CÔNG TY TNHH TRAINOCATE VIỆT NAM
40555A: Microsoft Security Workshop: Implementing PowerShell Security Best Practices

40555A: Microsoft Security Workshop: Implementing PowerShell Security Best Practices

40555A: Microsoft Security Workshop: Implementing PowerShell Security Best Practices

Overview

Duration: 1.0 day

Introduced in 2006, Windows PowerShell is a scripting language, a command-line shell, and a scripting platform built on Microsoft .NET Framework. Despite the scripting designation, Windows PowerShell features a range of characteristics common for programming languages, including its object-oriented nature, extensibility, C#-like syntax, and the ability to interact directly with .NET classes, their properties, and methods.

The primary objective of Windows PowerShell was to help IT professionals and power users control and automate the administration of the Windows operating system and applications that run on Windows.

To take advantage of the benefits that Windows PowerShell has to offer, while at the same time, minimize security-related risks, it is essential to understand the primary aspects of Windows PowerShell operational security. Another aspect that is critical to consider in the context of this course is the role of Windows PowerShell in security exploits.

This 1-day Instructor-led security workshop provides discussion and practical hands-on training for PowerShell. you will learn about PowerShell fundamentals, including its architectural design, its editions and versions, and basics of interacting with PowerShell

You will then explore the most common Windows PowerShell-based techniques employed by hackers in order to leverage existing access to a Windows operating system to facilitate installation of malicious software, carry out reconnaissance tasks, establish its persistency on the target computer, and promote lateral movement. You will also review some of Windows PowerShell-based security tools that facilitate penetration testing, forensics, and reverse engineering of Windows PowerShell exploits. To conclude the course, you will provide a summary of technologies recommended by the Blue Team that are geared towards implementing comprehensive, defense-in-depth security against Windows PowerShell-based attacks.

This workshop is part of a larger series of Workshops offered by Microsoft on the practice of Security. While it is not required that you have completed any of the other courses in the Security Workshop series before taking this workshop, it is highly recommended that you start with the first course in the series, Microsoft Security Workshop: Enterprise Security Fundamentals.

  • 40551A: Microsoft Security Workshop: Enterprise Security Fundamentals
  • 40552A: Microsoft Security Workshop: Managing Identity
  • 40553A: Microsoft Security Workshop: Planning for a Secure Enterprise - Improving Detection
  • 40554A: Microsoft Security Workshop: Implementing Windows 10 Security Features
  • 40555A: Microsoft Security Workshop: Implementing PowerShell Security Best Practices.

Objectives

After completing this workshop, students will be able to:

  • Provide an overview of Windows PowerShell
  • Describe PowerShell editions and versions
  • Install and use Windows PowerShell and PowerShell Core
  • Manage execution of local PowerShell scripts
  • Manage remote execution of Windows PowerShell
  • Manage remote execution of PowerShell Core
  • Describe security implications of using Constrained Language Mode
  • Describe the architecture and components of Windows PowerShell DSC
  • Recommend Windows PowerShell auditing and logging configuration
  • Provide examples of Windows PowerShell-based attacks
  • Use Windows PowerShell-based security tools
  • Provide an overview of Windows PowerShell-based security-related technologies
  • Implement Windows PowerShell logging by using Desired State Configuration (DSC)
  • Identify and mitigate Windows PowerShell-based exploits
  • Implement Just Enough Administration (JEA)

Content

Module 1: PowerShell Fundamentals

Introduced in 2006, Windows PowerShell is a scripting language, a command-line shell, and a scripting platform built on Microsoft .NET Framework. Despite the scripting designation, Windows PowerShell features a range of characteristics common for programming languages, including its object-oriented nature, extensibility, C#-like syntax, and the ability to interact directly with .NET classes, their properties, and methods. The primary objective of Windows PowerShell was to help IT professionals and power users control and automate the administration of the Windows operating system and applications that run on Windows. With the introduction of .NET Core in 2016, Microsoft extended the scope of PowerShell to other operating system platforms, leading to an open-source, GitHub-hosted project, named PowerShell Core. You can use PowerShell Core on macOS 10.12, a variety of 64-bit Linux distributions, in addition to the 32-bit and 64-bit Windows operating system, including Windows 10 running on Advanced Reduced Instruction Set Computing Machine (ARM) devices. In this module, you will learn about PowerShell fundamentals, including its architectural design, its editions and versions, and basics of interacting with PowerShell.

