Published on: 2022-10-21 16:20:14
Categories: 28
Share:
At the end of Course 9: Implementing PowerShell Security Best Practice, you have the necessary skills to enroll in course 10: Hack Windows Server 2019 using PowerShell & WMI, and you can write the main tool script with more than 3500 lines of code in that course.
The original purpose of Windows PowerShell was to help IT professionals and power users control and automate the management of the Windows operating system and the programs that run on Windows. To take advantage of the benefits that Windows PowerShell has to offer while minimizing security risks, it is essential to understand the basic aspects of Windows PowerShell operational security. Another aspect to consider in the context of this course is the role of Windows PowerShell in security exploits.
You will then explore the most common Windows PowerShell-based techniques used by hackers to exploit existing access to a Windows operating system to facilitate the installation of malicious software, perform detection tasks, establish its stability on a target computer, and promote lateral movement. did . You’ll also review some Windows PowerShell-based security tools that facilitate penetration testing, forensics, and reverse engineering of Windows PowerShell exploits. To conclude the course, you will provide a summary of the technologies recommended by the Blue Team to implement comprehensive and defense-in-depth security against Windows PowerShell-based attacks.
Publisher: Udemy
Lecturer: Dante Leo
English language
Training level: advanced
Number of courses: 67
Training duration: 9 hours and 55 minutes
After Extract, view with your favorite Player.
English subtitle
Quality: 720p
3.67 GB
Sharing is caring: