Ultimate IIS
A 3- to 5-day
custom course on Microsoft's Internet
Information Server, at an intermediate to advanced level.
Course developer: Brett Hill
A. Securing
Windows 2000 for IIS
B. Upgrading Key Security
C. Automating Hotfix Installation
D. Recommended Registry Edits
E. Disabling NetBIOS and Direct Host
F. Hardening TCP/IP
G. What Services to Disable
H. How to Set NTFS Permissions
I. How
to Prevent 95% of All Attacks
J. How to Prepare IIS 5 for the Internet
K. Securing WebDAV
L. Monitoring and Intrusion Detection
M. XP as a Development Client
N. Using Security Analysis and Configuration Templates
O. IPSec and IIS
A. Installing
IIS 5
B. Upgrading IIS 4
C. IIS 5 Installation FAQ
D. Installing to a Custom Location
E. IIS 5 Installation Log
F. Troubleshooting the Installation
G. Solving Reinstallation Problems
H. Migration Upgrade Pros and Cons
I. In-Place Upgrade Pros and Cons
J. The Domain Controller Issue
K. IIS 5 In-Place Upgrade Techniques
L. Transferring Local Users and Groups
M. Transferring the Metabase
N. The IIS Import Wizard, Pros and Cons
O. Using MetaEdit as a Migration Tool
A. Quick Configuration
Guide
B. Host Headers: Virtually Unknown Facts
C. Virtual Directories: Undocumented Tips
D. IIS 5 Reliable Restarts
E. IIS Reset Use and Potential Problems
F. CPU Throttling
G. Undocumented Socket Pooling Issues
H. Using WebDAV
I. HTTP Compression: How, When, and Potential Problems
J. Configuring IIS for ASP
A. When is
Kerberos Used?
B. Common Mistakes in Authentication Configuration
C. Changing the Anonymous User
D. Authentication Impacts on Scalability
E. Is Windows Integrated Authentication Secure?
F. Client Certificate Authentication
G. Installing and Using SSL
Content on this page copyright 2002, 2003 by Independent Software, Inc. and/or Brett Hill