Certified Secure Coder- PHP (CSC- PHP)
4.2 (29 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
896 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Certified Secure Coder- PHP (CSC- PHP) to your Wishlist.

Add to Wishlist

Certified Secure Coder- PHP (CSC- PHP)

This course teaches how to hack and secure PHP. Owasp top10(A1 to A10) for PHP.
4.2 (29 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
896 students enrolled
Last updated 1/2015
English
Current price: $10 Original price: $20 Discount: 50% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 4 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
What Will I Learn?
Learn to Hack and Write Secure PHP code
Learn the OWASP Top10 Methodology A1 - A10
Apply the above OWASP Top10 methodology on PHP programming
View Curriculum
Requirements
  • basic programming in PHP
  • web based programming language
Description

This course teaches the programmers on how to exploit(hack) and defend against various attacks on PHP language. The course is designed around OWASP Top10 which is common standard which is used in design, architecture, testing of web applications.

The course contains video/audio lectures. It has Theory on PHP programming(Exploit, Defense) . It also has Demos of exploitation and Defense. It gives students practical insight into coding web application in PHP securely.

We recommend students to study the course over a period of 15 days and attempt the quiz at the end of the period. we also recommend students to study various resource material available on the internet in various forums including OWASP official website.

The course is structured according to OWASP Top 10 from A1 to A10. In each of the OWASP Top10 sessions we have categorized presentation, exploitation, defense.

Any programmer who is programming in PHP, should take this course. Secure PHP programmers are prefered by organisations across the globe.

Who is the target audience?
  • Programmers who code in PHP
  • Design Engineers, Architects who design or architecture for PHP based programs
  • Security testers and Functional testers who test PHP based programs
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 66 Lectures Collapse All 66 Lectures 04:07:14
+
Injection(A1) - OWASP Top10
9 Lectures 01:04:34


SQLI
10:30

Time based SQLI
05:13

Union Exploitation Technique
09:03

SQL Injection Union - Demo - Exploitation
12:40

Preventing SQLI
02:44

SQL Injection Login Bypass - Demo
04:44

SQL Injection - Demo - Defense
07:51
+
Injection(A1) - Command Injection
3 Lectures 07:32
Command Injection Presentation
03:26

Command Injection - Demo
02:32

Command Injection Prevention - Demo
01:34
+
Injection(A1) - XML & XPath Injection
3 Lectures 13:37
XML & XPath Injection Presentation
08:07

XPath Injection - Demo
03:18

XPath Injection Prevention - Demo
02:12
+
Injection(A1) - PHP Code Injection
3 Lectures 07:11
PHP Code Injection Presentation
03:34

PHP Code Injection Demo
02:32

PHP Code Injection Prevention
01:05
+
Injection(A1) - PHP Object Injection
4 Lectures 11:51
PHP Object Injection Presentation
02:14

PHP Object Injection Demo 1
05:18

PHP Object Injection Demo 2
03:00

PHP Object Injection Prevention
01:19
+
Injection(A1) - SSI Injection
3 Lectures 08:13
SSI Injection Presentation
02:43

SSI Injection Demo
04:15

SSI Injection Prevention
01:15
+
Injection(A1) - LDAP Injection
1 Lecture 03:47
LDAP Injection Presentation
03:47
+
Injection(A1) - HTML Injection
2 Lectures 06:33
HTML Injection Presentation
03:01

HTML Injection Demo
03:32
+
Broken Authentication and Session Management(A2) - OWASP Top10
3 Lectures 08:02
Broken Authentication and Session Management - OWASP Top10(A2) - Presentation
05:28

Broken Authentication and Session Management - Demo - Exploit
00:44

Defense Demo
01:50
+
Cross-Site Scripting (XSS) - A3 - OWASP Top10
6 Lectures 18:10
Cross Site Scripting(XSS) - Introduction
02:46

Cross Site Scripting - Reflected
03:32

Cross Site Scripting - Demo - Reflected - Get
02:57

Cross Site Scripting(XSS) - Demo - Reflected - Post
01:25

Cross Site Scripting(XSS) Stored - Presentation
05:58

Cross Site Scripting(XSS) - Demo - Stored
01:32
9 More Sections
About the Instructor
Cyber Security & Privacy Foundation Pte Ltd
4.0 Average rating
973 Reviews
16,983 Students
9 Courses

Cyber Security and Privacy Foundation Pte Ltd. is a Consulting, Services & Training Company based in Singapore. We do Vulnerability Assessment, Penetration Testing, Web Application Security Testing, Mobile Application Security Testing and Cyber Security Training. We do zero day security assessment and APT analysis and technical security certifications for organisation.

Cyber Security & Privacy Foundation, India is setup with objective to do non commercial work. It has around 14000+ members and almost 9000+ students and CISO's of major companies on its board. We are involved in active research in field on cyber security, web portal security management, product research which is useful for all computer users.

J Prasanna : 20+ year full time experience in field of computer security. He has worked for anti virus companies & run my own consulting companies. He have worked on standards implementation, consulting, testing, handled team of security experts, coders & networking experts. Can provide value to any organization by thinking out of box,implementing ideas from conceptual stage. Great networking ability, have handled media relating to Cyber security issue on many occasions and good at training(both technical, non technical subjects). Taking ownership, delivering results, crisis management and cross functional skills are key strengths.

Specialties: Managing technical team, handling delivery & taking ownership of team. Virus analysis, Antivirus & Security products testing, Application security design & review, Secure enterprise architecture & design, ISO 27001 Standards implementation, Training. Presented in various CII conference on Cyber Security and Defense IT consultative committee(DITCC). He has Got numerous commendations from Indian army. He has done guest lecturing for various law enforcement and military academy in india.