Join us for Wild West Hackin’ Fest Deadwood virtual conference! Register Here

PowerShell for InfoSec: What You Need to Know with Carrie Roberts

Course Authored by .

This course covers PowerShell fundamentals, execution logging options, and security features for both offensive and defensive applications in IT environments.

On-Demand $575.00

Course Length: 16 Hours

Includes a Certificate of Completion



Next scheduled date: Content is loading, please wait.

Description

This course covers PowerShell fundamentals, execution logging options, and security features for both offensive and defensive applications in IT environments.

PowerShell is an excellent cross-platform shell for executing commands and scripts on both local and remote machines. It is installed on Windows by default and is widely used by both network defenders and attackers. This course will cover key PowerShell concepts that both blue and red teamers should understand including logging, credential management, remote administration, security bypass techniques and popular PowerShell attack tools.

System Requirements
  • Hardware/Software Requirements
    • A computer with VMware Player/Workstation/Fusion installed
    • Note: Administrative Access required for install
    • You can use other virtualization platforms if you prefer but specific instructions won’t be provided
    • At least 8GB RAM and 50 GB free disk space
    • Lab VMs Installed as described here
    • Solid internet access

Syllabus

    • PowerShell Usage Fundamentals
        • Profiles

        • Environment Variables

        • Aliases

        • PowerShell Gallery

        • History Files

        • Encoded commands

        • Help System

        • Objects and Piping

    • Modules and Module Load Hijacking

    • Logging: Script Block, Module and Transcription

    • PS Remoting

    • Secure Administration Options:
        • Just Enough Admin (JEA)

        • Constrained Language Mode

    • Antimalware Scan Interface (AMSI) Bypass

    • Execution Policy Bypass

    • Credential Management

    • PowerShell without PowerShell

    • Download Cradles

    • PowerShell Core

    • Popular PS Attack Tools

    • Obfuscation

FAQ

Who Should Take This Course
Anyone interested in learning more about PowerShell and its use as both an offensive and defensive tool

About the Instructor

Pixel splash background
Carrie Roberts
Carrie Roberts
"Teacher and Mentor"
Bio

Carrie Roberts is a programmer, turned pentester, turned red teamer, turned blueish purple. She is currently on the Red Team at Walmart. She loves to learn and give back to the community. She is one of the primary Atomic Red Team project maintainers and developers and has developed many of her own open-source tools. She holds master’s Degrees in both Computer Science and Information Security Engineering.

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.