Lessons

  • Overview of Windows PowerShell
  • PowerShell editions and versions
  • Running PowerShell

Module 2: PowerShell Operational Security

To take advantage of the benefits that Windows PowerShell has to offer, while at the same time, minimize security-related risks, it is essential to understand the primary aspects of Windows PowerShell operational security. In this module, you will learn about enhancing operating system security by leveraging built-in Windows PowerShell features and technologies that are part of the Windows PowerShell operational environment. Another aspect that is critical to consider in the context of this module is the role of Windows PowerShell in security exploits. According to empirical data, in majority of cases, Windows PowerShell is used as a post-exploitation tool. This implies that, at the point where a Windows PowerShell session is launched, an attacker already gained access to the security context in which the target system or the target user operates. This is the type of scenario that this module will focus on. In this case, Windows PowerShell serves as powerful and extremely flexible engine for executing arbitrary tasks on the local and remote computers, which, incidentally, is the same reason that made Windows PowerShell extremely popular among system administrators. There are obviously other types of attacks which rely on Windows PowerShell to gain unauthorized access to a target system. In this type of scenario, Windows PowerShell serves as an exploitation tool. We will explore these types of attacks in the last module of this course.

Lessons

  • Managing Local Script Execution
  • Managing remote execution capabilities of Windows PowerShell
  • Managing remote execution capabilities of PowerShell Core
  • Language Mode

Module 3: Implementing PowerShell-based Security
In the previous module, you learned about a number of security-related features built into Windows PowerShell and technologies that are part of the Windows PowerShell operational environment that help you with their enforcement. The purpose of this module is to present the most common and effective methods of leveraging Windows PowerShell to enhance operating system security. These methods include:

  • Protecting from unintended configuration changes by relying on PowerShell Desired State Configuration (DSC)
  • Implementing the principle of least privilege in remote administration scenarios by using Just Enough Administration (JEA)
  • Tracking and auditing events that might indicate exploit attempts by using Windows PowerShell logging

Lessons

  • Windows PowerShell DSC
  • Just Enough Administration (JEA)
  • Windows PowerShell Auditing and Logging

Module 4: Windows PowerShell-based Exploits and their Mitigation

Organizations cannot comprehensively identify gaps in security detection and response by solely focusing on breach prevention strategies. Understanding how to not only protect but also to detect and respond to breaches is just as important—if not more so—than taking action to prevent a breach from occurring in the first place. By planning for the worst-case scenarios through Red Teaming (real-world attack and penetration), organizations can develop the necessary capabilities to detect attempted exploits and significantly improve responses associated with security breaches. Red Teaming has become one of the most essential parts of developing and securing Microsoft’s platforms and services. The Red Team takes on the role of sophisticated adversaries and allows Microsoft to validate and improve security, strengthen defenses and drive greater effectiveness of the entire security program. Red Teams enable Microsoft to test breach detection and response as well as accurately measure readiness and impacts of real-world attacks. The purpose of the Blue Team is looking for creative and reliable defenses to detect and foil attacks orchestrated by the Red Team. The Blue Team is comprised of either a dedicated set of security responders or members from across the security incident response, Engineering and Operations organizations. Regardless of their make-up, they are independent and operate separately from the Red Team. The Blue Team follows established security processes and uses the latest tools and technologies to detect and respond to attacks and penetration. In this module, we will first approach the Windows PowerShell-based security from the Red Team’s perspective. We will explore the most common Windows PowerShell-based techniques employed by hackers in order to leverage existing access to a Windows operating system to facilitate installation of malicious software, carry out reconnaissance tasks, establish its persistency on the target computer, and promote lateral movement. We will also review some of Windows PowerShell-based security tools that facilitate penetration testing, forensics, and reverse engineering of Windows PowerShell exploits. To conclude the module and the course, we will provide a summary of technologies recommended by the Blue Team that are geared towards implementing comprehensive, defense-in-depth security against Windows PowerShell-based attacks. There are many documented exploits that utilize Windows PowerShell capabilities to carry out attacks that either target security flaws present in unpatched or out-of-date systems or to laterally expand the scope of such attacks once a single system is compromised. Note that the overview of such exploits presented in this module is not meant to be exhaustive. Our intention is to illustrate common patterns that such exploits follow and highlight the importance of a comprehensive defense in-depth strategy.
Lessons

