SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis paper will proceed in a very logical manner to describe how a sequential development life cycle increases in depth as security is applied. Each major portion of the paper will address a phase of the system development lifecycle. In the end, this document will describe a repeatable process where enterprise security policies allow business requirements to be met through the execution of appropriate security strategies and solutions. How the SDLC couples with data security is reflected in diagram 1.0, on page 2. The catalyst for this document stems from real-life experiences while providing security services to application developers. In light, this document may serve as a guide to developers who would like to understand the security analyst role, developers who wish to incorporate the security analyst skill set into the developer skill set, or to those who lack a general understanding of the relationship between data security and the System's Development Life Cycle (SDLC). This document serves as high level guide to expose the relationship between requisite security considerations and the development life cycle.