages among C, Java, Python, and Javascript.

Hello
This is

613

Learners

31

Reviews

2

Answers

4.5

Rating

18

Courses

I am someone for whom IT is both a hobby and a profession.

I have a diverse background in writing, translation, consulting, development, and lecturing.

Curriculum

All

209 lectures ∙ (22hr 39min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

8 reviews

5.0

8 reviews

  • tops19504245님의 프로필 이미지
    tops19504245

    Reviews 3

    Average Rating 5.0

    5

    30% enrolled

    • arigaram
      Instructor

      Thank you.

  • ckh61119717님의 프로필 이미지
    ckh61119717

    Reviews 2

    Average Rating 5.0

    5

    24% enrolled

  • wschoi5323님의 프로필 이미지
    wschoi5323

    Reviews 1

    Average Rating 5.0

    5

    100% enrolled

  • bradpitt님의 프로필 이미지
    bradpitt

    Reviews 5

    Average Rating 3.8

    5

    30% enrolled

  • kff1265149님의 프로필 이미지
    kff1265149

    Reviews 2

    Average Rating 5.0

    5

    100% enrolled

$77.00

arigaram's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!