SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAt the core of IT security is the CIA-triad - the need to protect the Confidentiality of data, the need to protect the Integrity of data and the need to protect the Availability of data. Unfortunately when it comes to wireless networks the Availability aspect will always be at a risk due to the inherent properties of wireless communications. Additionally, since wireless networks offer very little protection to hardware at lower layers of the OSI model, attackers can exploit this flaw to initially gain unauthorized access of a device connected to a wireless network, and then gain total control of the system by launching an attack at the heart of the device - the CPU.