Course 9:Implementing PowerShell Security Best Practice 2019 | Udemy


Course 9:Implementing PowerShell Security Best Practice 2019 | Udemy
English | Size: 4.28 GB
Genre: eLearning

What you’ll learn
Windows PowerShell security view
Use Windows PowerShell and PowerShell Core to secure the network
Manage execution of local PowerShell scripts
Manage remote execution of Windows PowerShell
Manage remote execution of PowerShell Core
Describe security implications of using Constrained Language Mode
Describe the architecture and components of Windows PowerShell DSC
Recommend Windows PowerShell auditing and logging configuration
Provide examples of Windows PowerShell-based attacks
Use Windows PowerShell-based security tools
Provide an overview of Windows PowerShell-based security-related technologies
Implement Windows PowerShell logging by using Desired State Configuration (DSC)
Identify and mitigate Windows PowerShell-based exploits
Implement Just Enough Administration (JEA)

Course Description

The primary objective of Windows PowerShell was to help IT professionals and power users control and automate the administration of the Windows operating system and applications that run on Windows.

To take advantage of the benefits that Windows PowerShell has to offer, while at the same time, minimise security-related risks, it is essential to understand the primary aspects of Windows PowerShell operational security. Another aspect that is critical to consider in the context of this course is the role of Windows PowerShell in security exploits.

You will then explore the most common Windows PowerShell-based techniques employed by hackers in order to leverage existing access to a Windows operating system to facilitate installation of malicious software, carry out reconnaissance tasks, establish its persistence on the target computer, and promote lateral movement. You will also review some of Windows PowerShell-based security tools that facilitate penetration testing, forensics, and reverse engineering of Windows PowerShell exploits. To conclude the course, you will provide a summary of technologies recommended by the Blue Team that are geared towards implementing comprehensive, defense-in-depth security against Windows PowerShell-based attacks.

Course Outline

Module 1, “PowerShell Fundamentals”, In this module, you will learn about PowerShell fundamentals, including its architectural design, its editions and versions, and basics of interacting with PowerShell, you will learn in practical the difference between FullCLR and CoreCLR, how to install PowerShell core on Windows, Linux and MAC, and how to deal with PowerShell profiles.

Module 2, “PowerShell Operational Security”, In this module, you will learn about enhancing operating system security by leveraging built-in Windows PowerShell features and technologies that are part of the Windows PowerShell operational environment.

In practical side of this module you will learn to deal with below:

1. Upgrade execution policy level to increase security level in your network.

2. Deal with code signing certificate.

3. Authenticate script file with authorized certificate.

Module 3, “Implementing PowerShell-based Security”, The purpose of this module is to present the most common and effective methods of leveraging Windows PowerShell to enhance operating system security. These methods include:

Protecting from unintended configuration changes by relying on PowerShell Desired State Configuration (DSC)

Implementing the principle of least privilege in remote administration scenarios by using Just Enough Administration (JEA)

Tracking and auditing events that might indicate exploit attempts by using Windows PowerShell logging.

Module 4, “Windows PowerShell-based Exploits and their Mitigation “, In this module, we will first approach the Windows PowerShell-based security from the Red Team’s perspective. We will explore the most common Windows PowerShell-based techniques employed by hackers in order to leverage existing access to a Windows operating system to facilitate installation of malicious software, carry out reconnaissance tasks, establish its persistence on the target computer, and promote lateral movement. We will also review some of Windows PowerShell-based security tools that facilitate penetration testing, forensics, and reverse engineering of Windows PowerShell exploits. To conclude the module and the course, we will provide a summary of technologies recommended by the Blue Team that are geared towards implementing comprehensive, defense-in-depth security against Windows PowerShell-based attacks.

Module 5, “Network & Firewall”, In this practical module, you will learn how to write ports scanner script, test network servers, and use 4 different methods to secure ports using firewall.

Module 6, “Domain inventory”, In this practical module, you will learn how to detect suspected profile in any domain PCs, deploy your code for profile detection, write other inventory codes to create reports of AD groups, users, GPOs ..etc, write script to manage registry key and values .

Module 7, “Domain shares”, In this module, you will learn how to deal with network shares, you will write a script to manage following scenarios:

Domain servers shares

Shared Directory security info

Network shares

By end of this course you have necessary skills to enroll into course 10: Hack windows Server 2019 using PowerShell & WMI, and you will be able to write the main tool script with 3500+ code lines in that course.

Who this course is for:
This course is intended for IT Professionals that require a deeper understanding of Windows PowerShell security related features and exploits and to increase their knowledge level through a predominately hands-on experience implementing Windows PowerShell security features

nitroflare.com/view/BAC8E8D54127382/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part01.rar
nitroflare.com/view/F8465185C2D111B/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part02.rar
nitroflare.com/view/9FB317EFCFBD939/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part03.rar
nitroflare.com/view/F1921CE734C9C1A/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part04.rar
nitroflare.com/view/28D82F103E7641E/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part05.rar
nitroflare.com/view/5A0BA69280D966C/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part06.rar
nitroflare.com/view/B860FA7D4BA590B/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part07.rar
nitroflare.com/view/F3651D4142C99BB/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part08.rar
nitroflare.com/view/704959DEA5A5EC0/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part09.rar

rapidgator.net/file/83c0dbaefee54f49f164a6b29ddb05a4/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part01.rar.html
rapidgator.net/file/825890709d80b9e9b92d18f38679fbf0/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part02.rar.html
rapidgator.net/file/643a8a8fbc384c7d5c916ca0cfab4fa8/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part03.rar.html
rapidgator.net/file/f1a1875bf13b0f3ecdb1095055fe65eb/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part04.rar.html
rapidgator.net/file/e673d440a23cab588eaab763cc063ea0/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part05.rar.html
rapidgator.net/file/5daa3ff4f3f7810ed84176679b06f973/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part06.rar.html
rapidgator.net/file/8e488d6931f622ea6d92ef0598025fa2/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part07.rar.html
rapidgator.net/file/5fbc0ebe3d2b2625c73b85282d4e53a4/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part08.rar.html
rapidgator.net/file/553cf0ccd71917bc23f8f505e921f8bb/UD-Course-9-Implementing-PowerShell-Security-Best-Practice-2019.31.1.part09.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.