<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="35406" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/masterclass-mspsas" lastchanged="2026-03-04T18:03:36+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Master Class: Workshop Microsoft PowerShell Advanced Security</title><productcode>MSPSAS</productcode><vendorcode>MT</vendorcode><vendorname>Master Class</vendorname><fullproductcode>MT-MSPSAS</fullproductcode><version>1.0</version><objective>&lt;p&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/training-mspsfa&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Workshop Microsoft PowerShell Fundamentals &amp; Advanced Bundle &lt;span class=&quot;fl-prod-pcode&quot;&gt;(MSPSFA)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; or equivalent knowledge&lt;/p&gt;</objective><essentials>&lt;p&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/training-mspsfa&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Workshop Microsoft PowerShell Fundamentals &amp; Advanced Bundle &lt;span class=&quot;fl-prod-pcode&quot;&gt;(MSPSFA)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; or equivalent knowledge&lt;/p&gt;</essentials><audience>&lt;p&gt;Administrators, IT decision-makers&lt;/p&gt;</audience><contents>&lt;h5&gt;IT security &amp;ndash; comprehensive analysis of potential security risks&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;&lt;q&gt;IT security is not an end in itself&lt;/q&gt;&lt;/li&gt;&lt;li&gt;Classification of potential threats&lt;/li&gt;&lt;li&gt;Risk management, cost-benefit analyses, and ROI assessment of security measures&lt;/li&gt;&lt;li&gt;Implementation of the &amp;quot;defense in depth&amp;quot; concept&lt;/li&gt;&lt;li&gt;The Pareto principle in IT security&lt;/li&gt;&lt;li&gt;Security as a process&lt;/li&gt;&lt;li&gt;Attack Tactics and Privilege Escalation&lt;/li&gt;&lt;li&gt;&lt;q&gt;Security by obscurity&lt;/q&gt; vs. &lt;q&gt;KISS&lt;/q&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;The architecture of PowerShell and its potential vulnerability&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;The role and development of command line tools in the Microsoft context&lt;/li&gt;&lt;li&gt;Comparison of the management approach in MS Windows and the MS Exchange Manage Shell&lt;/li&gt;&lt;li&gt;Modular approach of PowerShell and object orientation&lt;/li&gt;&lt;li&gt;Risk assessment compared to .cmd and .exe&lt;/li&gt;&lt;li&gt;authentication&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Clean Code vs. Obfuscation&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Clean code principles&lt;/li&gt;&lt;li&gt;Code obfuscation techniques&lt;/li&gt;&lt;li&gt;Aliases &amp;ndash; Obfuscation with on-board tools&lt;/li&gt;&lt;li&gt;Das Tool Invoke-Obfuscation&lt;/li&gt;&lt;li&gt;Detecting obfuscation using statistical methods&lt;/li&gt;&lt;li&gt;Code Encoding&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Code-Injection und Execution in Memory&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Invoke-Expression&lt;/li&gt;&lt;li&gt;Executing code from the on-board help&lt;/li&gt;&lt;li&gt;Functions with untested parameters&lt;/li&gt;&lt;li&gt;In-Memory-Execution durch Remote-Code&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Credentials&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Handling secure strings and PSCredential objects&lt;/li&gt;&lt;li&gt;Secure credentials with certificates
&lt;ul&gt;
&lt;li&gt;Fundamentals of Public Key Infrastructure&lt;/li&gt;&lt;li&gt;Store credentials in encrypted form (certificate)&lt;/li&gt;&lt;li&gt;Use encrypted credentials for remote sessions&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Credentials f&amp;uuml;r Remote Scripts&lt;/li&gt;&lt;li&gt;Credentials f&amp;uuml;r Scheduled Jobs&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Elevation&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Running script code in the LocalSystem context&lt;/li&gt;&lt;li&gt;Self-Elevator&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Is co-signed&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Management of the PowerShell code signature&lt;/li&gt;&lt;li&gt;PKI requirements&lt;/li&gt;&lt;li&gt;Code signing&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;AppLocker&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;The design of Applocker implementation guidelines&lt;/li&gt;&lt;li&gt;Bypass Applocker script rules&lt;/li&gt;&lt;li&gt;Managing Applocker through Powershell&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Powershell Logging&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Types and application scenarios of logging&lt;/li&gt;&lt;li&gt;Transcript&lt;/li&gt;&lt;li&gt;&lt;q&gt;Over-the-shoulder-Transcription&lt;/q&gt; via GPO&lt;/li&gt;&lt;li&gt;Powershell Output-Streams&lt;/li&gt;&lt;li&gt;Deep script block logging in the event log&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Just-Enough-Administration&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;The principle of least privilege&lt;/li&gt;&lt;li&gt;PowerShell Constrained Language Mode&lt;/li&gt;&lt;li&gt;What is JEA?&lt;/li&gt;&lt;li&gt;PS Session Config und Role Capabilities&lt;/li&gt;&lt;li&gt;Setting up and testing the JEA configuration&lt;/li&gt;&lt;/ul&gt;</contents><objective_plain>Workshop Microsoft PowerShell Fundamentals &amp; Advanced Bundle (MSPSFA) or equivalent knowledge</objective_plain><essentials_plain>Workshop Microsoft PowerShell Fundamentals &amp; Advanced Bundle (MSPSFA) or equivalent knowledge</essentials_plain><audience_plain>Administrators, IT decision-makers</audience_plain><contents_plain>IT security – comprehensive analysis of potential security risks


