SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsIn early 2010, security analysts started noticing something really interesting. Attackers from several Chinese hacker groups shifted from a strategy of remote and overt attacks to a stealthy strategy of attacking from compromised pivot points within our own networks. These changing tactics demand significant examination and discussion. Fortunately for us, this strategy allows us to make clearer predictions about the depth of our enemy's exploit arsenal, the ability to develop newer attack vectors, and the adversary's perception of our defensive strategy.