{"course":{"productid":35406,"modality":1,"active":true,"language":"fr","title":"Master Class: Workshop Microsoft PowerShell Advanced Security","productcode":"MSPSAS","vendorcode":"MT","vendorname":"Master Class","fullproductcode":"MT-MSPSAS","courseware":{"has_ekit":false,"has_printkit":true,"language":""},"url":"https:\/\/portal.flane.ch\/course\/masterclass-mspsas","objective":"<p><span class=\"cms-link-marked\"><a class=\"fl-href-prod\" href=\"\/swisscom\/fr\/course\/training-mspsfa\"><svg role=\"img\" aria-hidden=\"true\" focusable=\"false\" data-nosnippet class=\"cms-linkmark\"><use xlink:href=\"\/css\/img\/icnset-linkmarks.svg#linkmark\"><\/use><\/svg>Workshop Microsoft PowerShell Fundamentals & Advanced Bundle <span class=\"fl-prod-pcode\">(MSPSFA)<\/span><\/a><\/span> or equivalent knowledge<\/p>","essentials":"<p><span class=\"cms-link-marked\"><a class=\"fl-href-prod\" href=\"\/swisscom\/fr\/course\/training-mspsfa\"><svg role=\"img\" aria-hidden=\"true\" focusable=\"false\" data-nosnippet class=\"cms-linkmark\"><use xlink:href=\"\/css\/img\/icnset-linkmarks.svg#linkmark\"><\/use><\/svg>Workshop Microsoft PowerShell Fundamentals & Advanced Bundle <span class=\"fl-prod-pcode\">(MSPSFA)<\/span><\/a><\/span> or equivalent knowledge<\/p>","audience":"<p>Administrators, IT decision-makers<\/p>","contents":"<h5>IT security &ndash; comprehensive analysis of potential security risks<\/h5><ul>\n<li><q>IT security is not an end in itself<\/q><\/li><li>Classification of potential threats<\/li><li>Risk management, cost-benefit analyses, and ROI assessment of security measures<\/li><li>Implementation of the &quot;defense in depth&quot; concept<\/li><li>The Pareto principle in IT security<\/li><li>Security as a process<\/li><li>Attack Tactics and Privilege Escalation<\/li><li><q>Security by obscurity<\/q> vs. <q>KISS<\/q><\/li><\/ul><h5>The architecture of PowerShell and its potential vulnerability<\/h5><ul>\n<li>The role and development of command line tools in the Microsoft context<\/li><li>Comparison of the management approach in MS Windows and the MS Exchange Manage Shell<\/li><li>Modular approach of PowerShell and object orientation<\/li><li>Risk assessment compared to .cmd and .exe<\/li><li>authentication<\/li><\/ul><h5>Clean Code vs. Obfuscation<\/h5><ul>\n<li>Clean code principles<\/li><li>Code obfuscation techniques<\/li><li>Aliases &ndash; Obfuscation with on-board tools<\/li><li>Das Tool Invoke-Obfuscation<\/li><li>Detecting obfuscation using statistical methods<\/li><li>Code Encoding<\/li><\/ul><h5>Code-Injection und Execution in Memory<\/h5><ul>\n<li>Invoke-Expression<\/li><li>Executing code from the on-board help<\/li><li>Functions with untested parameters<\/li><li>In-Memory-Execution durch Remote-Code<\/li><\/ul><h5>Credentials<\/h5><ul>\n<li>Handling secure strings and PSCredential objects<\/li><li>Secure credentials with certificates\n<ul>\n<li>Fundamentals of Public Key Infrastructure<\/li><li>Store credentials in encrypted form (certificate)<\/li><li>Use encrypted credentials for remote sessions<\/li><\/ul><\/li><li>Credentials f&uuml;r Remote Scripts<\/li><li>Credentials f&uuml;r Scheduled Jobs<\/li><\/ul><h5>Elevation<\/h5><ul>\n<li>Running script code in the LocalSystem context<\/li><li>Self-Elevator<\/li><\/ul><h5>Is co-signed<\/h5><ul>\n<li>Management of the PowerShell code signature<\/li><li>PKI requirements<\/li><li>Code signing<\/li><\/ul><h5>AppLocker<\/h5><ul>\n<li>The design of Applocker implementation guidelines<\/li><li>Bypass Applocker script rules<\/li><li>Managing Applocker through Powershell<\/li><\/ul><h5>Powershell Logging<\/h5><ul>\n<li>Types and application scenarios of logging<\/li><li>Transcript<\/li><li><q>Over-the-shoulder-Transcription<\/q> via GPO<\/li><li>Powershell Output-Streams<\/li><li>Deep script block logging in the event log<\/li><\/ul><h5>Just-Enough-Administration<\/h5><ul>\n<li>The principle of least privilege<\/li><li>PowerShell Constrained Language Mode<\/li><li>What is JEA?