
Welcome to the Treehouse Library
This is a sample catalog of all the courses we offer. Browse by topic or difficulty. Sign up today and get access to our entire library. Treehouse students get access to workshops, bonus content, conferences, and more.
Ready to start learning?
Treehouse offers a 7 day free trial for new students. Get access to 1000s of hours of content. Learn to code, land your dream job.
Start Your Free Trial- Newest
-
All Topics
- All Topics
- • AI
- • JavaScript
- • React
- • No-Code
- • Python
- • Design
- • HTML
- • CSS
- • Game Development
- • Data Analysis
- • Development Tools
- • Databases
- • Security
- • Digital Literacy
- • Swift
- • Java
- • Machine Learning
- • APIs
- • Professional Growth
- • Computer Science
- • Ruby
- • Quality Assurance
- • PHP
- • Go Language
- • Android
- • Learning Resources
- • College Credit
- • Coding for Kids
Security
Keeping yourself, your users, and your data safe is important no matter what language or technology you use. Understanding what kinds of attacks exist and how to mitigate or prevent them will give you more control and peace of mind.
-
- 1
- 2
(UPI) Chapter 17: Blockchain Security Analysis
In this chapter, the discussion provides a comprehensive analysis of blockchain security by examining its origins, applications, and the various layers vulnerable to attacks. It also reviews the security threats, defense mechanisms, and current status of blockchain security protection, while highlighting the challenges for regulatory and supervisory frameworks in addressing decentralized, tamper-resistant systems.
-
- 1
- 2
- 3
- 4
- 5
- 6
(UPI) Chapter 1: Basic Concepts and Models of Cybersecurity
Chapter 1 of the cybersecurity book introduces the foundational concepts and challenges of securing cyberspace, emphasizing the complexity of cybersecurity due to the diversity of interconnected systems and asymmetric threats from attackers. It explores key protection goals such as confidentiality, integrity, and availability, while highlighting the need for both proactive and reactive security measures to defend against evolving cyber threatsβ.
-
- 1
- 2
- 3
(UPI) Chapter 2: Core Values and Value Conflicts in Cybersecurity
This chapter explores the fundamental ethical values in cybersecurity, including security, privacy, fairness, and accountability, and how they shape technical and institutional measures. The chapter also examines value conflicts, such as privacy versus security, highlighting the complexity of these tensions and proposing context-sensitive approaches to resolve them.
-
- 1
(UPI) Chapter 4: Cybersecurity and the State
In this chapter, cybersecurity and the state are examined with a focus on how both EU-level and national strategies address the complex challenges posed by digital threats and the need for robust cybersecurity measures. In this chapter, the interplay between cybersecurity initiatives, data protection frameworks, and the tensions arising from balancing state security with individual privacy is analyzed alongside recommended realignment and solution approaches.
-
- 1
- 2
- 3
(UPI) Chapter 5: Norms of Responsible State Behaviour in Cyberspace
In this chapter, we examine the evolving norms of responsible state behavior in cyberspace by analyzing national strategies, international diplomatic processes, and the contributions of diverse stakeholders. It discusses how major powers such as the US and the Sino-Russian bloc are formulating their cyber strategies, the role of UN GGE processes and regional security organizations in norm-building, and how non-state actors like the ICRC, civil society, and private companies are influencing the debate, while also outlining prospects for future cooperative frameworks.
-
- 1
- 2
(UPI) Chapter 7: Cybersecurity in Health Care
In this chapter, the discussion centers on the ethical, moral, and technical dimensions of cybersecurity in health care, emphasizing the interplay between moral principles, technical aims, and real-world case studies. It examines how foundational ethical frameworks like principlism can guide the design and evaluation of health care ICT systems while balancing conflicting values such as privacy, usability, and security.
-
- 1
- 2
- 3
(UPI) Chapter 8: Cybersecurity of Critical Infrastructure
In this chapter, the analysis centers on the cybersecurity of critical infrastructure within the national security domain, examining both the ethical challenges and value conflicts that arise when protecting vital public services and systems from cyber threats. The chapter reviews relevant literature, presents frameworks for categorizing attacks, and discusses real-world case studies to illustrate the complex trade-offs between security and other societal values such as privacy, equity, and long-term stability.
-
- 1
- 2
(UPI) Chapter 12: Threat Detection and Defense Techniques
In this chapter, the discussion centers on advanced threat detection and defense techniques for web applications, with an emphasis on integrating and benchmarking various security analysis tools. The chapter reviews existing research on static, dynamic, and interactive analysis tools (SAST, DAST, and IAST), proposes a novel methodology for combining these tools to enhance vulnerability detection while reducing false positives, and provides practical insights and rankings based on a comprehensive evaluation using the OWASP Benchmark project.
-
- 1
- 2
(UPI) Chapter 15: Cyber-Security Training and Continuous Adaptation of Programmes
In this chapter, the focus is on cybersecurity training and the continuous adaptation of training programs, emphasizing the need for dynamic, model-driven educational frameworks that integrate pedagogical best practices with security threat models. The chapter outlines a detailed methodology for designing, implementing, and assessing cybersecurity trainingβillustrated through a smart shipping use caseβand demonstrates how platforms like THREAT-ARREST can tailor training to specific organizational needs while continuously monitoring and improving trainee performance.
-
- 1
Internet Street Smarts
The Internet Street Smarts course by Cyber Collective empowers learners to navigate the digital world with confidence and awareness. Designed for people of all technical backgrounds, the course breaks down complex topics into approachable lessons, blending practical skills with a social justice perspective. Participants will explore:
1. The Data Ecosystem: Understanding how personal data is collected, shared, and used.
2. Common Scams: Identifying and avoiding online scams that target marginalized communities and beyond.
3. Practical Cybersecurity Skills: Tips and tools to protect yourself and your loved ones online.
4. The Bigger Picture: Examining the societal impacts of cyber threats on underrepresented communities.
With actionable guidance and relatable teaching methods, Internet Street Smarts bridges knowledge gaps and empowers learners to build safer, more informed online habits. Perfect for beginners and advanced learners alike, this course is a must for anyone looking to take control of their digital presence.
Join us to become street-smart online, because protecting yourself online shouldnβt feel overwhelming. -
- 1
- 2
Working with $_GET and $_POST in PHP
This course will show you how to work with PHP Superglobals such as $GET and $POST while using a security-conscious mindset. External inputs, like HTML forms, are considered a security vulnerability so you should always filter inputs and escape outputs. Using PHP Superglobals when using external inputs such as HTML forms, cookies, sessions, and web servers will give you a security-conscious mindset that you can apply to all of your projects.
-
- 1
- 2
Using Cookies and JWTs for Secure Authentication
Refactor an existing authentication project by using cookies and JSON Web Token to increase security. Cookies are a way for a browser to store information while tokens are a stand-in or representation for something else.
-
- 1
- 2
- 3
- 4
Introduction to Algorithms
Algorithms are a fundamental topic in computer science, power many of the largest companies today and are used in making many decisions that affect our day to day lives - in obvious places like Google's PageRank algorithm to more obscure use cases like national security and local policing. In this introductory course, we're going to take our first steps towards understanding the world of algorithms and data structures. Before we can study individual algorithms we're going to spend time learning how to evaluate algorithms, how to make comparisons and how to develop algorithmic thinking
-
- 1
- 2
- 3
Introduction to Application Security
Welcome to the realm of web security, where millions of dollars and peopleβs lives are on the line. Well, not in all cases, but some! From protecting static web sites to the most complex of web services and APIs, every web developer should be aware of and adept at writing secure code and building systems that can stand up to the strongest of malicious users. In this course, we will lay the groundwork for what you need to know to get started exploring the vast field of web security, and along the way you will begin to realize that security isnβt about checking boxes, but rather about embedding the thought process and principles of rock-solid security into every line of code you write. First, we will discuss why security matters to you as a web developer, then we will look at data security at an implementation level, then finally we will examine the art of maintaining your websites, apps, and services on a daily basis.
-
- 1
- 2
- 3
Security Literacy
The internet is an invaluable resource for information and entertainment, but it doesnβt always protect your privacy and identity. This course offers an overview on how to stay safe and secure when using your browser and beyond. Weβll introduce foundational concepts about how online activity translates to internet traffic. Weβll then explore some common ways that attackers can view and manipulate this traffic for their uses and how to protect against them. And finally, weβll establish some industry-recommended habits to keep you and your data secure.
-
- 1
- 2
Introduction to Data Security
Keeping data and communications secure is one of the most important topics in development today. In this course, we'll look at common methods of protecting both of these areas.
-
5 hoursBonus Series
The Treehouse Show
The Treehouse Show is our weekly conversation with the Treehouse Community.
Viewed -
- 1
- 2
- 3
- 4
PHP User Authentication
Learn how to implement a custom user authentication system that controls users access to web resources, using password hashing and JSON Web Tokens for security. The system lets users sign up, log in, and log out, limiting access to certain actions based on authorization.
-
- 1
- 2
- 3
PHP & Databases with PDO
Whether you have aspirations of working on a Content Management System, an E-Commerce Site, a new and exciting web app, or an API you will eventually need to work with a Database. PHP and Databases work together through the use of PHP Data Objects or PDO for short.
Whoops! Perhaps you can try a broader search.