Main Menu
My Infosec
Main Menu
My Infosec

Secure Coding in PHP Training

Make your applications resistant to contemporary attacks through the Internet with emphasis on security issues of JavaScript, Ajax, and HTML5.

Award Winning Training

For 17 years InfoSec has been one of the most awarded and trusted information security training vendors - 42 industry awards!

Analysts Recommended

IDC lists InfoSec Institute as Major Player in their Security Training Vendor Assessment.

PHP Secure Coding Course Overview

​InfoSec Institute’s Secure Coding in PHP 3-day Intense Course provides essential skills for PHP developers necessary to make their applications resistant to contemporary attacks through the Internet with emphasis on security issues of JavaScript, Ajax, and HTML5.

Secure Coding in PHP Course Description

InfoSec Institute’s Secure Coding in PHP Course discusses Web vulnerabilities through PHP-based examples going beyond the OWASP top ten, tackling various injection attacks, script injections, attacks against session handling of PHP, insecure direct object references, issues with file upload, and many others. PHP-related vulnerabilities are introduced grouped into the standard vulnerability types of missing or improper input validation, incorrect error and exception handling, improper use of security features and time- and state-related problems. For this latter we discuss attacks like the open_basedir circumvention, denial-of-service through magic float or the hash table collision attack. In all cases participants will get familiar with the most important techniques and functions to be used to mitigate the enlisted risks. A special focus is given to client-side security tackling security issues of JavaScript, Ajax and HTML5. A number of security-related extensions to PHP are introduced like hash, mcrypt and OpenSSL for cryptography, or Ctype, ext/filter and HTML Purifier for input validation. Hardening best practices are given in connection with PHP configuration (setting php.ini), Apache and the server in general. Finally, an overview is given to various security testing tools and techniques which developers and testers can use, including security scanners, penetration testing and exploit packs, sniffers, proxy servers, fuzzing tools and static source code analyzers. Both the introduction of vulnerabilities and the configuration practices are supported by a number of hands-on exercises demonstrating the consequences of successful attacks, showing how to apply mitigation techniques and introducing the use of various extensions and tools

Secure Coding in PHP Course Objectives

InfoSec Institute’s Secure Coding in PHP Course offers you three (3) days of training with a real PHP Security expert. Our experts have extensive PHP development experience as well as years of experience performing security code reviews. Participants in our Secure Coding in PHP Course will:

  • Understand basic concepts of security, IT security and secure coding
  • Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
  • Learn to use various security features of PHP
  • Get information about some recent vulnerabilities of the PHP framework
  • Learn about typical coding mistakes and how to avoid them
  • Get practical knowledge in using security testing tools
  • Get sources and further reading on secure coding practices

.

Who Should Attend:

  • Web developers, architects, and testers

The courses below are excellent follow-on classes, once the Secure Coding in PHP has been completed:

  • Secure Coding in Java
  • Secure Coding in .NET
  • Secure Coding for Android Platform

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

Award-Winning Training

The Secure Coding in PHP Experience

During the Three (3) Day program, our instructors give you 110% of their time and dedication to ensure that your time is well spent. You will receive an all-inclusive immersion experience by receiving your hotel stay and most meals during your training experience; therefore you eat, sleep and train at the learning facility with no distractions! Session content is organized into the following Modules:

  • IT security and secure coding
    • Nature of security
    • IT security related terms
    • Definition of risk
    • Different aspects of IT security
    • Requirements of different application areas
    • IT security vs. secure coding
    • From vulnerabilities to botnets and cyber crime
    • Classification of security flaws o Classification of security flaws
  • Web Application Vulnerabilities
  • Basics of Cryptography
    • Cryptosystems
    • Symmetric-key cryptography
    • Other cryptographic algorithms
    • Asymmetric (public-key) cryptography
    • Public Key Infrastructure (PKI)
  • Client-side Security
    • Javascript security
    • AJAX security
    • HTML5 security
  • PHP Security Services
    • Cryptography extensions in PHP
    • Input validation APIs
  • PHP Environment
    • ​Server Configuration
    • Securing PHP configuration
    • Environment security
    • Hardening
    • Configuration management
  • Advice and Principles
    • Matt Bishop’s principles of robust programming
    • The security principles of Saltzer and Schroeder
  • Input validation
    • Input validation concepts
    • Remote PHP code execution
    • MySQL validation errors – beyond SQL Injection
    • Variable scope errors in PHP
    • File uploads, spammers
    • Environment manupulation
  • Improper use of security features
    • ​Problems related to the use of security features
    • Insecure randomness
    • Weak PRNGs in PHP
    • Stronger PRNGs we can use in PHP
    • Password management – stored passwords
    • Some usual password management problems
    • Storing credentials for external systems
    • Privacy violation
    • Improper error and exception handling
    • Classification of security flaws
  • Time and State problems
    • Concurrency and threading
    • Concurrency in PHP
    • Preventing file race condition
    • Double submit problem
    • PHP session handling
    • A PHP design flaw – open_basedir race condition
    • Database race condition
    • Denial of service possibilities
    • Hashtable collision attack
    • Classification of security flaws
  • Using Security Testing Tools
    • Web vulnerability scanners
    • SQL injection tools
    • Public database
    • Google hacking
    • Proxy servers and sniffers
    • Exercise – Capturing network traffic o Static code analysis

Book your course

    What Our Students Are Saying

    Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.
    JH

    John Hollan GE

    Advanced Ethical Hacking Training Boot Camp

    Career Tracks

    • IT Audit Track

      The IT Audit track goes through all aspects of IT Auditing. Our goals with this set of courses is to create the most complete Security Auditor an organization could wish for.
    Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing
    View instant course pricing