SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis document describes the Information Technology (IT) security architecture for GIAC, a small fictitious company who specializes in the distribution of fortune cookie sayings. The following aspects of the security design are discussed: The company's business processes as they relate to the development and distribution of fortune cookie sayings. The network applications, protocols and infrastructure used to track fortune cookie sayings from development to market. The security infrastructure including complete policies for perimeter security devices. A tutorial for configuration of the company's border router. A process to validate the company's primary firewall policy In addition to the description of GIAC's security architecture outlined above, an analysis of a previously posted GIAC GCFW practical assignment submitted by Andrew Walker is provided.