Course Outline
Using PHP Namespaces
- Overview of Namespaces
- Defining Namespaces
- Using Namespaces
- Working with the Composer
- Understanding Name Resolution Rules
Using PHP Interfaces
- Creating an Interface
- Extending an Interface
- Working with Predefined PHP Interfaces
Working with PHP Traits
- Understanding PHP Traits
- Creating a PHP Trait
Object-Oriented Programming with Advanced PHP
- Using PHP Magic Methods
- Using PHP Constructors
- Using PHP Deconstructors
- Using PHP Singletons
Implementing PHP Abstract Classes
- Overview of PHP Abstract Classes
- Creating PHP Abstract Classes
Using the PHP Iterator
- Creating a PHP Iterator
- Using Stacking Iterators
- Using SPL Iterators
Using PHP Generators
- Overview of PHP Generators
- Creating a PHP Generator
Implementing PHP Password Hashing, Password Verification, and Password Updating
Working with PHP Type Hints
- Understanding the Basic PHP Type Hints
- Using PHP Strict Type Declarations
- Working with PHP Return Types
Working with PHP Closures
- Overiew of PHP Closures
- Creating a PHP Closure
- Using Advanced Closures
Using PHP Exceptions
- Understanding PHP Exceptions
- Throwing an Exception
- Implementing Nested Exceptions
- Implementing PHP SPL Exceptions
- Extending PHP Exceptions
- Using the Finally Block
Debugging and Logging in PHP
Using Functions in PHP
- Understanding Code Reuse
- Understanding Function Feeding
- Returning Data from a Function
- Demo: Call-by-Value vs. Call-by-Reference
Using Date and Time Related Extensions
Using PHP Regular Expressions (REGEX) Functions
Using String Manipulation Functions
Runtime Error Handling in PHP
Operating on Files in PHP
Accessing Database Storage in PHP
Implementing Design Patterns in PHP
Implementing the Mail Function in PHP
- Demo: Sending and Retrieving Emails in PHP
- Demo: Using SMTP (Simple Main Transfer Protocol) to Send E-mails
Using PEAR and cURL in PHP
- Demo: Using the PHP Extension and Application Repository (PEAR)
- Demo: Implementing Basic cURL
- Demo: Webscraping Using cURL
Working with Web Services in PHP
- Using the Simple Object Access Protocol (SOAP)
- Using Web Services Description Language (WSDL)
Understanding Introspection and Reflection in PHP
- Demo: Using Instrospection API
- Demo: Using Reflection API
- Demo: Using Smarty Templates
Working with PHP Sessions
- Understanding Sessions
- Demo: PHP Session Mechanism
Implementing Best Practices and Security in PHP
- Understanding Best Practices
- Demo: Using Encryption
IT security and secure coding
- Web application security
- Web application vulnerabilities
- Client-side security
- Server-side security
- Practical cryptography
- PHP security services
- PHP Environment
- Principles of security and secure coding
- Common coding errors and vulnerabilities
- Security testing techniques and tools
Requirements
- An understanding of basic internet security.
- Experience with PHP programmig.
- Client side programming experience.
Audience
- PHP Programmer
Testimonials (8)
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
Emin was really engaging and enthusiastic, his knowledge succeeded expectations and allowed for questions at each portion.
Becky
Course - OSINT Practitioner Course (Advanced OSINT)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
the balance between lectures and practice, the rhythm, the trainer knowledge and pedagogic skill
Armando Pinto - EID
Course - C/C++ Secure Coding
Very good knowledge and character.
Constantinos Michael
Course - Java and Web Application Security
Pushing changes on an ongoing basis, when on the 3rd day I started to get more lost than before and it was harder to spot the error quickly, I was quickly able to check out the latest changes and stay up to date with the material
Paulina
Course - Advanced Java Security
Machine Translated
Very good to understand how a hacker would potentially analyse sites for weakness and tools they might employ .