This course teaches techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions.
Interested in attending? Have a suggestion about running this event near you?
Register your interest now
This course teaches techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions.