SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsPenetrating an I.T. professional's home system is even more desirable in the eyes of most hackers. This is due to the fact that I.T. professionals will often have key information on their systems to aid a hacker in penetrating a corporate network. Documents may be present that define a full corporate network architecture. Home systems may have dial-in and VPN information, complete with passwords in plain text. In addition, the I.T. professional may use exactly the same user-IDs and passwords at home that are used at work, and these often have elevated privileges (such as Domain Admin, Administrator, or root) on the corporate network. And if the hacker succeeds in penetrating the home system which has a VPN connection in place for the corporate network; then in point of fact the hacker has now found a backdoor into a corporate system.