Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
The Cyber Threat Perspective - Episode 51: Security Automation with PowerShell

Episode 51: Security Automation with PowerShell

07/26/23 • 36 min

The Cyber Threat Perspective

Spencer and Darrius continue their series of episodes all about PowerShell. In this episode, they discuss using PowerShell for automation and orchestration. Stay tuned for the next episode where we talk about defending against PowerShell abuse.

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/mylinks

Work with Us: https://securit360.com

plus icon
bookmark

Spencer and Darrius continue their series of episodes all about PowerShell. In this episode, they discuss using PowerShell for automation and orchestration. Stay tuned for the next episode where we talk about defending against PowerShell abuse.

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/mylinks

Work with Us: https://securit360.com

Previous Episode

undefined - Episode 50: How Attackers Use PowerShell

Episode 50: How Attackers Use PowerShell

In this episode Spencer and Darrius discuss how cyber adversaries harness the power of PowerShell to orchestrate their malicious activities. Stay tuned for the next episode where we talk about security automation with PowerShell.

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/mylinks

Work with Us: https://securit360.com

Next Episode

undefined - Episode 52: How to Prepare for an External Penetration Test

Episode 52: How to Prepare for an External Penetration Test

In this episode Spencer and Tyler discuss the most important things you must do before you have an external penetration test. Everything from understanding goals and objectives to asset management to dark web searches. Listen in as Tyler shares how the SecurIT360 external pentest process may be different from other pentests you've received in the past.

Blog: https://offsec.blog/
Youtube: https://www.youtube.com/@cyberthreatpov
Twitter: https://x.com/cyberthreatpov

Follow Spencer on social ⬇
Spencer's Links: https://go.spenceralessi.com/mylinks

Work with Us: https://securit360.com

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/the-cyber-threat-perspective-228427/episode-51-security-automation-with-powershell-31901588"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to episode 51: security automation with powershell on goodpods" style="width: 225px" /> </a>

Copy