Security is paramount when developing applications for the web. Every year we hear about high profile companies losing sensitive data to intruders, and mainly compromises originate from their web presence. The best way to achieve a truly secure web application is to build that application with security in mind from the start. Join us as we investigate common mistakes and failing in web security, and teach you how to build truly secure web applications from the ground up.

What Will You Learn?

After completing this course, you will be prepared to incorporate standard, best practice security measures into your PHP applications. You will be able to identify the most common types of vector attacks and industry experienced vulnerabilities allowing you to monitor and fortify your application code against them.

What Will You Be Able to Achieve?

  • Building truly secure web applications with confidence and aptitude.
  • Ensure that your application and company avoid an embarrassing hack or data breach.
  • Be sure that you understand and can mitigate the most common web security failings, and understand why “Security First” is the best possible way to code.

Read our Frequently Asked Questions for more information.


This course is designed for intermediate to experienced PHP application developers who are looking to enhance their skills and be able to learn or implement security best practices. It is also appropriate for intermediate PHP and professional developers who are interested in studying early on how to build security into the applications as part of their learning process.


Basic to advanced knowledge of PHP 5 is recommended including experience developing PHP 5 applications. 

Registration, Terms, and Conditions

Click the button below to register for this class.



If you have any questions, please contact us at

Class Format and Duration

This online class provides instructor-led lectures coupled with practical examples and student exercises. You will be given a participant course guide, to help you follow along with the lectures and exercises, as well as the solution code to the security practice application.  This class can be also delivered by an instructor on site.

Classes include 10 total training hours spread across a 2-4 week course. Classes meet 2-3 times per week, with each session lasting between 2-3 hours.


Classes are scheduled to meet the needs of our customers. Once you purchase a class, we will assign you to a class (based on your time zone) within 60 days of purchase.

For interested parties in Milan or Rome, please contact Elena Brambilla with questions about the courses.

Next Steps

After you have purchased your Zend online training course, you will receive an email detailing the registration process. If you have any questions, please contact us at

Special Offer: Interested in taking additional classes and achieving certification? Check out our bundle discount and save more! We recommend:

A-Zend for Experienced PHP Programmers Bundle

Class Outline


  1. What is Security
  2. Defense in Depth
  3. Basic Security Rules
  4. Building Secure Web Applications Guidelines
  5. Open Web Application Security Project (OWASP)
  6. Web Application Exploits
  7. Risk Management
  8. Injection


  1. SQL Injection
  2. XSS Injection
  3. Cross-site forgeries (CSRF)
  4. Brute Force
  5. Broken Authentication and Session Management
  6. Insecure Direct Object References
  7. Security Misconfiguration
  8. Insufficient Cryptographic Storage
  9. Missing Function-Level Access Control
  10. Using Components with Known Vulnerabilities
  11. Invalidated Redirects and Forwards


  1. Secure Configuration
  2. Authentication Techniques
  3. Password Cryptography 
  4. Hermetic Filtering/Validation/Escaping Techniques
  5. Handling Asynchronous Web Calls (AJAX)
  6. Lock down Database Security
  7. Employing Access Controls and Handling Account Lockouts (ACL)
  8. White Listing Techniques
  9. Using an API Framework (Apigility)
  10. Creating a Standard Review Process
  11. Captchas, Tokens and Session Managment
  12. Cryptographic Storage Techniques
  13. Extension Evaluation
  14. Securing File Uploads
  15. Logging
  16. Web Server Security


  1. Additional Learning Resources
  2. Security Standards
  3. Penetration Testing
  4. Performance Tools