Packt

PowerShell for Penetration Testing

Packt

PowerShell for Penetration Testing

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

2 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

2 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Master basic and intermediate PowerShell scripting techniques for penetration testing

  • Automate security tasks and build custom scripts for multiple platforms

  • Identify and exploit vulnerabilities in network services and web applications

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

February 2026

Assessments

16 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 16 modules in this course

In this section, we explore penetration testing components, ethical and legal requirements, and the cyber kill chain methodology for structured security assessments.

What's included

2 videos2 readings1 assignment

In this section, we cover PowerShell's role in parsing and manipulating JSON and XML for penetration testing.

What's included

1 video3 readings1 assignment

In this section, we explore PowerShell-based management of network services and DNS, focusing on automation, query types, and record configuration for efficient IT operations.

What's included

1 video3 readings1 assignment

In this section, we explore TCP and UDP port scanning using PowerShell cmdlets and .NET, focusing on network enumeration and identifying open ports for security assessments.

What's included

1 video1 reading1 assignment

In this section, we explore PowerShell techniques for encoding and decoding JSON and XML, and apply OWASP standards to test REST and SOAP API security vulnerabilities.

What's included

1 video2 readings1 assignment

In this section, we explore PowerShell's role in assessing SMB, Active Directory, and LDAP security through enumeration, vulnerability scanning, and configuration evaluation for enhanced network resilience.

What's included

1 video3 readings1 assignment

In this section, we explore PowerShell's role in database penetration testing, covering MySQL, PostgreSQL, and MSSQL with practical examples and security assessments.

What's included

1 video5 readings1 assignment

In this section, we explore port identification, authentication checks, and banner grabbing to assess mail server vulnerabilities. These techniques help identify risks and strengthen email system security.

What's included

1 video5 readings1 assignment

In this section, we explore PowerShell for testing FTP, SFTP, and SSH security through scripting and configuration analysis.

What's included

1 video2 readings1 assignment

In this section, we explore brute forcing in PowerShell, focusing on FTP, SSH, and web services. It covers ethical methods, script design, and mitigation strategies for security testing.

What's included

1 video3 readings1 assignment

In this section, we cover PowerShell remoting and SNMP for remote administration and network monitoring.

What's included

1 video3 readings1 assignment

In this section, we explore using PowerShell to analyze Azure environments, focusing on RBAC, resource discovery, and automation for cloud security assessments.

What's included

1 video3 readings1 assignment

In this section, we explore using PowerShell to profile AWS components, analyze security groups for misconfigurations, and automate monitoring and reporting for enhanced cloud security.

What's included

1 video2 readings1 assignment

In this section, we explore PowerShell C2 techniques for penetration testing, focusing on covert communication, obfuscation, and real-world attack simulation to enhance defensive strategies.

What's included

1 video2 readings1 assignment

In this section, we explore PowerShell-based post-exploitation techniques in Microsoft Windows, focusing on privilege escalation, user profiling, and network movement to enhance security assessments and threat simulation.

What's included

1 video1 reading1 assignment

In this section, we examine PowerShell's role in Linux post-exploitation, focusing on privilege escalation, file permissions, and threat simulation for enhanced system security.

What's included

1 video1 reading1 assignment

Instructor

Packt - Course Instructors
Packt
1,528 Courses 403,471 learners

Offered by

Packt

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions