linkedin behance facebook instagram odnoklassniki twitter vimeo vk youtube logo-edx
Skip to main content

Powershell Security Best Practices

Learn best practices on how to use PowerShell securely and how to use PowerShell to enhance security.

About this course

This course is part of the Microsoft Professional Program in Cybersecurity.

This course that will teach students how to securely accomplish administrative tasks using Windows PowerShell 5.x. Students will review PowerShell fundamentals, learn Powershell operational security, and configuration management.

Students will also learn how to use administration tools such as Desired State Configuration (DSC) and Just Enough Administration (JEA) to configure and secure servers. This course also looks at new threats, new exploits, the ever-changing attack surface, and how to remediate them.

What you'll learn

After completing this course, students will be able to:

  • Understand the architecture of Powershell;
  • Deploy Powershell operational security;
  • Analyze PowerShell Auditing and Logging;
  • Enhance server management with Desired State Configuration and Just Enough Administration;
  • Analyze and debug scripts;
  • Understand Powershell based exploits and their remediation.

Course Syllabus

PowerShell Fundamentals

PowerShell Operational Security

Configuration management

Delegation of Administration

PowerShell Auditing and Logging

PowerShell-based exploits and their remediation




In addition to their professional experience, students should have:

  • Experience with Windows networking
  • Experience with Windows Server administration
  • Experience with using Windows PowerShell

Meet the instructors

Marcin Policht

Marcin Policht

System Engineer SR Tech

Marcin is a systems engineer with 20+ years of experience in IT.

  • MVP: Microsoft MVP in Directory Services for the last 10 years
  • MCT: Microsoft Certified Trainer