Learning PHP Security Training Video

Courses For Success
Online

AU$189 - (R$487)

Informação importante

  • Curso
  • Online
  • Quando:
    à escolha
Descrição

A Practical PHP Training Course That Teaches Real World Skills In this project-based PHP Security video tutorial series, you'll quickly have relevant skills for real-world applications. Follow along with our expert instructor in this training course to get: Concise, informative and broadcast-quality Learning PHP Security training videos delivered to your desktop The ability to learn at your own pace with our intuitive, easy-to-use interface A quick grasp of even the most complex Learning PHP Security subjects because they're broken into simple, easy to follow tutorial videos Practical working files further enhance the learning process and provide a degree of retention that is unmatched by any other form of Learning PHP Security tutorial, online or offline...so you'll know the exact steps for your own projects. Course Fast Facts: Only 4.5 hours to complete this course 43 tutorial videos Expert instructors lead each course Download to any Windows PC or Mac and save for viewing off line Course is accessible 24/7 from any computer once downloaded You can study from home or at work at your own pace in your own time Course Description In this PHP Security training video, expert author Doug Bierer teaches you about the primary security considerations that can affect a PHP website, and how you can take preventative measures. This course is designed for users that already have a working knowledge of PHP and MySQL, and who develop PHP-based websites that contain sensitive or financial information.

You will start by learning about the most common forms of attack and what the consequences can be when your website is not protected. You will then move into learning about the filtering and validation functions in PHP, and why you should use them. Doug will teach you how you can protect your website against common website vulnerabilities and how to protect file uploads. Finally, this video tutorial will teach you how...

Informação importante

Requisitos: System Requirements - Digital Download Digital Download: Microsoft Windows XP or higher, Mac OS X 10.4 or higher. Minimum screen resolution of 1024x768 Digital Download specific requirements: Between 1GB and 6GB of available hard drive space (depending on the training course) An Internet connection with sufficient bandwidth. You must have at least a 56K modem connection (Broadband recommended). Most modern ADSL and Cable internet solutions will be sufficient. Do I need...

Instalações

Instalações e datas

Início Localização
à escolha
Online

O que se aprende nesse curso?

Security
PHP
MySQL
Database
SQL
Database training
IT Security
Skills and Training

Programa

  • 01. Getting Started
    • 0101 What Does The Course Cover?
    • 0102 How To Set Up For The Course
  • 02. Nature And Scope Of The Problem
    • 0201 What Is The Threat? - Part 1
    • 0202 What Is The Threat? - Part 2
    • 0203 What Are The Consequences When A Website Is Not Protected Against Attacks?
    • 0204 Most Common Forms Of Attack - Part 1
    • 0205 Most Common Forms Of Attack - Part 2
    • 0206 Most Common Vulnerabilities Attackers Can Exploit
    • 0207 Helpful Resources
    • 0208 Lab: Hacking Into Sweets Complete - Instructions
    • 0209 Lab: Hacking Into Sweets Complete - Solution
  • 03. Understanding Filtering, Validation, And Output Escaping
    • 0301 What Is Filtering, Validation, Output Escaping, And Why Do It?
    • 0302 PHP Filtering Functions And Techniques
    • 0303 PHP Validation Functions And Techniques
    • 0304 PHP Output Escaping Functions
    • 0305 Using filter_var() To Filter And Validate
    • 0306 Lab: Filtering And Validating Posted Form Data - Instructions
    • 0307 Lab: Filtering And Validating Posted Form Data - Solutions
  • 04. Preventing The Most Common Forms Of Attack
    • 0401 Cross-Site Scripting Attacks - Part 1
    • 0402 Cross-Site Scripting Attacks - Part 2
    • 0403 Cross-Site Scripting Attacks - Part 3
    • 0404 Session Hijacking And Forgery Attacks - Part 1
    • 0405 Session Hijacking And Forgery Attacks - Part 2
    • 0406 Remote Code Injection Attacks - Part 1
    • 0407 Remote Code Injection Attacks - Part 2
    • 0408 Lab: Improving Security On An Existing Website - Instructions
    • 0409 Lab: Improving Security On An Existing Website - Solutions
  • 05. Protecting Against Common Website Vulnerabilities
    • 0501 Unplanned Information Disclosure - Part 1
    • 0502 Unplanned Information Disclosure - Part 2
    • 0503 Predictable Resource Location
    • 0504 Insufficient Authorization
    • 0505 Improper Access Controls
    • 0506 Avoiding Misconfiguration
    • 0507 Protecting File Uploads
    • 0508 Lab: Improving Security On An Existing Website - Instructions
    • 0509 Lab: Improving Security On An Existing Website - Solutions
  • 06. Protecting Against SQL Injection Attacks
    • 0601 How Can You Protect A MySQL Database?
    • 0602 MySQL Database Escaping And Quoting
    • 0603 Using Prepared Statements
    • 0604 Lab: Protecting A MySQL Database Against SQL Injection - Instructions
    • 0605 Lab: Protecting A MySQL Database Against SQL Injection - Solutions
  • 07. About The Author
    • 0701 Wrap Up
    • 0702 About The Author

Informação adicional

Digital Download FAQs

Q: What is a digital download?

A digital download is training that you download from the internet using your web browser instead of us shipping you a physical CD.

Q: How instant is the "Instant Purchase"?

If you complete your purchase, you are emailed your access key within minutes of the transaction completing.

Q: How do I access my digital download...