Secure coding in PHP Training Course
This course equips PHP developers with the essential skills needed to build applications resilient against modern internet-based threats. Through PHP-centric examples that extend beyond the OWASP Top Ten, the curriculum covers a wide array of injection attacks, script injections, vulnerabilities in PHP session handling, insecure direct object references, file upload issues, and more. PHP-specific vulnerabilities are categorized into standard types such as missing or improper input validation, flawed error and exception handling, misuse of security features, and time- and state-related problems. Regarding the latter, we examine attacks such as open_basedir circumvention, denial-of-service via magic floats, and hash table collision attacks. In each scenario, participants will learn the critical techniques and functions required to mitigate these risks.
A significant emphasis is placed on client-side security, addressing issues related to JavaScript, Ajax, and HTML5. The course introduces several PHP security extensions, including hash, mcrypt, and OpenSSL for cryptography, as well as Ctype, ext/filter, and HTML Purifier for input validation. Best practices for hardening PHP configuration (php.ini settings), Apache, and the broader server environment are also detailed. Finally, an overview of various security testing tools and techniques available to developers and testers is provided, including security scanners, penetration testing tools, exploit kits, sniffers, proxy servers, fuzzing tools, and static source code analyzers.
Both the introduction of vulnerabilities and configuration best practices are reinforced with hands-on exercises. These demonstrations illustrate the impact of successful attacks, show how to apply mitigation strategies, and introduce the use of various extensions and tools.
Participants completing this course will be able to:
- Grasp the fundamental concepts of security, IT security, and secure coding.
- Identify web vulnerabilities beyond the OWASP Top Ten and understand how to prevent them.
- Recognize client-side vulnerabilities and apply secure coding practices.
- Develop a practical understanding of cryptography.
- Utilize various built-in security features of PHP.
- Identify typical coding errors and learn how to avoid them.
- Stay informed about recent vulnerabilities affecting the PHP framework.
- Gain practical experience in using security testing tools.
- Access resources and further reading on secure coding practices.
Audience
Developers
This course is available as onsite live training in Norway or online live training.Course Outline
- IT security and secure coding
- Web application security
- Web application vulnerabilities
- Client-side security
- Client-side security
- Practical cryptography
- PHP security services
- PHP Environment
- Principles of security and secure coding
- Common coding errors and vulnerabilities
- Security testing techniques and tools
- Knowledge sources
Open Training Courses require 5+ participants.
Secure coding in PHP Training Course - Booking
Secure coding in PHP Training Course - Enquiry
Secure coding in PHP - Consultancy Enquiry
Testimonials (3)
I genuinely enjoyed the real life examples.
Marios Prokopiou
Course - Secure coding in PHP
All topics were well covered and presented with a lot of examples. Ahmed was very efficient and managed to keep us focused and attracted at all times.
Kostas Bastas
Course - Secure coding in PHP
The subject of the course was very interesting and gave us many ideas.
Anastasios Manios
Course - Secure coding in PHP
Upcoming Courses
Related Courses
AdaBoost Python for Machine Learning
14 HoursThis instructor-led, live training in Norway (available online or on-site) is designed for data scientists and software engineers who wish to employ AdaBoost to create boosting algorithms for machine learning using Python.
By the conclusion of this training, participants will be able to:
- Establish the necessary development environment to initiate the creation of machine learning models with AdaBoost.
- Comprehend the ensemble learning approach and how to execute adaptive boosting.
- Learn the process of constructing AdaBoost models to enhance machine learning algorithms in Python.
- Utilize hyperparameter tuning to improve the accuracy and performance of AdaBoost models.
Android Security
14 HoursAndroid is an open platform designed for mobile devices, including smartphones and tablets. It offers a wide array of security features to facilitate the development of secure software; however, it also lacks certain security aspects found in other handheld platforms. This course provides a comprehensive overview of these features, highlighting critical shortcomings related to the underlying Linux architecture, file systems, and the general environment, as well as the use of permissions and other Android software development components.
Common security pitfalls and vulnerabilities affecting both native code and Java applications are described, along with recommendations and best practices to avoid and mitigate them. In many instances, the issues discussed are supported by real-life examples and case studies. Finally, we provide a brief overview of how to use security testing tools to uncover security-related programming bugs.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Learn about Android security solutions
- Learn to utilize various security features of the Android platform
- Gain information about recent vulnerabilities in Java on Android
- Learn about common coding mistakes and how to avoid them
- Gain understanding of native code vulnerabilities on Android
- Recognize the severe consequences of insecure buffer handling in native code
- Understand architectural protection techniques and their weaknesses
- Obtain resources and further reading on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursImplementing a secure networked application can be challenging, even for developers who have previously utilized various cryptographic building blocks (such as encryption and digital signatures). To help participants grasp the role and application of these cryptographic primitives, a solid foundation is first laid regarding the core requirements of secure communication: secure acknowledgment, integrity, confidentiality, remote identification, and anonymity. This includes presenting typical problems that can undermine these requirements alongside real-world solutions.
Given that cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Rather than presenting an in-depth mathematical background, these elements are explored from a developer's perspective, illustrating typical use-case examples and practical considerations related to cryptography, such as public key infrastructures. Security protocols in various areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families, such as IPSEC and SSL/TLS.
Typical cryptographic vulnerabilities are discussed, both in relation to certain crypto algorithms and cryptographic protocols (e.g., BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and similar), as well as the RSA timing attack. In each case, the practical considerations and potential consequences of each problem are described, again, without delving into deep mathematical details.
Finally, as XML technology is central to data exchange for networked applications, the security aspects of XML are described. This includes the usage of XML within web services and SOAP messages, alongside protection measures such as XML signature and XML encryption. The discussion also covers weaknesses in these protection measures and XML-specific security issues, such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Gain information about some recent related vulnerabilities
- Understand security concepts of web services
- Obtain sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursThis three-day course introduces the fundamentals of securing C/C++ code against exploitation by malicious actors, focusing on vulnerabilities related to memory management and input handling. The curriculum emphasizes core principles for writing robust and secure software.
Advanced Java Security
21 HoursEven seasoned Java developers do not always fully master the diverse security services provided by Java, nor are they always aware of the various vulnerabilities pertinent to web applications built in Java.
This course introduces the security components of the Java Standard Edition while addressing security issues within Java Enterprise Edition (JEE) and web services. Discussions of specific services are grounded in the fundamentals of cryptography and secure communication. A variety of exercises focus on declarative and programmatic security techniques in JEE, and both transport-layer and end-to-end security for web services are examined. The practical application of these components is illustrated through several hands-on exercises, allowing participants to experiment with the discussed APIs and tools firsthand.
The course also covers and explains the most common and severe programming flaws associated with the Java language and platform, as well as web-related vulnerabilities. In addition to typical errors made by Java programmers, the introduced security vulnerabilities encompass language-specific issues and problems arising from the runtime environment. All vulnerabilities and associated attacks are demonstrated through accessible exercises, followed by recommended coding guidelines and potential mitigation techniques.
Participants attending this course will
- Understand the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and discover how to prevent them
- Grasp the security concepts underlying web services
- Learn to utilize various security features of the Java development environment
- Gain a practical understanding of cryptography
- Understand the security solutions offered by Java EE
- Learn about common coding mistakes and how to avoid them
- Receive information on recent vulnerabilities in the Java framework
- Acquire practical knowledge in using security testing tools
- Obtain resources and further reading materials on secure coding practices
Audience
Developers
Standard Java Security
14 HoursDescription
The Java language and its Runtime Environment (JRE) were engineered to eliminate many of the severe security vulnerabilities commonly found in other languages, such as C and C++. However, software developers and architects must do more than just know how to leverage the positive security features available in the Java environment; they must also recognize the numerous vulnerabilities that remain relevant to Java development (negative security).
Before introducing security services, the course provides a concise overview of cryptography fundamentals, establishing a common baseline for understanding the purpose and operation of the components involved. Participants will apply this knowledge through practical exercises, allowing them to explore the discussed APIs firsthand.
Additionally, the course examines the most frequent and critical programming flaws within the Java language and platform, addressing both typical errors made by Java developers and issues specific to the language and its environment. Each vulnerability and associated attack is illustrated through clear, understandable exercises, followed by recommended coding guidelines and effective mitigation strategies.
Participants attending this course will
- Grasp the core concepts of security, IT security, and secure coding
- Identify web vulnerabilities beyond the OWASP Top Ten and learn how to prevent them
- Utilize various security features within the Java development environment
- Gain a practical understanding of cryptography
- Recognize typical coding mistakes and learn how to avoid them
- Learn about recent vulnerabilities affecting the Java framework
- Access sources and further reading materials on secure coding practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursToday, a variety of programming languages can compile code for the .NET and ASP.NET frameworks. While this environment offers powerful tools for security development, developers must understand how to apply architectural and coding-level techniques to implement desired security functions, prevent vulnerabilities, or limit their exploitation.
This course aims to equip developers with practical skills through numerous hands-on exercises. Participants will learn how to prevent untrusted code from executing privileged actions, protect resources via robust authentication and authorization, manage remote procedure calls and sessions, and explore various implementation strategies for specific functionalities, among other topics.
The introduction to vulnerabilities begins by examining typical programming errors made when using .NET. The discussion on ASP.NET vulnerabilities covers various environment settings and their impacts. Furthermore, the course addresses ASP.NET-specific security challenges, including general web application issues and specialized attack vectors such as ViewState attacks and string termination attacks.
Participants in this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Identify web vulnerabilities beyond the OWASP Top Ten and learn how to mitigate them
- Master the use of various security features within the .NET development environment
- Acquire practical knowledge for utilizing security testing tools
- Understand common coding mistakes and strategies to avoid them
- Gain insight into recent vulnerabilities affecting .NET and ASP.NET
- Access resources and further reading materials on secure coding practices
Audience
Developers
The Secure Coding Landscape
14 HoursThis course introduces key security concepts, providing an overview of vulnerabilities across different programming languages and platforms, and explains how to manage risks associated with software security throughout the software development lifecycle. While not delving too deeply into technical details, it highlights some of the most significant and prevalent vulnerabilities in various software development technologies. The course also addresses the challenges of security testing, presenting techniques and tools that can help identify issues in your code.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Comprehend web vulnerabilities on both server and client sides
- Recognize the serious consequences of improper buffer handling
- Become informed about recent vulnerabilities in development environments and frameworks
- Learn about common coding mistakes and how to avoid them
- Understand security testing approaches and methodologies
Audience
Managers
Microsoft SDL Core
14 HoursThe Combined SDL Core training offers an in-depth look at secure software design, development, and testing through the Microsoft Secure Development Lifecycle (SDL). It provides a Level 100 overview of the fundamental building blocks of SDL, followed by design techniques to help detect and fix flaws in the early stages of the development process.
Focusing on the development phase, the course provides an overview of typical security-relevant programming bugs in both managed and native code. Attack methods are presented for the discussed vulnerabilities, along with associated mitigation techniques. These concepts are explored through a series of hands-on exercises that offer practical, real-world hacking scenarios for participants. An introduction to various security testing methods is followed by demonstrations of the effectiveness of different testing tools. Participants gain a deeper understanding of how these tools operate by applying them to previously discussed vulnerable code through practical exercises.
Participants attending this course will
Understand basic concepts of security, IT security, and secure coding
Become familiar with the essential steps of the Microsoft Secure Development Lifecycle
Learn secure design and development practices
Learn about secure implementation principles
Understand security testing methodology
- Obtain sources and further reading materials on secure coding practices
Audience
Developers, Managers
Security Testing
14 HoursOnce participants have gained familiarity with various vulnerabilities and attack vectors, they will explore the general approach and methodology for security testing, along with the techniques used to uncover specific weaknesses. Security testing begins with information gathering about the system (the Target of Evaluation), followed by comprehensive threat modeling to identify and prioritize all potential threats, ultimately leading to a risk analysis-driven test plan.
