Breaking Down Secure Coding

This lecture is designed to be easily understood even if you have no prior knowledge of Secure Coding. After covering fundamental secure coding concepts, it focuses on web service security. This course was originally conducted as a special lecture hosted by OO University. It provides over 160 source codes with extensive comments, pinpointing core topics and techniques that can be applied immediately in the field.

(5.0) 9 reviews

98 learners

Level Basic

Course period Unlimited

security training
security training
Penetration Testing
Penetration Testing
security
security
security training
security training
Penetration Testing
Penetration Testing
security
security

What you will gain after the course

  • You can gain a comprehensive understanding of secure coding.

  • You can learn web security, authentication and authorization, and code review methods for security.

  • You can learn about security vulnerabilities and countermeasures for each language.

🧭 Precautions

The lectures are currently in the process of being completed. Please be aware that there is a disadvantage in that you may have to wait a long time until all lectures are finished (although they will be supplemented frequently). Please take this into consideration when making your purchase decision.

📋 Change History

  • March 21, 2026

    • We have started publishing the 2nd edition (revised edition). We plan to gradually replace the existing 1st edition lectures with the 2nd edition. The audio quality of the 1st edition classes will naturally be improved, and code materials will also be reinforced in PDF format.

  • January 22, 2026

    • I have uploaded videos explaining all the code up to Section 12. I will gradually upload explanatory videos for the code in the remaining sections (13–19) as well.

  • September 18, 2025

    • I have added the precautions and change history to the detailed introduction page.

🔐 Course Introduction

In modern software development, security is a necessity, not an option. This course allows you to systematically learn and practice secure coding techniques, which are a core competency for developing secure software. Designed for all IT professionals interested in security, including developers, security personnel, and QA engineers, this course is ideal for use in security training. (Keywords: security training, penetration testing, security)

📘 Course Curriculum

Part 1. Basic Understanding of Secure Coding

Section 1. Course Information

  • Chapter 1. Orientation

Section 2. Importance of Secure Coding

  • Chapter 2. The Three Elements of Information Security

  • Chapter 3. The Role of Security in Software Development

  • Chapter 4. Case Study: Analysis of Famous Security Incidents

Section 3. Threat Modeling

  • Chapter 5. Concepts of Threat Modeling

  • Chapter 6. Introduction to the STRIDE Model

  • Chapter 7. Introduction to the DREAD Model

  • Chapter 8. Threat Modeling Tools

  • Chapter 9. Lab: Threat Modeling Application Example

Section 4. Coding Standards and Guidelines

  • Chapter 10. Secure Coding Standards (CERT, OWASP, etc.)

  • Chapter 11-1. Guidelines for Secure Coding

Section 5. Basic Practice - Secure Input Handling

  • Chapter 11-2. Input Validation and Writing Clean Code

  • Chapter 11-3. Practice: Writing Secure Input Handling Code


Part 2. Language-Specific Security Vulnerabilities and Countermeasures

Section 6. Overview of Security Vulnerabilities by Language

  • Chapter 12. Security Vulnerabilities in C/C++

  • Chapter 13. Security Vulnerabilities in Java

  • Chapter 14. Security Vulnerabilities in Python

Section 7. Secure Coding in C and C++

  • Chapter 15. Memory Management and Buffer Overflow

  • Chapter 16. Format String Vulnerability

  • Chapter 17. Practice: Writing Secure Memory Management Code

Section 8. Java Secure Coding

  • Chapter 18. Object Serialization and Security

  • Chapter 19. SQL Injection and Countermeasures

  • Chapter 20. Lab: Writing SQL Injection Defense Code

Section 9. Python Secure Coding

  • Chapter 21. Dynamic Typing and Security

  • Chapter 22. Security Issues with the Pickle Module

  • Chapter 23. Practice: Writing Secure Data Serialization Code

Part 3. Web Application Security

Section 10. Web Application Security Overview

  • Chapter 24. The Importance of Web Security

  • Chapter 25. OWASP Top 10 Overview


Section 11. Cross-Site Scripting (XSS)

  • Chapter 26. Concepts and Types of XSS

  • Chapter 27. XSS Defense Techniques

  • Chapter 28. Lab: Writing XSS Vulnerability Defense Code

Section 12. Cross-Site Request Forgery (CSRF)

