강의

멘토링

로드맵

Security & Network

/

Computer Security

Breaking Down Secure Coding

This lecture is designed for understanding even if you have no prior knowledge of what Secure Coding (Security Coding) is. After covering basic security coding concepts, it focuses on web service security. This was a special lecture presented under the auspices of OO University. It presents over 160 source codes with rich comments, pinpointing core topics and techniques immediately applicable in practice.

(5.0) 5 reviews

78 learners

  • arigaram
보안교육
실습 중심
security training
Penetration Testing
security

What you will learn!

  • You can thoroughly understand secure coding.

  • You can learn web security, authentication and authorization, and code review methods for security.

  • You can learn language-specific security flaws & solutions.

🧭Precautions

The course is currently being completed. We plan to gradually adjust the price as the course is being finalized. Therefore, those who purchase earlier can buy it at a relatively lower price, but they will have the disadvantage of having to wait longer until the course is fully completed (although we will continuously add supplementary content). Please consider this when making your purchase decision.

📋Change History

  • September 18, 2025

    • I've added precautions and change history to the detailed introduction page.

🔐 Course Introduction

In modern software development, security is not an option but a necessity. This course enables you to systematically learn and practice secure coding techniques, which are core competencies for developing secure software. Designed for all IT professionals interested in security, including developers, security personnel, and QA engineers, this course is excellent for use in security education. (Keywords: security education, penetration testing, security)

📘 Course Structure

Part 1. Basic Understanding of Secure Coding

Section 1. Course Information

  • Chapter 1. Orientation

Section 2. The Importance of Secure Coding

  • Chapter 2. The Three Pillars of Information Security

  • Chapter 3. The Role of Security in Software Development

  • Chapter 4. Case Study: Analysis of Famous Security Incidents

Section 3. Threat Modeling

  • Chapter 5. The Concept of Threat Modeling

  • Chapter 6. Introduction to the STRIDE Model

  • Chapter 7. Introduction to the DREAD Model

  • Chapter 8. Threat Modeling Tools

  • Chapter 9. Practice: Threat Modeling Application Examples

Section 4. Coding Standards and Guidelines

  • 10. Secure Coding Standards (CERT, OWASP, etc.)

  • 11-1. Guidelines for Secure Coding

Section 5. Basic Practice - Secure Input Processing

  • 11-2. Input Validation and Clean Code Writing

  • 11-3. Practice: Writing Secure Input Processing Code


Part 2. Security Vulnerabilities and Countermeasures by Language

Section 6. Overview of Security Vulnerabilities by Language

  • Chapter 12. Security Vulnerabilities in C/C++

  • Chapter 13. Java Security Vulnerabilities

  • Chapter 14. Security Vulnerabilities in Python

Section 7. Secure Coding in C and C++

  • Chapter 15. Memory Management and Buffer Overflow

  • 16. Format String Vulnerability

  • Chapter 17. Practice: Writing Safe Memory Management Code

Section 8. Java Security Coding

  • Chapter 18. Object Serialization and Security

  • 19. SQL Injection and Countermeasures

  • Chapter 20. Practice: Writing SQL Injection Defense Code

Section 9. Python Security Coding

  • Chapter 21. Dynamic Typing and Security

  • Chapter 22. Security Issues with the Pickle Module

  • Chapter 23. Practice: Writing Secure Data Serialization Code

Part 3. Web Application Security

Section 10. Web Application Security Overview

  • Chapter 24. The Importance of Web Security

  • Chapter 25. OWASP Top 10 Overview


Section 11. Cross-Site Scripting (XSS)

  • Chapter 26. Concept and Types of XSS

  • Chapter 27. XSS Defense Techniques

  • Chapter 28. Practice: Writing XSS Vulnerability Defense Code

Section 12. Cross-Site Request Forgery (CSRF)

  • 29. The Concept of CSRF and Attack Methods

  • 30. CSRF Defense Techniques

  • Chapter 31. Practice: Writing CSRF Defense Code

Section 13. Security Headers and HTTPS (Chapters 32-33)

  • 32. How to Configure Security Headers

  • Chapter 33. The Importance of HTTPS and Configuration Methods

Part 4. Authentication and Authorization

Section 14. Fundamentals of Authentication and Authorization

  • Chapter 34. Differences Between Authentication and Authorization

  • Chapter 35. Secure Authentication Methods

Section 15. Password Management

  • 36-1. Understanding Passwords and Salt

  • 36-2. Secure Password Storage Techniques

  • Chapter 37. Practice: Password Management through Hashing and Salting

Section 16. OAuth and JWT

  • Chapter 38. OAuth Concepts and Use Cases

  • Chapter 39. The Concept and Usage of JWT (Java Web Token)

  • Chapter 40. Implementing Authentication Using JWT

Section 17. Session Management

  • Chapter 41. Secure Session Management Techniques

  • Chapter 42. Session Hijacking Prevention Methods

Part 5. Security Implementation and Review Methods

Section 18. Code Review and Static Analysis Tools

  • Chapter 43. The Importance of Code Review

  • Chapter 44. Utilizing Static Analysis Tools

Section 19. Dynamic Analysis and Penetration Testing

  • Chapter 45. The Concept of Dynamic Analysis

  • 46-1. Penetration Testing Tools

  • 46-2. Penetration Testing Execution Phases

  • Chapter 47. Hands-on: Simple Penetration Testing Simulation

📘 Example Screens and Example Code

Rich annotated code is provided with over 160 examples.

We present both vulnerable code and code with reinforced security measures together. Since specific countermeasures for reinforcing vulnerabilities are provided in detail, you can apply them directly to practical work.

For example, Example Code 13-6 contains code with vulnerabilities.

Meanwhile, example code 13-7 contains code that reinforces the vulnerability.

🎯 Learning Objectives

  • Acquiring basic principles and practical skills for writing secure code

  • Understanding and responding to security vulnerabilities by language and platform

  • Strengthening Key Threat Response Capabilities for Web Security and Authentication/Authorization

  • Acquiring Practical Knowledge for Establishing Security Culture within Development Organizations

Prevention is the best approach to security incidents. Start now.
Take your first step into secure coding with this course!

Recommended for
these people

Who is this course right for?

  • A person who wants to know what Secure Coding is

  • Person wanting to solidify Secure Coding fundamentals

  • Someone who must immediately patch web application vulnerabilities

  • A person eager to learn immediately practical techniques.

Need to know before starting?

  • It's a plus if you understand one or two of C, Java, Python, Javascript languages.

Hello
This is

413

Learners

20

Reviews

1

Answers

4.7

Rating

17

Courses

IT가 취미이자 직업인 사람입니다.

다양한 저술, 번역, 자문, 개발, 강의 경력이 있습니다.

Curriculum

All

209 lectures ∙ (14hr 26min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

5 reviews

5.0

5 reviews

  • hyunseok.jang님의 프로필 이미지
    hyunseok.jang

    Reviews 5

    Average Rating 3.8

    5

    30% enrolled

    • 아리가람
      Instructor

      감사합니다.

  • kff126님의 프로필 이미지
    kff126

    Reviews 2

    Average Rating 5.0

    5

    100% enrolled

  • 이승준님의 프로필 이미지
    이승준

    Reviews 3

    Average Rating 5.0

    5

    30% enrolled

  • 박찬호님의 프로필 이미지
    박찬호

    Reviews 3

    Average Rating 5.0

    5

    100% enrolled

  • bmind2001님의 프로필 이미지
    bmind2001

    Reviews 4

    Average Rating 5.0

    5

    31% enrolled

$77.00

arigaram's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!