Abusi di servizi, registry, token, scheduled tasks e prime nozioni di Active Directory per muoverti in ambienti enterprise.
Real patterns you will actually see in labs and internal assessments.