You can watch the review and introduction video of the “PowerShell for Hackers” online course taught by “Mohammad Ali Ebrahimi” in full from the link below and register online.
ravinacademy.com/courses/powershell-for-hackers
39 hours from Monday, November 22 (during 13 3-hour sessions, every Monday and Wednesday from 18:00 to 21:00)
It is possible to register in installments for this course, and you can contact Ravin Academy’s training unit for more information.
Ways of communication with the education office of Ravin Academy:
Contact number: 021-91693023 (extension 1)
About this course
PowerShell was first introduced in 2006 by Microsoft with the aim of creating a scripting framework for automating commands and configurations in Windows-based infrastructure. In the following years, with newer versions, PowerShell became a powerful scripting language. It is also provided from version 7.2 and in addition to Windows, PowerShell scripts can also be run on Linux-based operating systems. PowerShell allows its users to execute commands at any level, as well as full access to COM and WMI. In other words, PowerShell allows you to fully manage the operating system. Also, using it, you can easily access things like saved data, registry, certificates, File-System, and many other things. Because of these features, PowerShell has been highly sought after by cyber security experts and, of course, cyber attackers in recent years. According to Carbon Black’s report, in more than a third of detected cyber incidents, attackers have used PowerShell in some way. For example, one of the most common uses of PowerShell for attackers is to implement File-Less malware. In such a way that the malware runs without any binary files in the victim’s operating system, and this has created serious challenges for antiviruses. Familiarity with the methods used by attackers in PowerShell can be very useful for security assessment experts (such as penetration testing and red team services), because by applying it, they can identify and fix vulnerabilities in infrastructure based on Microsoft products. Also, security experts of organizations, if they are familiar with these methods, can secure their organization’s infrastructure against this type of security incidents or design and implement rules to identify possible attackers in the organization’s infrastructure. In this course, the basics of scripting in PowerShell will be taught first, and then the applications of PowerShell in attackers’ exploitation of WMI, Active Directory, Windows API, access expansion and stabilization techniques, and many other topics will be discussed. The duration of this course is 39 hours, which will be held online during 13 3-hour sessions, every Monday and Wednesday from 18:00 to 21:00. This course will start on Monday, November 22.
To whom is this course recommended?
Security assessment/penetration testing/red team experts
Blue team experts (response to incidents, security and threat hunting)
Windows-based network administrators
Cyber security consultants
WHAT KNOWLEDGE DO I NEED TO ATTEND THIS COURSE?
Familiarity with the concepts of Windows servers and Active Directory
Getting to know basic network concepts and widely used protocols
General knowledge of cyber attacks and threats
