Course Outline
Introduction
Overview of Windows Security Using PowerShell Automation
Getting Started with PowerShell Automation
Using PowerShell Features for Windows Security
Writing PowerShell Scripts, Functions, and Modules
Executing PowerShell Commands and Scripts
Passing Arguments and Piping Data for PowerShell Scripts
Running Remote Command Shells
Integrating PowerShell Core with OpenSSH on Windows
Exploring PowerShell Just Enough Admin (JEA)
Deploying PowerShell, Group Policy, and Task Scheduler
Using PowerShell for Windows Management Instrumentation (WMI)
Using PowerShell for Active Directory Queries and Management
Server Hardening Automation with AppLocker Using PowerShell
Managing Windows Firewall Using PowerShell Scripting
Using IPsec to Share Permissions for Listening Ports
Working with PowerShell Transcription Logging, Windows Event Logs, and Namespace Auditing
Using Certificate Authentication and TLS Encryption
Configuring Public Key Infrastructure and Windows Certificates
Employing Multi-Factor Authentication Using Smart Cards and Tokens
Learning About Security Best Practices
Signing PowerShell Scripts Digitally
Writing a PowerShell Ransomware Script
Blocking Hackers and Ransomware Using Various Security Methods
Mitigating Kerberos Attacks, Remote Desktop Protocol Attacks, Security Access Token Abuse, and More
Deploying Anti-Exploitation Defenses for PowerShell
Summary and Conclusion
Requirements
- A general understanding of Windows Server and Active Directory concepts
- Familiarity with command-line shell and scripting language
Audience
- SysAdmins
- Systems engineers
- Security architects
- Security analysts
Testimonials
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.
Kenny, Jiun Ming Wee
Very knowledgeable and approachable trainer.
- Trainocate (S) Pte. Ltd.
I enjoyed the practical exercises. Hands-on is the best way to learn.
- W L Gore & Associates (UK) Ltd
Also provided a lot of curiously related interesting in some way with the subject
- EduBroker Sp. z o.o.
Security models, discussion of good programming practices, various types of attacks.