Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified PowerShell Hacker
Alert MeDescription
Certified PowerShell Hacker Introduction
Join our Certified PowerShell Hacker course to master the art of ethical hacking and security testing using PowerShell. This intensive four-day training program is meticulously designed to empower IT professionals with the skills necessary to leverage PowerShell in the evolving digital landscape. With organizations increasingly depending on Active Directory for authentication and authorization, the proficiency in PowerShell becomes crucial. This course delves into the sophisticated use of PowerShell as both a utility for administrative tasks and a potent vector for cybersecurity threats.
Participants will explore practical, real-world applications within Windows infrastructures and apply authentic penetration testing methods. From understanding the intricacies of Active Directory security to implementing robust defenses against PowerShell-based exploits, you will gain invaluable insights and hands-on experience. Our program is built on a foundation of theoretical knowledge and practical exercises, including lab manuals and virtual machines for independent lab work, ensuring a thorough comprehension and immediate application of your hacking and security testing skills.
Here’s what you can expect to gain from this course:
- A detailed lab manual for hands-on learning.
- Access to virtual machines (VMs) for conducting practical labs independently.
- Innovative insights into assessing the security of your Active Directory infrastructure.
- Immediate application of hacking techniques for security testing.
- Proficiency in implementing countermeasures to defend against PowerShell attacks.
Certified PowerShell Hacker Exam
- Upon successful completion of the course, you’ll be well-prepared to take the Certified PowerShell Hacker (CPSH) exam.
- This online examination, accessible through Mile2’s Assessment and Certification System (MACS) on your mile2.com account, comprises 100 multiple-choice questions and has a duration of 2 hours.
- The exam fee is $400 USD and must be purchased through Mile2.com, marking the culmination of your journey to becoming a Certified PowerShell Hacker. Join us on this exciting path towards enhancing your cybersecurity skills and knowledge.
Certified PowerShell Hacker Course Objectives
- Master PowerShell for Ethical Hacking: Learn to exploit PowerShell for security testing within Windows, Mac, and Linux environments.
- Hands-On Learning: Utilize detailed lab manuals and access virtual machines to conduct practical and independent security labs.
- Security Assessment Skills: Develop expertise in assessing the security vulnerabilities of Active Directory infrastructures.
- Practical Defense Strategies: Gain proficiency in crafting and implementing countermeasures against PowerShell-based attacks.
- Immediate Application: Apply hacking techniques in real-time to enhance the security and robustness of IT systems.
Prerequisites
- General Understanding of Pen Testing
- General Understanding of Active Directory
- General Understanding of scripting and programming
Audience
- Penetration Testers
- Microsoft Administrators
- Security Administrators
- Active Directory Administrators
- Anyone looking to learn more about security
Certified PowerShell Hacker Outline
Certified PowerShell Hacker Introduction
- Different Tool Options
- Installing everything needed
- Language Basics
- Using the Windows API and WMI
- Interacting with the Registry
- Managing Objects and COM Objects
Active Directory and Kerberos Introduction
- Overview of Kerberos
- The three-headed monster
- Key Distribution Center
- Kerberos in Detail
- Why we care about Kerberos as a Hacker
- Overview of Active Directory
- Understanding AD concepts
- AD Objects and Attributes
Pen Testing Methodology Revisited
- Introduction to the methodology
- The Plan!!
- Vulnerability Identification
- Client-side attacks with and without PowerShell
Information Gathering and Enumeration
- What can a domain user see?
- Domain Enumeration
- Trust and Privileges Mapping
- After the client exploit
Privilege Escalation
- Local Privilege Escalation
- Credential Replay Attacks
- Domain Privilege Escalation
- Dumping System and Domain Secrets
- PowerShell with Human Interface Devices
Lateral Movements and Abusing Trust
- Kerberos attacks (Golden, Silver Tickets and more)
- Delegation Issues
- Attacks across Domain Trusts
- Abusing Forest Trusts
- Abusing SQL Server Trusts
- Pivoting to other machines
Persistence and Bypassing Defenses
- Abusing Active Directory ACLs
- Maintaining Persistence
- Bypassing Defenses
- Attacking Azure Active Directory
Defending Against PowerShell Attacks
- Defending an Active Directory Infrastructure
- Detecting Attacks
- Logging
- Transcripts
- Using Certificates
- Using Bastion Hosts
- Using AppLocker
$3000.00
|
4 Days Course |