Duration

30 Hours(For Regular Course)

4-8 Hours(For Capsule Course)


Enroll Now

Request more information




Securing Windows with PowerShell

This web-based training course on Securing Windows with PowerShell functionality, administration and development, is available online to all individuals, institutions, corporates and enterprises in India (New Delhi NCR, Bangalore, Chennai, Kolkatta), US, UK, Canada, Australia, Singapore, United Arab Emirates (UAE), China and South Africa. No matter where you are located, you can enroll for any training with us - because all our training sessions are delivered online by live instructors using interactive, intensive learning methods.

Critical security control in computer systems is currently one of the most important aspects of network and information security. The work of penetration testers and ethical hackers is to find out the loopholes and vulnerabilities in the systems but it is more than known that these penetration tests can only make preparatory actions and not mitigation actions. It is the job of critical security control professionals to defend against windows attacks and also understand the likely attacks which may possibly happen in the future. The job of pen test tools such as Metasploit, Cain, Netcat and poison Ivy can easily be abused by highly competent hackers and that's where the job of critical security control professional becomes even more important. Implementing security events through various security essentials surpasses intrusion detection when push comes to shove.


In this Securing Windows with PowerShell online training course, the trainees are provided the knowledge of controlling administrative powers using Group Policy and PowerShell scripting. Using PowerShell to control the windows administration is probably one of the most important requirements of critical security control. With the growing world of cloud computing PowerShell becomes even more important as it can be integrated with the cloud to implement security computer forensics and application security. This Securing Windows with PowerShell online course explores upon the various methods and processes of PowerShell scripting and how it is implemented for security automation right from the scratch. There are no pre-requisites for this Securing Windows with PowerShell training as everything will be taught from the scratch, but it is presumed that the trainees are familiar with basic windows and active directory concepts.

Overview And Security

  • Introduction To Powershell
  • Security And Execution Policy Of Powershell
  • Signing Scripts Digitally
  • Profile Scripts

Powershell Structure

  • In-Built Help System Support
  • Using The Graphical Editor
  • CMD And Bash Users
  • Cmdlets, Functions, And Scripts Execution
  • Piping Objects Apart From Text
  • Properties And Methods Of Objects

Example Commands

  • Harvesting The Output Of Windows Tools
  • Parsing Text Files
  • Powershell Remoting
  • Seeking Event Logs
  • Parsing Nmap XML Output

Write Your Own Scripts

  • Writing Functions
  • Parameters Of Function
  • Returning Output
  • Flow Control: If-Then, Do-While, For-Each, Switch Case
  • COM Objects
  • Class Library Of .NET Framework
  • Piping Data In And Out Of Scripts
  • Overall Design Of The Script

Powershell And Windows Management Instrumentation (WMI)

  • Introduction To WMI
  • WMI Queries
  • Remote Command Execution With WMI
  • Seeking Remote Event Logs
  • Installed Software From The Inventory

More Than Anti-Virus Scanning

  • Whitelisting Of Applications
  • Applocker
  • Scripts And Executable Signing
  • USB Devices And Their Control
  • Microsoft Rootkit: EMET
  • Virtual Desktop Infrastructure (VDI)

Hardening Of OS With Templates For Security

  • INF Versus XML Security
  • Editing And Applying Templates
  • Configurations Of Security And Analysis
  • SECEDIT.EXE
  • Security Configuration Wizard (SCW)
  • Auditing With Templates

Hardening Using Group Policy

  • Microsoft Security Compliance Manager
  • Group Policy Objects (Gpos)
  • Enhancements Of Third-Party GPO
  • Pushing Out Powershell Scripts
  • Remote Command Execution With GPO
  • Troubleshooting Tools Of GPO

Administrative Powers

  • Limiting Pass-The-Hash And Token Abuse
  • Limiting The Administrative User's Power
  • Privileges, Logon Rights, And Permissions Limiting
  • Controlling User Account
  • Policies Of Authentication
  • Managing Admin Password Updates
  • Picture Passwords
  • PIN Logons
  • Windows Hello Biometric Logons
  • Password Managers
  • Credential Guard In Hash Protection

Active Directory In Powershell

  • Active Directory Scripting Of Powershell
  • Management Of Users, Computers, And Groups
  • Seeking Active Directory Through Powershell
  • Administrative Center Of Active Directory

Permissions And Delegation In Active Directory

  • Permissions Of Active Directory
  • Auditing In Active Directory
  • Authority Delegation At The OU Level
  • Attribute Content Changes Logging

Public Key Infrastructure Usage

  • Sturdy Authentication And Encryption
  • Smart Cards, Ipsec, Wireless, SSL/TLS, S/MIME, Etc.
  • Mobile And BYOD Devices
  • Signing Of Codes And Documents

Installing The Windows PKI

  • Root Vs Subordinate Certification Authorities
  • Your Own Root CA
  • Templates Of Custom Certificate
  • Control Of Certificate Enrollment

Managing PKI

  • Accessing Certificates Through Powershell
  • Auditing Root Cas Through Powershell Script
  • Deployment Of Certificates Through Group Policy
  • PKI Settings Of Group Policy
  • Revoking Certificates
  • Automating Private Key Backup
  • Credential Roaming Of Keys
  • Authority Delegation
  • Disabling SSL And Using TLS
  • Optimization Of TLS Cipher Suites

Deployment Of Smart Cards

  • Built In Features
  • Virtual Smart Cards In TPM
  • Enrollment Station Of Smart Card
  • Group Policy Deployment
  • Limited Budget Smart Cards

Creating Ipsec Policies

  • Ipsec And Vpns Correlation
  • Requirement And Preference Of Ipsec
  • Sharing Permissions With TCP Ports
  • Options Of IDS/IPS Compatibility
  • Encrypted Vlans Based On Ipsec
  • Group Policy Management
  • Powershell And NETSH.EXE

Windows Firewall

  • Ipsec And Vpns Correlation
  • Requirement And Preference Of Ipsec
  • Sharing Permissions With TCP Ports
  • Options Of IDS/IPS Compatibility
  • Encrypted Vlans Based On Ipsec
  • Group Policy Management
  • Powershell And NETSH.EXE

Windows Firewall

  • Management Of Group Policy
  • Management Of Powershell
  • Metro App And Awareness Of Services
  • Compatibility Of Roaming And VPN
  • Integration Of Deep Ipsec

Dangerous Server Protocols

  • RDP Man-In-The-Middle Attacks
  • Encryption In Smbv3 Native
  • SMB Attacks
  • NTLM, Ntlmv2, And Kerberos
  • Kerberos Armoring
  • Protocol Stack Hardening

Server Hardening

  • Server Manager And Powershell Integration
  • Server Nano/Core/Minimal/Full
  • Templates Of Security And Group Policy
  • Incidents Preparations And Doing Pre-Forensics
  • Service Account Security

Dynamic Access Control (DAC)

  • Access Control And Auditing Of Templates
  • Requirement Of DAC Windows 8/10
  • Conditional Expressions In DAC
  • Complying With Regulations In DAC
  • Automated File Classification Infrastructure
  • Identity Restrictions Of Users And Device
  • Auditing Without Management Of Sacls
  • Deployment Of Central Access Policy
  • Scripts For Managing DAC In Powershell

Hardening DNS

  • DNSSEC
  • Ipsec In DNS
  • Securing Dynamic Updates
  • Sinkholing Unnecessary DNS Names Using Powershell
  • Powershell Scripting For The Hosts File

Securing windows with PowerShell is one of the competencies that Windows administrators should have without fail in order to keep their system and networks secure in this growing age of digitization and networking. With the automation flexibilities and methodologies provided by PowerShell it becomes an essential component of overall network and system security model. Becoming a PowerShell windows administration expert will add immense value to any individual's work and provide him great job prospects and career opportunities. This course comes highly recommended for windows security engineers and system administrators along with those working with PKI, smart cards and APT malware mitigations.

1. Are lab-sessions available after theory sessions?

We provide online lab facilities to all our students, wherever possible & applicable, using a combination of one or more options, including global ASP setups, live-environments, real-time simulations, training-videos, PPTs, Screenshots and others.

2. Who and how qualified are the instructors?

All our instructors go through a rigorous and multiple processes of filtering and selection before they are appointed by us. Only the most qualified, most experienced and best suited candidates are chosen as instructors.

3.What are the machine requirements for the course?

You must have a fairly good desktop PC or laptop. You can even access these courses on your tabs or smart phones. For PCs and laptops the configuration should be at-least an Intel Pentium processor, 4GB of RAM and 50 to 100 GB of free hard disk space. You must also have a good and steady WiFi internet connection which works at 3G or 4G speeds.

4.How will I undergo practical training in the course?

Depending on the type of lab facilities available for the course you have enrolled in for our instructor would be happy to help you in your lab sessions.

5.What is the process to get my questions/queries answered?

Get in touch with your trainer. You can also consult your batch-mates. We believe in collaborative and practical learning.

6.Can a free demo session be provided?

We do not provide free demo sessions.

7.Will there be a provision for repetition if I miss a class?

We encourage our trainees to attend all sessions. If you have missed a session we will try out best to update you on it, if possible. Else you will need to pay a small fee to have a repeat session arranged specifically for you.

8.Does your organization provide assistance in job hunting?

We are connected across the industry in India and abroad. We will pass on any job openings from our customer to our trainees. But we are not a manpower placement provider.

9.How and where can I make the payment?

You can pay using any credit or debit card in India or abroad. You can also pay using your PayPal account.

10. Will practice material or tests be also provided with the course?

Yes. As required & as applicable.

11.What is the minimum or maximum batch size?

Minimum/maximum batch sizes vary from course to course, depending upon a number of factors. It can vary from as few as 2 to as many as a few hundred, in some cases. But that number does not impact the quality of training that we deliver due to our tight quality-control mechanisms.

All trainees will be provided with a course participation and completion certificate by Aurelius Corporate Solutions. Please note, we are an independent provider of learning solutions. We are not affiliated in any manner to any company or organization.

Copyright © 2016 Aurelius Corporate Solutions Pvt. Ltd. All Rights Reserved.