We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

Laravel

Configure, Validate, Authenticate and Authorize

Aaron Saray

To get started in this beginning course on Laravel, we will examine what prerequisites you need to get the most out of this specialization. We’ll discuss the different ways to install the Laravel framework and focus on the most secure choice. We also will talk about the security concerns of using third-party packages. The course will introduce some tips on how to audit your application after a third-party package is installed. Finally, we'll share resources to stay up-to-date with Laravel.

Read more

To get started in this beginning course on Laravel, we will examine what prerequisites you need to get the most out of this specialization. We’ll discuss the different ways to install the Laravel framework and focus on the most secure choice. We also will talk about the security concerns of using third-party packages. The course will introduce some tips on how to audit your application after a third-party package is installed. Finally, we'll share resources to stay up-to-date with Laravel.

Securing configuration and secrets is one of the most important parts of your Laravel app. This course will focus on using the configuration system properly, securing environment secrets and ways to force SSL for your Laravel app. In addition, log filtering and exception handling systems are constructed to reduce the chance of leaking sensitive information.

Validation is necessary to secure input from both users and third-parties. In this course, we’ll discuss what things to validate, why to validate them and how to use Laravel’s built-in rules to get the most secure validation configuration. We'll examine using form requests to validate for controllers, as well as using inline-validation for commands. Finally, custom validation is also built and dissected.

Authentication is the first half of securing user access to your Laravel application. In this course, we’ll cover how to authenticate users in Laravel and the reasons why. We’ll discuss and examine the built-in Laravel authentication kits and explain which kit is best for which use case. Even if you have unique authentication requirements, Laravel’s authentication system can be used and we’ll show how with a custom authentication provider.

Authorization is the second half of securing user access to your Laravel application. In this course, we’ll discuss the different built-in options Laravel has to provide authorization. Gates, a simpler solution, will be compared to the more advanced policy system. Extending the authorization system with roles and permissions with a third-party package is also demonstrated. Finally, best practices of using authorization will be presented, including making sure not to fall into some common traps.

Enroll now

What's inside

Syllabus

Introduction and installation
To get started, we will examine what prerequisites you need to get the most out of this learning path. We’ll discuss the different ways to install the Laravel framework and focus on the most secure choice. We also will talk about the security concerns of using third-party packages. The course will introduce some tips on how to audit your application after a third-party package is installed. Finally, we'll share resources to stay up-to-date with Laravel.
Read more
Protecting secrets and reducing information leakage
Securing configuration and secrets is one of the most important parts of your Laravel app. This course will focus on using the configuration system properly, securing environment secrets and ways to force SSL for your Laravel app. In addition, log filtering and exception handling systems are constructed to reduce the chance of leaking sensitive information.
Validation
Validation is necessary to secure input from both users and third-parties. In this course, we’ll discuss what things to validate, why to validate them and how to use Laravel’s built-in rules to get the most secure validation configuration. We'll examine using form requests to validate for controllers, as well as using inline-validation for commands. Finally, custom validation is also built and dissected.
Authentication
Authentication is the first half of securing user access to your Laravel application. In this course, we’ll cover how to authenticate users in Laravel and the reasons why. We’ll discuss and examine the built-in Laravel authentication kits and explain which kit is best for which use case. Even if you have unique authentication requirements, Laravel’s authentication system can be used and we’ll show how with a custom authentication provider.
Authorization
Authorization is the second half of securing user access to your Laravel application. In this course, we’ll discuss the different built-in options Laravel has to provide authorization. Gates, a simpler solution, will be compared to the more advanced policy system. Extending the authorization system with roles and permissions with a third-party package is also demonstrated. Finally, best practices of using authorization will be presented, including making sure not to fall into some common traps.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches Laravel, which is a popular PHP framework used to build web applications, APIs, and microservices
Provides essential security measures for your Laravel applications
Helps you build secure and maintainable web applications in PHP
Develops your understanding of authentication and authorization mechanisms in Laravel
If you are new to web development or have basic PHP knowledge and want to learn about Laravel, this course can be a good starting point
Instructed by Aaron Saray, an experienced Laravel developer and instructor

