Defending against PowerShell Attacks

Defending against PowerShell Attacks

via YouTube Direct link

Introduction

1 of 36

1 of 36

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Defending against PowerShell Attacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 VBA
  3. 3 Win32 API
  4. 4 PowerShell
  5. 5 Palo Alto Labs
  6. 6 Post exploitation frameworks
  7. 7 Why people use PowerShell
  8. 8 MITRE Framework
  9. 9 Lets Block PowerShell
  10. 10 PowerShell doesnt solve the underlying security problem
  11. 11 PowerShell is a management engine
  12. 12 You block PowerShell
  13. 13 Lua scripting language
  14. 14 Three stages in security
  15. 15 PowerShell security
  16. 16 Just enough administration
  17. 17 DNS administration
  18. 18 Administration
  19. 19 Gaea
  20. 20 Local Sandboxing
  21. 21 Security Exposure
  22. 22 PowerShell Security Transparency
  23. 23 Configuration
  24. 24 Module Pipeline Logging
  25. 25 System Transcripting
  26. 26 Script Lock Logging
  27. 27 Invoke Obfuscation
  28. 28 Invoke Expression
  29. 29 Antimalware
  30. 30 Protected Event Logging
  31. 31 Useful PowerShell Events
  32. 32 PowerShell Scripts
  33. 33 Abstract Syntax Trees
  34. 34 Device Guard Application Whitelisting
  35. 35 Raid Number
  36. 36 Fake Face

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.