This course equips cybersecurity professionals with essential PowerShell scripting skills for penetration testing across various platforms.

PowerShell for Penetration Testing

Recommended experience
What you'll learn
Master basic and intermediate PowerShell scripting techniques for penetration testing
Automate security tasks and build custom scripts for multiple platforms
Identify and exploit vulnerabilities in network services and web applications
Details to know

Add to your LinkedIn profile
February 2026
16 assignments
See how employees at top companies are mastering in-demand skills

There are 16 modules in this course
In this section, we explore penetration testing components, ethical and legal requirements, and the cyber kill chain methodology for structured security assessments.
What's included
2 videos2 readings1 assignment
In this section, we cover PowerShell's role in parsing and manipulating JSON and XML for penetration testing.
What's included
1 video3 readings1 assignment
In this section, we explore PowerShell-based management of network services and DNS, focusing on automation, query types, and record configuration for efficient IT operations.
What's included
1 video3 readings1 assignment
In this section, we explore TCP and UDP port scanning using PowerShell cmdlets and .NET, focusing on network enumeration and identifying open ports for security assessments.
What's included
1 video1 reading1 assignment
In this section, we explore PowerShell techniques for encoding and decoding JSON and XML, and apply OWASP standards to test REST and SOAP API security vulnerabilities.
What's included
1 video2 readings1 assignment
In this section, we explore PowerShell's role in assessing SMB, Active Directory, and LDAP security through enumeration, vulnerability scanning, and configuration evaluation for enhanced network resilience.
What's included
1 video3 readings1 assignment
In this section, we explore PowerShell's role in database penetration testing, covering MySQL, PostgreSQL, and MSSQL with practical examples and security assessments.
What's included
1 video5 readings1 assignment
In this section, we explore port identification, authentication checks, and banner grabbing to assess mail server vulnerabilities. These techniques help identify risks and strengthen email system security.
What's included
1 video5 readings1 assignment
In this section, we explore PowerShell for testing FTP, SFTP, and SSH security through scripting and configuration analysis.
What's included
1 video2 readings1 assignment
In this section, we explore brute forcing in PowerShell, focusing on FTP, SSH, and web services. It covers ethical methods, script design, and mitigation strategies for security testing.
What's included
1 video3 readings1 assignment
In this section, we cover PowerShell remoting and SNMP for remote administration and network monitoring.
What's included
1 video3 readings1 assignment
In this section, we explore using PowerShell to analyze Azure environments, focusing on RBAC, resource discovery, and automation for cloud security assessments.
What's included
1 video3 readings1 assignment
In this section, we explore using PowerShell to profile AWS components, analyze security groups for misconfigurations, and automate monitoring and reporting for enhanced cloud security.
What's included
1 video2 readings1 assignment
In this section, we explore PowerShell C2 techniques for penetration testing, focusing on covert communication, obfuscation, and real-world attack simulation to enhance defensive strategies.
What's included
1 video2 readings1 assignment
In this section, we explore PowerShell-based post-exploitation techniques in Microsoft Windows, focusing on privilege escalation, user profiling, and network movement to enhance security assessments and threat simulation.
What's included
1 video1 reading1 assignment
In this section, we examine PowerShell's role in Linux post-exploitation, focusing on privilege escalation, file permissions, and threat simulation for enhanced system security.
What's included
1 video1 reading1 assignment
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
More questions
Financial aid available,

