Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Introduction to PowerShell - Hunting Network Activity

Cyber Mentor via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to leverage PowerShell for network threat hunting and detection of indicators of compromise across Windows environments in this 24-minute cybersecurity tutorial. Master the identification of telltale network signs of compromise, analyze suspicious connections using Netstat and Get-NetTCPConnection commands, and discover techniques for correlating network activity with running processes. Explore advanced methods for hunting malware beacon activity, enumerating session lengths, and utilizing Get-NetUDPEndpoint for comprehensive network analysis. Develop practical skills in using PowerShell's networking capabilities to strengthen defensive security posture, detect malicious network behavior, and enhance incident response capabilities. Gain hands-on experience with connection state analysis, process correlation techniques, and systematic approaches to identifying compromised systems through network indicators. Perfect for SOC analysts, incident responders, and cybersecurity professionals seeking to enhance their PowerShell-based threat hunting methodologies and defensive security skills.

Syllabus

0:00 - Introduction
1:43 - Network Indicators of Compromise
2:33 - Netstat
2:50 - Get-NetTCPConnection
4:16 - Connection State
7:34 - Correlating Network and Processes
14:11 - Hunting a Malware Beacon
18:43 - Enumerating Session Length
20:55 - Get-NetUDPEndpoint
21:42 - Conclusion edited

Taught by

The Cyber Mentor

Reviews

Start your review of Introduction to PowerShell - Hunting Network Activity

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.