Содержание
Course Overview 1m 4s Course Overview 1m 4s Securing Windows Systems 28m 49s Introduction 59s Reducing Your Attack Surface 2m 39s Updating Windows 4m 48s Understanding Windows Firewall 2m 13s Configuring Windows Firewall 5m 9s Disabling Windows Services 3m 24s Removing Windows Features 3m 10s Securing Windows Accounts 5m 42s Conclusion 40sReducing IIS Vulnerabilities 36m 24s Introduction 44s IIS Attack Surface 3m 2s Reducing Exposed Information 5m 20s IIS Vulnerabilities 5m 57s Removing Unneeded IIS Modules 3m 44s Locking Down Error Pages 3m 40s IP Address Restrictions 5m 39s HTTP Request Filtering 7m 44s Summary 31sLeveraging SSL and TLS on Your IIS Server 22m 30s Introduction 39s SSL Basics 4m 43s Cipher Suites 4m 21s Disabling TLS/SSL 2m 30s Installing SSL Certificates 4m 48s HTTP/2 and HTTP/3 4m 51s Conclusion 33sFamiliarizing Yourself with Exploits 17m 53s Introduction 29s Buffer Overflow 3m 33s CRLF Injection 2m 35s Phishing 1m 24s Cross Site Scripting 1m 42s SQL Injection 3m 40s Man in the Middle (MITM) Attacks 2m 20s Brute Force / Dictionary Attacks 1m 30s Summary 36sSecuring Your Applications 31m 14s Introduction 37s Managing Accounts 6m 39s Cross-Origin Resource Sharing (CORS) 4m 27s Securing Application Pools 3m 54s File and Folder Security 4m 18s Handling Mappings 5m 0s Authentication Methods 5m 51s Summary 25sMonitoring Your Server 23m 29s Introduction 33s Reviewing Access Logs 4m 54s Event Tracing For Windows 3m 6s Windows Event Viewer 2m 9s Using Log Parser 4m 53s Health and Diagnostics 3m 45s Creating a Security Monitoring Plan 3m 35s Summary 31s