Featured resource
Forrester Wave Report 2025
Pluralsight named a Leader in the Forrester Wave™

Our tech skill development platform earned the highest scores possible across 11 criteria.

Learn more
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Threat Hunt with PowerShell

This course will teach you how to leverage PowerShell for practical threat hunting by detecting hidden persistence mechanisms, analyzing attacker activity in logs, and identifying anomalies across Active Directory, Azure, and Microsoft 365.

Michael Teske - Pluralsight course - Threat Hunt with PowerShell
by Michael Teske

What you'll learn

Modern enterprises generate an overwhelming volume of logs and artifacts, making manual threat detection impossible. In this course, Threat Hunt with PowerShell, you’ll learn to wield PowerShell as a unified hunting platform. First, you’ll explore techniques to surface hidden persistence mechanisms on the file system and in memory. Next, you’ll discover how to interrogate Active Directory for rogue administrators and replication abuse. Finally, you’ll learn to pivot your hunts to the cloud by analyzing Azure and Microsoft 365 telemetry. When you’re finished with this course, you’ll be able to rapidly develop PowerShell‑based hunts that uncover adversary activity before it escalates.

Table of contents

About the author

Michael Teske - Pluralsight course - Threat Hunt with PowerShell
Michael Teske

Michael Teske is an Author Evangelist with Pluralsight helping people elevate their skills. He has 20+ years of experience in IT Ops, including 17 as an IT instructor at a community college.

More Courses by Michael