Certified Secure Coder- PHP (CSC- PHP)
Certified Secure Coder- PHP (CSC- PHP), available at $44.99, has an average rating of 3.85, with 66 lectures, 1 quizzes, based on 187 reviews, and has 1508 subscribers.
You will learn about Learn to Hack and Write Secure PHP code Learn the OWASP Top10 Methodology A1 – A10 Apply the above OWASP Top10 methodology on PHP programming This course is ideal for individuals who are Programmers who code in PHP or Design Engineers, Architects who design or architecture for PHP based programs or Security testers and Functional testers who test PHP based programs It is particularly useful for Programmers who code in PHP or Design Engineers, Architects who design or architecture for PHP based programs or Security testers and Functional testers who test PHP based programs.
Enroll now: Certified Secure Coder- PHP (CSC- PHP)
Summary
Title: Certified Secure Coder- PHP (CSC- PHP)
Price: $44.99
Average Rating: 3.85
Number of Lectures: 66
Number of Quizzes: 1
Number of Published Lectures: 66
Number of Published Quizzes: 1
Number of Curriculum Items: 67
Number of Published Curriculum Objects: 67
Original Price: $19.99
Quality Status: approved
Status: Live
What You Will Learn
- Learn to Hack and Write Secure PHP code
- Learn the OWASP Top10 Methodology A1 – A10
- Apply the above OWASP Top10 methodology on PHP programming
Who Should Attend
- Programmers who code in PHP
- Design Engineers, Architects who design or architecture for PHP based programs
- Security testers and Functional testers who test PHP based programs
Target Audiences
- Programmers who code in PHP
- Design Engineers, Architects who design or architecture for PHP based programs
- Security testers and Functional testers who test PHP based programs
This course teaches the programmers on how to exploit(hack) and defend against various attacks on PHP language. The course is designed around OWASP Top10 which is common standard which is used in design, architecture, testing of web applications.
The course contains video/audio lectures. It has Theory on PHP programming(Exploit, Defense) . It also has Demos of exploitation and Defense. It gives students practical insight into coding web application in PHP securely.
We recommend students to study the course over a period of 15 days and attempt the quiz at the end of the period. we also recommend students to study various resource material available on the internet in various forums including OWASP official website.
The course is structured according to OWASP Top 10 from A1 to A10. In each of the OWASP Top10 sessions we have categorized presentation, exploitation, defense.
Any programmer who is programming in PHP, should take this course. Secure PHP programmers are prefered by organisations across the globe.
Course Curriculum
Chapter 1: Injection(A1) – OWASP Top10
Lecture 1: Injection – OWASP Top10 (A1) – Presentation
Lecture 2: Blind SQL Injection Presentation
Lecture 3: SQLI
Lecture 4: Time based SQLI
Lecture 5: Union Exploitation Technique
Lecture 6: SQL Injection Union – Demo – Exploitation
Lecture 7: Preventing SQLI
Lecture 8: SQL Injection Login Bypass – Demo
Lecture 9: SQL Injection – Demo – Defense
Chapter 2: Injection(A1) – Command Injection
Lecture 1: Command Injection Presentation
Lecture 2: Command Injection – Demo
Lecture 3: Command Injection Prevention – Demo
Chapter 3: Injection(A1) – XML & XPath Injection
Lecture 1: XML & XPath Injection Presentation
Lecture 2: XPath Injection – Demo
Lecture 3: XPath Injection Prevention – Demo
Chapter 4: Injection(A1) – PHP Code Injection
Lecture 1: PHP Code Injection Presentation
Lecture 2: PHP Code Injection Demo
Lecture 3: PHP Code Injection Prevention
Chapter 5: Injection(A1) – PHP Object Injection
Lecture 1: PHP Object Injection Presentation
Lecture 2: PHP Object Injection Demo 1
Lecture 3: PHP Object Injection Demo 2
Lecture 4: PHP Object Injection Prevention
Chapter 6: Injection(A1) – SSI Injection
Lecture 1: SSI Injection Presentation
Lecture 2: SSI Injection Demo
Lecture 3: SSI Injection Prevention
Chapter 7: Injection(A1) – LDAP Injection
Lecture 1: LDAP Injection Presentation
Chapter 8: Injection(A1) – HTML Injection
Lecture 1: HTML Injection Presentation
Lecture 2: HTML Injection Demo
Chapter 9: Broken Authentication and Session Management(A2) – OWASP Top10
Lecture 1: Broken Authentication and Session Management – OWASP Top10(A2) – Presentation
Lecture 2: Broken Authentication and Session Management – Demo – Exploit
Lecture 3: Defense Demo
Chapter 10: Cross-Site Scripting (XSS) – A3 – OWASP Top10
Lecture 1: Cross Site Scripting(XSS) – Introduction
Lecture 2: Cross Site Scripting – Reflected
Lecture 3: Cross Site Scripting – Demo – Reflected – Get
Lecture 4: Cross Site Scripting(XSS) – Demo – Reflected – Post
Lecture 5: Cross Site Scripting(XSS) Stored – Presentation
Lecture 6: Cross Site Scripting(XSS) – Demo – Stored
Chapter 11: Cross Site Scripting – A3 – Defense
Lecture 1: Cross-Site Scripting (XSS) – OWASP Top10 – Presentation – Defence
Lecture 2: Cross-Site Scripting (XSS) – FIlters
Lecture 3: Cross Site Scripting(XSS) – HTTP Flag
Lecture 4: Cross Site Scripting – Demo – Modsecurity
Chapter 12: Insecure Direct Object References – A4 – OWASP Top10
Lecture 1: Insecure Direct Object Reference – OWASP Top10 – A4 – Presentation
Lecture 2: Insecure Direct Object Reference -DEMO- Exploitation
Lecture 3: Insecure Direct Object Reference – Demo – Defense
Chapter 13: Security Misconfiguration – A5 – OWASP Top10
Lecture 1: Security Misconfiguration – OWASP Top10 – A5 – Presentation
Lecture 2: Security Misconfiguration – Demo – Exploit
Lecture 3: Security Misconfiguration – Demo – Defense
Chapter 14: Sensitive Data Exposure – A6 – OWASP Top10
Lecture 1: Sensitive Data Exposure – OWASP Top10 – A6 – Presentation
Lecture 2: Sensitive Data Exposure – A6 – Demo – Exploit
Lecture 3: Sensitive Data Exposure – A6 – Demo – Defense
Chapter 15: Missing Function Level Access Control – A7 – OWASP Top10
Lecture 1: Missing Function Level Access Control – OWASP Top10 – A7 – Presentation
Lecture 2: Missing Function Level Access Control – Demo – Exploitation(1)
Lecture 3: Missing Function Level Access Control – Demo – Exploitation(2)
Lecture 4: Missing Function Level Access Control – Demo – Defence
Chapter 16: Cross-Site Request Forgery (CSRF) – A8 – OWASP Top10
Lecture 1: Cross-Site Request Forgery (CSRF) – OWASP Top10 – A8 – Presentation
Lecture 2: Cross-Site Request Forgery (CSRF) – OWASP Top10 – A8 – Defense Presentation
Lecture 3: CSRF – Demo – Get Exploit
Lecture 4: CSRF – Demo – Get Defence
Lecture 5: CSRF – Demo – Post Exploit
Lecture 6: CSRF – Demo – Post Defence
Chapter 17: Using Components with Known Vulnerabilities – A9 – OWASP Top10
Lecture 1: Using Components with Known Vulnerabilities – OWASP top10 – A9 – Presentation
Lecture 2: Using components with Known Vulnerabilities – A9 – Demo
Chapter 18: Unvalidated Redirects and Forwards – A10 – OWASPTop10
Lecture 1: Unvalidated Redirects and Forwards – OWASP Top10 – A10 – Presentation
Lecture 2: Unvalidated Redirects and Forwards – OWASP Top10 – A10 – Presentation Defense
Lecture 3: Unvalidated Redirects and Forwards – Demo – Exploit
Lecture 4: Unvalidated Redirects and Forwards – Demo – Defense
Chapter 19: Certification
Instructors
Rating Distribution
- 1 stars: 5 votes
- 2 stars: 17 votes
- 3 stars: 42 votes
- 4 stars: 64 votes
- 5 stars: 59 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Digital Marketing Foundation Course
- Google Shopping Ads Digital Marketing Course
- Multi Cloud Infrastructure for beginners
- Master Lead Generation: Grow Subscribers & Sales with Popups
- Complete Copywriting System : write to sell with ease
- Product Positioning Masterclass: Unlock Market Traction
- How to Promote Your Webinar and Get More Attendees?
- Digital Marketing Courses
- Create music with Artificial Intelligence in this new market
- Create CONVERTING UGC Content So Brands Will Pay You More
- Podcast: The top 8 ways to monetize by Podcasting
- TikTok Marketing Mastery: Learn to Grow & Go Viral
- Free Digital Marketing Basics Course in Hindi
- MailChimp Free Mailing Lists: MailChimp Email Marketing
- Automate Digital Marketing & Social Media with Generative AI
- Google Ads MasterClass – All Advanced Features
- Online Course Creator: Create & Sell Online Courses Today!
- Introduction to SEO – Basic Principles of SEO
- Affiliate Marketing For Beginners: Go From Novice To Pro
- Effective Website Planning Made Simple