Powershell for Pentesters
What about this course?
The PowerShell For Penetration Testers (PFPT) is an online course designed for teaching PowerShell to penetration testers, system administrators, and other security professionals. You will be able to use and write tools in PowerShell which is installed by default of all modern Windows operating systems. The course will be of interest to anyone who wants to know more about using PowerShell for security research, penetration testing, and red teaming. The course covers various phases of penetration testing and PowerShell is used to enhance techniques in each phase. <p> </p> <p><span style="font-size:18px"><span style="color:#e74c3c"><strong>IMPORTANT INFORMATION!</strong></span></span></p> <p><span style="color:#dddddd"><strong>As of January 15th 2023, Pentester Academy & INE no longer offers:</strong></span></p> <li><span style="color:#dddddd"><strong>Enterprise Security Labs (Active Directory/Red Team Labs & Courses)</strong></span></li> <li><span style="color:#dddddd"><strong>Active Directory/Azure Bootcamps and its associated certifications (CRTP/CRTE/PACES/LinuxAD/CARTP/CAWASP)</strong></span></li> <p><span style="color:#dddddd"><u><strong>Prior to April 18th 2023, all current subscribers will still be able to access this course, after which it will be no longer available.</strong></u></span></p>
Instructor for this course
Nikhil Mittal
InfoSec Researcher
This course is composed by the following modules
Course Introduction
Introduction to Powershell
Exploring and Using Cmdlets
Output Formatting
Operators
Advanced Operators
Types in Powershell
Arrays in Powershell
Conditional Statements in Powershell
Loop Statements in Powershell
Basics of Powershell Scripting
Functions in Powershell Part 1
Functions in Powershell Part 2
Functions in Powershell Part 3
Advanced Functions in Powershell
Advanced Scripting with Powershell
Module in Powershell Part 1
Modules in Powershell Part 2
Modules in Powershell Part 3
Remoting Part 1
Remoting Part 2
Powershell Remoting Part 3
Powershell Remoting Part 4
Powershell Remoting Part 5
Powershell Remoting Part 6
Jobs in Powershell
Using .NET in Powershell Part 1
Using .NET in Powershell Part 2
Using .NET in Powershell Part 3
Using .NET in Powershell Part 4
Using .NET in Powershell Part 5
Using WMI in Powershell Part 1
Using WMI in Powershell Part 2
Using WMI in Powershell Part 3
COM and Powershell
Registry and Powershell Part 1
Registry and Powershell Part 2
Registry and Powershell Part 3
Pentest Methodology
Recon and Scanning Part 1
Recon and Scanning Part 2
Vulnerability Scanning and Analysis
Bruteforce Part 1
Bruteforce Part 2
Exploitation: Executing Scripts on MySQL
Client Side Attacks Part 1
Client Side Attacks Part 2
Client Side Attacks Part 3
Client Side Attacks Part 4
PHPMyAdmin Part 1
PHPMyAdmin Part 2
Metasploit Part 1
Metasploit Part 2
Porting Exploits Part 1
Porting Exploits Part 2
Porting Exploits Part 3
Domain Enumeration Part 1
Domain Enumeration Part 2
Information Gathering
Privilege Escalation Part 1
Privilege Escalation Part 2
Privilege Escalation Part 3
Dumping System Secrets Part 1
Dumping System Secrets Part 2
Backdoors Part 1
Backdoors Part 2
POSHing the Hashes
Remoting Revisited
Web Shells
Persistence
Powershell with other Security Tools
Defense with Powershell
PowerShell and HID
Course Conclusion
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?