Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

PowerShell for Penetration Testing

Packt via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This course equips cybersecurity professionals with essential PowerShell scripting skills for penetration testing across various platforms. By focusing on practical, real-world applications, you’ll learn to automate tasks, identify vulnerabilities, and conduct assessments. You’ll be able to automate security operations and build custom scripts for different environments, significantly enhancing your pentesting efficiency. The course blends foundational scripting techniques with advanced exploitation methods to ensure learners gain valuable hands-on experience in cybersecurity. Ideal for aspiring and intermediate penetration testers, this course also benefits those looking to enhance their PowerShell proficiency in penetration testing scenarios.

Syllabus

  • Introduction to Penetration Testing
    • In this section, we explore penetration testing components, ethical and legal requirements, and the cyber kill chain methodology for structured security assessments.
  • Programming Principles in PowerShell
    • In this section, we cover PowerShell's role in parsing and manipulating JSON and XML for penetration testing.
  • Network Services and DNS
    • In this section, we explore PowerShell-based management of network services and DNS, focusing on automation, query types, and record configuration for efficient IT operations.
  • Network Enumeration and Port Scanning
    • In this section, we explore TCP and UDP port scanning using PowerShell cmdlets and .NET, focusing on network enumeration and identifying open ports for security assessments.
  • The Web, REST, and SOAP
    • In this section, we explore PowerShell techniques for encoding and decoding JSON and XML, and apply OWASP standards to test REST and SOAP API security vulnerabilities.
  • SMB, Active Directory, LDAP and Kerberos
    • In this section, we explore PowerShell's role in assessing SMB, Active Directory, and LDAP security through enumeration, vulnerability scanning, and configuration evaluation for enhanced network resilience.
  • Databases: MySQL, PostgreSQL, and MSSQL
    • In this section, we explore PowerShell's role in database penetration testing, covering MySQL, PostgreSQL, and MSSQL with practical examples and security assessments.
  • Email Services: Exchange, SMTP, IMAP, and POP
    • In this section, we explore port identification, authentication checks, and banner grabbing to assess mail server vulnerabilities. These techniques help identify risks and strengthen email system security.
  • PowerShell and FTP, SFTP, SSH, and TFTP
    • In this section, we explore PowerShell for testing FTP, SFTP, and SSH security through scripting and configuration analysis.
  • Brute Forcing in PowerShell
    • In this section, we explore brute forcing in PowerShell, focusing on FTP, SSH, and web services. It covers ethical methods, script design, and mitigation strategies for security testing.
  • PowerShell and Remote Control and Administration
    • In this section, we cover PowerShell remoting and SNMP for remote administration and network monitoring.
  • Using PowerShell in Azure
    • In this section, we explore using PowerShell to analyze Azure environments, focusing on RBAC, resource discovery, and automation for cloud security assessments.
  • Using PowerShell in AWS
    • In this section, we explore using PowerShell to profile AWS components, analyze security groups for misconfigurations, and automate monitoring and reporting for enhanced cloud security.
  • Command and Control
    • In this section, we explore PowerShell C2 techniques for penetration testing, focusing on covert communication, obfuscation, and real-world attack simulation to enhance defensive strategies.
  • Post-Exploitation in Microsoft Windows
    • In this section, we explore PowerShell-based post-exploitation techniques in Microsoft Windows, focusing on privilege escalation, user profiling, and network movement to enhance security assessments and threat simulation.
  • Post-Exploitation in Linux
    • In this section, we examine PowerShell's role in Linux post-exploitation, focusing on privilege escalation, file permissions, and threat simulation for enhanced system security.

Taught by

Packt - Course Instructors

Reviews

Start your review of PowerShell for Penetration Testing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.