Powershell Security Best Practices

Powershell Security Best Practices

LaaS bundle

Microsoft INF251x-LAAS

From Free of Charge

To EUR 99.00

Learn best practices on how to use PowerShell securely and how to use PowerShell to enhance security.

Abstract


This course is part of the Microsoft Professional Program in Cybersecurity.

This course that will teach students how to securely accomplish administrative tasks using Windows PowerShell 5.x. Students will review PowerShell fundamentals, learn Powershell operational security, and configuration management.

Students will also learn how to use administration tools such as Desired State Configuration (DSC) and Just Enough Administration (JEA) to configure and secure servers. This course also looks at new threats, new exploits, the ever-changing attack surface, and how to remediate them.

Prerequisites


In addition to their professional experience, students should have:

  • Experience with Windows networking
  • Experience with Windows Server administration
  • Experience with using Windows PowerShell

What you'll learn


After completing this course, students will be able to:

  • Understand the architecture of Powershell
  • Deploy Powershell operational security
  • Analyze PowerShell Auditing and Logging
  • Enhance server management with Desired State Configuration and Just Enough Administration.
  • Analyze and debug scripts
  • Understand Powershell based exploits and their remediation.
Write Your Own Review

Only registered users can write reviews. Please Sign in or create an account

Free of Charge

E-Learning

Official Microsoft Course

Powershell Security Best Practices

Powershell Security Best Practices

Microsoft INF251x
Free of Charge
Microsoft
Open edX
90 days

This course that will teach students how to securely accomplish administrative tasks using Windows PowerShell 5.x. Students will review PowerShell fundamentals, learn Powershell operational security, and configuration management.

Students will also learn how to use administration tools such as Desired State Configuration (DSC) and Just Enough Administration (JEA) to configure and secure servers. This course also looks at new threats, new exploits, the ever-changing attack surface, and how to remediate them.

Official Microsoft Certificate

Microsoft Certificate of Completion

Microsoft Certificate of Completion

Microsoft A85-04383
EUR 99.00
Microsoft

Original Microsoft Certificate of Completion


Get your Original Microsoft Certificate of Completion that certifies the successful passing of a Microsoft Massive Open Online Course (MOOC).

* Required Fields