Course Information
Course Overview
This course teaches how to hack and secure PHP. Owasp top10(A1 to A10) for PHP.
This course teaches the programmers on how to exploit(hack) and defend against various attacks on PHP language. The course is designed around OWASP Top10 which is common standard which is used in design, architecture, testing of web applications.
The course contains video/audio lectures. It has Theory on PHP programming(Exploit, Defense) . It also has Demos of exploitation and Defense. It gives students practical insight into coding web application in PHP securely.
We recommend students to study the course over a period of 15 days and attempt the quiz at the end of the period. we also recommend students to study various resource material available on the internet in various forums including OWASP official website.
The course is structured according to OWASP Top 10 from A1 to A10. In each of the OWASP Top10 sessions we have categorized presentation, exploitation, defense.
Any programmer who is programming in PHP, should take this course. Secure PHP programmers are prefered by organisations across the globe.
Course Content
- 19 section(s)
- 66 lecture(s)
- Section 1 Injection(A1) - OWASP Top10
- Section 2 Injection(A1) - Command Injection
- Section 3 Injection(A1) - XML & XPath Injection
- Section 4 Injection(A1) - PHP Code Injection
- Section 5 Injection(A1) - PHP Object Injection
- Section 6 Injection(A1) - SSI Injection
- Section 7 Injection(A1) - LDAP Injection
- Section 8 Injection(A1) - HTML Injection
- Section 9 Broken Authentication and Session Management(A2) - OWASP Top10
- Section 10 Cross-Site Scripting (XSS) - A3 - OWASP Top10
- Section 11 Cross Site Scripting - A3 - Defense
- Section 12 Insecure Direct Object References - A4 - OWASP Top10
- Section 13 Security Misconfiguration - A5 - OWASP Top10
- Section 14 Sensitive Data Exposure - A6 - OWASP Top10
- Section 15 Missing Function Level Access Control - A7 - OWASP Top10
- Section 16 Cross-Site Request Forgery (CSRF) - A8 - OWASP Top10
- Section 17 Using Components with Known Vulnerabilities - A9 - OWASP Top10
- Section 18 Unvalidated Redirects and Forwards - A10 - OWASPTop10
- Section 19 Certification
What You’ll Learn
- Learn to Hack and Write Secure PHP code, Learn the OWASP Top10 Methodology A1 - A10, Apply the above OWASP Top10 methodology on PHP programming
Skills covered in this course
Reviews
-
RRemy Ralfelt
It is ok, but there are several improvments. Noice in background, consistency with screens and the recording voice. Sometimes the sound is good, sometimes it is low voice. The injection A1 sections were pretty good except for the last one LDAP injection.
-
PPhilippe R Collin III
The content seems like it is just a copy and paste of other documents I have read online. These attacks are basic and assume you know the PHP. It would be better to give more complex attacks where you don't know the PHP code so you can identify better ways to secure.
-
CChayse Hartsuff
Outdated, even for its time. Was clearly someone reviewing a video taken earlier which ruined the flow. A lot of background noise
-
EEki einstein Laksamana
thanks the course take me a step further to knowing what i m doing, and how to do it in proper and secure way :D