Pluralsight - Securing IIS Websites by Jeremy Morgan 收录时间:2020-03-31 23:36:41 文件大小:365MB 下载次数:52 最近下载:2021-01-21 01:36:36 磁力链接: magnet:?xt=urn:btih:272f54c3dc867652304c919bd521a980b00b6433 立即下载 复制链接 文件列表 6. Monitoring Your Server/2. Event Tracing For Windows.mp4 22MB 1. Securing Windows Systems/4. Configuring Windows Firewall.mp4 16MB 6. Monitoring Your Server/1. Reviewing Access Logs.mp4 15MB 2. Reducing IIS Vulnerabilities/6. IP Address Restrictions.mp4 15MB 2. Reducing IIS Vulnerabilities/2. Reducing Exposed Information.mp4 13MB 2. Reducing IIS Vulnerabilities/7. HTTP Request Filtering.mp4 13MB 5. Securing Your Applications/5. Handling Mappings.mp4 12MB 5. Securing Your Applications/1. Managing Accounts.mp4 12MB securing-iis-websites.zip 12MB 5. Securing Your Applications/3. Securing Application Pools.mp4 12MB 6. Monitoring Your Server/4. Using Log Parser.mp4 12MB 1. Securing Windows Systems/5. Disabling Windows Services.mp4 11MB 3. Leveraging SSL and TLS on Your IIS Server/4. Installing SSL Certificates.mp4 11MB 1. Securing Windows Systems/7. Securing Windows Accounts.mp4 11MB 2. Reducing IIS Vulnerabilities/4. Removing Unneeded IIS Modules.mp4 11MB 6. Monitoring Your Server/5. Health and Diagnostics.mp4 11MB 5. Securing Your Applications/2. Cross-Origin Resource Sharing (CORS).mp4 10MB 1. Securing Windows Systems/2. Updating Windows.mp4 10MB 4. Familiarizing Yourself with Exploits/5. SQL Injection.mp4 9MB 5. Securing Your Applications/6. Authentication Methods.mp4 9MB 1. Securing Windows Systems/6. Removing Windows Features.mp4 9MB 2. Reducing IIS Vulnerabilities/5. Locking Down Error Pages.mp4 8MB 2. Reducing IIS Vulnerabilities/3. IIS Vulnerabilities.mp4 8MB 4. Familiarizing Yourself with Exploits/2. CRLF Injection.mp4 8MB 3. Leveraging SSL and TLS on Your IIS Server/2. Cipher Suites.mp4 7MB 5. Securing Your Applications/4. File and Folder Security.mp4 7MB 3. Leveraging SSL and TLS on Your IIS Server/1. SSL Basics.mp4 7MB 3. Leveraging SSL and TLS on Your IIS Server/5. HTTP-2 and HTTP-3.mp4 6MB 3. Leveraging SSL and TLS on Your IIS Server/3. Disabling TLS-SSL.mp4 6MB 6. Monitoring Your Server/3. Windows Event Viewer.mp4 6MB 2. Reducing IIS Vulnerabilities/1. IIS Attack Surface.mp4 6MB 1. Securing Windows Systems/1. Reducing Your Attack Surface.mp4 4MB 4. Familiarizing Yourself with Exploits/1. Buffer Overflow.mp4 4MB 6. Monitoring Your Server/6. Creating a Security Monitoring Plan.mp4 4MB 4. Familiarizing Yourself with Exploits/6. Man in the Middle (MITM) Attacks.mp4 3MB 1. Securing Windows Systems/3. Understanding Windows Firewall.mp4 3MB 4. Familiarizing Yourself with Exploits/7. Brute Force - Dictionary Attacks.mp4 3MB 4. Familiarizing Yourself with Exploits/4. Cross Site Scripting.mp4 2MB 0. Course Overview/0. Course Overview.mp4 2MB 1. Securing Windows Systems/0. Introduction.mp4 2MB 4. Familiarizing Yourself with Exploits/3. Phishing.mp4 2MB 2. Reducing IIS Vulnerabilities/0. Introduction.mp4 1MB 3. Leveraging SSL and TLS on Your IIS Server/0. Introduction.mp4 914KB 5. Securing Your Applications/0. Introduction.mp4 900KB 1. Securing Windows Systems/8. Conclusion.mp4 856KB 6. Monitoring Your Server/0. Introduction.mp4 842KB 4. Familiarizing Yourself with Exploits/8. Summary.mp4 801KB 6. Monitoring Your Server/7. Summary.mp4 720KB 4. Familiarizing Yourself with Exploits/0. Introduction.mp4 707KB 3. Leveraging SSL and TLS on Your IIS Server/6. Conclusion.mp4 