bag

Secure coding guide for Developers, Analysts and Architects

2 years ago

A practical guide to building hacking and securing your application

Free USD $59.99

Created by: Wesley Thijs

Expired Coupon

Share if you liked:

A practical guide to building hacking and securing your application

Published en 28 Apr 2022

Udemy UK

What you'll learn

  • 7 Different issue types
  • Basic security tips
  • Security design patterns
  • PHP

Requirements

  • You need to be able to read simple PHP code

Description

Whoami?

My name is Wesley Thijs, I've been a PHP programmer for 3 years and I've worked with windev to create AS-400 GUI's. I am nowhere near an expert in coding but I do know my security. As an ethical hacker, it is my mission to bring about a safer internet for all. I could do this alone but it's much better to train the people who need it and build in security from the ground up.


What is this course?

This course has been designed to lift up the security of your applications by teaching you several issue types in a practical way.

We've set up an FTP server that can be used so you don't even need to set up your own server, all you need is an FTP client to start building, hacking, and securing your labs.

To finish off, we dive into the basics of security and give you an overview of secure coding patterns.

What issues are covered? 

  1. Open redirects

  2. CSRF

  3. LFI

  4. RFI

  5. XXE

  6. XSS

  7. SSRF

  8. JWT hacking

Who is this for

We have designed and built this course to fit any modern-day company that is working on cybersecurity awareness from the ground up. This course can be offered to anyone in the software development team, including analysts and architects. It will solidify these techniques to anyone who has at least a reading-level understanding of PHP.


Requirements

1) You need to have a reading level understanding of PHP

2) An FTP client is required

Who this course is for:

  • Developers wanting to learn about vulnerabilities
  • Architects wanting to avoid exploits before they can occur
  • Managers that want dive deeper into the word of exploits and hacking
  • Analysts that want to prevent sneaky exploits in their analysis

You should keep in mind that the Coupons last a maximum of 4 days or until 1000 registrations are exhausted, but it can expire anytime. Get the course with coupon by clicking on the following button:

(Coupon valid for the first 1000 registrations): 26623BC2DE538DFDF6BF
Udemy UK
Tags:

Add a new comment

Subscribe to our newsletter
Receive the latest Coupons and promotions Request Coupon