Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Moodle Administration Essentials

Buy

Learn how to set up, maintain, and support your Moodle site efficiently

About This Book

  • Authorize and authenticate your Moodle site and learn about permissions and security
  • Brand your Moodle site and manage users, roles, files, and courses
  • Enhance your Moodle site to increase productivity

Who This Book Is For

If you are an experienced system administrator and know how to manage servers and set up web environments but now want to explore Moodle, this book is perfect for you. You'll get to grips with the basics and learn to manage Moodle quickly, focusing on essential tasks. Having prior knowledge of virtual learning environments would be beneficial, but is not mandatory to make the most of this book.

What You Will Learn

  • Manage user accounts, authenticate users, and control user permissions with roles
  • Enhance your Moodle site with plugins such as activity modules, admin reports, admin tools, and more
  • Brand your Moodle site with configured themes
  • Set up the structure of your site using categories in Moodle
  • Prepare your site for end-of-year rollover
  • Install Moodle on a Linux Server
  • Monitor the usage and performance of your Moodle site

In Detail

This book begins with a brief look at Moodle's background and an examination of its architectural structure and LAMP architecture.

You'll learn to create user accounts and understand the methods of authentication based on manual accounts and e-mail-based self-registrations. You'll then develop the Moodle site structure and course set up, and discover how to edit it through a sample faculty site. Next, you'll configure two of the standard themes in Moodle and apply them to organizational branding. You'll also explore how plugins are configured and installed, and learn about backing up, resetting, and restoring Moodle courses.

Finally, you'll learn Moodle's security options, along with performance testing, and how to use the built-in Moodle performance testing script.

(HTML tags aren't allowed.)

Excavate!: The Wonderful and Frightening World of The Fall
Excavate!: The Wonderful and Frightening World of The Fall

This is a book about Mark E. Smith and The Fall - or more precisely, their ever-influential world. The Fall were so many things, so many worlds; if you got it (and not everyone did), they represented everything.

'To 50,000 Fall Fans: please buy this inspired & inspiring, profound & provocative,
...

Structural Packaging: Design Your Own Boxes and 3D Forms
Structural Packaging: Design Your Own Boxes and 3D Forms

Unlike other packaging titles, which simply provide templates to copy, this book enables designers of all packaging types to create 3-D packaging forms that are specific to their needs rather than based on an existing design. Structural Packaging gives the reader an understanding of the underlying principles of packaging construction...

IT Auditing Using Controls to Protect Information Assets, 2nd Edition
IT Auditing Using Controls to Protect Information Assets, 2nd Edition

When we began writing this book, we had a fundamental tenet: Write a clear handbook for creating the organization’s IT audit function and for performing their IT audits. We wanted this book to provide more than checklists and textbook theories but instead to provide real-life practical guidance from people who have performed IT...


Cisco multicast routing and switching
Cisco multicast routing and switching

Another offering in the Cisco Technical Expert series, this book provides a good introduction to IP multicasting and Cisco routers. The important protocols for multicast service are covered in detail, including a discussion on the Internet Group Management Protocol (IGMP) and the Cisco Group Management Protocol (CGMP). Following...

Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Protected: Internet, Intranet, & Virtual Private Networks
Protected: Internet, Intranet, & Virtual Private Networks
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy