Powershell Security Best Practices

Powershell Security Best Practices
2 months
Certification paid
Course by EdX
Powershell Security Best Practices
What will you learn?
After completing this course, students will be able to: Understand the architecture of Powershell
Deploy Powershell operational security
Analyze PowerShell Auditing and Logging
Enhance server management with Desired State Configuration and Just Enough Administration.
Analyze and debug scripts
Understand Powershell based exploits and their remediation.
About the course

This course that will teach students how to securely accomplish administrative tasks using Windows PowerShell 5.x. Students will review PowerShell fundamentals, learn Powershell operational security, and configuration management.

Students will also learn how to use administration tools such as Desired State Configuration (DSC) and Just Enough Administration (JEA) to configure and secure servers. This course also looks at new threats, new exploits, the ever-changing attack surface, and how to remediate them.

Note: These courses will retire in June. Please enroll only if you are able to finish your coursework in time.

Powershell Security Best Practices
Learn best practices on how to use PowerShell securely and how to use PowerShell to enhance security.
Marcin Policht
Marcin Policht
System Engineer SR Tech
All the courses on this platform are free of charge. The authors are top universities and corporations that seek to maintain high quality standards. If you do not meet a deadline for assignments, you lose points. Like on other platforms, the videos in which the theory is explained are followed by practical assignments. Courses are available in English, Chinese, Spanish, French and Hindi.
Like any other website, konevy uses «cookies». These cookies are used to store information including visitor's preferences, and the pages on the website that the visitor accessed or visited. The information is used to optimize the users' experience by customizing our web page content based on visitors' browser type and/or other information. For more general information on cookies, please read the «What Are Cookies» article on Cookie Consent website.