강의

멘토링

로드맵

Inflearn brand logo image
Security & Network

/

Computer Security

Developer/Operator Security Training - Hacking Response and Security Enhancement Strategies

Cyber security threats are increasing every year, targeting external services and internal system penetration and personal information theft. This article covers basic security activities that developers and operators must perform to operate, develop, and protect infrastructure, applications, and the cloud.

(4.9) 9 reviews

57 learners

  • boanproject
이론 중심
개념정리
security training

Reviews from Early Learners

What you will learn!

  • Cyber Security Issues

  • Application Security

  • Cloud Security

  • Infrastructure Security

  • OSINT Security

"Information Security Lecture" that Developers and Operators Must Take

  • We cover security threat cases and utilization methods that can be derived from the development and operation stages using OSINT search services.

  • We cover the main application vulnerabilities and countermeasures that must be observed during the development of external services.

  • It addresses the importance of security enhancement during the security design phase and covers business processes that can be applied in practice.

  • We cover key security items and cyber hacking cases that must be observed during the development and operation of cloud services.

  • We present methods for strengthening log file analysis and monitoring during the operation of cloud services.

Learn about these things

Strengthening web application security

This explains application security that must be observed during the development and operation of external services based on the OWASP TOP 10 major items, and presents security response measures for each case.

Importance of Strengthening Security in Design and Development Phases

If you address important security issues from the service design stage, you can significantly reduce costs. We present a business process method that can eliminate potential security vulnerabilities.

Strengthen system security and detect suspicious processes

We present a method to quickly detect and monitor malicious intrusions that may occur during system operation. We introduce examples of automatic analysis services and tools that can be utilized in practice.

Cloud Service Integrated Log Security Monitoring

We introduce a case of integrated logging and security monitoring of various infrastructure logs generated in the process of operating a cloud service. Strengthening major attack monitoring within a large amount of logs is a very important security activity.

Recommended for
these people

Who is this course right for?

  • Developer, Infrastructure Operations

  • External Service Security Officer

  • If you want to understand the latest security issues

  • If you want to understand basic security activities

Need to know before starting?

  • The mindset of maintaining basic security

Hello
This is

108,891

Learners

3,155

Reviews

443

Answers

4.7

Rating

69

Courses

보안프로젝트 ( www.boanproject.com )는 IT보안, 빅데이터, 머신러닝, IoT 등 다양한 분야의 온라인 강의, 그룹 강의를 진행하고 있습니다. 

Curriculum

All

6 lectures ∙ (1hr 12min)

Course Materials:

Lecture resources
Published: 
Last updated: 

Reviews

All

9 reviews

4.9

9 reviews

  • lifeistogether7123님의 프로필 이미지
    lifeistogether7123

    Reviews 8

    Average Rating 5.0

    5

    100% enrolled

    セキュリティの概念を理解するのにとても役立ちました。

    • seungwonjeong4734님의 프로필 이미지
      seungwonjeong4734

      Reviews 5

      Average Rating 5.0

      5

      100% enrolled

      役に立ちました!

      • mai74115949님의 프로필 이미지
        mai74115949

        Reviews 1

        Average Rating 5.0

        5

        100% enrolled

        ハッキング対応に関連するセキュリティ教育が良かったです。

        • pjoonheeq님의 프로필 이미지
          pjoonheeq

          Reviews 5

          Average Rating 5.0

          5

          67% enrolled

          • choiddongg4850님의 프로필 이미지
            choiddongg4850

            Reviews 2

            Average Rating 5.0

            5

            67% enrolled

            $26.40

            boanproject's other courses

            Check out other courses by the instructor!

            Similar courses

            Explore other courses in the same field!