INTRODUCTION
PHP is an award-winning content management system (CMS), which enables you to easily build many types of website. This PHP course will allow users to create a dynamic interactive website from scratch using the free PHP Content Management System (CMS). Each participant will learn how to create a professional website using the PHP Content Management System. PHP is open source and free for all.
Website penetration testing is practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine.
The goal of information management is to ensure that the right information reaches the right stakeholders at the right time. Project stakeholders, donors, partners, and beneficiaries depend on good and timely information to make good decisions.You will gain a strong working knowledge of the concepts of project information management systems and be able to immediately use that knowledge to effectively manage the information in your project.
WHO IS THIS TRAINING INTENDED FOR?
The PHP course is a must for web designers and web developers. It will be an important foundation for anyone maintaining or creating websites. Journalist, post high school students, university and college students, early career professionals, supervisors and team leaders and senior executives or person’s interest to understand how professional websites are authored may also attend.
DURATION
15 Days
TRAI NING OBJECTIVE
• All fundamentals of HTML,CSS and Javaslipt
• All PHP Fundamentals and Building Blocks with practical implementation in Projects
• Form Validation with most Secure way using Regular Expressions
• Making web pages dynamic with the variety of PHP Techniques
• Employee Management System CRUD Application in PHP
• Complete CMS ( Content Management System) with Admin-Panel
• Getting Started with Bootstrap Framework
• Using PHP Sessions and pass information easily on different modules of Project
• Stunning Blog with Commenting functionality
• Sending Email using PHP
• Understand and perform the basic steps in order to performa penetration testing of a web application
• Understand web application's security principles and potential dangers
• Be able to gather information about your target
• You will learn how to find vulnerabilities in your target web application
• Exploit found vulnerabilities and get control over remote servers
• Understand the penetration testing process
• As a web application developer you will understand how to secure your application
TRAINING CONTENT
Module One:HTML and CSS Basics
• What is it HTML and how we use it
• Versions of HTML
• Creating a Basic Web Page
• Insert content
• Create a Basic Page Structure
• Basic HTML Formatting
• Inserting images
• Create hypertext Links
• What is CSS and how we use it
• Creating CSS styles
• Basic formatting with CSS Managing CSS styles
• Formatting links with CSS
Module two: JavaScript Basics
• What is JavaScript and how we use it
• Benefits of JavaScript
• Interactivity in HTML
• Implement basic effects for your content
• The future of Web development
Module Three: Building Blocks of PHP
• Requirements overview
• XAMP Downloading and Installing
• XAMP Server
• XAMP Files and Solving Error
• Variable
• Constants
• Strings
• Numbers
• Arrays
• Arrays Functions
• If Statements
• Operators
• For Loop
• While Loops
• For-each Loops
• Switch Statements
• Branching
• User Define Functions
• Re-usability
• Static Variables
• Local Variables
• Global Variables
• Super Global Variables
Module Four: Regular Expressions
• Introduction to Regular Expressions Creation
• Advanced Regular Expressions Creation
Module Five: Form Validation
• Introduction to forms
• Form Validation
• Adding Constraints
• Working with CSS
• Introduction to Sending Email
• Sending Email in PHP
• Form Validation Project Sending Email
Module Six: Dynamic Web Pages
• Url and links
• Dynamic Web Pages
Module Seven: Employee Management
• Working with Database and codes
• Creating DB and Table
• Establishing Connection
• Connection Code
• Form Creation and Applying Styles
• PHP and Query Creation
• Adding Constraints
• View From Database
• Delete From Database
• Update Into Database
• Search From Database
• SQL Injection
• Styling
Module Eight: Configuring Bootstrap
• Bootstrap Framework
• Bootstrap Framework Version
• Add Bootstrap To Website
Module Nine: Designing Admin Panel
• Creating the Dashboard
• Designing Tabs
• Icons
• Footer
Module Ten: PHP MYSQL Work in Admin-Panel
• Creating DataBase and Category Table
• Creating Category Form
• Validations on Category
• Completing Manage Category Page
• Form Creation, Validation and Complition
Module eleven: Working with Public Front-End of Blog
• Deigning Public Front-End Navigation
• Designing the Main Area for Blog
• Extracting Post From DB on Blog Page
• Activating Search Tab of Blog Page
• Full Blog Post
• Designing and Extracting Dashboard
• Enhancing Admin Experience
• Edit Post Extraction and Updation
• Delete Post
• Working with Comments
• Designing Comment Form
• PHP for Comments
• Adding Relation between Tables using Foreign Key and Primary Key
• Extracting Comments
• Designing Comments Dashboard
• Approve Comments
• DisApprove Comments
• Delete Comments
• Enhancing Admin Experience on Comments Tab
• Delete Category
Module Twelve:Admin Registration System
• Adding New Admins
• Extracting and Deleting Admins
• Managing Login / Logout / Access Process
• Designing Login Page
• Longing in
• Restricting Admin Area
• LogOut Page
Module Thirteen: Web Hacking and Penetration Testing
Introduction
-
Core Problems - Why Web Security
-
Web Technologies
-
Preparing the Lab Environment
-
Information Gathering using Search Engines and Social Networks - part 1
-
Information Gathering using Search Engines and Social Networks
-
Join Our Online Classroom!
Mapping the Web Application. User and Password Brute
What Web Application Mapping Means
-
Usernames and Passwords Brute-Forcing using Burp
-
Spider and Analyze a Website using Burp
-
Brute-frocing Web Resources using Dirb and Dirbuster
Attacking Authentication and Session Management
-
Theoretical Overview of Attacking Authentication and Session Management
-
Session Hijacking trough Man In The Middle Attack
-
Intercept and access traffic over HTTPS. Get Facebook or Gmail Passwords
Access controls. Data stores and Client
-
Theoretical Approach of Attacking Access Controls
-
SQL injection
-
Exploiting SQLi using Sqlmap and Getting Remote Shell
-
Upload and Remote File Execution
Attacking the Server and Application
-
Attacking the server: OS Command injection, Path Traversal and Mail Injection
-
Attacking Application Logic
(XSS) Cross Site Scripting. Attacking the Users
-
Cross Site Scripting Theory. Attacking Users
-
Reflected XSS – Session Hijacking using Cross Site Scripting
-
Stored or Persistent Cross Site Scripting
-
Beef-XSS Demo
-
Cross-site Request Forgery (CSRF
General Notes
· All our courses can be Tailor-made to participants' needs
· The participant must be conversant in English
· Presentations are well-guided, practical exercises, web-based tutorials, and group work. Our facilitators are experts with more than 10 years of experience.
· Upon completion of training the participant will be issued with a Foscore development center certificate (FDC-K)
· Training will be done at the Foscore development center (FDC-K) centers. We also offer inhouse and online training on the client schedule
· Course duration is flexible and the contents can be modified to fit any number of days.
· The course fee for onsite training includes facilitation training materials, 2 coffee breaks, a buffet lunch, and a Certificate of successful completion of Training. Participants will be responsible for their own travel expenses and arrangements, airport transfers, visa application dinners, health/accident insurance, and other personal expenses.
· Accommodation, pickup, freight booking, and Visa processing arrangement, are done on request, at discounted prices.
· Tablet and Laptops are provided to participants on request as an add-on cost to the training fee.
· One-year free Consultation and Coaching provided after the course.
· Register as a group of more than two and enjoy a discount of (10% to 50%)
· Payment should be done before commence of the training or as agreed by the parties, to the FOSCORE DEVELOPMENT CENTER account, so as to enable us to prepare better for you.
· For any inquiries reach us at training@fdc-k.org or +254712260031
· Website:www.fdc-k.org
Foscore Development Center |Training Courses | Monitoring and Evaluation|Data Analysis|Market Research |M&E Consultancy |ICT Services |Mobile Data Collection | ODK Course | KoboToolBox | GIS and Environment |Agricultural Services |Business Analytics specializing in short courses in GIS, Monitoring and Evaluation (M&E), Data Management, Data Analysis, Research, Social Development, Community Development, Finance Management, Finance Analysis, Humanitarian and Agriculture, Mobile data Collection, Mobile data Collection training, Mobile data Collection training Nairobi, Mobile data Collection training Kenya, ODK, ODK training, ODK training Nairobi, ODK training Kenya, Open Data Kit, Open Data Kit training, Open Data Kit Training, capacity building, consultancy and talent development solutions for individuals and organisations, through our highly customised courses and experienced consultants, in a wide array of disciplines
Other Upcoming Online Workshops