
SANS SEC505 – Securing Windows and Powershell Automation (2020)
English | Size: 5.13GB
Category: Tutorial
WINDOWS SECURITY AUTOMATION MEANS POWERSHELL
In this course (SEC505) you will learn how to:
Write PowerShell scripts for Windows and Active Directory security automation
Safely run PowerShell scripts on thousands of hosts over the network
Defend against PowerShell malware such as ransomware
Harden Windows Server and Windows 10 against skilled attackers
In particular, we will use PowerShell to secure Windows against many of the attacks described in the MITRE ATT&CK matrix, especially stolen administrative credentials, ransomware, hacker lateral movement inside the LAN, and insecure Windows protocols, like RDP and SMB.
You will leave this course ready to start writing your own PowerShell scripts to help secure your Windows environment. It’s easy to find Windows security checklists, but how do you automate those changes across thousands of machines? How do you safely run scripts on many remote boxes? In this course you will learn not just Windows and Active Directory security, but how to manage security using PowerShell.
DON’T JUST LEARN POWERSHELL SYNTAX, LEARN HOW TO LEVERAGE POWERSHELL AS A FORCE MULTIPLIER FOR WINDOWS SECURITY
There is another reason why PowerShell has become popular: PowerShell is just plain fun! You will be surprised at how much you can accomplish with PowerShell in a short period of time – it’s much more than just a scripting language, and you don’t have to be a coding guru to get going.
Learning PowerShell is also useful for another kind of security: job security. Employers are looking for IT people with PowerShell skills. You don’t have to know any PowerShell to attend this course, we will learn it together during the labs.
You can learn basic PowerShell syntax on YouTube for free, but this week goes far beyond syntax. In this course we will learn how to use PowerShell as a platform for managing security, as a "force multiplier" for the Blue Team, and as a rocket booster for your Windows IT career.
WE WILL WRITE A POWERSHELL RANSOMWARE SCRIPT AND DEFEND AGAINST IT
Unfortunately, PowerShell is being abused by hackers and malware authors. On the last day of the course, we will write our own ransomware script to see how to defend against scripts like it.
This is a fun course and a real eye-opener, even for Windows administrators with years of experience. Come have fun learning PowerShell and Windows security at the same time.
The course author, Jason Fossen, is a SANS Institute Fellow and has been writing and teaching for SANS since 1998. In fact, this course (SEC505) has had at least one day of PowerShell for more than ten years, and now PowerShell is the centerpiece of the course.
Topic Highlights
PowerShell scripting of Windows Management Instrumentation (WMI)
PowerShell remote command execution
PowerShell Core with OpenSSH
PowerShell Just Enough Admin (JEA)
PowerShell scripting of Active Directory
PowerShell scripts to replace Microsoft LAPS
PowerShell certificate authentication, such as with YubiKeys
PowerShell hardening of TLS, RDP and SMB
PowerShell malware and lateral movement inside the LAN
PowerShell ransomware – too easy, all too easy
DOWNLOAD:

https://rapidgator.net/file/5187f2d14a2226bbbe399c4478b02af3/SANS_SEC505-Securing_Windows_and_Powershell_Automation_(2020).part01.rar.html
https://rapidgator.net/file/991b09fddb608459a1f04367f6d661c6/SANS_SEC505-Securing_Windows_and_Powershell_Automation_(2020).part02.rar.html
https://rapidgator.net/file/a2791b48f06a3ce8db7d7c52b5679cd7/SANS_SEC505-Securing_Windows_and_Powershell_Automation_(2020).part03.rar.html
https://rapidgator.net/file/6254e600c23f319ac4b44b7e5a4ad4b8/SANS_SEC505-Securing_Windows_and_Powershell_Automation_(2020).part04.rar.html
https://rapidgator.net/file/1689fb9a9a5d5f700b84415a6e3f7414/SANS_SEC505-Securing_Windows_and_Powershell_Automation_(2020).part05.rar.html
https://rapidgator.net/file/48c2eff01d0e96b9ff801ea531ad836d/SANS_SEC505-Securing_Windows_and_Powershell_Automation_(2020).part06.rar.html
https://rapidgator.net/file/d6d8314a4b3abb8487507747ac6bccfb/SANS_SEC505-Securing_Windows_and_Powershell_Automation_(2020).part07.rar.html
https://rapidgator.net/file/90126032ad1f354836f82ef754d33faa/SANS_SEC505-Securing_Windows_and_Powershell_Automation_(2020).part08.rar.html
https://nitroflare.com/view/F6A8D7D1BBC84ED/SANS_SEC505-Securing_Windows_and_Powershell_Automation_%282020%29.part01.rar
https://nitroflare.com/view/1C8EC487C3D232E/SANS_SEC505-Securing_Windows_and_Powershell_Automation_%282020%29.part02.rar
https://nitroflare.com/view/18FDC6E9C88816B/SANS_SEC505-Securing_Windows_and_Powershell_Automation_%282020%29.part03.rar
https://nitroflare.com/view/9AE88C0D2CB62A6/SANS_SEC505-Securing_Windows_and_Powershell_Automation_%282020%29.part04.rar
https://nitroflare.com/view/43133157C8C430B/SANS_SEC505-Securing_Windows_and_Powershell_Automation_%282020%29.part05.rar
https://nitroflare.com/view/CA283C621D78E03/SANS_SEC505-Securing_Windows_and_Powershell_Automation_%282020%29.part06.rar
https://nitroflare.com/view/FE318A2C6079DA2/SANS_SEC505-Securing_Windows_and_Powershell_Automation_%282020%29.part07.rar
https://nitroflare.com/view/52C07B9F2257096/SANS_SEC505-Securing_Windows_and_Powershell_Automation_%282020%29.part08.rar
Leave a Reply