Some organizations do not configure their operating systems and account management to properly protect the use of task scheduling functionality. As a result, adversaries can abuse this capability to execute malicious code on a victimâ€™s system. Get hands-on practice detecting this technique so you can protect your organization.
You will be able to identify and validate critical threats related to threat actor attempts to exfiltrate your organizationâ€™s valuable data and potentially attempt to extort your organization for financial gain.
You will be able to use a SIEM tool to identify indicators of compromise and validate whether they should be investigated further.
You will learn response and mitigation recommendations to keep your organization safe.