After the success of our two initial training courses, we’re launching a second developer course in June in San Francisco!
The new course, WordPress Fundamentals: Security, Performance, & Debugging draws from issues and examples we’ve seen here with our WordPress.com VIP clients. We’ve worked with numerous VIP clients to make their sites more secure, faster, and able to scale WordPress for high traffic, and we’ll now work with you to help make the sites you build safe and scalable.
Below is a complete description of the course. You can sign up for the new training course in June in San Francisco now!
WordPress Fundamentals: Security, Performance, & Debugging is a day-long, intensive course meant to improve WordPress developers’ in advanced concepts like security and performance. Attendees should be familiar with developing WordPress plugins and themes or should have attended our Developer Fundamentals I course.
We’ll cover the basics of writing fast and secure code. Attendees will see and try popular profiling tools and we will show common performance problems, both on the front- and the back-end. Instead of just listing vulnerabilities, attendees will learn how to think like an attacker and exploit the vulnerabilities before fixing them.
- Proficiency with PHP development.
- Awareness of WordPress as a platform, including common terminology such as a post, a page, widgets, and sidebars.
- Proficiency with basic WordPress plugin and theme development – actions, filters, loading assets, main core APIs.
- The latest version of VirtualBox: https://www.virtualbox.org/
- Performance: common reasons for slow back-end code
- Performance: profiling back-end code with WordPress tools
- Performance: profiling back-end code with lower level tools
- Performance: profiling tools for front-end code and asset loading
- Security: common types of vulnerabilities
- Security: exploiting and fixing XSS problems
- Security: exploiting and fixing SQL injection problems
- Security: exploiting and fixing CSRF vulnerabilities
- Security: exploiting and fixing remote file inclusion attacks