Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Learn PowerShell Core 6.0
  • Toc
  • feedback
Learn PowerShell Core 6.0

Learn PowerShell Core 6.0

By : das Neves, Jan-Hendrik Peters
4 (2)
close
Learn PowerShell Core 6.0

Learn PowerShell Core 6.0

4 (2)
By: das Neves, Jan-Hendrik Peters

Overview of this book

Beginning with an overview of the different versions of PowerShell, Learn PowerShell Core 6.0 introduces you to VSCode and then dives into helping you understand the basic techniques in PowerShell scripting. You will cover advanced coding techniques, learn how to write reusable code as well as store and load data with PowerShell. This book will help you understand PowerShell security and Just Enough Administration, enabling you to create your own PowerShell repository. The last set of chapters will guide you in setting up, configuring, and working with Release Pipelines in VSCode and VSTS, and help you understand PowerShell DSC. In addition to this, you will learn how to use PowerShell with Windows, Azure, Microsoft Online Services, SCCM, and SQL Server. The final chapter will provide you with some use cases and pro tips. By the end of this book, you will be able to create professional reusable code using security insight and knowledge of working with PowerShell Core 6.0 and its most important capabilities.
Table of Contents (21 chapters)
close

Secure coding


In previous chapters, you have already read about best practices for writing PowerShell code. In addition, we will add some more advice here. These will be things that most software developers learn very early in their career, but as you know, PowerShell users are very rarely real software developers. Most PowerShell users actually come from the operations area and are trying to automate operational tasks. The following practices are described by the Open Web Application Security Project (OWASP) and include, in our opinion, the most important topics:

  • Input validation
  • Output encoding
  • Authentication and password management 
  • Session management
  • Access control
  • Cryptographic practices
  • Error handling and logging
  • Data protection
  • Communication security
  • System configuration
  • Database security
  • File management
  • Memory management
  • General coding practices

Note

A complete description of the security practices from OWASP can be retrieved from the following link: https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete