589689.xyz

Pluralsight - Securing IIS Websites by Jeremy Morgan

  • 收录时间:2020-03-31 23:36:41
  • 文件大小:365MB
  • 下载次数:52
  • 最近下载:2021-01-21 01:36:36
  • 磁力链接:

文件列表

  1. 6. Monitoring Your Server/2. Event Tracing For Windows.mp4 22MB
  2. 1. Securing Windows Systems/4. Configuring Windows Firewall.mp4 16MB
  3. 6. Monitoring Your Server/1. Reviewing Access Logs.mp4 15MB
  4. 2. Reducing IIS Vulnerabilities/6. IP Address Restrictions.mp4 15MB
  5. 2. Reducing IIS Vulnerabilities/2. Reducing Exposed Information.mp4 13MB
  6. 2. Reducing IIS Vulnerabilities/7. HTTP Request Filtering.mp4 13MB
  7. 5. Securing Your Applications/5. Handling Mappings.mp4 12MB
  8. 5. Securing Your Applications/1. Managing Accounts.mp4 12MB
  9. securing-iis-websites.zip 12MB
  10. 5. Securing Your Applications/3. Securing Application Pools.mp4 12MB
  11. 6. Monitoring Your Server/4. Using Log Parser.mp4 12MB
  12. 1. Securing Windows Systems/5. Disabling Windows Services.mp4 11MB
  13. 3. Leveraging SSL and TLS on Your IIS Server/4. Installing SSL Certificates.mp4 11MB
  14. 1. Securing Windows Systems/7. Securing Windows Accounts.mp4 11MB
  15. 2. Reducing IIS Vulnerabilities/4. Removing Unneeded IIS Modules.mp4 11MB
  16. 6. Monitoring Your Server/5. Health and Diagnostics.mp4 11MB
  17. 5. Securing Your Applications/2. Cross-Origin Resource Sharing (CORS).mp4 10MB
  18. 1. Securing Windows Systems/2. Updating Windows.mp4 10MB
  19. 4. Familiarizing Yourself with Exploits/5. SQL Injection.mp4 9MB
  20. 5. Securing Your Applications/6. Authentication Methods.mp4 9MB
  21. 1. Securing Windows Systems/6. Removing Windows Features.mp4 9MB
  22. 2. Reducing IIS Vulnerabilities/5. Locking Down Error Pages.mp4 8MB
  23. 2. Reducing IIS Vulnerabilities/3. IIS Vulnerabilities.mp4 8MB
  24. 4. Familiarizing Yourself with Exploits/2. CRLF Injection.mp4 8MB
  25. 3. Leveraging SSL and TLS on Your IIS Server/2. Cipher Suites.mp4 7MB
  26. 5. Securing Your Applications/4. File and Folder Security.mp4 7MB
  27. 3. Leveraging SSL and TLS on Your IIS Server/1. SSL Basics.mp4 7MB
  28. 3. Leveraging SSL and TLS on Your IIS Server/5. HTTP-2 and HTTP-3.mp4 6MB
  29. 3. Leveraging SSL and TLS on Your IIS Server/3. Disabling TLS-SSL.mp4 6MB
  30. 6. Monitoring Your Server/3. Windows Event Viewer.mp4 6MB
  31. 2. Reducing IIS Vulnerabilities/1. IIS Attack Surface.mp4 6MB
  32. 1. Securing Windows Systems/1. Reducing Your Attack Surface.mp4 4MB
  33. 4. Familiarizing Yourself with Exploits/1. Buffer Overflow.mp4 4MB
  34. 6. Monitoring Your Server/6. Creating a Security Monitoring Plan.mp4 4MB
  35. 4. Familiarizing Yourself with Exploits/6. Man in the Middle (MITM) Attacks.mp4 3MB
  36. 1. Securing Windows Systems/3. Understanding Windows Firewall.mp4 3MB
  37. 4. Familiarizing Yourself with Exploits/7. Brute Force - Dictionary Attacks.mp4 3MB
  38. 4. Familiarizing Yourself with Exploits/4. Cross Site Scripting.mp4 2MB
  39. 0. Course Overview/0. Course Overview.mp4 2MB
  40. 1. Securing Windows Systems/0. Introduction.mp4 2MB
  41. 4. Familiarizing Yourself with Exploits/3. Phishing.mp4 2MB
  42. 2. Reducing IIS Vulnerabilities/0. Introduction.mp4 1MB
  43. 3. Leveraging SSL and TLS on Your IIS Server/0. Introduction.mp4 914KB
  44. 5. Securing Your Applications/0. Introduction.mp4 900KB
  45. 1. Securing Windows Systems/8. Conclusion.mp4 856KB
  46. 6. Monitoring Your Server/0. Introduction.mp4 842KB
  47. 4. Familiarizing Yourself with Exploits/8. Summary.mp4 801KB
  48. 6. Monitoring Your Server/7. Summary.mp4 720KB
  49. 4. Familiarizing Yourself with Exploits/0. Introduction.mp4 707KB
  50. 3. Leveraging SSL and TLS on Your IIS Server/6. Conclusion.mp4 693KB
  51. 2. Reducing IIS Vulnerabilities/8. Summary.mp4 690KB
  52. 5. Securing Your Applications/7. Summary.mp4 597KB
  53. 2. Reducing IIS Vulnerabilities/7. HTTP Request Filtering.srt 16KB
  54. 5. Securing Your Applications/1. Managing Accounts.srt 13KB
  55. 2. Reducing IIS Vulnerabilities/3. IIS Vulnerabilities.srt 12KB
  56. 5. Securing Your Applications/6. Authentication Methods.srt 12KB
  57. 1. Securing Windows Systems/7. Securing Windows Accounts.srt 11KB
  58. 2. Reducing IIS Vulnerabilities/6. IP Address Restrictions.srt 10KB
  59. 1. Securing Windows Systems/2. Updating Windows.srt 10KB
  60. 1. Securing Windows Systems/4. Configuring Windows Firewall.srt 10KB
  61. 5. Securing Your Applications/5. Handling Mappings.srt 9KB
  62. 2. Reducing IIS Vulnerabilities/2. Reducing Exposed Information.srt 9KB
  63. 6. Monitoring Your Server/1. Reviewing Access Logs.srt 9KB
  64. 3. Leveraging SSL and TLS on Your IIS Server/1. SSL Basics.srt 9KB
  65. 3. Leveraging SSL and TLS on Your IIS Server/4. Installing SSL Certificates.srt 9KB
  66. 3. Leveraging SSL and TLS on Your IIS Server/5. HTTP-2 and HTTP-3.srt 8KB
  67. 5. Securing Your Applications/2. Cross-Origin Resource Sharing (CORS).srt 8KB
  68. 3. Leveraging SSL and TLS on Your IIS Server/2. Cipher Suites.srt 8KB
  69. 6. Monitoring Your Server/4. Using Log Parser.srt 8KB
  70. 5. Securing Your Applications/4. File and Folder Security.srt 8KB
  71. 5. Securing Your Applications/3. Securing Application Pools.srt 7KB
  72. 4. Familiarizing Yourself with Exploits/1. Buffer Overflow.srt 7KB
  73. 6. Monitoring Your Server/6. Creating a Security Monitoring Plan.srt 7KB
  74. 6. Monitoring Your Server/5. Health and Diagnostics.srt 7KB
  75. 1. Securing Windows Systems/5. Disabling Windows Services.srt 7KB
  76. 4. Familiarizing Yourself with Exploits/5. SQL Injection.srt 7KB
  77. 2. Reducing IIS Vulnerabilities/5. Locking Down Error Pages.srt 7KB
  78. 2. Reducing IIS Vulnerabilities/4. Removing Unneeded IIS Modules.srt 7KB
  79. 6. Monitoring Your Server/2. Event Tracing For Windows.srt 6KB
  80. 1. Securing Windows Systems/6. Removing Windows Features.srt 6KB
  81. 2. Reducing IIS Vulnerabilities/1. IIS Attack Surface.srt 6KB
  82. 1. Securing Windows Systems/1. Reducing Your Attack Surface.srt 5KB
  83. 4. Familiarizing Yourself with Exploits/2. CRLF Injection.srt 5KB
  84. 4. Familiarizing Yourself with Exploits/6. Man in the Middle (MITM) Attacks.srt 4KB
  85. 3. Leveraging SSL and TLS on Your IIS Server/3. Disabling TLS-SSL.srt 4KB
  86. 1. Securing Windows Systems/3. Understanding Windows Firewall.srt 4KB
  87. 6. Monitoring Your Server/3. Windows Event Viewer.srt 4KB
  88. 4. Familiarizing Yourself with Exploits/4. Cross Site Scripting.srt 3KB
  89. 4. Familiarizing Yourself with Exploits/7. Brute Force - Dictionary Attacks.srt 3KB
  90. 4. Familiarizing Yourself with Exploits/3. Phishing.srt 3KB
  91. content.txt 2KB
  92. 1. Securing Windows Systems/0. Introduction.srt 2KB
  93. 0. Course Overview/0. Course Overview.srt 2KB
  94. 2. Reducing IIS Vulnerabilities/0. Introduction.srt 1KB
  95. 3. Leveraging SSL and TLS on Your IIS Server/0. Introduction.srt 1KB
  96. 6. Monitoring Your Server/0. Introduction.srt 1KB
  97. 1. Securing Windows Systems/8. Conclusion.srt 1KB
  98. 5. Securing Your Applications/0. Introduction.srt 1KB
  99. 6. Monitoring Your Server/7. Summary.srt 965B
  100. 4. Familiarizing Yourself with Exploits/8. Summary.srt 954B
  101. 3. Leveraging SSL and TLS on Your IIS Server/6. Conclusion.srt 948B
  102. 2. Reducing IIS Vulnerabilities/8. Summary.srt 874B
  103. 4. Familiarizing Yourself with Exploits/0. Introduction.srt 874B
  104. 5. Securing Your Applications/7. Summary.srt 783B