MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Hacking & Securing PHP Applications

Course Summary

This course teaches how to hack and secure PHP. Owasp top10(A1 to A10) for PHP.


  • +

    Course Syllabus

    • Injection(A1) - OWASP Top10
      • Injection - OWASP Top10 (A1) - Presentation
      • Blind SQL Injection Presentation
      • SQLI
      • Time based SQLI
      • Union Exploitation Technique
      • SQL Injection Union - Demo - Exploitation
      • Preventing SQLI
      • SQL Injection Login Bypass - Demo
      • SQL Injection - Demo - Defense
    • Broken Authentication and Session Management(A2) - OWASP Top10
      • Broken Authentication and Session Management - OWASP Top10(A2) - Presentation
      • Broken Authentication and Session Management - Demo - Exploit
      • Defense Demo
    • Cross-Site Scripting (XSS) - A3 - OWASP Top10
      • Cross Site Scripting(XSS) - Introduction
      • Cross Site Scripting - Reflected
      • Cross Site Scripting - Demo - Reflected - Get
      • Cross Site Scripting(XSS) - Demo - Reflected - Post
      • Cross Site Scripting(XSS) Stored - Presentation
      • Cross Site Scripting(XSS) - Demo - Stored
    • Cross Site Scripting - A3 - Defense
      • Cross-Site Scripting (XSS) - OWASP Top10 - Presentation - Defence
      • Cross-Site Scripting (XSS) - FIlters
      • Cross Site Scripting(XSS) - HTTP Flag
      • Cross Site Scripting - Demo - Modsecurity
    • Insecure Direct Object References - A4 - OWASP Top10
      • Insecure Direct Object Reference - OWASP Top10 - A4 - Presentation
      • Insecure Direct Object Reference -DEMO- Exploitation
      • Insecure Direct Object Reference - Demo - Defense
    • Security Misconfiguration - A5 - OWASP Top10
      • Security Misconfiguration - OWASP Top10 - A5 - Presentation
      • Security Misconfiguration - Demo - Exploit
      • Security Misconfiguration - Demo - Defense
    • Sensitive Data Exposure - A6 - OWASP Top10
      • Sensitive Data Exposure - OWASP Top10 - A6 - Presentation
      • Sensitive Data Exposure - A6 - Demo - Exploit
      • Sensitive Data Exposure - A6 - Demo - Defense
    • Missing Function Level Access Control - A7 - OWASP Top10
      • Missing Function Level Access Control - OWASP Top10 - A7 - Presentation
      • Missing Function Level Access Control - Demo - Exploitation(1)
      • Missing Function Level Access Control - Demo - Exploitation(2)
      • Missing Function Level Access Control - Demo - Defence
    • Cross-Site Request Forgery (CSRF) - A8 - OWASP Top10
      • Cross-Site Request Forgery (CSRF) - OWASP Top10 - A8 - Presentation
      • Cross-Site Request Forgery (CSRF) - OWASP Top10 - A8 - Defense Presentation
      • CSRF - Demo - Get Exploit
      • CSRF - Demo - Get Defence
      • CSRF - Demo - Post Exploit
      • CSRF - Demo - Post Defence
    • Using Components with Known Vulnerabilities - A9 - OWASP Top10
      • Using Components with Known Vulnerabilities - OWASP top10 - A9 - Presentation
      • Using components with Known Vulnerabilities - A9 - Demo
    • Unvalidated Redirects and Forwards - A10 - OWASPTop10
      • Unvalidated Redirects and Forwards - OWASP Top10 - A10 - Presentation
      • Unvalidated Redirects and Forwards - OWASP Top10 - A10 - Presentation Defense
      • Unvalidated Redirects and Forwards - Demo - Exploit
      • Unvalidated Redirects and Forwards - Demo - Defense
    • Certification
      • Hacking & Securing PHP


Course Fee:
USD 50

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top