Writing Secure PHP Code - PHP Security Tutorial
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
This PHP Security training video from Infinite Skills teaches you about the primary security considerations that can affect a PHP website, and how you can take preventative measures. This course is designed for users that already have a working knowledge of PHP and MySQL, and who develop PHP-based websites that contain sensitive or financial information.
You will start by learning about the most common forms of attack and what the consequences can be when your website is not protected. You will then move into learning about the filtering and validation functions in PHP, and why you should use them. Doug will teach you how you can protect your website against common website vulnerabilities and how to protect file uploads. Finally, this video tutorial will teach you how to protect against SQL injection attacks, and covers topics such as database escaping, using prepared statements, and protecting a MySQL database.
By the completion of this video based training course, you will have the knowledge required to ensure your website is secure against attacks and free of vulnerabilities. Working files are included, allowing you to follow along with the author throughout the lessons.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Getting Started|
Important - Working Files - Download These FirstPreview
0101 What Does The Course Cover?Preview
0102 How To Set Up For The Course
|Section 2: Nature And Scope Of The Problem|
0201 What Is The Threat? - Part 1
0202 What Is The Threat? - Part 2
0203 What Are The Consequences When A Website Is Not Protected Against Attacks?
0204 Most Common Forms Of Attack - Part 1
0205 Most Common Forms Of Attack - Part 2
0206 Most Common Vulnerabilities Attackers Can Exploit
0207 Helpful Resources
0208 Lab: Hacking Into Sweets Complete - Instructions
0209 Lab: Hacking Into Sweets Complete - Solution
|Section 3: Understanding Filtering, Validation, And Output Escaping|
0301 What Is Filtering, Validation, Output Escaping, And Why Do It?
0302 PHP Filtering Functions And Techniques
0303 PHP Validation Functions And Techniques
0304 PHP Output Escaping Functions
0305 Using filter_var() To Filter And Validate
0306 Lab: Filtering And Validating Posted Form Data - Instructions
0307 Lab: Filtering And Validating Posted Form Data - Solutions
|Section 4: Preventing The Most Common Forms Of Attack|
0401 Cross-Site Scripting Attacks - Part 1
0402 Cross-Site Scripting Attacks - Part 2
0403 Cross-Site Scripting Attacks - Part 3
0404 Session Hijacking And Forgery Attacks - Part 1
0405 Session Hijacking And Forgery Attacks - Part 2
0406 Remote Code Injection Attacks - Part 1
0407 Remote Code Injection Attacks - Part 2
0408 Lab: Improving Security On An Existing Website - Instructions
0409 Lab: Improving Security On An Existing Website - Solutions
|Section 5: Protecting Against Common Website Vulnerabilities|
0501 Unplanned Information Disclosure - Part 1
0502 Unplanned Information Disclosure - Part 2
0503 Predictable Resource Location
0504 Insufficient Authorization
0505 Improper Access Controls
0506 Avoiding Misconfiguration
0507 Protecting File Uploads
0508 Lab: Improving Security On An Existing Website - Instructions
0509 Lab: Improving Security On An Existing Website - Solutions
|Section 6: Protecting Against SQL Injection Attacks|
0601 How Can You Protect A MySQL Database?
0602 MySQL Database Escaping And Quoting
0603 Using Prepared Statements
0604 Lab: Protecting A MySQL Database Against SQL Injection - Instructions
0605 Lab: Protecting A MySQL Database Against SQL Injection - Solutions
|Section 7: Conclusion|
0701 Wrap Up
Infinite Skills is a Canadian based company who offer a huge and ever growing range of high quality eLearning solutions that teach using studio quality narrated videos backed-up with practical hands-on examples and comprehensive working files. All courses are created by trained educators and experts in video based education.
The emphasis is on teaching real life skills that are essential for progressing in today's commercial environment.