WordPress 3: Developing Secure Sites

Product type
Level

WordPress 3: Developing Secure Sites

Lynda
Logo Lynda

Need more information? Get more details on the site of the provider.

Description

Illustrates various techniques for securing self-hosted WordPress sites.This course explains how to secure self-hosted WordPress sites, including site configuration, code modification, and the use of free plug-ins. Beginning with the basics of site security, author Jeff Starr explains how to harden a WordPress site by configuring authentication keys, setting proper file permissions, and removing version numbers. The course shows how to implement a firewall, prevent automated spam, and control proxy access, and concludes with a series of advanced tips and site security best practices. Topics include: Backing up and restoring your site Setting up strong passwords Choosing trusted plugins and t…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: WordPress, Drupal, Content Management System (CMS), Web Accessibility, and Digital Publishing & Editing.

Illustrates various techniques for securing self-hosted WordPress sites.This course explains how to secure self-hosted WordPress sites, including site configuration, code modification, and the use of free plug-ins. Beginning with the basics of site security, author Jeff Starr explains how to harden a WordPress site by configuring authentication keys, setting proper file permissions, and removing version numbers. The course shows how to implement a firewall, prevent automated spam, and control proxy access, and concludes with a series of advanced tips and site security best practices. Topics include: Backing up and restoring your site Setting up strong passwords Choosing trusted plugins and themes Protecting the configuration file and the admin directory Securing the login page Fighting comment spam Blocking access and detecting hacks Finding and reporting vulnerabilities

There are no reviews yet.
  • View related products with reviews: WordPress.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.