Boot Camp

Secure Coding in PHP Training Boot Camp

Learn how to make PHP applications resistant to attacks from security issues around JavaScript, Ajax and HTML5. This boot camp is designed for PHP developers that require effective, real-world, secure programming skills they can implement immediately at the workplace.

Everything you need to earn your certification

  • 1-Year access to all boot camp video replays and materials
  • 100% Satisfaction Guarantee
  • Free annual Infosec Skills subscription ($299 value!)
  • Hands-on cyber ranges and labs
  • Knowledge Transfer Guarantee
Wistia video thumbnail

What you'll learn

Training overview

This comprehensive three-day Secure Coding for PHP Boot Camp discusses web vulnerabilities through PHP-based examples. You’ll learn concepts beyond the OWASP Top Ten, tackling various injection attacks, script injections, attacks against session handling of PHP, insecure direct object references, issues with file upload and many others.

Both the introduction of vulnerabilities and the configuration practices are supported by a number of hands-on exercises demonstrating the consequences of successful attacks, showing how to apply mitigation techniques and introducing the use of various extensions and tools.

Before your boot camp

Prerequisites

Basic to advanced knowledge of PHP, including experience developing PHP applications, as well as familiarity with Apache, MySQL and SQL.

    Syllabus

  • Day 1
    • IT security and secure coding

      • Nature of security
      • IT security related terms
      • Definition of risk
      • Different aspects of IT security
      • Requirements of different application areas
      • IT security vs. secure coding
      • From vulnerabilities to botnets and cybercrime
      • Classification of security flaws

      Web application vulnerabilities

      Basics of cryptography

      • Cryptosystems
      • Symmetric-key cryptography
      • Other cryptographic algorithms
      • Asymmetric (public-key) cryptography
      • Public Key Infrastructure (PKI)

      Client-side security

      • JavaScript security
      • AJAX security
      • HTML5 security
  • Day 2
    • PHP security services

      • Cryptography extensions in PHP
      • Input validation APIs

      PHP environment

      • ​Server configuration
      • Securing PHP configuration
      • Environment security
      • Hardening
      • Configuration management

      Advice and principles

      • Matt Bishop’s principles of robust programming
      • The security principles of Saltzer and Schroeder

      Input validation

      • Input validation concepts
      • Remote PHP code execution
      • MySQL validation errors – beyond SQL Injection
      • Variable scope errors in PHP
      • File uploads, spammers
      • Environment manipulation
  • Day 3
    • Improper use of security features

      • ​Problems related to the use of security features
      • Insecure randomness
      • Weak PRNGs in PHP
      • Stronger PRNGs we can use in PHP
      • Password management – stored passwords
      • Some usual password management problems
      • Storing credentials for external systems
      • Privacy violation
      • Improper error and exception handling
      • Classification of security flaws

      Time and state problems

      • Concurrency and threading
      • Concurrency in PHP
      • Preventing file race condition
      • Double submit problem
      • PHP session handling
      • A PHP design flaw – open_basedir race condition
      • Database race condition
      • Denial of service possibilities
      • Hashtable collision attack
      • Classification of security flaws

      Using security testing tools

      • Web vulnerability scanners
      • SQL injection tools
      • Public database
      • Google hacking
      • Proxy servers and sniffers
      • Exercise – Capturing network traffic
      • Static code analysis

Syllabus

Training schedule

Guaranteed results

Our boot camp guarantees

100% Satisfaction Guarantee

If you’re not 100% satisfied with your training at the end of the first day, you may withdraw and enroll in a different online or in-person course.

Knowledge Transfer Guarantee

If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year.

Unlock team training discounts

If you’re like many of our clients, employee certification is more than a goal — it’s a business requirement. Connect with our team to learn more about our training discounts.