강의

멘토링

커뮤니티

Security & Network

/

Computer Security

Breaking Down Secure Coding

This lecture is designed for understanding even if you have no prior knowledge of what Secure Coding (Security Coding) is. After covering basic security coding concepts, it focuses on web service security. This was a special lecture presented under the auspices of OO University. It presents over 160 source codes with rich comments, pinpointing core topics and techniques immediately applicable in practice.

(5.0) 8 reviews

86 learners

  • arigaram
보안교육
실습 중심
security training
Penetration Testing
security

What you will gain after the course

  • You can thoroughly understand secure coding.

  • You can learn web security, authentication and authorization, and code review methods for security.

  • You can learn language-specific security flaws & solutions.

🧭Important Notes

I am currently in the process of completing this course. I plan to gradually adjust the price as the course progresses toward completion. Therefore, those who purchase earlier can buy at a relatively lower price, but will have the disadvantage of having to wait longer until the course is fully completed (though I will continuously add supplementary content). Please consider this when making your purchase decision.

📋Change History

  • September 18, 2025

    • I've added the precautions and change history to the detailed introduction page.

🔐 Course Introduction

In modern software development, security is not an option but a necessity. This course enables you to systematically learn and practice secure coding techniques, which are core competencies for developing secure software. Designed for all IT professionals interested in security, including developers, security personnel, and QA engineers, this course is excellent for use in security education. (Keywords: security education, penetration testing, security)

📘 Course Structure

Part 1. Basic Understanding of Secure Coding

Section 1. Course Information

  • Chapter 1. Orientation

Section 2. The Importance of Secure Coding

  • Chapter 2. The Three Key Elements of Information Security

  • Chapter 3. The Role of Security in Software Development

  • Chapter 4. Case Study: Analysis of Famous Security Incidents

Section 3. Threat Modeling

  • Chapter 5. The Concept of Threat Modeling

  • Chapter 6. Introduction to the STRIDE Model

  • Chapter 7. Introduction to the DREAD Model

  • Chapter 8. Threat Modeling Tools

  • Chapter 9. Practice: Threat Modeling Application Examples

Section 4. Coding Standards and Guidelines

  • 10. Secure Coding Standards (CERT, OWASP, etc.)

  • 11-1. Guidelines for Secure Coding

Section 5. Basic Practice - Secure Input Processing

  • 11-2. Input Validation and Clean Code Writing

  • 11-3. Practice: Writing Secure Input Processing Code


Part 2. Security Vulnerabilities and Countermeasures by Language

Section 6. Overview of Security Vulnerabilities by Language

  • Chapter 12. Security Vulnerabilities in C/C++

  • Chapter 13. Java Security Vulnerabilities

  • Chapter 14. Security Vulnerabilities in Python

Section 7. Secure Coding in C and C++

  • Chapter 15. Memory Management and Buffer Overflow

  • Chapter 16. Format String Vulnerability

  • Chapter 17. Practice: Writing Safe Memory Management Code

Section 8. Java Security Coding

  • Chapter 18. Object Serialization and Security

  • Chapter 19. SQL Injection and Countermeasures

  • Chapter 20. Practice: Writing SQL Injection Defense Code

Section 9. Python Security Coding

  • Chapter 21. Dynamic Typing and Security

  • Chapter 22. Security Issues with the Pickle Module

  • Chapter 23. Practice: Writing Secure Data Serialization Code

Part 3. Web Application Security

Section 10. Web Application Security Overview

  • 24. The Importance of Web Security

  • Chapter 25. OWASP Top 10 Overview


Section 11. Cross-Site Scripting (XSS)

  • Chapter 26. Concept and Types of XSS

  • Chapter 27. XSS Defense Techniques

  • 28. Hands-on: Writing XSS Vulnerability Defense Code

Section 12. Cross-Site Request Forgery (CSRF)

  • Chapter 29. CSRF Concepts and Attack Methods

  • 30. CSRF Defense Techniques

  • Chapter 31. Practice: Writing CSRF Defense Code

Section 13. Security Headers and HTTPS (Chapters 32-33)

