Books & Videos

Table of Contents

Chapter: Getting Started

What Does The Course Cover?

09m 32s

How To Set Up For The Course

04m 42s

Chapter: Nature And Scope Of The Problem

What Is The Threat? - Part 1

04m 54s

What Is The Threat? - Part 2

05m 33s

What Are The Consequences When A Website Is Not Protected Against Attacks?

03m 18s

Most Common Forms Of Attack - Part 1

05m 57s

Most Common Forms Of Attack - Part 2

05m 42s

Most Common Vulnerabilities Attackers Can Exploit

10m 9s

Helpful Resources

06m 9s

Lab: Hacking Into Sweets Complete - Instructions

03m 41s

Lab: Hacking Into Sweets Complete - Solution

03m 41s

Chapter: Understanding Filtering, Validation, And Output Escaping

What Is Filtering, Validation, Output Escaping, And Why Do It?

09m 37s

PHP Filtering Functions And Techniques

09m 44s

PHP Validation Functions And Techniques

10m 13s

PHP Output Escaping Functions

04m 40s

Using filter_var() To Filter And Validate

06m 29s

Lab: Filtering And Validating Posted Form Data - Instructions

04m 23s

Lab: Filtering And Validating Posted Form Data - Solutions

07m 13s

Chapter: Preventing The Most Common Forms Of Attack

Cross-Site Scripting Attacks - Part 1

09m 2s

Cross-Site Scripting Attacks - Part 2

04m 17s

Cross-Site Scripting Attacks - Part 3

09m 35s

Session Hijacking And Forgery Attacks - Part 1

05m 23s

Session Hijacking And Forgery Attacks - Part 2

09m 37s

Remote Code Injection Attacks - Part 1

07m 4s

Remote Code Injection Attacks - Part 2

06m 37s

Lab: Improving Security On An Existing Website - Instructions

02m 38s

Lab: Improving Security On An Existing Website - Solutions

08m 17s

Chapter: Protecting Against Common Website Vulnerabilities

Unplanned Information Disclosure - Part 1

06m 46s

Unplanned Information Disclosure - Part 2

08m 44s

Predictable Resource Location

07m 36s

Insufficient Authorization

06m 41s

Improper Access Controls

11m 1s

Avoiding Misconfiguration

11m 34s

Protecting File Uploads

06m 37s

Lab: Improving Security On An Existing Website - Instructions

03m 9s

Lab: Improving Security On An Existing Website - Solutions

06m 30s

Chapter: Protecting Against SQL Injection Attacks

How Can You Protect A MySQL Database?

05m 42s

MySQL Database Escaping And Quoting

03m 44s

Using Prepared Statements

06m 59s

Lab: Protecting A MySQL Database Against SQL Injection - Instructions

02m 23s

Lab: Protecting A MySQL Database Against SQL Injection - Solutions

04m 50s

Chapter: About The Author

Wrap Up

03m 28s

About The Author

03m 31s