Certified PowerShell Hacker (CPSH) Training

This Certified PowerShell Hacker (CPSH) Training Workshop is an intense 4-day training course covering the keys to hacking with PowerShell. We know that most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and objects within the organization.

Many use PowerShell to speed up and simplify management, which only makes sense. Did you know that a large percentage of hacks over the last year included PowerShell based attacks? Well, they did, which is why we spend 4 days learning how to hack like the pros using nothing but what is already available to us in Windows or now in open source code on Mac and Linux!

The Certified PowerShell Hacker (CPSH) Training Workshop course is based on real-world implementations of a windows infrastructure along with real-world penetration testing techniques. You will leave with a really strong skill set to help test your windows environment like never before. An attendee will also walk away with a strong skill set on how to help prevent these attacks from happening in the first place!

Accreditations & Acknowledgements

  • Accredited by the NSA CNSS 4011-4016
  • Mapped to NIST / Homeland Security NICCS’s Cyber Security Workforce Framework
  • Approved on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Exam Information:

The Certified PowerShell Hacker (CPSH) exam is taken online through our Assessment and Certification System (“MACS”), which is accessible on your mile2 account. The exam will take 2 hours and consist of 100 multiple-choice questions. The cost is $500 USD and must be purchased from ENO Institute

Student Materials:

  • Official Student Guide (Hardcopy)
  • Official Student Courseware (Electronic Version)
  • Student Lab guide
  • Exam Prep Guide
  • 1 Exam Voucher
  • CPEs: 32

Certified Powershell Hacker (CPSH) TrainingDuration: 4 days

  • We can adapt this Certified PowerShell Hacker (CPSH) course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this Certified PowerShell Hacker (CPSH) course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Certified PowerShell Hacker (CPSH) Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Certified PowerShell Hacker (CPSH) course in manner understandable to lay audiences.

The target audience for this Certified PowerShell Hacker (CPSH) course:

  • Penetration Testers
  • Microsoft Administrators
  • Security Administrators
  • Active Directory Administrators
  • Anyone looking to learn more about security

The knowledge and skills that a learner must have before attending this Certified PowerShell Hacker (CPSH) course are:

  • General Understanding of Pen Testing
  • General Understanding of Active Directory
  • General Understanding of scripting and programming
Certified PowerShell Hacker (CPSH) Training - OBJECTIVES

Upon completing this Certified PowerShell Hacker (CPSH) course, learners will be able to meet these objectives:

  • How satellite communications relates to other forms of wireless systems that are used to provide one-way broadcasting and two-way interactive services, especially those delivered through the global Internet
Certified PowerShell Hacker (CPSH) Training - COURSE SYLLABUS

Module 1 Introduction to PowerShell

  • Different Tool Options
  • Installing everything needed
  • Language Basics
  • Using the Windows API and WM
  • Interacting with the Registry
  • Managing Objects and COM Objects

Module 2 –Introduction to Active Directory and Kerberos

  • Overview of Kerberos
  • The three-headed monster
  • Key Distribution Center
  • Kerberos in Detail
  • Why we care about Kerberos as a Hacker
  • Overview of Active Directory
  • Understanding AD concepts
  • AD Objects and Attributes

Module 3 –Pen Testing Methodology Revisited

  • Introduction to the methodology
  • The Plan!!
  • Vulnerability Identification
  • Client-side attacks with and without PowerShell

Module 4 –Information Gathering and Enumeration

  • What can a domain user see?
  • Domain Enumeration
  • Trust and Privileges Mapping
  • After the client exploit

Module 5 –Privilege Escalation

  • Local Privilege Escalation
  • Credential Replay Attacks
  • Domain Privilege Escalation
  • Dumping System and Domain Secrets
  • PowerShell with Human Interface Devices

Module 6 –Lateral Movements and Abusing Trust

  • Kerberos attacks (Golden, Silver Tickets and more)
  • Delegation Issues
  • Attacks across Domain Trusts
  • Abusing Forest Trusts
  • Abusing SQL Server Trusts
  • Pivoting to other machines

Module 7–Persistence and Bypassing Defenses

  • Abusing Active Directory ACLs
  • Maintaining Persistence
  • Bypassing Defenses
  • Attacking Azure Active Directory

Module 8–Defending Against PowerShell Attacks

  • Defending an Active Directory Infrastructure
  • Detecting Attacks
  • Logging
  • Transcripts
  • Using Certificates
  • Using Bastion Hosts
  • Using AppLocker
Certified PowerShell Hacker (CPSH) Training Course Wrap-Up

Whether you are looking for general information or have a specific question, we want to help.
Request More Information

    Time frame: