Product Image

Powershell Security Best Practices

This course will show understudies how to safely achieve authoritative undertakings utilizing Windows PowerShell 5.x.

Self-Paced

Learning Style

Microsoft

Provider

Beginner

Difficulty

12 Hours

Course Duration

Course Info

Download PDF

Certificate

See Sample

Subscribe Buy Individually Timezone
tab
About Individual Course:
  • Individual course plan gives you access to this course
$99.00
/ Each
When you subscribe, you get:
Master Subscription plan gives you access to this course and over 1176 other popular courses
On Sale!
Now Only $2,999.00 Regular Price $3,499.00
Now Only $2,999.00 Regular Price $3,499.00
/ Year

You have already taken demo for this course.

If you want to get access to demo again, feel free to contact our support at (855) 800-8240

This course will show understudies how to safely achieve authoritative undertakings utilizing Windows PowerShell 5.x.

Course Information

About this course:

This course will show understudies how to safely achieve authoritative undertakings utilizing Windows PowerShell 5.x. Understudies will learn PowerShell operational security, review the fundamentals of PowerShell, and configuration management.

Understudies will also figure out how to utilize administration devices, for example, Just Enough Administration (JEA) and Desired State Configuration (DSC) to secure and configure servers. Also, this course takes a gander at new exploits, new threats, the ever-changing attack surface, and the way to remediate them.

Course Objective:

  • Comprehend the PowerShell architecture.
  • Windows PowerShell Architecture
  • Deploy the operational security of PowerShell
  • PowerShell versions and editions
  • Running Windows PowerShell
  • Handling the execution of Local Script with the Policy of Windows PowerShell Execution.
  • Running the capabilities of Remote Execution Windows PowerShell
  • Constrained Endpoints
  • Analyze Logging and Auditing of PowerShell
  • Anti-Malware Scan Interface (AMSI)
  • PowerShell-based attacks for Windows
  • PowerShell-based security tools for Windows
  • Summary of the technologies of Windows PowerShell-based security
  • Increase the management of servers with Just Enough Administration and Desired State Configuration.
  • Debug and Analyze scripts
  • PowerShell based exploits Comprehension and their remediation.

Audience:

Programmers

Windows Server administrator

Prerequisite:

  • Windows networking Experience
  • Windows Server administration Experience
  • Windows PowerShell usage Experience

Outline

More Information

More Information
Brand Microsoft
Subjects Information Security
Lab Access No
Technology Microsoft
Learning Style Self-Paced Learning
Learning Type Course
Difficulty Beginner
Course Duration 12 Hours
Language English

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Course Expert:

Author

Paul Jackson

 

Paul has over 2 decades of of technical experience as a senior engineer, operations manager & project lead.
He has had hands-on impact within internal IT infrastructure, as well as in hundreds of unique customer environments that resulted in an in-depth knowledge of a wide range of security, identity, cloud, and infrastructure products & features; and a breadth of knowledge in associated network devices and applications.

His specialties include:

Identity, AD, Azure AD, Azure AD Connect, Azure MFA, ADFS, WAP, e-Gap, IAG, UAG, Firewalls, DirectAccess, Load balancers, PKI, Troubleshooting application and network issues, quickly learning new applications/technologies, building and leading tech teams, project management, creating scalable processes.

click here