RAR-files |
rebar-pluralsight.securing.iis.websites.rar |
15,000,000 |
525ED594 |
rebar-pluralsight.securing.iis.websites.r00 |
15,000,000 |
D505E3DE |
rebar-pluralsight.securing.iis.websites.r01 |
15,000,000 |
1F8B15B4 |
rebar-pluralsight.securing.iis.websites.r02 |
15,000,000 |
8B1691E6 |
rebar-pluralsight.securing.iis.websites.r03 |
15,000,000 |
8370A964 |
rebar-pluralsight.securing.iis.websites.r04 |
15,000,000 |
C6FAA947 |
rebar-pluralsight.securing.iis.websites.r05 |
15,000,000 |
746C9477 |
rebar-pluralsight.securing.iis.websites.r06 |
15,000,000 |
F82EFBFA |
rebar-pluralsight.securing.iis.websites.r07 |
15,000,000 |
71105C54 |
rebar-pluralsight.securing.iis.websites.r08 |
15,000,000 |
163196C1 |
rebar-pluralsight.securing.iis.websites.r09 |
15,000,000 |
E9C503D1 |
rebar-pluralsight.securing.iis.websites.r10 |
15,000,000 |
32F0A3F6 |
rebar-pluralsight.securing.iis.websites.r11 |
15,000,000 |
D2C6BE14 |
rebar-pluralsight.securing.iis.websites.r12 |
15,000,000 |
8F2C307B |
rebar-pluralsight.securing.iis.websites.r13 |
15,000,000 |
046FCCBB |
rebar-pluralsight.securing.iis.websites.r14 |
15,000,000 |
310047F3 |
rebar-pluralsight.securing.iis.websites.r15 |
15,000,000 |
AFF9F346 |
rebar-pluralsight.securing.iis.websites.r16 |
15,000,000 |
EC9849E2 |
rebar-pluralsight.securing.iis.websites.r17 |
15,000,000 |
FFB11480 |
rebar-pluralsight.securing.iis.websites.r18 |
15,000,000 |
95238719 |
rebar-pluralsight.securing.iis.websites.r19 |
15,000,000 |
2861E407 |
rebar-pluralsight.securing.iis.websites.r20 |
15,000,000 |
C035F2B8 |
rebar-pluralsight.securing.iis.websites.r21 |
15,000,000 |
1A7E2F09 |
rebar-pluralsight.securing.iis.websites.r22 |
15,000,000 |
B051108C |
rebar-pluralsight.securing.iis.websites.r23 |
15,000,000 |
521A2443 |
rebar-pluralsight.securing.iis.websites.r24 |
7,758,560 |
F1AE4F92 |
|
Total size: |
382,758,560 |
|
|
Archived
files |
01 - Course Overview\01 - Course Overview.mp4
[b9240590d91b98e9]
|
2,305,603 |
83382B53 |
02 - Securing Windows Systems\02 - Introduction.mp4
[69193066e953c928]
|
2,111,945 |
652E9830 |
02 - Securing Windows Systems\03 - Reducing Your Attack Surface.mp4
[165659874c090cb2]
|
4,672,973 |
F583C9A4 |
02 - Securing Windows Systems\04 - Updating Windows.mp4
[17d25f893e66e52a]
|
10,083,011 |
86E73191 |
02 - Securing Windows Systems\05 - Understanding Windows Firewall.mp4
[3bdbafdf08bd00b1]
|
2,897,315 |
663C7A80 |
02 - Securing Windows Systems\06 - Configuring Windows Firewall.mp4
[54f87395b0516860]
|
16,862,474 |
ADE5A526 |
02 - Securing Windows Systems\07 - Disabling Windows Services.mp4
[906d12002eacf3d6]
|
11,936,206 |
192611B9 |
02 - Securing Windows Systems\08 - Removing Windows Features.mp4
[dc259abab0d7796c]
|
9,602,688 |
0412CC51 |
02 - Securing Windows Systems\09 - Securing Windows Accounts.mp4
[2f86579df109be8e]
|
11,637,777 |
6EFC848B |
02 - Securing Windows Systems\10 - Conclusion.mp4
[60d250a7fae1c85a]
|
876,112 |
945EA4E2 |
03 - Reducing IIS Vulnerabilities\11 - Introduction.mp4
[afd4b9d79c1d43a5]
|
1,088,734 |
4B40D726 |
03 - Reducing IIS Vulnerabilities\12 - IIS Attack Surface.mp4
[d135aa0d8b637e95]
|
6,048,214 |
D4C2B496 |
03 - Reducing IIS Vulnerabilities\13 - Reducing Exposed Information.mp4
[441bac65d1b2426d]
|
13,905,834 |
21114C31 |
03 - Reducing IIS Vulnerabilities\14 - IIS Vulnerabilities.mp4
[6871843dd19c0064]
|
8,640,069 |
9CB3CDF9 |
03 - Reducing IIS Vulnerabilities\15 - Removing Unneeded IIS Modules.mp4
[e1f7baa1072e6929]
|
11,304,892 |
ACAC2B89 |
03 - Reducing IIS Vulnerabilities\16 - Locking Down Error Pages.mp4
[dcaa834122748a6c]
|
8,773,121 |
FD2FA200 |
03 - Reducing IIS Vulnerabilities\17 - IP Address Restrictions.mp4
[d87df7f83101a0c2]
|
15,599,700 |
2AE9F644 |
03 - Reducing IIS Vulnerabilities\18 - HTTP Request Filtering.mp4
[99de35e55cd00]
|
13,462,710 |
47322231 |
03 - Reducing IIS Vulnerabilities\19 - Summary.mp4
[bbd85c49735c8efc]
|
706,456 |
80FBF5DE |
