Course Description
Learn to securely deploy Magento 2 projects. With the rise of global fraud and data breaches, security has become a priority for Ecommerce platform. Gain the knowledge of security best practices and protocols to minimize the risk of data breach and payment fraud. This course will familiarize you with security best practices to enable you to support your development team working with the Magento 2 platform.
- Unit 1: Introduction to Magento Security for Developers
- eCommerce Threat Landscape
- Security Best Practices
- Shared Responsibility Overview
- Compliance
- Unit 2: Secure Programming
- OWASP Top 10
- Beyond OWASP Top 10
- Defensive PHP Programming
- Magento specific Secure Coding
- Restricting Access in Magento
- Secure Programming
- Unit 3: Operational Security
- Magento’s ACL’s and User Permissions
- Monitoring and Logging
- Evaluating Extension Vendors
- Unit 4: Incident Response
- Introduction to Incident Response
- Incidence Response Planning
- Unit 5: Business Impact
Getting Started
Currently there is a group that has access to the Magento U platform. You can get started by going to this link: here