693KB 2. Reducing IIS Vulnerabilities/8. Summary.mp4 690KB 5. Securing Your Applications/7. Summary.mp4 597KB 2. Reducing IIS Vulnerabilities/7. HTTP Request Filtering.srt 16KB 5. Securing Your Applications/1. Managing Accounts.srt 13KB 2. Reducing IIS Vulnerabilities/3. IIS Vulnerabilities.srt 12KB 5. Securing Your Applications/6. Authentication Methods.srt 12KB 1. Securing Windows Systems/7. Securing Windows Accounts.srt 11KB 2. Reducing IIS Vulnerabilities/6. IP Address Restrictions.srt 10KB 1. Securing Windows Systems/2. Updating Windows.srt 10KB 1. Securing Windows Systems/4. Configuring Windows Firewall.srt 10KB 5. Securing Your Applications/5. Handling Mappings.srt 9KB 2. Reducing IIS Vulnerabilities/2. Reducing Exposed Information.srt 9KB 6. Monitoring Your Server/1. Reviewing Access Logs.srt 9KB 3. Leveraging SSL and TLS on Your IIS Server/1. SSL Basics.srt 9KB 3. Leveraging SSL and TLS on Your IIS Server/4. Installing SSL Certificates.srt 9KB 3. Leveraging SSL and TLS on Your IIS Server/5. HTTP-2 and HTTP-3.srt 8KB 5. Securing Your Applications/2. Cross-Origin Resource Sharing (CORS).srt 8KB 3. Leveraging SSL and TLS on Your IIS Server/2. Cipher Suites.srt 8KB 6. Monitoring Your Server/4. Using Log Parser.srt 8KB 5. Securing Your Applications/4. File and Folder Security.srt 8KB 5. Securing Your Applications/3. Securing Application Pools.srt 7KB 4. Familiarizing Yourself with Exploits/1. Buffer Overflow.srt 7KB 6. Monitoring Your Server/6. Creating a Security Monitoring Plan.srt 7KB 6. Monitoring Your Server/5. Health and Diagnostics.srt 7KB 1. Securing Windows Systems/5. Disabling Windows Services.srt 7KB 4. Familiarizing Yourself with Exploits/5. SQL Injection.srt 7KB 2. Reducing IIS Vulnerabilities/5. Locking Down Error Pages.srt 7KB 2. Reducing IIS Vulnerabilities/4. Removing Unneeded IIS Modules.srt 7KB 6. Monitoring Your Server/2. Event Tracing For Windows.srt 6KB 1. Securing Windows Systems/6. Removing Windows Features.srt 6KB 2. Reducing IIS Vulnerabilities/1. IIS Attack Surface.srt 6KB 1. Securing Windows Systems/1. Reducing Your Attack Surface.srt 5KB 4. Familiarizing Yourself with Exploits/2. CRLF Injection.srt 5KB 4. Familiarizing Yourself with Exploits/6. Man in the Middle (MITM) Attacks.srt 4KB 3. Leveraging SSL and TLS on Your IIS Server/3. Disabling TLS-SSL.srt 4KB 1. Securing Windows Systems/3. Understanding Windows Firewall.srt 4KB 6. Monitoring Your Server/3. Windows Event Viewer.srt 4KB 4. Familiarizing Yourself with Exploits/4. Cross Site Scripting.srt 3KB 4. Familiarizing Yourself with Exploits/7. Brute Force - Dictionary Attacks.srt 3KB 4. Familiarizing Yourself with Exploits/3. Phishing.srt 3KB content.txt 2KB 1. Securing Windows Systems/0. Introduction.srt 2KB 0. Course Overview/0. Course Overview.srt 2KB 2. Reducing IIS Vulnerabilities/0. Introduction.srt 1KB 3. Leveraging SSL and TLS on Your IIS Server/0. Introduction.srt 1KB 6. Monitoring Your Server/0. Introduction.srt 1KB 1. Securing Windows Systems/8. Conclusion.srt 1KB 5. Securing Your Applications/0. Introduction.srt 1KB 6. Monitoring Your Server/7. Summary.srt 965B 4. Familiarizing Yourself with Exploits/8. Summary.srt 954B 3. Leveraging SSL and TLS on Your IIS Server/6. Conclusion.srt 948B 2. Reducing IIS Vulnerabilities/8. Summary.srt 874B 4. Familiarizing Yourself with Exploits/0. Introduction.srt 874B 5. Securing Your Applications/7. Summary.srt 783B