PHP Security Training VideosCareerVision Training
£ 72 - (Rs 5,898)
- Online campus
What you'll learn on the course
• Format: DVD or Instant Download
• Duration: 4.5 Hours (43 lessons)
• Instructor: Doug Bierer
• Platform: Windows PC or Mac
• Date Released: 16-10-2013
In this PHP Security training video, expert author Doug Bierer teaches you about the primary security considerations that can affect a PHP website, and how you can take preventative measures. This course is designed for users that already have a working knowledge of PHP and MySQL, and who develop PHP-based websites that contain sensitive or financial information.
You will start by learning about the most common forms of attack and what the consequences can be when your website is not protected. You will then move into learning about the filtering and validation functions in PHP, and why you should use them. Doug will teach you how you can protect your website against common website vulnerabilities and how to protect file uploads. Finally, this video tutorial will teach you how to protect against SQL injection attacks, and covers topics such as database escaping, using prepared statements, and protecting a MySQL database.
By the completion of this video based training course, you will have the knowledge required to ensure your website is secure against attacks and free of vulnerabilities. Working files are included, allowing you to follow along with the author throughout the lessons.
Benefits of this Software Training:
• Tuition by expert tutors.
• Narrated training videos demonstrate the key tools and professional techniques
helping you to work faster and smarter.
• Learning is fast as the trainers guide you using simplistic terms and minimal jargon.
• Personal Tutoring - Step-by-step video training from your own desktop.
Delivered via DVD/CD training or online tuition.
• The tutor transfers knowledge to you quickly and effectively.
• All the concepts of each application are explained clearly and precisely.
• Course works on PC and Mac.
• Alternative to a boring book or manual and expensive training courses,
seminars and amp; classes.
• Jump to and from lessons - learn at your own pace.
• The visual and practical nature shortens the learning curve compared to standard
The first 3 chapters are available for free viewing. Click on the links below to get started.00. Free Videos From This Course What Does The Course Cover? About The Author What Are The Most Common Vulnerabilities Attackers Can Exploit? What Are The Most Common PHP Filtering Functions And Techniques? Preventing Session Hijacking And Forgery Attacks - Part I Protecting Against Predictable Resource Location Protecting File Uploads Lab: Protecting A MySQL Database Against SQL Injection - Instructions 01. Getting Started 0101 What Does The Course Cover? 0102 How To Set Up For The Course 02. Nature And Scope Of The Problem 0201 What Is The Threat? - Part 1 0202 What Is The Threat? - Part 2 0203 What Are The Consequences When A Website Is Not Protected Against Attacks? 0204 Most Common Forms Of Attack - Part 1 0205 Most Common Forms Of Attack - Part 2 0206 Most Common Vulnerabilities Attackers Can Exploit 0207 Helpful Resources 0208 Lab: Hacking Into Sweets Complete - Instructions 0209 Lab: Hacking Into Sweets Complete - Solution 03. Understanding Filtering, Validation, And Output Escaping 0301 What Is Filtering, Validation, Output Escaping, And Why Do It? 0302 PHP Filtering Functions And Techniques 0303 PHP Validation Functions And Techniques 0304 PHP Output Escaping Functions 0305 Using filter_var() To Filter And Validate 0306 Lab: Filtering And Validating Posted Form Data - Instructions 0307 Lab: Filtering And Validating Posted Form Data - Solutions 04. Preventing The Most Common Forms Of Attack 0401 Cross-Site Scripting Attacks - Part 1 0402 Cross-Site Scripting Attacks - Part 2 0403 Cross-Site Scripting Attacks - Part 3 0404 Session Hijacking And Forgery Attacks - Part 1 0405 Session Hijacking And Forgery Attacks - Part 2 0406 Remote Code Injection Attacks - Part 1 0407 Remote Code Injection Attacks - Part 2 0408 Lab: Improving Security On An Existing Website - Instructions 0409 Lab: Improving Security On An Existing Website - Solutions 05. Protecting Against Common Website Vulnerabilities 0501 Unplanned Information Disclosure - Part 1 0502 Unplanned Information Disclosure - Part 2 0503 Predictable Resource Location 0504 Insufficient Authorization 0505 Improper Access Controls 0506 Avoiding Misconfiguration 0507 Protecting File Uploads 0508 Lab: Improving Security On An Existing Website - Instructions 0509 Lab: Improving Security On An Existing Website - Solutions 06. Protecting Against SQL Injection Attacks 0601 How Can You Protect A MySQL Database? 0602 MySQL Database Escaping And Quoting 0603 Using Prepared Statements 0604 Lab: Protecting A MySQL Database Against SQL Injection - Instructions 0605 Lab: Protecting A MySQL Database Against SQL Injection - Solutions 07. About The Author 0701 Wrap Up 0702 About The Author