PHP Security

Course Details : PHP Security



In this PHP Security training in Mumbai, our expert trainer teaches you about the primary security considerations that can affect a PHP website, and how you can take preventative measures. This course run at Mumbai is designed for users that already have a working knowledge of PHP and MySQL, and who develop PHP-based websites that contain sensitive or financial information.

You will start by learning about the most common forms of PHP attack and PHP threats and what the consequences can be when your website is not protected. You will then move into learning about the filtering and validation functions in PHP, and why you should use them. Trainer in Mumbai will teach you how you can protect your website against common website vulnerabilities and how to protect file uploads. Finally, this tutorial will teach you how to protect against SQL injection attacks, and covers topics such as database escaping, using prepared statements, and protecting a MySQL database.

By the completion of this PHP Security training course at Mumbai, you will have the knowledge required to ensure your website is secure against attacks and free of vulnerabilities. Working files are included, allowing you to follow along with the trainer throughout the lessons.

Outline Syllabus


  1. What Does The Course Cover?
  2. How To Set Up For The Course
  3. What Is The Threat? - Part 1
  4. What Is The Threat? - Part 2
  5. What Are The Consequences When A Website Is Not Protected Against Attacks?
  6. Most Common Forms Of Attack - Part 1
  7. Most Common Forms Of Attack - Part 2
  8. Most Common Vulnerabilities Attackers Can Exploit
  9. Helpful Resources
  10. Lab: Hacking Into Sweets Complete - Instructions
  11. Lab: Hacking Into Sweets Complete - Solution
  12. What Is Filtering, Validation, Output Escaping, And Why Do It?
  13. PHP Filtering Functions And Techniques
  14. PHP Validation Functions And Techniques
  15. PHP Output Escaping Functions
  16. Using filter_var() To Filter And Validate
  17. Lab: Filtering And Validating Posted Form Data - Instructions
  18. Lab: Filtering And Validating Posted Form Data - Solutions
  19. Cross-Site Scripting Attacks - Part 1
  20. Cross-Site Scripting Attacks - Part 2
  21. Cross-Site Scripting Attacks - Part 3
  22. Session Hijacking And Forgery Attacks - Part 1
  23. Session Hijacking And Forgery Attacks - Part 2
  24. Remote Code Injection Attacks - Part 1
  25. Remote Code Injection Attacks - Part 2
  26. Lab: Improving Security On An Existing Website - Instructions
  27. Lab: Improving Security On An Existing Website - Solutions
  28. Unplanned Information Disclosure - Part 1
  29. Unplanned Information Disclosure - Part 2
  30. Predictable Resource Location
  31. Insufficient Authorization
  32. Improper Access Controls
  33. Avoiding Misconfiguration
  34. Protecting File Uploads
  35. Lab: Improving Security On An Existing Website - Instructions
  36. Lab: Improving Security On An Existing Website - Solutions
  37. How Can You Protect A MySQL Database?
  38. MySQL Database Escaping And Quoting
  39. Using Prepared Statements
  40. Lab: Protecting A MySQL Database Against SQL Injection - Instructions
  41. Lab: Protecting A MySQL Database Against SQL Injection - Solutions