Ultimate PHP 8 Security: Master Web App Defense
Focused View
5:19:09
1. Course Overview.mp4
01:54
1. Version Check.mp4
00:15
2. Introduction.mp4
02:10
3. Is PHP Insecure.mp4
05:24
4. Security Principles.mp4
07:16
5. OWASP.mp4
03:17
6. Summary.mp4
01:27
01. Introduction.mp4
01:10
02. Online Shop.mp4
04:22
03. What Is Input.mp4
09:21
04. Hacking the Shop.mp4
04:59
05. Validating Mandatory Input.mp4
05:02
06. More Validation With PHP.mp4
04:42
07. The ctype Extension.mp4
02:09
08. The filter Extension.mp4
05:32
09. PHP 7+ Typing.mp4
01:56
10. Summary.mp4
00:56
01. Introduction.mp4
00:48
02. Cracking the Shop.mp4
05:09
03. Anatomy of XSS.mp4
03:53
04. Same-origin Policy.mp4
03:28
05. Consequences of XSS.mp4
04:43
06. Types of XSS.mp4
05:44
07. Filtering Input.mp4
03:03
08. Escaping Output.mp4
08:42
09. Preventing XSS in JSON.mp4
04:25
10. Cross-site Script Inclusion (XSSI).mp4
03:22
11. Browser XSS Protection.mp4
04:01
12. Understanding Content Security Policy (CSP).mp4
02:43
13. Using Content Security Policy.mp4
06:54
14. Allowing Inline Code in CSP.mp4
05:22
15. Testing a Content Security Policy.mp4
02:45
16. Summary.mp4
01:32
01. Introduction.mp4
01:15
02. Cracking the Shop.mp4
02:04
03. Famous SQL Injection Incidents.mp4
03:29
04. How SQL Injection Works.mp4
03:39
05. Vulnerable Code Patterns.mp4
03:40
06. Finding SQL Injection.mp4
06:21
07. Preventing SQL Injection.mp4
06:25
08. PHP Database Escaping Functions.mp4
04:38
09. Prepared Statements with PDO.mp4
03:34
10. Prepared Statements with MySQL.mp4
03:14
11. Prepared Statements with PostgreSQL.mp4
02:09
12. Prepared Statements with SQLite.mp4
01:44
13. Prepared Statements with Oracle.mp4
02:05
14. Prepared Statements with Microsoft SQL Server.mp4
02:42
15. Summary.mp4
00:56
1. Introduction.mp4
01:45
2. Cracking the Shop.mp4
02:35
3. Cookies Explained.mp4
06:43
4. Securing Cookies.mp4
06:56
5. Sessions with PHP.mp4
05:29
6. Session Attacks and Countermeasures.mp4
06:36
7. Securing PHP Sessions.mp4
03:33
8. HTTP Strict Transport Security (HSTS).mp4
05:02
9. Summary.mp4
01:20
1. Introduction.mp4
00:58
2. Cracking the Shop.mp4
04:23
3. Cross-site Request Forgery Explained.mp4
05:10
4. CSRF Countermeasures.mp4
07:13
5. Token Creation with PHP.mp4
09:39
6. Clickjacking.mp4
03:02
7. Preventing Framing.mp4
06:38
8. Summary.mp4
01:12
1. Introduction.mp4
01:15
2. Hashing or Encryption.mp4
03:29
3. Hashing Algorithms.mp4
03:29
4. Cracking MD5.mp4
05:06
5. PHP Hashing Algorithms.mp4
02:28
6. PHP Password Hashing API.mp4
05:10
7. More Hashing.mp4
02:39
8. Summary.mp4
01:12
1. Introduction.mp4
00:59
2. Hacking the Shop.mp4
03:40
3. PHP Error Levels.mp4
07:09
4. PHP Error Configuration Settings.mp4
05:27
5. Custom Error Handling.mp4
07:50
6. Disabling Revealing Information.mp4
03:35
7. Summary.mp4
01:07
1. Introduction.mp4
01:02
2. OWASP Top Ten 1-5.mp4
03:46
3. OWASP Top Ten 6-10.mp4
03:44
4. Summary.mp4
01:27
More details
Course Overview
Learn to build secure PHP web applications by mastering defense techniques against XSS, CSRF, SQL injection, and other critical vulnerabilities. This comprehensive course covers PHP 8 security features, OWASP standards, and real-world protection strategies.
What You'll Learn
- Defend against Cross-site Scripting (XSS) using Content Security Policy
- Implement robust protection against SQL injection across multiple databases
- Secure sessions, cookies, and passwords with PHP's built-in security features
Who This Is For
- PHP developers transitioning to PHP 8
- Web application security specialists
- Backend engineers maintaining legacy PHP systems
Key Benefits
- Hands-on techniques for securing real-world applications
- Covers OWASP Top 10 vulnerabilities and countermeasures
- Includes PHP 8-specific security enhancements
Curriculum Highlights
- Input Validation & Security Principles
- XSS Defense & Content Security Policy
- SQL Injection Prevention with PDO
Focused display
Category
- language english
- Training sessions 84
- duration 5:19:09
- level average
- English subtitles has
- Release Date 2025/06/02