Warning: This course intentionally includes a virus file as part of the learning material since the course deals with security issues.
Key Features
- Master PowerShell for security—configure, audit, monitor, exploit, and bypass defenses
- Gain insights from a Microsoft expert and creator of PowerShell tools EventList and JEAnalyzer
- Build stealthy techniques to evade controls while improving detection and response
- Learn practical techniques from real-world case studies to enhance your security operations
Who this book is for
This book is for security professionals, penetration testers, system administrators, red and blue team members, and cybersecurity enthusiasts aiming to enhance their security operations using PowerShell. Whether you're experienced or new to the field, it offers valuable insights and practical techniques to leverage PowerShell for various security tasks. A basic understanding of PowerShell and cybersecurity fundamentals is recommended. Familiarity with concepts such as Active Directory, as well as programming languages like C and Assembly, can be beneficial.