Courses
About
Contact
Login
Get Started
Courses
All Courses
My Courses
Logout
About
Contact
Logout
Logout
Get Started
Enterprise WordPress Security
Take Course
Enterprise WordPress Security Overview
Enterprise WordPress Security Overview
Lessons
About Enterprise WordPress Security
Introduction
Introduction
Lessons
WordPress as a Ubiquitous Component of the Web
How WordPress Manages Security
The OWASP Top 10
The OWASP Top 10
Lessons
What is OWASP?
Why Are The OWASP Top 10 Relevant to WordPress?
Injection Including XSS and SQL Injection
Injection Including XSS and SQL Injection
Lessons
How Injection Vulnerabilities Work
How to Protect Against XSS Injection Attacks
How to Protect Against SQL Injection Attacks
Access Control
Access Control
Lessons
Vulnerabilities and the Principle of Least Privilege
How is this Vulnerability Exploited in WordPress
Roles and Capabilities in WordPress
Security Configuration and WordPress
Security Configuration and WordPress
Lessons
WordPress Security Configuration
Hosting Environment Security
Core WordPress Settings and Configuration
Best Practices for Enhanced Security Configuration
Vulnerable and Outdated Components in WordPress
Vulnerable and Outdated Components in WordPress
Lessons
Understanding the Components of WordPress
How are Outdated Components Exploited
Strategies for Keeping WordPress Components Updated
Server-Side Request Forgery
Server-Side Request Forgery
Lessons
Definition and Effects of Server-Side Request Forgery
Examples of SSRF being exploited in WordPress
Mitigating SSRF Vulnerabilities
Four Additional Best Practices
Four Additional Best Practices
Lessons
Plan for and Mitigate DoS Attacks
Plan for Disaster Recovery
Integrate Coding Standards into Your Development and Build Process
Leverage Logging and Activity Audits
Exercises
Exercises
Lessons
Enterprise WordPress Security Quiz
Coding Exercise