In this course, we will examine the concepts of PowerShell from a security stand point. We will cover topics like PowerShell architecture, PowerShell Remoting capabilities, Desired State Configuration, Just Enough Administration and much more.
Later in the course we will examine some common Powershell-based attacks, sample payload and their mitigation/remediation.
After completing this course, you will be able to:
Understand the architecture of Powershell
Deploy Powershell operational security
Analyze PowerShell Auditing and Logging
Enhance server management with Desired State Configuration and Just Enough Administration
Analyze and debug scripts
Understand Powershell based exploits and their remediation
This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. You will get:
Video lectures on each topic explaining each concept thoroughly with examples (and Demonstrations where applicable)
Hands-on Lab at the end of the course in which you will practice at your own pace. You will have a step by step instruction file available to complete the Lab tasks like: implementing Powershell DSC, JEA, performing PowerShell attacks and much more.
Final Exam at the end of the course - 20 questions to test your knowledge on the topics and concepts learned in the course
Links to official Microsoft resources/blogs/videos for further documentation
This course is the 3rd course from a series of 9 courses which address all aspects to become a Microsoft Cyber Security Professional . This cyber security track is designed to teach you, or fill in the knowledge gaps, all the aspects and technologies to become a successful cyber security professional. The entire track addresses mostly Microsoft security technologies, including the latest cloud services made available by Microsoft like: Microsoft Defender Suite, Office 365 security features and services, Microsoft Graph, Azure Active Directory Security and many more.
Microsoft, Windows, Microsoft 365 and Microsoft Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This course is not certified, accredited, affiliated with, nor endorsed by Microsoft Corporation.