Course Curriculum

Before the Course
(W41M00) Before the course 00:00:00
(W00) Course Instructions 00:00:00
Module 1
(W41M01) Basics of PowerShell (syntax, cmdlets, system help) 00:00:00
(W41M02) Functions and Modules 00:00:00
(W41M03) PowerShell Jobs 00:00:00
(W41M04) Scripting with PowerShell 00:00:00
(W41M05) Creating powershell scripts 00:00:00
(W41M06) Nishang scripts – case study 00:00:00
(W41M07) Module 1 Exercise 1: PowerShell cmdlets 00:00:00
(W41A01) Exercise 1: PowerShell cmdlets 30, 00:00
(W41M08) Module 1 Exercise 2: PowerShell jobs 00:00:00
(W41A02) Exercise 2: PowerShell jobs 30, 00:00
(W41M09) Module 1 Exercise 3: Scripting 00:00:00
(W41A03) Exercise 3: Scripting 30, 00:00
Module 2
(W41M10) PowerShell integration of .NET – Part 1 00:00:00
(W41M11) PowerShell integration of .NET – Part 2 00:00:00
(W41M12) PowerShell and WMI 00:00:00
(W41M13) Using Windows API with PowerShell 00:00:00
(W41M14) COM Objects 00:00:00
(W41M15) PowerShell to Windows Registry 00:00:00
(W41M16) WMI Explorer and PowerShell 00:00:00
(W41M17) Module 2 Exercise 1 – Interaction with the Registry 00:00:00
(W41A04) Exercise 1: Interaction with Registry 30, 00:00
(W41M18) Module 2 Exercise 2 – Windows API 00:00:00
(W41A05) Exercise 2: Windows API 30, 00:00
(W41M19) Module 2 Exercise 3 – COM Objects 00:00:00
(W41A06) Exercise 3: COM objects 30, 00:00
Module 3
(W41M20) Information gathering – Part 1 00:00:00
(W41M21) Information gathering – Part 2 00:00:00
(W41M22) Port scanning and reconnaissance 00:00:00
(W41M23) Client-side attacks using PowerShell 00:00:00
(W41M24) Brute-force attacks using PowerShell 00:00:00
(W41M25) DNS Enumeration 00:00:00
(W41M26) Hacking a Windows system using HTA server with Metasploit 00:00:00
(W41M27) 2FA bypass using PowerShell 00:00:00
(W41M28) Installation of Nishang 00:00:00
(W41M29) Module 3 Exercise 1: Information gathering 00:00:00
(W41A07) Exercise 1: Information gathering 30, 00:00
(W41M30) Module 3 Exercise 2: Brute forcing 00:00:00
(W41A08) Exercise 2: Brute forcing 30, 00:00
(W41M31) Module 3 Exercise 3: DNS Enumeration 00:00:00
(W41A09) Exercise 3: DNS Enumeration 30, 00:00
(W41M32) Module 3 Exercise 4: Exploits in Metasploit 00:00:00
(W41A10) Exercise 4: Exploits in Metasploit 30, 00:00
Module 4
(W41M33) Getting around server config 00:00:00
(W41M34) Privilege escalation – system level 00:00:00
(W41M35) Privilege escalation – part 2 00:00:00
(W41M36) PowerUp PowerShell scripts attacks 00:00:00
(W41M37) Fetching system details and commands 00:00:00
(W41M38) PowerShell webshell access 00:00:00
(W41M39) Passing the hashes 00:00:00
(W41M40) Retrieving NTLM hashes without touching LSASS 00:00:00
(W41M41) Remote command execution with WMI and remoting 00:00:00
(W41M42) Creating Registry backdoor using powershell 00:00:00
(W41M43) PowerShell Scripting with WMI explorer 00:00:00
(W41M44) Powershell – where to find additional resources 00:00:00
(W41M45) Module 4 Exercise 1: Privilege escalation 00:00:00
(W41A11) Exercise 1: Privilege escalation 30, 00:00
(W41M46) Module 4 Exercise 2: Create registry backdoor 00:00:00
(W41A12) Exercise 2: Create registry backdoor 30, 00:00
(W41M47) Module 4 Exercise 3: Pass the hashes 00:00:00
(W41A13) Exercise 3: Pass the hashes 30, 00:00
(W41M48) Module 4 Exercise 4: PowerShell script 00:00:00
(W41A14) Exercise 4: PowerShell script 30, 00:00
(W41M49) Module 4 Exercise 5: DLL hijacking 00:00:00
(W41A15) Exercise 5: DLL hijacking 30, 00:00
Final exam
(W41Q01) Final Exam 00:40:00
TAKE THIS COURSE
  • $249.00
  • UNLIMITED ACCESS
  • Course Certificate
252 STUDENTS ENROLLED

Who’s Online

There are no users currently online

Certificate Code

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013