<\/li><li>PS Session Config und Role Capabilities<\/li><li>Setting up and testing the JEA configuration<\/li><\/ul>","objective_plain":"Workshop Microsoft PowerShell Fundamentals & Advanced Bundle (MSPSFA) or equivalent knowledge","essentials_plain":"Workshop Microsoft PowerShell Fundamentals & Advanced Bundle (MSPSFA) or equivalent knowledge","audience_plain":"Administrators, IT decision-makers","contents_plain":"IT security \u2013 comprehensive analysis of potential security risks\n\n\n- IT security is not an end in itself\n- Classification of potential threats\n- Risk management, cost-benefit analyses, and ROI assessment of security measures\n- Implementation of the \"defense in depth\" concept\n- The Pareto principle in IT security\n- Security as a process\n- Attack Tactics and Privilege Escalation\n- Security by obscurity vs. KISS\nThe architecture of PowerShell and its potential vulnerability\n\n\n- The role and development of command line tools in the Microsoft context\n- Comparison of the management approach in MS Windows and the MS Exchange Manage Shell\n- Modular approach of PowerShell and object orientation\n- Risk assessment compared to .cmd and .exe\n- authentication\nClean Code vs. Obfuscation\n\n\n- Clean code principles\n- Code obfuscation techniques\n- Aliases \u2013 Obfuscation with on-board tools\n- Das Tool Invoke-Obfuscation\n- Detecting obfuscation using statistical methods\n- Code Encoding\nCode-Injection und Execution in Memory\n\n\n- Invoke-Expression\n- Executing code from the on-board help\n- Functions with untested parameters\n- In-Memory-Execution durch Remote-Code\nCredentials\n\n\n- Handling secure strings and PSCredential objects\n- Secure credentials with certificates\n\n- Fundamentals of Public Key Infrastructure\n- Store credentials in encrypted form (certificate)\n- Use encrypted credentials for remote sessions\n- Credentials f\u00fcr Remote Scripts\n- Credentials f\u00fcr Scheduled Jobs\nElevation\n\n\n- Running script code in the LocalSystem context\n- Self-Elevator\nIs co-signed\n\n\n- Management of the PowerShell code signature\n- PKI requirements\n- Code signing\nAppLocker\n\n\n- The design of Applocker implementation guidelines\n- Bypass Applocker script rules\n- Managing Applocker through Powershell\nPowershell Logging\n\n\n- Types and application scenarios of logging\n- Transcript\n- Over-the-shoulder-Transcription via GPO\n- Powershell Output-Streams\n- Deep script block logging in the event log\nJust-Enough-Administration\n\n\n- The principle of least privilege\n- PowerShell Constrained Language Mode\n- What is JEA?\n- PS Session Config und Role Capabilities\n- Setting up and testing the JEA configuration","skill_level":"Intermediate","version":"1.0","duration":{"unit":"d","value":3,"formatted":"3 jours"},"pricelist":{"List Price":{"DE":{"country":"DE","currency":"EUR","taxrate":19,"price":4390},"GB":{"country":"GB","currency":"GBP","taxrate":20,"price":3650},"SI":{"country":"SI","currency":"EUR","taxrate":20,"price":4390},"CH":{"country":"CH","currency":"CHF","taxrate":8.1,"price":4390},"AT":{"country":"AT","currency":"EUR","taxrate":20,"price":4390}}},"lastchanged":"2026-03-04T18:03:36+01:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course-schedule\/35406","source_lang":"fr","source":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course\/masterclass-mspsas"}}