WordPress 3: Developing Secure Sites – Starr illustrates
WordPress 3: Developing Secure Sites
By: Starr illustrates
Description:
In WordPress 3: Developing Secure Sites, author Jeff Starr illustrates various techniques for securing self-hosted WordPress sites, including site configuration, code modification, and the use of free plug-ins. Beginning with the basics of site security, the course explains how to harden a WordPress site by configuring authentication keys, setting proper file permissions, and removing version numbers. The course shows how to implement a firewall, prevent automated spam, and control proxy access, and concludes with a series of advanced tips and site security best practices. Exercise files accompany the course.
Topics include:
- Backing up and restoring your site
- Setting up strong passwords
- Choosing trusted plugins and themes
- Protecting the configuration file and the admin directory
- Securing the login page
- Fighting comment spam
- Blocking access and detecting hacks
- Finding and reporting vulnerabilities
Contents:
Introduction
Welcome
Using the exercise files
1. Getting Started
Backing up your site
Restoring your site
Keeping your site up to date
2. Security Essentials
Implementing strong passwords
Understanding users and roles
Choosing trusted plug-ins and themes
Removing unused plug-ins, themes, and files
Changing and recovering passwords
3. Hardening WordPress
Protecting the configuration file
Configuring authentication keys
Customizing the database prefix
Changing the admin username
Setting proper file permissions
Preventing directory listings
Protecting the admin directory
Removing version numbers
4. Improving Security with Plug-Ins
Fighting comment spam
Securing your login page
Monitoring file changes
Monitoring admin users
Implementing a firewall
Blocking access
Detecting hacks
5. Advanced Tips and Tricks
Stopping file hotlinking
Protecting the installation page
Stopping automated spam
Detecting and blocking bad bots
Firewalling your site
Protecting your RSS feeds
Controlling proxy access
6. Applying Best Practices
Finding and reporting vulnerabilities
Auditing your site
Choosing a good host
Conclusion
Next steps
Access Download WordPress 3: Developing Secure Sites – Starr illustrates right now!
Delivery Method:
After your purchase, you’ll get access to the downloads page. Here, you can download all the files associated with your order.
Downloads are available once your payment is confirmed, we’ll also send you a download notification email separate from any transaction notification emails you receive from Coursedownloads.