O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

PHP Security

Video Description

In this PHP Security training video, expert author Doug Bierer teaches you about the primary security considerations that can affect a PHP website, and how you can take preventative measures. This course is designed for users that already have a working knowledge of PHP and MySQL, and who develop PHP-based websites that contain sensitive or financial information. You will start by learning about the most common forms of attack and what the consequences can be when your website is not protected. You will then move into learning about the filtering and validation functions in PHP, and why you should use them. Doug will teach you how you can protect your website against common website vulnerabilities and how to protect file uploads. Finally, this video tutorial will teach you how to protect against SQL injection attacks, and covers topics such as database escaping, using prepared statements, and protecting a MySQL database. By the completion of this video based training course, you will have the knowledge required to ensure your website is secure against attacks and free of vulnerabilities. Working files are included, allowing you to follow along with the author throughout the lessons.

Table of Contents

  1. Getting Started
    1. What Does The Course Cover? 00:09:33
    2. How To Set Up For The Course 00:04:43
  2. Nature And Scope Of The Problem
    1. What Is The Threat? - Part 1 00:04:54
    2. What Is The Threat? - Part 2 00:05:34
    3. What Are The Consequences When A Website Is Not Protected Against Attacks? 00:03:19
    4. Most Common Forms Of Attack - Part 1 00:05:58
    5. Most Common Forms Of Attack - Part 2 00:05:42
    6. Most Common Vulnerabilities Attackers Can Exploit 00:10:09
    7. Helpful Resources 00:06:09
    8. Lab: Hacking Into Sweets Complete - Instructions 00:03:42
    9. Lab: Hacking Into Sweets Complete - Solution 00:03:42
  3. Understanding Filtering, Validation, And Output Escaping
    1. What Is Filtering, Validation, Output Escaping, And Why Do It? 00:09:37
    2. PHP Filtering Functions And Techniques 00:09:44
    3. PHP Validation Functions And Techniques 00:10:13
    4. PHP Output Escaping Functions 00:04:40
    5. Using filter_var() To Filter And Validate 00:06:30
    6. Lab: Filtering And Validating Posted Form Data - Instructions 00:04:24
    7. Lab: Filtering And Validating Posted Form Data - Solutions 00:07:14
  4. Preventing The Most Common Forms Of Attack
    1. Cross-Site Scripting Attacks - Part 1 00:09:02
    2. Cross-Site Scripting Attacks - Part 2 00:04:17
    3. Cross-Site Scripting Attacks - Part 3 00:09:36
    4. Session Hijacking And Forgery Attacks - Part 1 00:05:23
    5. Session Hijacking And Forgery Attacks - Part 2 00:09:37
    6. Remote Code Injection Attacks - Part 1 00:07:05
    7. Remote Code Injection Attacks - Part 2 00:06:37
    8. Lab: Improving Security On An Existing Website - Instructions 00:02:39
    9. Lab: Improving Security On An Existing Website - Solutions 00:08:17
  5. Protecting Against Common Website Vulnerabilities
    1. Unplanned Information Disclosure - Part 1 00:06:46
    2. Unplanned Information Disclosure - Part 2 00:08:44
    3. Predictable Resource Location 00:07:37
    4. Insufficient Authorization 00:06:42
    5. Improper Access Controls 00:11:01
    6. Avoiding Misconfiguration 00:11:34
    7. Protecting File Uploads 00:06:37
    8. Lab: Improving Security On An Existing Website - Instructions 00:03:09
    9. Lab: Improving Security On An Existing Website - Solutions 00:06:31
  6. Protecting Against SQL Injection Attacks
    1. How Can You Protect A MySQL Database? 00:05:42
    2. MySQL Database Escaping And Quoting 00:03:44
    3. Using Prepared Statements 00:06:59
    4. Lab: Protecting A MySQL Database Against SQL Injection - Instructions 00:02:23
    5. Lab: Protecting A MySQL Database Against SQL Injection - Solutions 00:04:50
  7. About The Author
    1. Wrap Up 00:03:29
    2. About The Author 00:03:32