SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsOn one hand, the media is replete with reports of hackers exploiting various weaknesses in order to gain access to a network and the data it houses. Most, if not all, network administrators and engineers secure their intranets against outsiders these days. On the other hand, many administrators and engineers don't do the same thorough job of securing network resources against the people in the best position to do the most damage to a network, the legitimate users of the network. This paper will outline some of the threats posed by the 'insider' and safeguards against these threats. The following paragraphs describe some of the security measures you can implement which will help insure the availability of your network despite the users actions. These chapters are broken into several categories which are: Data input security basic security controls session security Internet security physical security desktop security data security and malicious activity.