Viewers: in countries Watching now:
In Joomla! 1.5: Developing Secure Sites, author Kenneth Crowder covers key steps to secure against data loss and minimize vulnerability to attack. The course covers simple, yet effective best practices that will minimize the risk of a Joomla! web site from being compromised or hacked, as well as what to do if a vulnerability in the core Joomla! code or a third-party extension is found.
Hello, there! I'm Kenneth Crowder and welcome to Joomla! Developing Secure Sites. In these videos, I have broken down the topic of Joomla! security into easy-to- follow best practices. I'll be showing you how to schedule backups, assess extensions for vulnerabilities, create effective passwords, discourage hackers by using proper naming conventions, and I'll show you how to keep your Joomla! web site secure. Implementing these best practices will minimize the risk of your web site being compromised.
It's time for you to stop being insecure about Joomla! security.
There are currently no FAQs about Joomla! 1.5: Developing Secure Sites.
Access exercise files from a button right under the course name.
Search within course videos and transcripts, and jump right to the results.
Remove icons showing you already watched videos if you want to start over.
Make the video wide, narrow, full-screen, or pop the player out of the page into its own window.
Click on text in the transcript to jump to that spot in the video. As the video plays, the relevant spot in the transcript will be highlighted.