Home Search Profile

Ultimate PHP 8 Security: Master Web App Defense

Focused View

5:19:09

  • 1. Course Overview.mp4
    01:54
  • 1. Version Check.mp4
    00:15
  • 2. Introduction.mp4
    02:10
  • 3. Is PHP Insecure.mp4
    05:24
  • 4. Security Principles.mp4
    07:16
  • 5. OWASP.mp4
    03:17
  • 6. Summary.mp4
    01:27
  • 01. Introduction.mp4
    01:10
  • 02. Online Shop.mp4
    04:22
  • 03. What Is Input.mp4
    09:21
  • 04. Hacking the Shop.mp4
    04:59
  • 05. Validating Mandatory Input.mp4
    05:02
  • 06. More Validation With PHP.mp4
    04:42
  • 07. The ctype Extension.mp4
    02:09
  • 08. The filter Extension.mp4
    05:32
  • 09. PHP 7+ Typing.mp4
    01:56
  • 10. Summary.mp4
    00:56
  • 01. Introduction.mp4
    00:48
  • 02. Cracking the Shop.mp4
    05:09
  • 03. Anatomy of XSS.mp4
    03:53
  • 04. Same-origin Policy.mp4
    03:28
  • 05. Consequences of XSS.mp4
    04:43
  • 06. Types of XSS.mp4
    05:44
  • 07. Filtering Input.mp4
    03:03
  • 08. Escaping Output.mp4
    08:42
  • 09. Preventing XSS in JSON.mp4
    04:25
  • 10. Cross-site Script Inclusion (XSSI).mp4
    03:22
  • 11. Browser XSS Protection.mp4
    04:01
  • 12. Understanding Content Security Policy (CSP).mp4
    02:43
  • 13. Using Content Security Policy.mp4
    06:54
  • 14. Allowing Inline Code in CSP.mp4
    05:22
  • 15. Testing a Content Security Policy.mp4
    02:45
  • 16. Summary.mp4
    01:32
  • 01. Introduction.mp4
    01:15
  • 02. Cracking the Shop.mp4
    02:04
  • 03. Famous SQL Injection Incidents.mp4
    03:29
  • 04. How SQL Injection Works.mp4
    03:39
  • 05. Vulnerable Code Patterns.mp4
    03:40
  • 06. Finding SQL Injection.mp4
    06:21
  • 07. Preventing SQL Injection.mp4
    06:25
  • 08. PHP Database Escaping Functions.mp4
    04:38
  • 09. Prepared Statements with PDO.mp4
    03:34
  • 10. Prepared Statements with MySQL.mp4
    03:14
  • 11. Prepared Statements with PostgreSQL.mp4
    02:09
  • 12. Prepared Statements with SQLite.mp4
    01:44
  • 13. Prepared Statements with Oracle.mp4
    02:05
  • 14. Prepared Statements with Microsoft SQL Server.mp4
    02:42
  • 15. Summary.mp4
    00:56
  • 1. Introduction.mp4
    01:45
  • 2. Cracking the Shop.mp4
    02:35
  • 3. Cookies Explained.mp4
    06:43
  • 4. Securing Cookies.mp4
    06:56
  • 5. Sessions with PHP.mp4
    05:29
  • 6. Session Attacks and Countermeasures.mp4
    06:36
  • 7. Securing PHP Sessions.mp4
    03:33
  • 8. HTTP Strict Transport Security (HSTS).mp4
    05:02
  • 9. Summary.mp4
    01:20
  • 1. Introduction.mp4
    00:58
  • 2. Cracking the Shop.mp4
    04:23
  • 3. Cross-site Request Forgery Explained.mp4
    05:10
  • 4. CSRF Countermeasures.mp4
    07:13
  • 5. Token Creation with PHP.mp4
    09:39
  • 6. Clickjacking.mp4
    03:02
  • 7. Preventing Framing.mp4
    06:38
  • 8. Summary.mp4
    01:12
  • 1. Introduction.mp4
    01:15
  • 2. Hashing or Encryption.mp4
    03:29
  • 3. Hashing Algorithms.mp4
    03:29
  • 4. Cracking MD5.mp4
    05:06
  • 5. PHP Hashing Algorithms.mp4
    02:28
  • 6. PHP Password Hashing API.mp4
    05:10
  • 7. More Hashing.mp4
    02:39
  • 8. Summary.mp4
    01:12
  • 1. Introduction.mp4
    00:59
  • 2. Hacking the Shop.mp4
    03:40
  • 3. PHP Error Levels.mp4
    07:09
  • 4. PHP Error Configuration Settings.mp4
    05:27
  • 5. Custom Error Handling.mp4
    07:50
  • 6. Disabling Revealing Information.mp4
    03:35
  • 7. Summary.mp4
    01:07
  • 1. Introduction.mp4
    01:02
  • 2. OWASP Top Ten 1-5.mp4
    03:46
  • 3. OWASP Top Ten 6-10.mp4
    03:44
  • 4. Summary.mp4
    01:27
  • More details


    Course Overview

    Learn to build secure PHP web applications by mastering defense techniques against XSS, CSRF, SQL injection, and other critical vulnerabilities. This comprehensive course covers PHP 8 security features, OWASP standards, and real-world protection strategies.

    What You'll Learn

    • Defend against Cross-site Scripting (XSS) using Content Security Policy
    • Implement robust protection against SQL injection across multiple databases
    • Secure sessions, cookies, and passwords with PHP's built-in security features

    Who This Is For

    • PHP developers transitioning to PHP 8
    • Web application security specialists
    • Backend engineers maintaining legacy PHP systems

    Key Benefits

    • Hands-on techniques for securing real-world applications
    • Covers OWASP Top 10 vulnerabilities and countermeasures
    • Includes PHP 8-specific security enhancements

    Curriculum Highlights

    1. Input Validation & Security Principles
    2. XSS Defense & Content Security Policy
    3. SQL Injection Prevention with PDO
    Focused display
    Category

    PHP

    • language english
    • Training sessions 84
    • duration 5:19:09
    • level average
    • English subtitles has
    • Release Date 2025/06/02