ATT&CK - System Information Discovery

Following initial access to a system, adversaries gather information about the system to decide how to continue the attack. The course will investigate how the attackers discover what system information with real world use cases.
Write your awesome label here.