Completed
Administration
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Defending against PowerShell Attacks
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 VBA
- 3 Win32 API
- 4 PowerShell
- 5 Palo Alto Labs
- 6 Post exploitation frameworks
- 7 Why people use PowerShell
- 8 MITRE Framework
- 9 Lets Block PowerShell
- 10 PowerShell doesnt solve the underlying security problem
- 11 PowerShell is a management engine
- 12 You block PowerShell
- 13 Lua scripting language
- 14 Three stages in security
- 15 PowerShell security
- 16 Just enough administration
- 17 DNS administration
- 18 Administration
- 19 Gaea
- 20 Local Sandboxing
- 21 Security Exposure
- 22 PowerShell Security Transparency
- 23 Configuration
- 24 Module Pipeline Logging
- 25 System Transcripting
- 26 Script Lock Logging
- 27 Invoke Obfuscation
- 28 Invoke Expression
- 29 Antimalware
- 30 Protected Event Logging
- 31 Useful PowerShell Events
- 32 PowerShell Scripts
- 33 Abstract Syntax Trees
- 34 Device Guard Application Whitelisting
- 35 Raid Number
- 36 Fake Face