Course Outline
Introduction
Overview of Windows Security Using PowerShell Automation for Government
Getting Started with PowerShell Automation for Government Operations
Utilizing PowerShell Features for Enhancing Windows Security for Government
Developing PowerShell Scripts, Functions, and Modules for Government Use
Executing PowerShell Commands and Scripts in a Government Environment
Passing Arguments and Piping Data in PowerShell Scripts for Government Applications
Running Remote Command Shells for Government Security Needs
Integrating PowerShell Core with OpenSSH on Windows for Government Systems
Exploring PowerShell Just Enough Admin (JEA) for Government Security
Deploying PowerShell, Group Policy, and Task Scheduler for Government Operations
Utilizing PowerShell for Windows Management Instrumentation (WMI) in Government
Using PowerShell for Active Directory Queries and Management in a Government Context
Automating Server Hardening with AppLocker Using PowerShell for Government
Managing the Windows Firewall Using PowerShell Scripting for Government Networks
Implementing IPsec to Share Permissions for Listening Ports in Government Systems
Working with PowerShell Transcription Logging, Windows Event Logs, and Namespace Auditing for Government Security
Utilizing Certificate Authentication and TLS Encryption for Government Communications
Configuring Public Key Infrastructure and Windows Certificates for Government Use
Employing Multi-Factor Authentication Using Smart Cards and Tokens in Government Environments
Understanding Security Best Practices for Government Operations
Digitally Signing PowerShell Scripts for Government Compliance
Writing a PowerShell Ransomware Script for Educational Purposes in Government Training
Blocking Hackers and Ransomware Using Various Security Methods for Government Systems
Mitigating Kerberos Attacks, Remote Desktop Protocol Attacks, Security Access Token Abuse, and More for Government Networks
Deploying Anti-Exploitation Defenses for PowerShell in Government Settings
Summary and Conclusion for Government Use
Requirements
- A foundational knowledge of Windows Server and Active Directory principles for government
- Proficiency with command-line shell and scripting languages
Audience
- System Administrators
- Systems Engineers
- Security Architects
- Security Analysts
Testimonials (5)
Multiple examples for each module and great knowledge of the trainer.
Sebastian - BRD
Course - Secure Developer Java (Inc OWASP)
Module3 Applications Attacks and Exploits, XSS, SQL injection Module4 Servers Attacks and Exploits, DOS, BOF
Tshifhiwa - Vodacom
Course - How to Write Secure Code
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - RSM UK Management Ltd.
Course - Secure Developer .NET (Inc OWASP)
Nothing it was perfect.