Master Class: Workshop Microsoft PowerShell Advanced Security (MSPSAS)

 

Who should attend

Administrators, IT decision-makers

Prerequisites

Course Objectives

Course Content

IT security – comprehensive analysis of potential security risks
  • IT security is not an end in itself
  • Classification of potential threats
  • Risk management, cost-benefit analyses, and ROI assessment of security measures
  • Implementation of the "defense in depth" concept
  • The Pareto principle in IT security
  • Security as a process
  • Attack Tactics and Privilege Escalation
  • Security by obscurity vs. KISS
The architecture of PowerShell and its potential vulnerability
  • The role and development of command line tools in the Microsoft context
  • Comparison of the management approach in MS Windows and the MS Exchange Manage Shell
  • Modular approach of PowerShell and object orientation
  • Risk assessment compared to .cmd and .exe
  • authentication
Clean Code vs. Obfuscation
  • Clean code principles
  • Code obfuscation techniques
  • Aliases – Obfuscation with on-board tools
  • Das Tool Invoke-Obfuscation
  • Detecting obfuscation using statistical methods
  • Code Encoding
Code-Injection und Execution in Memory
  • Invoke-Expression
  • Executing code from the on-board help
  • Functions with untested parameters
  • In-Memory-Execution durch Remote-Code
Credentials
  • Handling secure strings and PSCredential objects
  • Secure credentials with certificates
    • Fundamentals of Public Key Infrastructure
    • Store credentials in encrypted form (certificate)
    • Use encrypted credentials for remote sessions
  • Credentials für Remote Scripts
  • Credentials für Scheduled Jobs
Elevation
  • Running script code in the LocalSystem context
  • Self-Elevator
Is co-signed
  • Management of the PowerShell code signature
  • PKI requirements
  • Code signing
AppLocker
  • The design of Applocker implementation guidelines
  • Bypass Applocker script rules
  • Managing Applocker through Powershell
Powershell Logging
  • Types and application scenarios of logging
  • Transcript
  • Over-the-shoulder-Transcription via GPO
  • Powershell Output-Streams
  • Deep script block logging in the event log
Just-Enough-Administration
  • The principle of least privilege
  • PowerShell Constrained Language Mode
  • What is JEA?
  • PS Session Config und Role Capabilities
  • Setting up and testing the JEA configuration

Prices & Delivery methods

Online Training

Duration
3 days

Price
  • on request
Classroom Training

Duration
3 days

Price
  • on request

Click on town name or "Online Training" to book Schedule

Guaranteed date:   This green checkmark in the Upcoming Schedule below indicates that this session is Guaranteed to Run.
Instructor-led Online Training:   This is an Instructor-Led Online (ILO) course. These sessions are conducted via WebEx in a VoIP environment and require an Internet Connection and headset with microphone connected to your computer or laptop. If you have any questions about our online courses, feel free to contact us via phone or Email anytime.
This is a FLEX course, which is delivered simultaneously in two modalities. Choose to attend the Instructor-Led Online (ILO) virtual session or Instructor-Led Classroom (ILT) session.

Germany

This is a FLEX course. Guaranteed to Run Berlin Enroll
Online Training Time zone: Central European Summer Time (CEST) Enroll
This is a FLEX course. Guaranteed to Run Berlin Enroll
Online Training Time zone: Central European Summer Time (CEST) Enroll
This is a FLEX course. Berlin Enroll
Online Training Time zone: Central European Summer Time (CEST) Enroll
This is a FLEX course. Frankfurt Enroll
Online Training Time zone: Central European Summer Time (CEST) Enroll

France

Online Training Time zone: Central European Time (CET) Enroll