SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsBusinesses and organizations have been playing a game of cat and mouse with hackers for close to 50 years. The score depends on how you decide to keep it. The corporate approach has traditionally focused on tools and compliance to detect and block attacks, but have you ever wondered how hackers get past things like antivirus, firewalls, and intrusion detection systems? This talk is about diving into the tools and techniques hackers use to regularly evade detection and why what we’re concerned about today is not what attackers will be targeting tomorrow. We’ll do some live demonstrations to see how some of these attacks work, and how hard they can be to detect. By the end, you’ll understand that when it comes to hacking, there are no rules.
Jon Gorenflo has strengthened cybersecurity through leadership in pen testing, incident response, and security engineering. His dedication to mentoring and knowledge-sharing has empowered professionals and enhanced defenses industry-wide.
Read more about Jon Gorenflo