Course Outline

Introduction

Overview of Windows Security Using PowerShell Automation for Government

Getting Started with PowerShell Automation for Government

Utilizing PowerShell Features for Enhancing Windows Security in the Public Sector

Developing PowerShell Scripts, Functions, and Modules for Government Use

Executing PowerShell Commands and Scripts in a Secure Government Environment

Passing Arguments and Piping Data for PowerShell Scripts to Support Government Operations

Running Remote Command Shells for Efficient Government IT Management

Integrating PowerShell Core with OpenSSH on Windows for Enhanced Security in Government Networks

Exploring PowerShell Just Enough Admin (JEA) for Streamlined Governance and Accountability

Deploying PowerShell, Group Policy, and Task Scheduler to Support Government IT Policies

Using PowerShell for Windows Management Instrumentation (WMI) in Government Systems

Leveraging PowerShell for Active Directory Queries and Management in the Public Sector

Automating Server Hardening with AppLocker Using PowerShell in Government Environments

Managing Windows Firewall Using PowerShell Scripting for Enhanced Government Security

Utilizing IPsec to Share Permissions for Listening Ports in Government Networks

Working with PowerShell Transcription Logging, Windows Event Logs, and Namespace Auditing for Government Compliance

Implementing Certificate Authentication and TLS Encryption for Secure Government Communications

Configuring Public Key Infrastructure and Windows Certificates to Support Government Security Protocols

Employing Multi-Factor Authentication Using Smart Cards and Tokens in Government Systems

Understanding Security Best Practices for Effective Government IT Management

Digitally Signing PowerShell Scripts to Ensure Integrity and Authenticity in the Public Sector

Writing a PowerShell Ransomware Script for Educational Purposes in Government Training Programs

Blocking Hackers and Ransomware Using Various Security Methods for Government Networks

Mitigating Kerberos Attacks, Remote Desktop Protocol Attacks, Security Access Token Abuse, and More in the Public Sector

Deploying Anti-Exploitation Defenses for PowerShell to Protect Government Systems

Summary and Conclusion for Government IT Professionals

Requirements

  • A foundational knowledge of Windows Server and Active Directory principles for government
  • Proficiency with command-line shell and scripting languages

Audience

  • System Administrators
  • Systems Engineers
  • Security Architects
  • Security Analysts
 42 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories