Certified Secure Coder- PHP (CSC- PHP)

Master PHP security and hacking techniques through the OWASP Top 10. Learn to exploit and defend PHP applications with hands-on demos and lectures.

  • Overview
  • Curriculum
  • Instructor
  • Review

Brief Summary

This course is all about mastering PHP security! You’ll dive into ways to hack and defend against common vulnerabilities using the OWASP Top 10. Expect lectures, demos, and a whole lot of practical tips for coding safely in PHP.

Key Points

  • Learn how to hack and secure PHP applications.
  • Focus on OWASP Top 10 vulnerabilities (A1 to A10).
  • Includes theory on exploitation and defense techniques.
  • Contains video/audio lectures and practical demos.
  • Recommended study period of 15 days with a final quiz.

Learning Outcomes

  • Understand how to identify and exploit PHP vulnerabilities.
  • Apply OWASP Top 10 principles to secure PHP applications.
  • Gain practical skills through demos and real-world scenarios.
  • Improve your job prospects as a secure PHP programmer.
  • Create safer, more reliable web applications.

About This Course

This course teaches how to hack and secure PHP. Owasp top10(A1 to A10) for PHP.

This course teaches the programmers on how to exploit(hack) and defend against various attacks on PHP language. The course is designed around OWASP Top10 which is common standard which is used in design, architecture, testing of web applications.

The course contains video/audio lectures. It has Theory on PHP programming(Exploit, Defense) . It also has Demos of exploitation and Defense. It gives students practical insight into coding web application in PHP securely.

We recommend students to study the course over a period of 15 days and attempt the quiz at the end of the period. we also recommend students to study various resource material available on the internet in various forums including OWASP official website.

The course is structured according to OWASP Top 10 from A1 to A10. In each of the OWASP Top10 sessions we have categorized presentation, exploitation, defense.

Any programmer who is programming in PHP, should take this course. Secure PHP programmers are prefered by organisations across the globe.

  • Learn to Hack and Write Secure PHP code

  • Learn the OWASP Top10 Methodology A1 - A10

  • Apply the above OWASP Top10 methodology on PHP programming

Course Curriculum

1 Lectures

2 Lectures

0 Lectures

Instructor

Profile photo of Cyber Security & Privacy Foundation Pte Ltd
Cyber Security & Privacy Foundation Pte Ltd

Cyber Security and Privacy Foundation Pte Ltd. is a Consulting, Services & Training Company based in Singapore. We do Vulnerability Assessment, Penetration Testing, Web Application Security Testing, Mobile Application Security Testing and Cyber Security Training. We do zero day security assessment and APT analysis and technical security certifications for organisation. Cyber Security & Privacy Foundation, India is setup with objective...

Review
4.9 course rating
4K ratings
ui-avatar of Ricky Reeves
Ricky R.
3.5
9 months ago

Gives the basics in easy to understand examples.

  • Helpful
  • Not helpful
ui-avatar of Remy Ralfelt
Remy R.
3.0
1 year ago

It is ok, but there are several improvments. Noice in background, consistency with screens and the recording voice. Sometimes the sound is good, sometimes it is low voice. The injection A1 sections were pretty good except for the last one LDAP injection.

  • Helpful
  • Not helpful
ui-avatar of David Nagels
David N.
2.5
1 year ago

Content is ok, bit simple, audio quality is really bad

  • Helpful
  • Not helpful
ui-avatar of Philippe R Collin III
Philippe R. C. I.
2.5
3 years ago

The content seems like it is just a copy and paste of other documents I have read online. These attacks are basic and assume you know the PHP. It would be better to give more complex attacks where you don't know the PHP code so you can identify better ways to secure.

  • Helpful
  • Not helpful
ui-avatar of Chayse Hartsuff
Chayse H.
2.0
4 years ago

Outdated, even for its time. Was clearly someone reviewing a video taken earlier which ruined the flow. A lot of background noise

  • Helpful
  • Not helpful
ui-avatar of John Johnson
John J.
3.0
4 years ago

too much background noises in the audio

  • Helpful
  • Not helpful
ui-avatar of Carlos Gonzalez Hernandez
Carlos G. H.
5.0
4 years ago

Hasta el momento la informaciĂłn es valiosa.

  • Helpful
  • Not helpful
ui-avatar of Eki einstein Laksamana
Eki E. L.
5.0
4 years ago

thanks the course take me a step further to knowing what i m doing, and how to do it in proper and secure way :D

  • Helpful
  • Not helpful
ui-avatar of Maxim Sobol
Maxim S.
3.5
5 years ago

Annoying background noise, monotonic voice.

  • Helpful
  • Not helpful
ui-avatar of Dmitriy Valchuck
Dmitriy V.
2.5
5 years ago

It's too much useless, obvious information. It's also quite old.

  • Helpful
  • Not helpful
Leave A Reply

Your email address will not be published. Required fields are marked *

Ratings

Courses You May Like

Lorem ipsum dolor sit amet elit
Show More Courses