- Course
Threat Hunt with PowerShell
This course will teach you how to leverage PowerShell for practical threat hunting by detecting hidden persistence mechanisms, analyzing attacker activity in logs, and identifying anomalies across Active Directory, Azure, and Microsoft 365.
- Course
Threat Hunt with PowerShell
This course will teach you how to leverage PowerShell for practical threat hunting by detecting hidden persistence mechanisms, analyzing attacker activity in logs, and identifying anomalies across Active Directory, Azure, and Microsoft 365.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Modern enterprises generate an overwhelming volume of logs and artifacts, making manual threat detection impossible. In this course, Threat Hunt with PowerShell, you’ll learn to wield PowerShell as a unified hunting platform. First, you’ll explore techniques to surface hidden persistence mechanisms on the file system and in memory. Next, you’ll discover how to interrogate Active Directory for rogue administrators and replication abuse. Finally, you’ll learn to pivot your hunts to the cloud by analyzing Azure and Microsoft 365 telemetry. When you’re finished with this course, you’ll be able to rapidly develop PowerShell‑based hunts that uncover adversary activity before it escalates.