- IT security is not an end in itself
- Classification of potential threats
- Risk management, cost-benefit analyses, and ROI assessment of security measures
- Implementation of the &quot;defense in depth&quot; concept
- The Pareto principle in IT security
- Security as a process
- Attack Tactics and Privilege Escalation
- Security by obscurity vs. KISS
The architecture of PowerShell and its potential vulnerability


- The role and development of command line tools in the Microsoft context
- Comparison of the management approach in MS Windows and the MS Exchange Manage Shell
- Modular approach of PowerShell and object orientation
- Risk assessment compared to .cmd and .exe
- authentication
Clean Code vs. Obfuscation


- Clean code principles
- Code obfuscation techniques
- Aliases – Obfuscation with on-board tools
- Das Tool Invoke-Obfuscation
- Detecting obfuscation using statistical methods
- Code Encoding
Code-Injection und Execution in Memory


- Invoke-Expression
- Executing code from the on-board help
- Functions with untested parameters
- In-Memory-Execution durch Remote-Code
Credentials


- Handling secure strings and PSCredential objects
- Secure credentials with certificates

- Fundamentals of Public Key Infrastructure
- Store credentials in encrypted form (certificate)
- Use encrypted credentials for remote sessions
- Credentials für Remote Scripts
- Credentials für Scheduled Jobs
Elevation


- Running script code in the LocalSystem context
- Self-Elevator
Is co-signed


- Management of the PowerShell code signature
- PKI requirements
- Code signing
AppLocker


- The design of Applocker implementation guidelines
- Bypass Applocker script rules
- Managing Applocker through Powershell
Powershell Logging


- Types and application scenarios of logging
- Transcript
- Over-the-shoulder-Transcription via GPO
- Powershell Output-Streams
- Deep script block logging in the event log
Just-Enough-Administration


- The principle of least privilege
- PowerShell Constrained Language Mode
- What is JEA?
- PS Session Config und Role Capabilities
- Setting up and testing the JEA configuration</contents_plain><duration unit="d" days="3">3 days</duration><pricelist><price country="DE" currency="EUR">4390.00</price><price country="GB" currency="GBP">3650.00</price><price country="SI" currency="EUR">4390.00</price><price country="CH" currency="CHF">4390.00</price><price country="AT" currency="EUR">4390.00</price></pricelist><miles/></course>