Writing Secure PHP Code - PHP Security Tutorial

Create secure PHP code and prevent attacks and exploits in your code - This is an Essential course for all developers
3.6 (38 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
3,848 students enrolled
$50
Take This Course
  • Lectures 43
  • Contents Video: 4.5 hours
    Other: 0 mins
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 10/2013 English

Course Description

This PHP Security training video from Infinite Skills teaches you about the primary security considerations that can affect a PHP website, and how you can take preventative measures. This course is designed for users that already have a working knowledge of PHP and MySQL, and who develop PHP-based websites that contain sensitive or financial information.


You will start by learning about the most common forms of attack and what the consequences can be when your website is not protected. You will then move into learning about the filtering and validation functions in PHP, and why you should use them. Doug will teach you how you can protect your website against common website vulnerabilities and how to protect file uploads. Finally, this video tutorial will teach you how to protect against SQL injection attacks, and covers topics such as database escaping, using prepared statements, and protecting a MySQL database.

By the completion of this video based training course, you will have the knowledge required to ensure your website is secure against attacks and free of vulnerabilities. Working files are included, allowing you to follow along with the author throughout the lessons.

What are the requirements?

  • PC or Mac

What am I going to get from this course?

  • Learn how to write secure PHP code
  • Protect your website against attacks and exploits
  • Prevent PHP Injection and Cross-Site Scripting Attacks

What is the target audience?

  • Programmers of all levels
  • Web developers

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Getting Started
Important - Working Files - Download These First
Preview
Article
0101 What Does The Course Cover?
Preview
09:32
0102 How To Set Up For The Course
04:42
Section 2: Nature And Scope Of The Problem
0201 What Is The Threat? - Part 1
04:54
0202 What Is The Threat? - Part 2
05:33
0203 What Are The Consequences When A Website Is Not Protected Against Attacks?
03:18
0204 Most Common Forms Of Attack - Part 1
05:57
0205 Most Common Forms Of Attack - Part 2
05:42
0206 Most Common Vulnerabilities Attackers Can Exploit
10:09
0207 Helpful Resources
06:09
0208 Lab: Hacking Into Sweets Complete - Instructions
03:41
0209 Lab: Hacking Into Sweets Complete - Solution
03:41
Section 3: Understanding Filtering, Validation, And Output Escaping
0301 What Is Filtering, Validation, Output Escaping, And Why Do It?
09:37
0302 PHP Filtering Functions And Techniques
09:44
0303 PHP Validation Functions And Techniques
10:13
0304 PHP Output Escaping Functions
04:40
0305 Using filter_var() To Filter And Validate
06:29
0306 Lab: Filtering And Validating Posted Form Data - Instructions
04:23
0307 Lab: Filtering And Validating Posted Form Data - Solutions
07:13
Section 4: Preventing The Most Common Forms Of Attack
0401 Cross-Site Scripting Attacks - Part 1
09:02
0402 Cross-Site Scripting Attacks - Part 2
04:17
0403 Cross-Site Scripting Attacks - Part 3
09:35
0404 Session Hijacking And Forgery Attacks - Part 1
05:23
0405 Session Hijacking And Forgery Attacks - Part 2
09:37
0406 Remote Code Injection Attacks - Part 1
07:04
0407 Remote Code Injection Attacks - Part 2
06:37
0408 Lab: Improving Security On An Existing Website - Instructions
02:38
0409 Lab: Improving Security On An Existing Website - Solutions
08:17
Section 5: Protecting Against Common Website Vulnerabilities
0501 Unplanned Information Disclosure - Part 1
06:46
0502 Unplanned Information Disclosure - Part 2
08:44
0503 Predictable Resource Location
07:36
0504 Insufficient Authorization
06:41
0505 Improper Access Controls
11:01
0506 Avoiding Misconfiguration
11:34
0507 Protecting File Uploads
06:37
0508 Lab: Improving Security On An Existing Website - Instructions
03:09
0509 Lab: Improving Security On An Existing Website - Solutions
06:30
Section 6: Protecting Against SQL Injection Attacks
0601 How Can You Protect A MySQL Database?
05:42
0602 MySQL Database Escaping And Quoting
03:44
0603 Using Prepared Statements
06:59
0604 Lab: Protecting A MySQL Database Against SQL Injection - Instructions
02:23
0605 Lab: Protecting A MySQL Database Against SQL Injection - Solutions
04:50
Section 7: Conclusion
0701 Wrap Up
03:28

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Infinite Skills, High Quality Training

Infinite Skills is a Canadian based company who offer a huge and ever growing range of high quality eLearning solutions that teach using studio quality narrated videos backed-up with practical hands-on examples and comprehensive working files. All courses are created by trained educators and experts in video based education.

The emphasis is on teaching real life skills that are essential for progressing in today's commercial environment.

Ready to start learning?
Take This Course