We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Network Discovery and Enumeration with PowerShell

Ricardo Reimao

PowerShell is a powerful tool that can help you to enumerate local and remote information during an offensive engagement. This course will teach you how to use PowerShell to perform reconnaissance in a red team scenario.

Read more

PowerShell is a powerful tool that can help you to enumerate local and remote information during an offensive engagement. This course will teach you how to use PowerShell to perform reconnaissance in a red team scenario.

Using out-of-the-box tools during a red team engagement increases your chances of being detected. Highly skilled attackers leverage Windows-native features to perform their actions without being caught. In this course, Network Discovery and Enumeration with PowerShell, you’ll learn to perform reconnaissance on an offensive engagement using PowerShell features. First, you’ll explore how to gather information from local and remote machines using PowerShell features. Next, you’ll discover how to enumerate hosts and ports on your target network. Finally, you’ll learn how to leverage PowerShell to harvest information from the Active Directory of your target domain. When you’re finished with this course, you’ll have the skills and knowledge of PowerShell needed to enumerate information in a red team engagement.

Enroll now

What's inside

Syllabus

Course Overview
Enumerating Local Host Information
Enumerating Network Hosts
Active Directory Reconnaissance
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Helps red teamers to enumerate local and remote information
Teaches how to avoid detection by using Windows-native features
Covers enumeration of hosts and ports on target networks
Instructs on how to harvest information from Active Directory of target domains
Part of a series of courses on red team engagement

Save this course

Save Network Discovery and Enumeration with PowerShell to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Network Discovery and Enumeration with PowerShell. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Network Discovery and Enumeration with PowerShell will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts protect organizations from cyber threats by implementing and maintaining security measures. Network Discovery and Enumeration with PowerShell may be useful for Information Security Analysts who wish to leverage their PowerShell experience to conduct network reconnaissance and identify potential security risks within their organizations.
Network Engineer
Network Engineers design, implement, and maintain computer networks. Network Discovery and Enumeration with PowerShell may be useful for Network Engineers who wish to leverage their PowerShell experience to manage and troubleshoot their networks, as well as to identify and resolve network issues.
Systems Administrator
Systems Administrators manage and maintain computer systems. Network Discovery and Enumeration with PowerShell may be useful for Systems Administrators who wish to leverage their PowerShell experience to manage and troubleshoot their systems, as well as to identify and resolve system issues.
Security Analyst
Security Analysts monitor and analyze security data to identify and respond to security threats. Network Discovery and Enumeration with PowerShell may be useful for Security Analysts who wish to leverage their PowerShell experience to analyze security data and identify and respond to security threats.
Network Security Engineer
Network Security Engineers design and implement network security solutions for organizations. Network Discovery and Enumeration with PowerShell may be useful for Network Security Engineers who wish to leverage their PowerShell experience to design and implement network security solutions for their organizations, as well as to identify and resolve network security issues.
Security Consultant
Security Consultants provide organizations with advice and guidance on how to improve their security posture. Network Discovery and Enumeration with PowerShell may be useful for Security Consultants who wish to leverage their PowerShell experience to assess the security of their clients' networks and identify areas for improvement.
Cyber Threat Intelligence Analyst
Cyber Threat Intelligence Analysts analyze cyber threat intelligence to identify and mitigate threats to organizations. Network Discovery and Enumeration with PowerShell may be useful for Cyber Threat Intelligence Analysts who wish to leverage their PowerShell experience to analyze cyber threat intelligence and identify and mitigate threats to their organizations.
Incident Responder
Incident Responders respond to security incidents and breaches. Network Discovery and Enumeration with PowerShell may be useful for Incident Responders who wish to leverage their PowerShell experience to respond to security incidents and breaches, as well as to identify and resolve security issues.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain cybersecurity systems. Network Discovery and Enumeration with PowerShell may be useful for Cybersecurity Engineers who wish to leverage their PowerShell experience to manage and troubleshoot their cybersecurity systems, as well as to identify and resolve cybersecurity issues.
Cloud Security Engineer
Cloud Security Engineers design and implement security for cloud computing environments. Network Discovery and Enumeration with PowerShell may be useful for Cloud Security Engineers who wish to leverage their PowerShell experience to design and implement security for their cloud environments, as well as to identify and resolve security risks.
Penetration Tester
Penetration Testers use their knowledge of networks and system vulnerabilities to test systems for weaknesses. Network Discovery and Enumeration with PowerShell may be useful for Penetration Testers who wish to leverage their PowerShell experience to conduct network reconnaissance and identify vulnerabilities in their target networks.
Malware Analyst
Malware Analysts analyze malware to identify its capabilities and behavior. Network Discovery and Enumeration with PowerShell may be useful for Malware Analysts who wish to leverage their PowerShell experience to analyze malware and identify its capabilities and behavior, as well as to develop new malware detection and prevention tools and techniques.
Security Architect
Security Architects design and implement security solutions for organizations. Network Discovery and Enumeration with PowerShell may be useful for Security Architects who wish to leverage their PowerShell experience to design and implement security solutions for their organizations, as well as to identify and resolve security risks.
Security Researcher
Security Researchers identify and exploit vulnerabilities in computer systems and networks. Network Discovery and Enumeration with PowerShell may be useful for Security Researchers who wish to leverage their PowerShell experience to identify and exploit vulnerabilities in computer systems and networks, as well as to develop new security tools and techniques.
Computer Forensic Analyst
Computer Forensic Analysts investigate and analyze computer systems for evidence of cybercrimes. Network Discovery and Enumeration with PowerShell may be useful for Computer Forensic Analysts who wish to leverage their PowerShell experience to investigate and analyze computer systems for evidence of cybercrimes, as well as to develop new forensic tools and techniques.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Network Discovery and Enumeration with PowerShell.
Provides an overview of practical malware analysis techniques. It valuable resource for anyone looking to learn more about this topic.
Provides advanced penetration testing techniques. It valuable resource for anyone looking to learn more about this topic.
Provides an overview of reverse engineering techniques. It valuable resource for anyone looking to learn more about this topic.
Provides an overview of network security assessment techniques. It valuable resource for anyone looking to learn more about this topic.
Provides an overview of incident response and computer forensics techniques. It valuable resource for anyone looking to learn more about this topic.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser