YoVDO

OWASP PHP Security Project - Securing Web Applications with PHP Libraries and Tools

Offered By: OWASP Foundation via YouTube

Tags

Web Application Security Courses Cryptography Courses User Authentication Courses Encryption Courses Password Management Courses Secure Coding Practices Courses SQL Injection Prevention Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the OWASP PHP Security Project in this conference talk from AppSecUSA 2013. Dive into the efforts of PHP developers to enhance web application security through a collection of decoupled, flexible secure PHP libraries and tools. Learn about the project's framework, including encryption, logging, and password management. Discover advanced topics such as user authentication, cryptography, and protection against SQL injection. Gain insights into the importance of password entropy, secure password functions, and guarding against password guessing attacks. Examine practical examples and explore additional libraries for HTTP security, tainted input handling, and comprehensive logging. Access project resources, including the code repository, sample application, and official documentation to further your understanding of PHP security best practices.

Syllabus

Introduction
AppSec USA
Who is this for
Disclaimer
Other Libraries
Project Introduction
Framework Overview
Why use PHPsec
Encryption
Logs
Password Library
Importance of Password
Password is not guessable
Password entropy
Password functions
Password guessing
Advanced Password Library
User Library
Crypto Library
Example
SQL Injection
Parameterized Query
Download Manager
HTTP Library
Tainted Library
Log Library


Taught by

OWASP Foundation

Related Courses

PHP for Beginners: PDO Crash Course
Udemy
Parametrize Queries to Protect Against Injections with Java
Coursera Project Network via Coursera
MySQL PHP Database Essentials add a Database to your site
Udemy
PHP with MySQL Essential Training: 1 The Basics
LinkedIn Learning
Paramétrer vos requêtes pour protéger contre les attaques d'injection avec Java
Coursera Project Network via Coursera