Securing Windows Using PowerShell Automation
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
In this course you will learn how to use PowerShell to automate Windows security and harden PowerShell itself. This instructor-led, training is aimed at SysAdmins, systems engineers, security architects, and security analysts who wish to write, execute, and deploy PowerShell scripts and commands to automate Windows security management in their organization.
-
COURSE OBJECTIVES
By the end of the course, you‘ll be able to:
- Write PowerShell scripts for Windows and Active Directory security automation.
- Use PowerShell for remote command execution to run scripts on thousands of systems across an organization.
- Safely run PowerShell scripts on thousands of hosts over the network
- Manage certificates and authentication to control user access and activity.
- Defend against PowerShell malware such as ransomware
Harden Windows Server and Windows 10/11 against skilled attackers
-
COURSE AUDIENCE
This course is made for:
- Sys Admins
- Systems Engineers
- Security Architects
- Security Analysts
-
COURSE OUTLINE
Day One:
- Overview of Windows Security Using PowerShell Automation
- Getting Started with PowerShell Automation
- Using PowerShell Features for Windows Security
- Writing PowerShell Scripts, Functions, and Modules
- Executing PowerShell Commands and Scripts
Day Two:
- Passing Arguments and Piping Data for PowerShell Scripts
- Running Remote Command Shells
- Integrating PowerShell Core with OpenSSH on Windows
- Exploring PowerShell Just Enough Admin (JEA)
- Deploying PowerShell, Group Policy, and Task Scheduler
Day Three:
- Using PowerShell for Windows Management Instrumentation (WMI)
- Using PowerShell for Active Directory Queries and Management
- Server Hardening Automation with AppLocker Using PowerShell
- Managing Windows Firewall Using PowerShell Scripting
- Using IPsec to Share Permissions for Listening Ports
Day Four:
- Working with PowerShell Transcription Logging, Windows Event Logs, and Namespace Auditing
- Using Certificate Authentication and TLS Encryption
- Configuring Public Key Infrastructure and Windows Certificates
- Employing Multi-Factor Authentication Using Smart Cards and Tokens
- Learning About Security Best Practices
Day Five:
- Signing PowerShell Scripts Digitally
- Writing a PowerShell Ransomware Script
- Blocking Hackers and Ransomware Using Various Security Methods
- Mitigating Kerberos Attacks, Remote Desktop Protocol Attacks, Security Access Token Abuse, and More
- Deploying Anti-Exploitation Defenses for PowerShell
Keyword
Training Subject
Training Location