Writing Secure Code in PHP Learning Path

Learn secure programming techniques implemented in PHP.

9 hours, 59 minutes

Quick facts

About this learning path

  • courses

    100% online

  • Duration

    9 hours, 59 minutes

  • Assessment


About Writing Secure Code in PHP

This learning path will walk you through all of the most important concepts and cornerstones of modern secure PHP programming. This includes consideration of environment, avoiding old insecure practices and being proactively paranoid with your code. By the end of the path, you will be prepared to put these concepts into practice and able to successfully create secure code in PHP.



Secure Coding - PHP

Lab - 00:30:00

This lab covers multiple secure coding errors commonly found in PHP, including includes, evals, and both local and remote file inclusion attacks.
Writing Secure Code in PHP Skill Assessment

Assessment - 43 questions

Operating Environment

Course - 00:36:00

This course takes a close look at the operating environment that your code runs in. This includes the version of PHP being used, third-party libraries and browser security such as HTTPS.
Cryptography Weaknesses

Course - 01:24:00

This course provides a look at weaknesses in common cryptographic logic, including the better options that we have available to us. Also includes an overview of correctly handling our secret information.
Code-Data Separation

Course - 01:02:00

This course covers the separation of our code and data to prevent some of the most common types of attacks. These include SQL injection, XSS, CSRF, data leaks and source disclosure.
Application Logic

Course - 01:13:00

In this course, you'll explore common types of application logic that are often sources of security vulnerabilities. These affect every part of your application and include things such as sessions, cookies, file uploads and error handling.

Course - 00:25:00

APIs are an important part of modern web applications and require careful planning to ensure security. This course looks at how we secure APIs during authentication as well as responses.
Development Process

Course - 01:11:00

This course takes a look at our entire development process to ensure security at every point. This includes the tools we use and the places our code lives, as well as how we develop our code.

Course - 01:06:00

A look at the infrastructure beneath our code, including how to set it up and secure it. This includes traditional architectures as well as modern architectures.

Meet the author

David Myers

David Myers is a senior full-stack software engineer specializing in the development of complex web applications, with over 18 years of experience developing for the web. He primarily works within the LAMP stack of technologies but often utilizes whatever technology is needed. This includes Nginx, Python and Redis when discussing back-end technologies and ES6, Typescript, jQuery and Angular for front-end technologies. He has a broad range of experience working with clients and companies across many different industries.

The details

Learning path insights

How to claim CPEs

Should you complete this learning path, you’ll be able to download a certificate of completion. Use this to claim your CPEs or CPUs.

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All-Source Analyst
  • Mission Assessment Specialist
  • Target Developer

No software. No set up. Unlimited access.

Skip the server racks and spin up a realistic environment with one click. Infosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every Infosec Skills subscription so your team can skill up however they learn best.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo