Course Outline
Introduction
Overview of Windows Security Using PowerShell Automation for Government
Getting Started with PowerShell Automation for Government
Utilizing PowerShell Features for Enhancing Windows Security in the Public Sector
Developing PowerShell Scripts, Functions, and Modules for Government Use
Executing PowerShell Commands and Scripts in a Secure Government Environment
Passing Arguments and Piping Data for PowerShell Scripts to Support Government Operations
Running Remote Command Shells for Efficient Government IT Management
Integrating PowerShell Core with OpenSSH on Windows for Enhanced Security in Government Networks
Exploring PowerShell Just Enough Admin (JEA) for Streamlined Governance and Accountability
Deploying PowerShell, Group Policy, and Task Scheduler to Support Government IT Policies
Using PowerShell for Windows Management Instrumentation (WMI) in Government Systems
Leveraging PowerShell for Active Directory Queries and Management in the Public Sector
Automating Server Hardening with AppLocker Using PowerShell in Government Environments
Managing Windows Firewall Using PowerShell Scripting for Enhanced Government Security
Utilizing IPsec to Share Permissions for Listening Ports in Government Networks
Working with PowerShell Transcription Logging, Windows Event Logs, and Namespace Auditing for Government Compliance
Implementing Certificate Authentication and TLS Encryption for Secure Government Communications
Configuring Public Key Infrastructure and Windows Certificates to Support Government Security Protocols
Employing Multi-Factor Authentication Using Smart Cards and Tokens in Government Systems
Understanding Security Best Practices for Effective Government IT Management
Digitally Signing PowerShell Scripts to Ensure Integrity and Authenticity in the Public Sector
Writing a PowerShell Ransomware Script for Educational Purposes in Government Training Programs
Blocking Hackers and Ransomware Using Various Security Methods for Government Networks
Mitigating Kerberos Attacks, Remote Desktop Protocol Attacks, Security Access Token Abuse, and More in the Public Sector
Deploying Anti-Exploitation Defenses for PowerShell to Protect Government Systems
Summary and Conclusion for Government IT Professionals
Requirements
- A foundational knowledge of Windows Server and Active Directory principles for government
- Proficiency with command-line shell and scripting languages
Audience
- System Administrators
- Systems Engineers
- Security Architects
- Security Analysts
Testimonials (5)
Multiple examples for each module and great knowledge of the trainer.
Sebastian - BRD
Course - Secure Developer Java (Inc OWASP)
Module3 Applications Attacks and Exploits, XSS, SQL injection Module4 Servers Attacks and Exploits, DOS, BOF
Tshifhiwa - Vodacom
Course - How to Write Secure Code
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - RSM UK Management Ltd.
Course - Secure Developer .NET (Inc OWASP)
Nothing it was perfect.