  • Windows PowerShell-based attacks
  • Windows PowerShell-based security tools
  • Summary of Windows PowerShell security-related technologies

Lab : Implementing Windows PowerShell Security

  • Implement Windows PowerShell Logging by using DSC
  • Carry out a Windows PowerShell-based exploit
  • Implement Just Enough Administration

Additional Reading

This workshop is part of a larger series of Workshops offered by Microsoft on the practice of Security. While it is not required that you have completed any of the other courses in the Security Workshop series before taking this workshop, it is highly recommended that you start with the first course in the series, Microsoft Security Workshop: Enterprise Security Fundamentals.

  • 40551A: Microsoft Security Workshop: Enterprise Security Fundamentals
  • 40552A: Microsoft Security Workshop: Managing Identity
  • 40553A: Microsoft Security Workshop: Planning for a Secure Enterprise - Improving Detection
  • 40554A: Microsoft Security Workshop: Implementing Windows 10 Security Features
  • 40555A: Microsoft Security Workshop: Implementing PowerShell Security Best Practices.

Audience

This course is intended for IT Professionals that require a deeper understanding of Windows PowerShell security related features and exploits and to increase their knowledge level through a predominately hands-on experience implementing Windows PowerShell security features.

Prerequisites

In addition to their professional experience, students who take this training should already have the following technical knowledge:

  • A good foundation in accessing and using simple Windows PowerShell commands
  • The current cybersecurity ecosystem
  • Experience with Windows Client and Server administration, maintenance, and troubleshooting.
  • Basic experience and understanding of Windows networking technologies, to include Windows Firewall network setting, DNS, DHCP, WiFi, and cloud services concepts.
  • Basic experience and understanding of Active Directory, including functions of a domain controller, sign on services, and an understanding of group policy.
  • Knowledge of and relevant experience in systems administration, using Windows 10.

Learners who take this training can meet the prerequisites by obtaining equivalent knowledge and skills through practical experience as a Security Administrator, System Administrator, or a Network Administrator. Learners should have a good foundation in accessing and using simple Windows PowerShell commands. This knowledge can be obtained in INF210x, Windows PowerShell Basics.

Certification

This course is not associated with any Certification.

Lịch khai giảng

Form đăng ký

Bằng cách nhấn nút "ĐĂNG KÝ", tôi hoàn toàn đồng ý với Chính sách quyền riêng tư

Các khóa đào tạo Microsoft khác

MS-500 - Microsoft 365 Security Administration

Trong khóa học này, bạn sẽ học cách đảm bảo quyền truy cập của người dùng vào các tài nguyên của tổ chức bạn. Các nội dung bao gồm bảo vệ bằng mật khẩu người dùng, xác thực đa yếu tố, cách bật Azure Identity Protection, cách thiết lập và sử dụng Azure AD Connect, đồng thời giới thiệu cho bạn quyền truy cập có điều kiện trong Microsoft 365. Bạn sẽ tìm hiểu về các công nghệ giúp bảo vệ Môi trường 365. Cụ thể, bạn sẽ tìm hiểu về các mối đe dọa và các giải pháp bảo mật của Microsoft để giảm thiểu các mối đe dọa. Bạn sẽ tìm hiểu về Secure Score, Exchange Online protection, Azure Advanced Threat Protection, Windows Defender Advanced Threat Protection và quản lý mối đe dọa. Trong khóa học, bạn sẽ tìm hiểu về các công nghệ bảo vệ thông tin giúp bảo vệ môi trường Microsoft 365 của bạn. Khóa học thảo luận về quyền quản lý nội dung thông tin, mã hóa tin nhắn, nhãn, chính sách và quy tắc hỗ trợ ngăn ngừa mất dữ liệu và bảo vệ thông tin. Cuối cùng, bạn sẽ tìm hiểu về lưu trữ trong Microsoft 365 cũng như quản trị dữ liệu, cách thực hiện tìm kiếm và điều tra nội dung. Khóa học này bao gồm các chính sách và thẻ lưu giữ dữ liệu, quản lý hồ sơ tại chỗ cho SharePoint, lưu giữ email và cách thực hiện tìm kiếm nội dung hỗ trợ điều tra eDiscovery.
4.0 ngày

40502G: Microsoft Cloud Workshop: Big Data & Visualization

Overview Duration: 1.0 day In this workshop, you will deploy a web app using Machine Learning (ML) to predict travel delays given flight delay data and weather conditions. Plan a bulk data import operation, followed by preparation, such as cleaning and manipulating the data for testing, and training your Machine Learning model. Objectives At the end of this workshop, you will be better able to build a complete machine learning model in Azure Databricks for predicting if an upcoming flight will experience delays. In addition, you will learn to store the trained model in Azure Machine Learning Model Management, then deploy to Docker containers for scalable on-demand predictions, use Azure Data Factory (ADF) for data movement and operationalizing ML scoring, summarize data with Azure Databricks and Spark SQL, and visualize batch predictions on a map using Power BI. Content Module 1: Whiteboard Design Session - Big data analytics and visualization Lessons Review the customer case study Design a proof of concept solution Present the solution Module 2: Hands-on Lab - Big data analytics and visualization Lessons Retrieve lab environment information and create Databricks cluster Load Sample Data and Databricks Notebooks Setup Azure Data Factory Develop a data factory pipeline for data movement Operationalize ML scoring with Azure Databricks and Data Factory Summarize data using Azure Databricks Visualizing in Power BI Desktop Deploy intelligent web app (Optional) Audience This workshop is intended for Cloud Architects and IT professionals who have architectural expertise of infrastructure and solutions design in cloud technologies and want to learn more about Azure and Azure services as described in the ‘About this Course’ and ‘At Course Completion’ areas. Those attending this workshop should also be experienced in other non-Microsoft cloud technologies, meet the course prerequisites, and want to cross-train on Azure. Prerequisites N/A Certification This course is not associated with any Certification.
1.0 ngày

DP-060T00-A: Migrate NoSQL Workloads to Azure Cosmos DB

Overview Duration: 1.0 day This course will teach the students what is Cosmos DB and how you can migrate MongoDB and Cassandra workloads to Cosmos DB. Objectives At the end of this course, the students will have learned: Building Globally Distributed Applications with Cosmos DB Migrate Mongo DB Workloads to Cosmos DB Migrate Cassandra DB Workloads to Cosmos DB Content Module 1: Building Globally Distributed Applications with Cosmos DB This module describes the benefits and architecture of Cosmos DB. Lessons Cosmos DB overview Cosmos DB APIs Provisioning Throughput Partitioning/Sharding Best Practices Lab : Creating a Cosmos DB Database Create Cosmos DB Account Configure RUs At the end of this module, the students will be able to describe: Cosmos DB overview Cosmos DB APIs Provisioning Throughput Partitioning/Sharding Best Practices Module 2: Migrate MongoDB Workloads to Cosmos DB Migrate MongoDB Workloads to Cosmos DB Lessons Understand Migration Benefits Migration Planning Data Migration Application Migration Post-migration considerations Lab : Migrating MongoDB Workloads to Cosmos DB Create a Migration Project Define Source and Target Perform Migration Verify Migration At the end of this module, the students will be able to: Understand Migration Benefits Perform Migration Planning Perform Data Migration Perform Application Migration Undertake Post-migration considerations Module 3: Migrate Cassandra DB Workloads to Cosmos DB This module describes the benefits and process of migrating Cassandra DB workloads to Cosmos DB. Lessons Understand Migration Benefits Migration Planning Data Migration Application Migration Post-migration considerations Lab : Migrating Cassandra DB Workloads to Cosmos DB Export the Schema Move Data Using CQLSH COPY Move Data Using Spark Verify Migration At the end of this module, the students will be able to: Understand Migration Benefits Perform Migration Planning Perform Data Migration Perform Application Migration Undertake Post-migration considerations Audience The primary audience for this course is database developers who plan to migrate their MongoDB or Cassandra DB workloads to Azure using Cosmos DB. Prerequisites Successful students start this role with a fundamental knowledge of cloud computing concepts and professional experience in configuring NoSQL applications. Specifically: The fundamental concepts of partitioning, replication, and resource governance for building and configuring scalable NoSQL applications that are agnostic of Cosmos DB API. Experience with Azure, such as deploying and managing resources To gain these skills, take the following free online training before attending the course: Azure Data Fundamentals Core cloud services – Azure compute options Case studies: NoSQL databases and cloud object storage Certification This course is not associated with any Certification.
1.0 ngày

EXI: Excel 2019 Intermediate

Whether you need to crunch numbers for sales, inventory, information technology, human resources, or other organizational purposes and departments, the ability to get the right information to the right people at the right time can create a powerful competitive advantage. After all, the world runs on data more than ever before and that's a trend not likely to change, or even slow down, any time soon. But with so much data available and being created on a nearly constant basis, the ability to make sense of that data becomes more critical and challenging with every passing day. You already know how to get Microsoft® Office Excel® to perform simple calculations and how to modify your workbooks and worksheets to make them easier to read, interpret, and present to others. But, Excel is capable of doing so much more. To gain a truly competitive edge, you need to be able to extract actionable organizational intelligence from your raw data. In other words, when you have questions about your data, you need to know how to get Excel to provide the answers for you. And that's exactly what this course aims to help you do. This course builds upon the foundational knowledge presented in the Microsoft® Office Excel® 2019: Part 1 course and will help start you down the road to creating advanced workbooks and worksheets that can help deepen your understanding of organizational intelligence. The ability to analyze massive amounts of data, extract actionable information from it, and present that information to decision makers is at the foundation of a successful organization that is able to compete at a high level. This course covers Microsoft Office Specialist Program exam objectives to help you prepare for the Excel Associate (Office 365 and Office 2019): Exam MO-200 and Excel Expert (Office 365 and Office 2019): Exam MO-201 certifications.
1.0 ngày

EXA: Excel 2019 Advanced

Clearly, you use Excel a lot in your role. Otherwise, you wouldn't be taking this course. By now, you're already familiar with Microsoft® Office Excel® 2019, its functions and formulas, a lot of its features and functionality, and its powerful data analysis tools. You are likely called upon to analyze and report on data frequently, work in collaboration with others to deliver actionable organizational intelligence, and keep and maintain workbooks for all manner of purposes. At this level of use and collaboration, you have also likely encountered your fair share of issues and challenges. You're too busy, though, to waste time scouring over workbooks to resolve issues or to perform repetitive, monotonous tasks. You need to know how to get Excel to do more for you so you can focus on what's really important: staying ahead of the competition. That's exactly what this course aims to help you do. This course builds upon the foundational and intermediate knowledge presented in the Microsoft® Office Excel® 2019: Part 1 and Microsoft® Office Excel® 2019: Part 2 courses to help you get the most of your Excel experience. The ability to collaborate with colleagues, automate complex or repetitive tasks, and use conditional logic to construct and apply elaborate formulas and functions will put the full power of Excel right at your fingertips. The more you learn about how to get Excel to do the hard work for you, the more you'll be able to focus on getting the answers you need from the vast amounts of data your organization generates. This course covers Microsoft Office Specialist Program exam objectives to help you prepare for the Excel Associate (Office 365 and Office 2019): Exam MO-200 and Excel Expert (Office 365 and Office 2019): Exam MO-201 certifications.
1.0 ngày

Đăng ký tư vấn
cùng đội ngũ chuyên gia Trainocate!!

Bản quyền thuộc về Trainocate Việt Nam

back to top
icon đăng ký