Certified PowerShell Hacker | Mile2® - Cyber Security Certifications
Shopping cart
There are no products in your cart.
Log in




Certified Powershell Hacker

Certified PowerShell Hacker

This course is an intense few days covering the keys to hacking with PowerShell. We know that most companies have an Active Directory infrastructure that manages authentication and authorization to most devices and objects within the organization. Many use PowerShell to speed up and simplify management, which only makes sense. Did you know that a large percentage of hacks over the last year included PowerShell based attacks? Well, they did, which is why we spend 4 days learning how to hack like the pros using nothing but what is already available to us in Windows or now in open source code on Mac and Linux! 



Accreditations & Acknowledgements

Accreditation And Certifications

Mile2 is: 

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)


Request Information when this class will run
(*) Required Fields
Please let us know your name.
Please let us know your email address.
Invalid Phone
Invalid Input
Invalid Input



Exam Information

The Certified PowerShell Hacker exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consists of 100 multiple choice questions. The cost is $500 USD and must be purchased from Mile2.com.


Register for Class
Purchase Exam



Key Data

Course Title: Certified PowerShell Hacker

Duration: 4 Days

Class Format Options:


General Understanding of Pen Testing

General Understanding of Active Directory

General Understanding of scripting and programming

Student Materials:

CPEs: 32


Course Outline

  • Module 1 -  Course Introduction
  • Module 1 -  Introduction to PowerShell
  • Module 2 Introduction to Active Directory and Kerberos
  • Module 3 - Pen Testing Methodology Revisited
  • Module 4 Information Gathering and Enumeration
  • Module 5 - Privilege Escalation
  • Module 6 - Lateral Movements and Abusing Trust
  • Module 7 - Persistence and Bypassing Defenses
  • Module 8 - Defending Against PowerShell Attacks


Who Should Attend?

  • Penetration Testers
  • Microsoft Administrators
  • Security Administrators
  • Active Directory Administrators
  • Anyone looking to learn more about security

Upon Completion

Upon completion, the Certified PowerShell Hacker candidate will be able to competently take the CPSH exam.



We will never spam you.