SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsWhile most other areas of penetration testing are well understood, and their methodologies well documented, little information regarding testing and bypassing malware defenses is available in the public domain. Still, malware incidents remain the most expensive type of incidents caused by outsiders, while also being the most frequent type of incidents occurring to organizations. In addition, since malware payloads are normally executed on internal networks, bypassing most firewall restrictions, they do tend to be the weapon of choice for targeted attacks. Malware is used to perform multiple offensive activities: launching distributed denial of service attacks (DDoS), collecting classified information, etc. Consequently, testing and understanding the efficiency and configurations of malware defense systems is of uttermost importance.