04 - Leveraging SSL and TLS on Your IIS Server\20 - Introduction.mp4
[6f8b775a6ecb3cb4]
|
935,953 |
C9D8F98F |
04 - Leveraging SSL and TLS on Your IIS Server\21 - SSL Basics.mp4
[66f3dabfd9855464]
|
7,097,102 |
822E114C |
04 - Leveraging SSL and TLS on Your IIS Server\22 - Cipher Suites.mp4
[9e1ad953a400ee9a]
|
7,524,361 |
255B8CE4 |
04 - Leveraging SSL and TLS on Your IIS Server\23 - Disabling TLS-SSL.mp4
[757d01882f856bc]
|
6,452,231 |
1C7ED6E5 |
04 - Leveraging SSL and TLS on Your IIS Server\24 - Installing SSL Certificates.mp4
[e4b80be7a9e84547]
|
11,802,942 |
1429E1F6 |
04 - Leveraging SSL and TLS on Your IIS Server\25 - HTTP-2 and HTTP-3.mp4
[b5d22bc648c6ea5]
|
6,622,336 |
C3F5AB86 |
04 - Leveraging SSL and TLS on Your IIS Server\26 - Conclusion.mp4
[c0c6bff827c604ff]
|
710,011 |
A966977D |
05 - Familiarizing Yourself with Exploits\27 - Introduction.mp4
[e05e6eb5d36db504]
|
724,472 |
2C9FCAB3 |
05 - Familiarizing Yourself with Exploits\28 - Buffer Overflow.mp4
[39f2c1200abd3334]
|
4,663,595 |
B470CB87 |
05 - Familiarizing Yourself with Exploits\29 - CRLF Injection.mp4
[2ee2ec3de677bc6b]
|
8,578,049 |
9815E353 |
05 - Familiarizing Yourself with Exploits\30 - Phishing.mp4
[ff7414719c63ec8c]
|
1,613,767 |
93489E24 |
05 - Familiarizing Yourself with Exploits\31 - Cross Site Scripting.mp4
[66072f73104d65b4]
|
2,365,679 |
A1BDE9AA |
05 - Familiarizing Yourself with Exploits\32 - SQL Injection.mp4
[d24410c8e4258aec]
|
9,952,913 |
27065B00 |
05 - Familiarizing Yourself with Exploits\33 - Man in the Middle (MITM) Attacks.mp4
[1a4c36b458169bbc]
|
3,531,783 |
5B9D5657 |
05 - Familiarizing Yourself with Exploits\34 - Brute Force - Dictionary Attacks.mp4
[e24bf45c593479bf]
|
2,681,678 |
6439DFA3 |
05 - Familiarizing Yourself with Exploits\35 - Summary.mp4
[f8106dced9efd6fb]
|
820,200 |
50304FC7 |
06 - Securing Your Applications\36 - Introduction.mp4
[457ce3d3b2ce63e6]
|
921,354 |
4A90E6E6 |
06 - Securing Your Applications\37 - Managing Accounts.mp4
[4af7cf0ecdf00bea]
|
12,912,752 |
15FAD48B |
06 - Securing Your Applications\38 - Cross-Origin Resource Sharing (CORS).mp4
[c2c8bec1cfaf70f6]
|
10,279,604 |
0AA3EA78 |
06 - Securing Your Applications\39 - Securing Application Pools.mp4
[a8dc5c52a71e9012]
|
12,424,700 |
B56A3233 |
06 - Securing Your Applications\40 - File and Folder Security.mp4
[93a06eee8568872d]
|
7,130,588 |
DF8BE295 |
06 - Securing Your Applications\41 - Handling Mappings.mp4
[1f1171a84b093e6f]
|
13,100,726 |
ED0784A2 |
06 - Securing Your Applications\42 - Authentication Methods.mp4
[50ef52c53c4e05d7]
|
9,806,852 |
9BCA16A6 |
06 - Securing Your Applications\43 - Summary.mp4
[ebd2122012a8ce53]
|
611,820 |
F1AE9CF2 |
07 - Monitoring Your Server\44 - Introduction.mp4
[3301d91b6046ed28]
|
861,891 |
AC8A5C13 |
07 - Monitoring Your Server\45 - Reviewing Access Logs.mp4
[8441e5d3a5e7b558]
|
15,868,167 |
0F968E87 |
07 - Monitoring Your Server\46 - Event Tracing For Windows.mp4
[5ecdd9bcce418315]
|
22,651,413 |
BA6DADD5 |
07 - Monitoring Your Server\47 - Windows Event Viewer.mp4
[e881dbf37d25e8a4]
|
6,208,477 |
14D1D67D |
07 - Monitoring Your Server\48 - Using Log Parser.mp4
[3ba5f195626ca793]
|
12,307,026 |
6C7B0C7E |
07 - Monitoring Your Server\49 - Health and Diagnostics.mp4
[5c6fab3ef00d3b8a]
|
11,225,001 |
593014B7 |
07 - Monitoring Your Server\50 - Creating a Security Monitoring Plan.mp4
[29ca75ec477d7d30]
|
4,621,140 |
A798EE24 |
07 - Monitoring Your Server\51 - Summary.mp4
[a5fe08bf138a5e08]
|
737,079 |
FD5F0993 |
securing-iis-websites.zip |
12,488,131 |
3D155888 |
01 - Course Overview |
0 |
00000000 |
02 - Securing Windows Systems |
0 |
00000000 |
03 - Reducing IIS Vulnerabilities |
0 |
00000000 |
04 - Leveraging SSL and TLS on Your IIS Server |
0 |
00000000 |
05 - Familiarizing Yourself with Exploits |
0 |
00000000 |
06 - Securing Your Applications |
0 |
00000000 |
07 - Monitoring Your Server |
0 |
00000000 |
|
Total size: |
382,749,627 |
|
|