Ultimate IIS

A 3- to 5-day custom course on Microsoft's Internet
Information Server, at an intermediate to advanced level.
Course developer: Brett Hill

This course is offered both publicly and on a custom on-site basis, in conjunction with Brett Hill.

1. IIS and W2K Security

A. Securing Windows 2000 for IIS
B. Upgrading Key Security
C. Automating Hotfix Installation
D. Recommended Registry Edits
E. Disabling NetBIOS and Direct Host
F. Hardening TCP/IP
G. What Services to Disable
H. How to Set NTFS Permissions
I.
How to Prevent 95% of All Attacks
J. How to Prepare IIS 5 for the Internet
K. Securing WebDAV
L. Monitoring and Intrusion Detection
M. XP as a Development Client
N. Using Security Analysis and Configuration Templates
O. IPSec and IIS

2. IIS Architecture and Performance

A. Performance Tuning IIS
B. Application Protection Levels
C. COM+ and IIS
D. Performance Tuning ASP
E. IIS and CGI: Surprising Details
F. Impacts of ASP.NET on Architecture

3. Installing IIS 5 and Upgrading IIS 4

A. Installing IIS 5
B. Upgrading IIS 4
C. IIS 5 Installation FAQ
D. Installing to a Custom Location
E. IIS 5 Installation Log
F. Troubleshooting the Installation
G. Solving Reinstallation Problems
H. Migration Upgrade Pros and Cons
I. In-Place Upgrade Pros and Cons
J. The Domain Controller Issue
K. IIS 5 In-Place Upgrade Techniques
L. Transferring Local Users and Groups
M. Transferring the Metabase
N. The IIS Import Wizard, Pros and Cons
O. Using MetaEdit as a Migration Tool

4. IIS 5 Configuration: Beyond the Basics

A. Quick Configuration Guide
B. Host Headers: Virtually Unknown Facts
C. Virtual Directories: Undocumented Tips
D. IIS 5 Reliable Restarts
E. IIS Reset Use and Potential Problems
F. CPU Throttling
G. Undocumented Socket Pooling Issues
H. Using WebDAV
I. HTTP Compression: How, When, and Potential Problems
J. Configuring IIS for ASP

5. IIS Authentication

A. When is Kerberos Used?
B. Common Mistakes in Authentication Configuration
C. Changing the Anonymous User
D. Authentication Impacts on Scalability
E. Is Windows Integrated Authentication Secure?
F. Client Certificate Authentication
G. Installing and Using SSL

6. The Metabase

A. The Metabase Structure
B. How to Identify a Website by Number
C. Inheritance
D. Using MetaEdit
E. Securing and Recovering the Metabase

Content on this page copyright 2002, 2003 by Independent Software, Inc. and/or Brett Hill