Study them certs
idk wtm
PowerShell sux
you have a job?
DEEEEZ NUTZ
100

This is a dictionary of vulnerabilities in published operating systems and applications software

CVE or NVD

100

SLA

Service Level Agreement

100

Can't figure out what command to type cause you're so use to Linux commands, just use this command to find them translated from UNIX to PowerShell

Get-Alias

100

Looking at logs all day. Maybe cooking up some playbooks. Maybe even doing some malware analysis

SOC/Cybersecurity Analyst

100

This chain offers it fresh, never frozen

Wendy's

200

This technology collects IDS alerts and host logs from sources, then performs correlation analysis to identify indicators

SIEM

200

CIA

confidentiality, integrity, and availability

200

Used for PowerShell remoting, can be used as either ad-hoc commands (small, one off expressions) or interactive sessions. Not malicious by itself unless you know there shouldn't be any remote commands of PowerShell in an organization.

Invoke-Command

200

Configure firewalls, VPNs, Cisco stuff, Palo Alto stuff

Network Engineer (or net admin)

200

An American pop rock band known for hits such as Radioactive

Imagine Dragons

300

This type of authentication process is used at the bank with an ATM card

Two-Factor (Multi)

300

HIPAA

Health Insurance Portability and Accountability Act

300

Can't use Cat, but you can use this

Get-Content

300

Researches and analyzes emerging cyber threats

Threat Hunter (threat intelligence analyst)

300

A convention centered around a tool used for cutting wood

Saw Con

400

This is a physical control that prevents "piggybacking" or "tailgating," when an unauthorized person follows an authorized person into a controlled area

Turnstile (mantrap)

400

GNU

GNU's Not Unix

400

You can use curl like a normal person. But if you ain't normal so you'd use

Invoke-WebRequest

400

As Billie Eilish would say, I'm the bad guy

Pen tester (red teamer)

400

A telepath orc

Mind Goblin

500

A network area that is designed to be accessed by outside visitors but is still isolated from the private network of the organization. email, public web, file servers

DMZ
500

DAC

Discretionary Access Control

500

A PowerShell cmdlet that executes strings as PowerShell commands or expressions. It takes a string containing PowerShell code and runs it as if you had typed it directly into the PowerShell console. Can be dangerous because it executes arbitrary code

Invoke-Expression (iex)

500

You are the lawyer version of cybersecurity

GRC Analyst (Compliance analyst/officer works too)

500

This service is open 24/7, accepts everyone regardless of background, and has a revolving door policy. Although there is typically line. 

Your Mom