SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsFor a government cyber deterrence strategy to be effective, it must have network penetration tools, as well as, tools for distributed denial of service (DDOS), parallel scanning, reconnaissance, surveillance, and other capabilities. Most importantly, it must be able to assess cyber-attack attribution rapidly, and with certainty. This paper furthers the definition of cyber-deterrence architectures and evaluates of elements of future architectures in a penetration testing environment. Leveraging available policy research, a line-of-sight analysis is conducted from strategic goals to pen testing source code, filling in important architectural gaps. Policy implications of the proposed technical solutions are discussed. Cyber-deterrence capabilities are assessed at strategic and technical levels, technologies are envisioned that provide components of the solution, and the results are documented as conceptual architecture with research prototypes.