SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsWhile conducting research for this practical I found that there were many different arenas that warrant a closer look. I chose honeypots for this practical because they allow an administrator to track and learn from black-hats first hand without the attacker ever being aware that somebody is watching. A honeypot can be as simple or elaborate as necessary. The Bait and Switch router method was used for this practical because it is cost effective, and it provided an opportunity to learn the Linux operating system. This practical covers how to set up a Bait and Switch router on a Red Hat Linux server that will direct all unauthorized traffic to a honeypot while legitimate traffic will continue to the private network. I will then analyze some of the data collected during the exercise to demonstrate that the Bait and Switch method worked. A brief explanation of the exploits will be included in addition to the analysis of the data.