SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsDiscover the covert world of wireless network exploitation in our webcast on the "Nearest Neighbor Attack," as recently detailed by Volexity. This attack leverages nearby Wi-Fi networks for covert access, weaponizing proximity in an innovative and stealthy way. Join us as we explore how these techniques have long been a part of advanced wireless exploitation. As instructors and authors for the SANS SEC617: Wireless Penetration Testing and Ethical Hacking, we have been teaching and refining these methods for over six years, using "living off the land" strategies to demonstrate how attackers bypass physical barriers to compromise isolated systems.
In this webcast, we'll dive into the technical mechanics behind these attacks, the operational considerations that make them so effective, and the defensive measures that can help mitigate this emerging threat. By analyzing real-world applications of these techniques, including lessons from advanced persistent threats, you'll gain a deeper understanding of the challenges and solutions for securing wireless environments. This session will equip you with the insights needed to defend against adversaries who are using proximity as a vector for attack.
Larry has revolutionized embedded device security with decades of hands-on offensive research, co-authoring SANS's flagship wireless and IoT penetration testing courses, and pioneering SBOM exploitation techniques for supply chain defense strategies.
Learn moreJames Leyte-Vidal, GSE #209, has shaped offensive cybersecurity through decades of frontline innovation, authoring Ethical Password Cracking and leading Fortune 100 InfoSec teams to elevate global cyber defense.
Learn more