Completed
Device Guard Application Whitelisting
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Defending against PowerShell Attacks
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 VBA
- 3 Win32 API
- 4 PowerShell
- 5 Palo Alto Labs
- 6 Post exploitation frameworks
- 7 Why people use PowerShell
- 8 MITRE Framework
- 9 Lets Block PowerShell
- 10 PowerShell doesnt solve the underlying security problem
- 11 PowerShell is a management engine
- 12 You block PowerShell
- 13 Lua scripting language
- 14 Three stages in security
- 15 PowerShell security
- 16 Just enough administration
- 17 DNS administration
- 18 Administration
- 19 Gaea
- 20 Local Sandboxing
- 21 Security Exposure
- 22 PowerShell Security Transparency
- 23 Configuration
- 24 Module Pipeline Logging
- 25 System Transcripting
- 26 Script Lock Logging
- 27 Invoke Obfuscation
- 28 Invoke Expression
- 29 Antimalware
- 30 Protected Event Logging
- 31 Useful PowerShell Events
- 32 PowerShell Scripts
- 33 Abstract Syntax Trees
- 34 Device Guard Application Whitelisting
- 35 Raid Number
- 36 Fake Face