Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Intro to PowerShell - Investigating Windows Processes

Cyber Mentor via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to investigate Windows processes using PowerShell for cybersecurity incident response and threat hunting in this 23-minute tutorial. Explore the fundamentals of what processes are and why analyzing them is crucial during live endpoint investigations, as malware must run as processes or hide within active processes during intrusions. Master legacy process enumeration techniques before progressing to modern PowerShell cmdlets like Get-Process for comprehensive process analysis. Understand the Filter Left Principle to optimize your queries and improve performance when investigating large numbers of processes. Practice filtering techniques using the PowerShell pipeline to narrow down suspicious processes and identify potential threats. Discover how to use Get-CimInstance for more detailed process information and advanced querying capabilities. Develop skills in decoding command lines to understand what processes are actually executing and identify potentially malicious activity. Gain practical knowledge of PowerShell commands and techniques that security analysts use during real-world incident response scenarios to quickly identify and analyze suspicious processes on Windows endpoints.

Syllabus

0:00 - Introduction
1:14 - What are Processes?
2:20 - Legacy Process Enumeration
5:58 - Get-Process
7:52 - The Filter Left Principle
9:55 - Filtering with the Pipeline
13:30 - Get-CimInstance
17:45 - Decoding Command Lines
20:28 - Conclusion

Taught by

The Cyber Mentor

Reviews

Start your review of Intro to PowerShell - Investigating Windows Processes

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.