Course Outline
Introduction
Overview of Windows Security Using PowerShell Automation
Getting Started with PowerShell Automation
Using PowerShell Features for Windows Security
Writing PowerShell Scripts, Functions, and Modules
Executing PowerShell Commands and Scripts
Passing Arguments and Piping Data for PowerShell Scripts
Running Remote Command Shells
Integrating PowerShell Core with OpenSSH on Windows
Exploring PowerShell Just Enough Admin (JEA)
Deploying PowerShell, Group Policy, and Task Scheduler
Using PowerShell for Windows Management Instrumentation (WMI)
Using PowerShell for Active Directory Queries and Management
Server Hardening Automation with AppLocker Using PowerShell
Managing Windows Firewall Using PowerShell Scripting
Using IPsec to Share Permissions for Listening Ports
Working with PowerShell Transcription Logging, Windows Event Logs, and Namespace Auditing
Using Certificate Authentication and TLS Encryption
Configuring Public Key Infrastructure and Windows Certificates
Employing Multi-Factor Authentication Using Smart Cards and Tokens
Learning About Security Best Practices
Signing PowerShell Scripts Digitally
Writing a PowerShell Ransomware Script
Blocking Hackers and Ransomware Using Various Security Methods
Mitigating Kerberos Attacks, Remote Desktop Protocol Attacks, Security Access Token Abuse, and More
Deploying Anti-Exploitation Defenses for PowerShell
Summary and Conclusion
Requirements
- A general understanding of Windows Server and Active Directory concepts
- Familiarity with command-line shell and scripting language
Audience
- SysAdmins
- Systems engineers
- Security architects
- Security analysts
Testimonials (5)
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Method of conducting and practical classes
Adam - Hostersi sp. z o.o.
Course - Windows Server 2019 for System Administrators
Machine Translated
The way to receive the information from the trainer
Mohamed Romdhani - Shams Power
Course - CISM - Certified Information Security Manager
Interactivity, the trainer was willing to help and explain in areas that were difficult. I felt like the training was really useful for me
Lewis Johnson - Swift Group Ltd
Course - Windows Server 2016
conforme con la forma de explicar del instructor