ATT&CK #7 -
Adversaries use task scheduling utilities of operating systems to execute malicious payloads on a defined schedule or at system startup to achieve persistence. This course provides the Scheduled Task/Job technique's fundamentals, sub-techniques, adversarial use cases, and red and blue team exercises.
Red Report 2023
Improve your understanding of trending adversary TTPs
Get practical recommendations for enhancing your security posture
Obtain real-world examples for red teams