  • Chapter 29. CSRF Concepts and Attack Methods

  • Chapter 30. CSRF Defense Techniques

  • Chapter 31. Practice: Writing CSRF Defense Code

Section 13. Security Headers and HTTPS (Chapters 32-33)

  • Chapter 32. How to Configure Security Headers

  • Chapter 33. Importance of HTTPS and How to Configure It

Part 4. Authentication and Authorization

Section 14. Basics of Authentication and Authorization

  • Chapter 34. Differences between Authentication and Authorization

  • Chapter 35. Secure Authentication Methods

Section 15. Password Management

  • Chapter 36-1. Understanding Passwords and Salts

  • Chapter 36-2. Secure Password Storage Techniques

  • Chapter 37. Practice: Password Management through Hashing and Salting

Section 16. OAuth and JWT

  • Chapter 38. Concepts and Use Cases of OAuth

  • Chapter 39. Concepts and Usage of JWT (JSON Web Token)

  • Chapter 40. Implementing Authentication Using JWT

Section 17. Session Management

  • Chapter 41. Secure Session Management Techniques

  • Chapter 42. Methods to Prevent Session Hijacking

Part 5. Security Application and Review Methods

Section 18. Code Review and Static Analysis Tools

  • Chapter 43. Importance of Code Review

  • Chapter 44. Utilizing Static Analysis Tools

Section 19. Dynamic Analysis and Pentesting

  • Chapter 45. Concepts of Dynamic Analysis

  • Chapter 46-1. Pentest (Penetration Testing) Tools

  • Chapter 46-2. Pentesting Execution Steps

  • Chapter 47. Practice: Simple Pentest Simulation

📘 Example screens and example code

Over 160 pieces of code with rich comments are provided.

Both vulnerable code and remediated code are presented together. Since specific countermeasures for addressing vulnerabilities are provided, they can be directly applied to practical work.

For example, Example Code 13-6 contains code with vulnerabilities.

Meanwhile, Example Code 13-7 contains the code with the vulnerabilities reinforced.

🎯 Learning Objectives

  • Acquisition of basic principles and practical skills for writing secure code

  • Gain an understanding of security vulnerabilities by language and platform and secure the ability to respond to them.

  • Strengthening response capabilities against major threats related to web security and authentication/authorization

  • Acquiring practical knowledge to establish a security culture within development organizations

Prevention is the best defense against security incidents. Start now.
Take your first step into secure coding with this course!

Recommended for
these people

Who is this course right for?

  • Someone who wants to know what secure coding is

  • Those who want to build a strong foundation in secure coding

  • Those who need to fix web application vulnerabilities immediately

  • Someone who wants to learn techniques for immediate practical application.

Need to know before starting?

  • It is helpful to have an understanding of one or two languages among C, Java, Python, and Javascript.

Hello
This is arigaram

666

Learners

35

Reviews

2

Answers

4.5

Rating

18

Courses

I am someone for whom IT is both a hobby and a profession.

I have a diverse background in writing, translation, consulting, development, and lecturing.

Curriculum

All

209 lectures ∙ (22hr 48min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

9 reviews

5.0

9 reviews

  • tops19504245님의 프로필 이미지
    tops19504245

    Reviews 3

    Average Rating 5.0

    5

    30% enrolled

    • arigaram
      Instructor

      Thank you.

  • n1222kim7563님의 프로필 이미지
    n1222kim7563

    Reviews 1

    Average Rating 5.0

    5

    100% enrolled

    • arigaram
      Instructor

      Thank you

  • wschoi5323님의 프로필 이미지
    wschoi5323

    Reviews 1

    Average Rating 5.0

    5

    100% enrolled

    • arigaram
      Instructor

      Thank you.

  • bradpitt님의 프로필 이미지
    bradpitt

    Reviews 5

    Average Rating 3.8

    5

    30% enrolled

    • arigaram
      Instructor

      Thank you.

  • ckh61119717님의 프로필 이미지
    ckh61119717

    Reviews 2

    Average Rating 5.0

    5

    24% enrolled

    • arigaram
      Instructor

      Thank you.

arigaram's other courses

Check out other courses by the instructor!

Similar courses

Explore other courses in the same field!

$254.10