Featured resource
Tech Upskilling Playbook 2025
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Learn more
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Threat Hunt with PowerShell

This course will teach you how to leverage PowerShell for practical threat hunting by detecting hidden persistence mechanisms, analyzing attacker activity in logs, and identifying anomalies across Active Directory, Azure, and Microsoft 365.

Michael Teske - Pluralsight course - Threat Hunt with PowerShell
by Michael Teske

What you'll learn

Modern enterprises generate an overwhelming volume of logs and artifacts, making manual threat detection impossible. In this course, Threat Hunt with PowerShell, you’ll learn to wield PowerShell as a unified hunting platform. First, you’ll explore techniques to surface hidden persistence mechanisms on the file system and in memory. Next, you’ll discover how to interrogate Active Directory for rogue administrators and replication abuse. Finally, you’ll learn to pivot your hunts to the cloud by analyzing Azure and Microsoft 365 telemetry. When you’re finished with this course, you’ll be able to rapidly develop PowerShell‑based hunts that uncover adversary activity before it escalates.

Table of contents

About the author

Michael Teske - Pluralsight course - Threat Hunt with PowerShell
Michael Teske

Michael Teske is an Author Evangelist with Pluralsight helping people elevate their skills. He has 20+ years of experience in IT Ops, including 17 as an IT instructor at a community college.

More Courses by Michael