Save this course

Save Laravel: Configure, Validate, Authenticate and Authorize to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Laravel: Configure, Validate, Authenticate and Authorize. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Laravel: Configure, Validate, Authenticate and Authorize will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts design and implement security measures to protect their organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you secure web applications with SSL, secure configurations, and proper validation. These skills are in high demand in today's threat landscape.
Vulnerability Researcher
Vulnerability Researchers identify and analyze vulnerabilities in computer systems and software. They use a variety of tools and techniques to find ways to exploit vulnerabilities and gain unauthorized access to systems. This course can help you build a foundation in vulnerability research by teaching you about SSL, validation, authentication, and authorization.
Penetration Tester
Penetration Testers simulate attacks on computer systems and networks to identify vulnerabilities. They use a variety of tools and techniques to find ways to exploit vulnerabilities and gain unauthorized access to systems. This course can help you build a foundation in penetration testing by teaching you about SSL, validation, authentication, and authorization.
Security Analyst
Security Analysts monitor and analyze security systems to identify and respond to security threats. They use a variety of tools and technologies to protect their organization's systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you build a foundation in security analysis by teaching you about SSL, validation, authentication, and authorization.
Security Architect
Security Architects design and implement an organization's overall security strategy. They work with technology professionals to define security requirements and develop solutions that meet those requirements. This course can help you build a foundation in web security by teaching you about SSL, validation, authentication, and authorization.
Systems Engineer
Systems Engineers design, implement, and maintain computer systems and networks. They work with a variety of hardware and software technologies to create systems that meet the needs of their organization. This course can help you build a foundation in secure systems engineering by teaching you about SSL, validation, authentication, and authorization.
Software Developer
Software Developers design, develop, test, and maintain software applications. They use programming languages and software engineering principles to create software that meets the needs of users. This course can help you build a foundation in secure software development by teaching you about SSL, validation, authentication, and authorization. These skills are essential for any software developer working on web applications.
Web Developer
Web Developers are responsible for designing, developing, and maintaining websites. They turn website designs into functional products using a combination of coding and design thinking. This course can help prepare you for this role by teaching you how to secure a website with SSL, validate user input, and control user access to your website. These skills will help you build more secure and user-friendly websites.
Cloud Architect
Cloud Architects design and implement cloud computing solutions. They work with a variety of cloud technologies to create solutions that meet the needs of their organization. This course can help you build a foundation in secure cloud architecture by teaching you about SSL, validation, authentication, and authorization.
Network Engineer
Network Engineers design, implement, and maintain computer networks. They work with a variety of hardware and software technologies to create networks that meet the needs of their organization. This course can help you build a foundation in secure network engineering by teaching you about SSL, validation, authentication, and authorization.
Database Administrator
Database Administrators design, implement, and maintain databases. They work with a variety of database technologies to create databases that meet the needs of their organization. This course can help you build a foundation in secure database administration by teaching you about SSL, validation, authentication, and authorization.
Forensic Analyst
Forensic Analysts investigate computer crimes and cyberattacks. They use a variety of tools and technologies to collect and analyze evidence from computer systems and networks. This course can help you build a foundation in forensic analysis by teaching you about SSL, validation, authentication, and authorization.
IT Manager
IT Managers plan, direct, and coordinate the activities of an organization's IT department. They are responsible for ensuring that the organization's IT systems and services are reliable, secure, and efficient. This course can help you gain a better understanding of security concerns in the IT environment. Particularly, the course's focus on protecting secrets and reducing information leakage.
DevOps Engineer
DevOps Engineers work to bridge the gap between development and operations teams by automating and streamlining the software development process. They use a variety of tools and technologies to improve the efficiency and reliability of software delivery. This course can help you gain a better understanding of security concerns in the software development lifecycle. Particularly, the course's focus on protecting secrets and reducing information leakage.
Web Designer
Web Designers collaborate with Web Developers to create the look and feel of websites. They combine creativity with web technologies to create appealing interfaces for websites. This course may be useful in teaching you how to incorporate security concerns into your designs. Particularly, designing for SSL.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Laravel: Configure, Validate, Authenticate and Authorize.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Laravel: Configure, Validate, Authenticate and Authorize.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser