Threat Hunt with PowerShell
Duration: 1h 3m 55s | .MP4 1920x1080, 30 fps(r) | AAC, 48000 Hz, 2ch |
Genre: eLearning | Language: English
Duration: 1h 3m 55s | .MP4 1920x1080, 30 fps(r) | AAC, 48000 Hz, 2ch |
Genre: eLearning | Language: English
This course will teach you how to leverage PowerShell for practical threat hunting by detecting hidden persistence mechanisms, analyzing attacker activity in logs, and identifying anomalies across Active Directory, Azure, and Microsoft 365.
What you'll learn
Modern enterprises generate an overwhelming volume of logs and artifacts, making manual threat detection impossible. In this course, Threat Hunt with PowerShell, you’ll learn to wield PowerShell as a unified hunting platform. First, you’ll explore techniques to surface hidden persistence mechanisms on the file system and in memory. Next, you’ll discover how to interrogate Active Directory for rogue administrators and replication abuse. Finally, you’ll learn to pivot your hunts to the cloud by analyzing Azure and Microsoft 365 telemetry. When you’re finished with this course, you’ll be able to rapidly develop PowerShell‑based hunts that uncover adversary activity before it escalates.
More Info