PowerShell
Pen Testing Methodology Revisited
Privilege Escalation
Lateral Movements and Abusing Trust
Persistence and Bypassing Defenses
Defending Against PowerShell Attacks
A student needs to meet the following prerequisites in order to fully benefit from the course:
Here are just a few things you will take away from this course:
This course was designed for the benefit of the following organization roles:
Accreditations & Acknowledgements
Mile2 is: