개발자를 위한 (바이브 코딩) 프롬프트 패턴
아리가람
이제는 인공지능을 활용해서 개발하는 시대. 인공지능을 더 잘 활용해 더 좋고, 더 정확한 코드와 문서를 만드는 방법이 필요하므로 이에 알맞은 방법을 제시합니다.
초급
프롬프트엔지니어링
This lecture is designed for understanding even if you have no prior knowledge of what Secure Coding (Security Coding) is. After covering basic security coding concepts, it focuses on web service security. This was a special lecture presented under the auspices of OO University. It presents over 160 source codes with rich comments, pinpointing core topics and techniques immediately applicable in practice.
You can thoroughly understand secure coding.
You can learn web security, authentication and authorization, and code review methods for security.
You can learn language-specific security flaws & solutions.
The course is currently being completed. We plan to gradually adjust the price as the course is being finalized. Therefore, those who purchase earlier can buy it at a relatively lower price, but they will have the disadvantage of having to wait longer until the course is fully completed (although we will continuously add supplementary content). Please consider this when making your purchase decision.
September 18, 2025
I've added precautions and change history to the detailed introduction page.
In modern software development, security is not an option but a necessity. This course enables you to systematically learn and practice secure coding techniques, which are core competencies for developing secure software. Designed for all IT professionals interested in security, including developers, security personnel, and QA engineers, this course is excellent for use in security education. (Keywords: security education, penetration testing, security)
Chapter 1. Orientation
Chapter 2. The Three Pillars of Information Security
Chapter 3. The Role of Security in Software Development
Chapter 4. Case Study: Analysis of Famous Security Incidents
Chapter 5. The Concept of Threat Modeling
Chapter 6. Introduction to the STRIDE Model
Chapter 7. Introduction to the DREAD Model
Chapter 8. Threat Modeling Tools
Chapter 9. Practice: Threat Modeling Application Examples
10. Secure Coding Standards (CERT, OWASP, etc.)
11-1. Guidelines for Secure Coding
11-2. Input Validation and Clean Code Writing
11-3. Practice: Writing Secure Input Processing Code
Chapter 12. Security Vulnerabilities in C/C++
Chapter 13. Java Security Vulnerabilities
Chapter 14. Security Vulnerabilities in Python
Chapter 15. Memory Management and Buffer Overflow
16. Format String Vulnerability
Chapter 17. Practice: Writing Safe Memory Management Code
Chapter 18. Object Serialization and Security
19. SQL Injection and Countermeasures
Chapter 20. Practice: Writing SQL Injection Defense Code
Chapter 21. Dynamic Typing and Security
Chapter 22. Security Issues with the Pickle Module
Chapter 23. Practice: Writing Secure Data Serialization Code
Chapter 24. The Importance of Web Security
Chapter 25. OWASP Top 10 Overview
Chapter 26. Concept and Types of XSS
Chapter 27. XSS Defense Techniques
Chapter 28. Practice: Writing XSS Vulnerability Defense Code
29. The Concept of CSRF and Attack Methods
30. CSRF Defense Techniques
Chapter 31. Practice: Writing CSRF Defense Code
32. How to Configure Security Headers
Chapter 33. The Importance of HTTPS and Configuration Methods
Chapter 34. Differences Between Authentication and Authorization
Chapter 35. Secure Authentication Methods
36-1. Understanding Passwords and Salt
36-2. Secure Password Storage Techniques
Chapter 37. Practice: Password Management through Hashing and Salting
Chapter 38. OAuth Concepts and Use Cases
Chapter 39. The Concept and Usage of JWT (Java Web Token)
Chapter 40. Implementing Authentication Using JWT
Chapter 41. Secure Session Management Techniques
Chapter 42. Session Hijacking Prevention Methods
Chapter 43. The Importance of Code Review
Chapter 44. Utilizing Static Analysis Tools
Chapter 45. The Concept of Dynamic Analysis
46-1. Penetration Testing Tools
46-2. Penetration Testing Execution Phases
Chapter 47. Hands-on: Simple Penetration Testing Simulation
Rich annotated code is provided with over 160 examples.
We present both vulnerable code and code with reinforced security measures together. Since specific countermeasures for reinforcing vulnerabilities are provided in detail, you can apply them directly to practical work.
For example, Example Code 13-6 contains code with vulnerabilities.
Meanwhile, example code 13-7 contains code that reinforces the vulnerability.
Acquiring basic principles and practical skills for writing secure code
Understanding and responding to security vulnerabilities by language and platform
Strengthening Key Threat Response Capabilities for Web Security and Authentication/Authorization
Acquiring Practical Knowledge for Establishing Security Culture within Development Organizations
Prevention is the best approach to security incidents. Start now.
Take your first step into secure coding with this course!
Who is this course right for?
A person who wants to know what Secure Coding is
Person wanting to solidify Secure Coding fundamentals
Someone who must immediately patch web application vulnerabilities
A person eager to learn immediately practical techniques.
Need to know before starting?
It's a plus if you understand one or two of C, Java, Python, Javascript languages.
413
Learners
20
Reviews
1
Answers
4.7
Rating
17
Courses
IT가 취미이자 직업인 사람입니다.
다양한 저술, 번역, 자문, 개발, 강의 경력이 있습니다.
All
209 lectures ∙ (14hr 26min)
Course Materials:
All
5 reviews
$77.00
Check out other courses by the instructor!
Explore other courses in the same field!