Security assessments can occur at multiple stages of the Software Development Life Cycle (SDLC). This course covers design and code reviews, reconnaissance, system information gathering, implementation testing, and environment hardening for secure deployment. Detailed discussions include techniques such as taint analysis, heuristic-based code review, static code analysis, dynamic web vulnerability testing, and fuzzing. Participants will be introduced to various tools that automate the security evaluation of software products. These concepts are reinforced through hands-on exercises where learners execute these tools to analyze previously discussed vulnerable code. Additionally, real-life case studies are provided to deepen the understanding of different vulnerabilities.
This course equips testers and QA personnel with the ability to effectively plan and execute security tests, select and utilize the most suitable tools and techniques to identify even concealed security flaws, and acquire essential practical skills applicable to their daily work.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Gain knowledge of web vulnerabilities beyond the OWASP Top Ten and learn how to prevent them
- Understand client-side vulnerabilities and secure coding practices
- Comprehend security testing approaches and methodologies
- Acquire practical skills in using security testing techniques and tools
- Access resources and further reading materials on secure coding practices
Audience
Developers, Testers
Secure Web Application Development and Testing
21 HoursProtecting web-accessible applications demands security professionals who are thoroughly prepared and constantly informed about current attack methods and trends. A wide array of technologies and environments facilitates the comfortable development of web applications. It is crucial to be aware not only of the security issues specific to these platforms but also of general vulnerabilities that apply regardless of the development tools used.
This course provides an overview of applicable security solutions in web applications, with a special emphasis on understanding the most important cryptographic solutions. Various web application vulnerabilities are presented on both the server side (following the OWASP Top Ten) and the client side, demonstrated through relevant attacks, followed by recommended coding techniques and mitigation methods to avoid associated problems. The topic of secure coding is concluded by discussing typical security-relevant programming mistakes in input validation, improper use of security features, and code quality.
Testing plays a vital role in ensuring the security and robustness of web applications. Various approaches – from high-level auditing through penetration testing to ethical hacking – can be applied to find vulnerabilities of different types. However, if you want to go beyond the easy-to-find low-hanging fruits, security testing should be well-planned and properly executed. Remember: security testers should ideally find all bugs to protect a system, while for adversaries, it is enough to find one exploitable vulnerability to penetrate into it.
Practical exercises will help in understanding web application vulnerabilities, programming mistakes, and most importantly, the mitigation techniques. Together with hands-on trials of various testing tools from security scanners, through sniffers, proxy servers, fuzzing tools, to static source code analyzers, this course gives the essential practical skills that can be applied the next day at the workplace.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and know how to avoid them
- Learn about client-side vulnerabilities and secure coding practices
- Have a practical understanding of cryptography
- Understand security testing approaches and methodologies
- Get practical knowledge in using security testing techniques and tools
- Be informed about recent vulnerabilities in various platforms, frameworks, and libraries
- Get sources and further readings on secure coding practices
Audience
Developers, Testers
Laravel PHP Framework
14 HoursThis instructor-led, live training in Norway introduces the fundamentals of Laravel and guides participants through the creation of a Laravel-based web application.
Laravel Livewire
7 HoursThis instructor-led live training in Norway (online or onsite) targets developers who wish to learn and use Livewire to build modern and dynamic application interfaces.
By the end of this training, participants will be able to:
- Build and test Livewire components.
- Build applications using the Livewire library.
- Create dynamic components within PHP.
Laravel and Vue.js
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at web developers who wish to use Laravel and Vue JS for fullstack web development.
By the end of this training, participants will be able to:
- Develop web applications with Laravel and Vue JS.
- Integrate the Laravel backend API into Vue JS.
- Deploy a Laravel application.
Laravel: Middleware Development
14 HoursThis instructor-led live training (available online or onsite) is targeted at web developers who wish to build middleware and web services in Laravel.
By the end of this training, participants will be able to:
- Use Laravel's PHP Artisan to generate code and components.
- Build RESTful APIs in Laravel that can browse, read, edit, add, and delete.
- Filter and sort results based on URL parameters using RESTful APIs.