A course by Jeff Stein
Command and Control with PoshC2 is a course that is published by Pluralsight. You can access the full course on Pluralsight here. You need a Pluralsight subscription to watch this course. If you do not already have a subscription, I have a partnership with Pluralsight and the banner above features a link to get a FREE trial if you are interested in viewing the course in its entirety. Below you can find a sample of the course contents.
PoshC2 is a powerful tool that uses PowerShell to control a victim system toward furthering red teaming objectives beyond exploitation throughout the remaining life of an engagement. powerful tool that uses PowerShell to control a victim system toward furthering red teaming objectives beyond exploitation throughout the remaining life of an engagement. When you are finished with this course, you’ll have the skills and knowledge to execute these techniques Application Layer Protocol: Web Protocols-T1071.001, Account Discovery: Local Account- T1087.001 & Remote Access Software-T1219 using PoshC2.
Topic: Command and Control Series: Red Team Tools Level: Intermediate
Viewers should have a basic understanding of the windows command line. Knowledge of the Mitre Att&ck framework and the Cyber Kill Chain is recommended but not required.
Security Networking Wireless Malware Ethical Hacking Email Phishing PowerShell Python Splunk Monitoring Firewall Red Team Tools Blue Team Tools Cloud Initial Access Privilege Escalation Credential Access Lateral Movement Command & Control