
Learn all about PowerShell security concepts, tools and capabilities (with Hands-On Lab)
What you'll learn
- Understand the architecture of Powershell
- Analyze PowerShell Auditing and Logging
- Analyze and debug scripts
- Deploy Powershell operational security
- Enhance server management with Desired State Configuration and Just Enough Administration
- Understand Powershell based exploits and their remediation
Requirements
- Basic understanding of Windows Powershell
- Good foundation in accessing and using simple Windows Powershell commands
Description
In this course, we will examine the concepts of PowerShell from a security stand point. We will cover topics like PowerShell architecture, PowerShell Remoting capabilities, Desired State Configuration, Just Enough Administration and much more.Later in the course we will examine some common Powershell-based attacks, sample payload and their mitigation/remediation.
After completing this course, you will be able to:
- Understand the architecture of Powershell
- Deploy Powershell operational security
- Analyze PowerShell Auditing and Logging
- Enhance server management with Desired State Configuration and Just Enough Administration
- Analyze and debug scripts
- Understand Powershell based exploits and their remediation
- Video lectures on each topic explaining each concept thoroughly with examples (and Demonstrations where applicable)
- Hands-on Lab at the end of the course in which you will practice at your own pace. You will have a step by step instruction file available to complete the Lab tasks like: implementing Powershell DSC, JEA, performing PowerShell attacks and much more.
- Final Exam at the end of the course - 20 questions to test your knowledge on the topics and concepts learned in the course
- Links to official Microsoft resources/blogs/videos for further documentation
Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.
Who this course is for:
- Security Administrators, Security Analysts, System Administrator
- Any IT enthusiast who wnts to get started in cyber security and be confortable with the PowerShell Security