Moodle Security

Learn how to install and configure Moodle in the most secure way possible
Preview in Mapt

Moodle Security

Darko Miletić

1 customer reviews
Learn how to install and configure Moodle in the most secure way possible
Mapt Subscription
FREE
$29.99/m after trial
eBook
$18.90
RRP $26.99
Save 29%
Print + eBook
$44.99
RRP $44.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$18.90
$44.99
$29.99p/m after trial
RRP $26.99
RRP $44.99
Subscription
eBook
Print + eBook
Start 30 Day Trial

Frequently bought together


Moodle Security Book Cover
Moodle Security
$ 26.99
$ 18.90
Intro to Cyber Security Certification - Security+ Boot Camp [Video] Book Cover
Intro to Cyber Security Certification - Security+ Boot Camp [Video]
$ 14.99
$ 12.75
Buy 2 for $30.25
Save $11.73
Add to Cart
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 

Book Details

ISBN 139781849512640
Paperback204 pages

Book Description

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys at bay.

Moodle Security will show you how to make sure that only authorized users can access the information on your Moodle site. This may seem simple, but, every day, systems get hacked and information gets lost or misused. Imagine the consequences if that were to happen in your school. The straightforward examples in this book will help you to lock down those access routes one door at a time.

By learning about the different types of potential threat, reading this book will prepare you for the worst. Web robots can harvest your e-mail addresses to send spam e-mails from your account, which could have devastating effects. Moodle comes with a number of set roles and permissions – make sure these are assigned to the right people, and are set to keep out the spam bots, using Moodle's authentication features. Learn how to secure both Windows and Linux servers and to make sure that none of your system files are accessible to the wrong people. Many of the most dangerous web attacks come from inside your system, so once you have all of your security settings in place, you will learn to monitor user activity to make sure that there are no threats from registered users. You will learn to work with the tools that help you to do this and enable you to back up your settings so that even a crashed system can't bother you.

Table of Contents

Chapter 1: Delving into the World of Security
Moodle and security
The secure installation of Moodle
Quickly securing Moodle
Summary
Chapter 2: Securing Your Server Linux
Securing your Linux—the basics
Apache configuration
MySQL configuration
PHP configuration
File security permissions
Adequate location for a Moodle installation
How to secure Moodle files
Summary
Chapter 3: Securing Your Server—Windows
Securing Windows—the basics
File security permissions
Installing and securing PHP under Internet Information Server
Securing MySQL
Summary
Chapter 4: Authentication
Basics of authentication
Common authentication attacks
Authentication types in Moodle
Summary
Chapter 5: Roles and Permissions
Roles and capabilities
Standard Moodle roles
Customizing roles
Best practices
Summary
Chapter 6: Protection Against Bots
Internet bots
Protecting Moodle from unwanted search bots
Protection against spam bots
Protection against brute force attacks
Summary
Chapter 7: Securing User Files
Uploading files into Moodle
Dangers and pitfalls
Anti-virus and Moodle
Summary
Chapter 8: Securing Moodle Data
User information protection
Course information protection
Summary
Chapter 9: Monitoring User Activity
Activity monitoring using Moodle tools
Activity monitoring using OS native tools
Summary
Chapter 10: Backup
Importance of backup
Backup tools in Moodle
Site backup
Disaster recovery scenario
Summary

What You Will Learn

  • Use CAPTCHA to make sure that humans are creating new accounts on Moodle – not Spambots
  • Configure PHP and Apache servers to protect your Windows and Linux systems from malicious threats
  • Assign the most appropriate permissions to different files to ensure the right level of protection
  • Create custom roles to control who accesses what
  • Protect your site from external attacks with secure HTTP
  • Organize regular anti-virus scans to ensure no new risks have been introduced to the system
  • Monitor the security of Moodle easily with notifications and security reports
  • Minimize the downtime of Moodle in the case of actual damage

Authors

Table of Contents

Chapter 1: Delving into the World of Security
Moodle and security
The secure installation of Moodle
Quickly securing Moodle
Summary
Chapter 2: Securing Your Server Linux
Securing your Linux—the basics
Apache configuration
MySQL configuration
PHP configuration
File security permissions
Adequate location for a Moodle installation
How to secure Moodle files
Summary
Chapter 3: Securing Your Server—Windows
Securing Windows—the basics
File security permissions
Installing and securing PHP under Internet Information Server
Securing MySQL
Summary
Chapter 4: Authentication
Basics of authentication
Common authentication attacks
Authentication types in Moodle
Summary
Chapter 5: Roles and Permissions
Roles and capabilities
Standard Moodle roles
Customizing roles
Best practices
Summary
Chapter 6: Protection Against Bots
Internet bots
Protecting Moodle from unwanted search bots
Protection against spam bots
Protection against brute force attacks
Summary
Chapter 7: Securing User Files
Uploading files into Moodle
Dangers and pitfalls
Anti-virus and Moodle
Summary
Chapter 8: Securing Moodle Data
User information protection
Course information protection
Summary
Chapter 9: Monitoring User Activity
Activity monitoring using Moodle tools
Activity monitoring using OS native tools
Summary
Chapter 10: Backup
Importance of backup
Backup tools in Moodle
Site backup
Disaster recovery scenario
Summary

Book Details

ISBN 139781849512640
Paperback204 pages
Read More
From 1 reviews

Read More Reviews

Recommended for You

Moodle as a Curriculum and Information Management System Book Cover
Moodle as a Curriculum and Information Management System
$ 29.99
$ 21.00
Moodle 1.9 Theme Design: Beginner's Guide Book Cover
Moodle 1.9 Theme Design: Beginner's Guide
$ 26.99
$ 18.90
Moodle 2.0 First Look Book Cover
Moodle 2.0 First Look
$ 23.99
$ 16.80
Moodle 2 Administration Book Cover
Moodle 2 Administration
$ 29.99
$ 21.00
Moodle 2.0 E-Learning Course Development Book Cover
Moodle 2.0 E-Learning Course Development
$ 26.99
$ 18.90
Instant Moodle Quiz Module How-to Book Cover
Instant Moodle Quiz Module How-to
$ 12.99
$ 9.10