  • Chapter 32. How to Configure Security Headers

  • Chapter 33. The Importance of HTTPS and Configuration Methods

Part 4. Authentication and Authorization

Section 14. Basics of Authentication and Authorization

  • 34. The Difference Between Authentication and Authorization

  • Chapter 35. Secure Authentication Methods

Section 15. Password Management

  • 36-1. Understanding Passwords and Salt

  • 36-2. Secure Password Storage Techniques

  • Chapter 37. Practice: Password Management through Hashing and Salting

Section 16. OAuth and JWT

  • Chapter 38. OAuth Concepts and Use Cases

  • Chapter 39. The Concept and Usage of JWT (Java Web Token)

  • Chapter 40. Implementing Authentication Using JWT

Section 17. Session Management

  • Chapter 41. Secure Session Management Techniques

  • Chapter 42. Session Hijacking Prevention Methods

Part 5. Security Implementation and Review Methods

Section 18. Code Review and Static Analysis Tools

  • Chapter 43. The Importance of Code Review

  • Chapter 44. Utilizing Static Analysis Tools

Section 19. Dynamic Analysis and Penetration Testing

  • Chapter 45. The Concept of Dynamic Analysis

  • 46-1. Penetration Testing Tools

  • 46-2. Penetration Testing Execution Phases

  • Chapter 47. Practice: Simple Penetration Test Simulation

📘 Example Screens and Example Code

Rich annotated code with over 160 examples is provided.

We present both vulnerable code and code with reinforced security measures together. Since specific countermeasures for strengthening vulnerabilities are provided, you can apply them directly to practical work.

For example, Example Code 13-6 contains code with vulnerabilities.

Meanwhile, example code 13-7 contains code that reinforces the vulnerabilities.

🎯 Learning Objectives

  • Acquiring basic principles and practical skills for writing secure code

  • Understanding and securing capabilities to respond to security vulnerabilities by language and platform

  • Strengthening Key Threat Response Capabilities for Web Security and Authentication/Authorization

  • Acquiring Practical Knowledge for Establishing a Security Culture Within Development Organizations

Prevention is the best approach to security incidents. Start now.
Take your first step into secure coding with this course!

Recommended for
these people

Who is this course right for?

  • A person who wants to know what Secure Coding is

  • Person wanting to solidify Secure Coding fundamentals

  • Someone who must immediately patch web application vulnerabilities

  • A person eager to learn immediately practical techniques.

Need to know before starting?

  • It's a plus if you understand one or two of C, Java, Python, Javascript languages.

Hello
This is

560

Learners

29

Reviews

2

Answers

4.5

Rating

17

Courses

IT가 취미이자 직업인 사람입니다.

다양한 저술, 번역, 자문, 개발, 강의 경력이 있습니다.

Curriculum

All

209 lectures ∙ (18hr 18min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

8 reviews

5.0

8 reviews

  • tops19504245님의 프로필 이미지
    tops19504245

    Reviews 2

    Average Rating 5.0

    5

    30% enrolled

    • ckh61119717님의 프로필 이미지
      ckh61119717

      Reviews 1

      Average Rating 5.0

      5

      24% enrolled

      • arigaram
        Instructor

        ありがとうございます。

    • wschoi5323님의 프로필 이미지
      wschoi5323

      Reviews 1

      Average Rating 5.0

      5

      100% enrolled

      • arigaram
        Instructor

        ありがとうございます。

    • bradpitt님의 프로필 이미지
      bradpitt

      Reviews 5

      Average Rating 3.8

      5

      30% enrolled

      • arigaram
        Instructor

        ありがとうございます。

    • kff1265149님의 프로필 이미지
      kff1265149

      Reviews 2

      Average Rating 5.0

      5

      100% enrolled

      • arigaram
        Instructor

        ありがとうございます。

    $77.00

    arigaram's other courses

    Check out other courses by the instructor!

    Similar courses

    Explore other courses in the same field!