![Exploring Information Security Archive 1 artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/0a/e3/29/0ae329a6-824b-e791-64ac-b689c563d1e9/mza_1630514793302750726.jpg/100x100bb.jpg)
How to use PowerShell for security
Exploring Information Security Archive 1
English - August 31, 2015 13:00 - 22 minutes - 13 MBTechnology Education How To Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Matt Johnson has spoken at conference's like GrrCon and DerbyCon on using PowerShell for security. He also has his own podcast titled, Leveled up Infosec Podcast and he's the founder of PoshSec. You can catch Matt tweeting about security on Twitter @mwjcomputing. In this interview we cover: what is PowerShell; how to get started; how to best utilize it for security; resources; and what mistakes made using it.
Originally posted on August 27, 2014.
In the sixth edition of the Exploring Information Security (EIS) podcast, I talk with PowerShell guru Matt Johnson a founder of PoshSec.
Matt Johnson has spoken at conference's like GrrCon and DerbyCon on using PowerShell for security. He also has his own podcast titled, Leveled up Infosec Podcast and he's the founder of PoshSec. You can catch Matt tweeting about security on Twitter @mwjcomputing.
In this interview we cover:
What is PowerShellHow to get started using PowerShellHow to best utilize PowerShell for securityAvailable resourceWhat mistakes can be made using PowerShell for security