Welcome to the Treehouse Library
This is a sample catalog of all the courses we offer. Browse by topic or difficulty. Sign up today and get access to our entire library. Treehouse students get access to workshops, bonus content, conferences, and more.
Ready to start learning?
Treehouse offers a 7 day free trial for new students. Get access to 1000s of hours of content. Learn to code, land your dream job.
Start Your Free Trial- Newest
-
All Topics
- All Topics
- • AI
- • JavaScript
- • Databases
- • Python
- • Design
- • React
- • HTML
- • CSS
- • Data Analysis
- • Java
- • C#
- • Android
- • Computer Science
- • PHP
- • Quality Assurance
- • APIs
- • Security
- • Digital Literacy
- • Development Tools
- • Business
- • 21st Century Skills
- • Ruby
- • Machine Learning
- • Learning Resources
- • Go Language
- • Equity, Diversity, and Inclusion (EDI)
Security
Keeping yourself, your users, and your data safe is important no matter what language or technology you use. Understanding what kinds of attacks exist and how to mitigate or prevent them will give you more control and peace of mind.
-
- 1
- 2
Working with $_GET and $_POST in PHP
This course will show you how to work with PHP Superglobals such as $GET and $POST while using a security-conscious mindset. External inputs, like HTML forms, are considered a security vulnerability so you should always filter inputs and escape outputs. Using PHP Superglobals when using external inputs such as HTML forms, cookies, sessions, and web servers will give you a security-conscious mindset that you can apply to all of your projects.
-
- 1
- 2
Using Cookies and JWTs for Secure Authentication
Refactor an existing authentication project by using cookies and JSON Web Token to increase security. Cookies are a way for a browser to store information while tokens are a stand-in or representation for something else.
-
- 1
- 2
- 3
- 4
Introduction to Algorithms
Algorithms are a fundamental topic in computer science, power many of the largest companies today and are used in making many decisions that affect our day to day lives - in obvious places like Google's PageRank algorithm to more obscure use cases like national security and local policing. In this introductory course, we're going to take our first steps towards understanding the world of algorithms and data structures. Before we can study individual algorithms we're going to spend time learning how to evaluate algorithms, how to make comparisons and how to develop algorithmic thinking
-
- 1
- 2
- 3
- 4
OWASP Top 10 Vulnerabilities
Welcome again to the realm of web security, where millions of dollars and people’s lives are on the line. Not every web application has that much on the line, but many do, and it’s your job as the developer or manager to keep your users safe! From protecting static web sites to the most complex of web services and APIs, every web developer should be aware of, and adept at writing secure code and building systems that can stand up to the strongest of malicious users. In this course, we will build on earlier courses in basic web security by diving into the OWASP Top 10 for Node.js and JavaScript. The OWASP Top 10 is a trusted knowledge framework covering the top 10 major web security vulnerabilities, as well as providing information on how to mitigate them. Throughout this course, we will explore each vulnerability in general and in the scope of how they occur in JavaScript (as the frontend) and Node.js (as the backend).
-
- 1
- 2
- 3
Introduction to Application Security
Welcome to the realm of web security, where millions of dollars and people’s lives are on the line. Well, not in all cases, but some! From protecting static web sites to the most complex of web services and APIs, every web developer should be aware of and adept at writing secure code and building systems that can stand up to the strongest of malicious users. In this course, we will lay the groundwork for what you need to know to get started exploring the vast field of web security, and along the way you will begin to realize that security isn’t about checking boxes, but rather about embedding the thought process and principles of rock-solid security into every line of code you write. First, we will discuss why security matters to you as a web developer, then we will look at data security at an implementation level, then finally we will examine the art of maintaining your websites, apps, and services on a daily basis.
-
- 1
- 2
- 3
Security Literacy
The internet is an invaluable resource for information and entertainment, but it doesn’t always protect your privacy and identity. This course offers an overview on how to stay safe and secure when using your browser and beyond. We’ll introduce foundational concepts about how online activity translates to internet traffic. We’ll then explore some common ways that attackers can view and manipulate this traffic for their uses and how to protect against them. And finally, we’ll establish some industry-recommended habits to keep you and your data secure.
-
- 1
- 2
Introduction to Data Security
Keeping data and communications secure is one of the most important topics in development today. In this course, we'll look at common methods of protecting both of these areas.
-
5 hoursBonus Series
The Treehouse Show
The Treehouse Show is our weekly conversation with the Treehouse Community.
Viewed -
- 1
- 2
- 3
- 4
PHP User Authentication
Learn how to implement a custom user authentication system that controls users access to web resources, using password hashing and JSON Web Tokens for security. The system lets users sign up, log in, and log out, limiting access to certain actions based on authorization.
-
- 1
- 2
- 3
PHP & Databases with PDO
Whether you have aspirations of working on a Content Management System, an E-Commerce Site, a new and exciting web app, or an API you will eventually need to work with a Database. PHP and Databases work together through the use of PHP Data Objects or PDO for short.
Whoops! Perhaps you can try a broader search.