SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAdversaries are using client-side attacks and malware to bypass traditional perimeter defenses and establish footholds on internal networks. Preventive controls are failing to keep attackers out of private networks, and media outlets publicize another breach at a major organization on an almost regular basis. More needs to be done in order to identify and slow down attackers who have established pivot points into private networks before data exfiltration occurs. Active defense systems implementing active deception techniques can provide a mechanism to hinder an attacker's ability to quickly and accurately identify where sensitive data resides while alerting incident response teams of malicious activity. Furthermore, these systems can be used to augment the effectiveness of IDS and SIEM strategies, strengthening the overall security posture of organizations deploying them. Active defenses offer another effective layer of security that can be used to protect an organization's crown jewels.
Josh has been working in Information Security for 10+ years. He enjoys contributing to the community by sharing research and tools that help bolster blue team capabilities; tools that have been used in preventing and detecting large-scale incidents.
Read more about Josh Johnson