SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsSurge in infostealer malware in recent months has allowed threat actors to gain access to victim machines. It has become very common for threat actors to spend time in the target environment, harvest confidential information, gain better understanding about the victim's environment and tailor the attack to impose maximum damage, move laterally and escalate privileges to maintain persistence and maximize their revenue.
While Infostealer's primary goal is to harvest confidential information, they also provide remote access capacity allowing users to download and execute additional malware. Usually offered malware-as-a-service (MaaS), Infostealer actors operate a business model in which they offer their malware for a fee allowing anyone to deploy an infostealer.
In this webinar, we are going to focus on Zscaler's detection and protection capabilities against infostealers' data exfiltration. We will also break into their Tactics, Techniques and Procedures (TTP) to understand how the recent surge in infostealer has developed in a never-ending fight.
Nirmal has a Ph.D. in computer science and has been working in the threat research and analysis field for the past 12 years.
Read more about Nirmal Singh