Building Security into your PHP Applications Online Training Course
Designed to equip PHP developers with the knowledge they need to build more secure web applications. Learn how to incorporate best practice security measures into your PHP applications and how to prevent the most common types of security attacks.
“Excellent job! So much content covered in such a short space of time!” - Nina Errey
********************************************************************
Consider purchasing one of our Training Bundles and save more!
********************************************************************
AUDIENCE
This course is designed for experienced PHP application developers who want to learn or be reminded of security best practices. It is also appropriate for new PHP developers who want to learn how to build security into the applications they are learning to create.
PREREQUISITES
Basic knowledge of PHP 5.
Note: After you have purchased your Zend online training course, you will receive an email detailing the registration process. If you have any questions please contact us at itraining@zend.com
Product Benefits
OBJECTIVE
After completing the course participants will be prepared to:
- Incorporate standard, best practice security measures into their PHP applications.
- Identify the most common types of vector attacks and how best to monitor and guard against them.
CLASS DATE AND TIME
Check our upcoming online training schedule
CLASS OUTLINE
1. Basic Security Concepts A. What is Security B. Defense in Depth C. Basic Security Rules D. Building Secure Web Applications Guidelines | 3. Other Common Security Measures A. Secure Configurations B. Password Security C. Sandboxes and Traps D. Tarpits E. Obscurity F. Ajax Implications G. Filtering Charsets | |
2. What Happens When Things Go Wrong A. SQL InjectionAttacks B. XSS / XST Injection Attacks C. Command Injection Attacks D. Remote Code Injection Attacks E. XSRF / CSRF Attacks F. Session Attacks G. Secure File Uploads | 4. Security Resources, Tools, Infrastructure A. Security Resources and Tools B. Infrastructure and Server Security C. Database and MySQL Security D. Course Review and Project | |
Registration Information and Technical Requirements
Note: After you have purchased your Zend online training course, you will receive an email detailing the registration process.
If you have any questions please contact us at itraining@zend.com