SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThere is a battle raging between security professionals and hackers. By placing people into the shoes of a hacker, and teaching them the skills to gain access to a system, one is better able to defend against them. As a hacker, we dig up information on companies/individuals by mirroring their websites, using search engines, whois databases and traceroute. Next, we move to 'Scanning.' We ping their computers look at which ports are open identify their operating system map their networks and see if they have any available modem connections. Then we move to 'Enumeration' looking at valid user accounts and network shares. To 'Gain Access' we search for vulnerabilities our opponent has crack their passwords and sniff the data on their network. 'Escalating Privilege' is the next step to go from a low-level user account to having administrator equivalency. With these privileges we manipulate files and directories to help us 'Maintain Access' with the help of backdoors rootkits and Trojans. Lastly we 'Cover Our Tracks' by modifying or deleting log files hide files and use protocols covertly to hide what we are doing. If computer security professionals stay on the cutting edge of hacker tools and methods of entry they will be able to defeat hackers before they even get started on your systems.