This intense, 2-day long practical training will provide you with the advanced knowledge needed to safely use and secure the PowerShell platform. It focuses on practices for safely handling sensitive data in scripts, what script structures are insecure, and whether the entire PowerShell can be exploited by an attacker. It will cover lots of advanced, key features like AMSI, code injection and signing, process of working with sensitive data and many more. During this training you will spend more than 80% of the course time working on PowerShell engine so that you will build some advanced scripts, which you can immediately use in your daily work!
This course is delivered by one of the best people in the market in the security field – with practical knowledge from tons of successful projects and with great teaching skills. The course contents are based on the author's more than 15 years of real-world experience working with PowerShell.Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
TARGET AUDIENCE:
Experienced PowerShell Scripters, IT Administrators, Pentesters and everyone with advanced knowledge and experience who wants to learn more about PowerShell practical features. The training requires advanced knowledge of PowerShell.
COURSE PREREQUISITES:
The training requires advanced knowledge of PowerShell. We recommend to take PowerShell Advanced Course beforehand to gain more fluency in using PowerShell. If you are a novitiate in this topic, we recommend to take PowerShell Basic Course to be introduced to all fundamental PowerShell features and to solidify the most essential theoretical as well as practical knowledge.
COURSE CONTENT:
Module 1
• PowerShell 3+ Security Features
Module 2
• Credentials
Module 3
• Elevation
Module 4
• Process History and Memory
Module 5
• Working with Sensitive Data
Module 6
• Code Injection
Module 7
• Execution in Memory
Module 8
• Code Signing
Module 9
• AMSI, AppLocker and CLM
Module 10
• Encoding and Obfuscation
COURSE OBJECTIVE:
Not available. Please contact.
FOLLOW ON COURSES:
Not available. Please contact.