SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsHigh-value penetration testing involves modeling the techniques used by real-world computer attackers to find vulnerabilities, and under controlled circumstances, to exploit those flaws in a professional, safe manner according to a carefully designed scope and rules of engagement. This process helps to determine business risk and potential impact of attacks, all with the goal of helping the organization improve its security stance. Here are recommendations for each phase of penetration testing to help you provide higher business value in your work.
This poster has been created as reference for the SEC670: Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control course by the Certified Instructor Jonathan Reiter.
Jonathan is an officer in the Maryland Air National Guard serving as a cyberspace capabilities developer. With expertise in Windows implant development and kernel research, he brings practical defensive and offensive cybersecurity experience to SANS.
Read more about Jonathan Reiter