SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsBoth individuals and organizations may suffer serious losses measured in dollars, time and reputation when laptop computers are stolen, lost, broken or hijacked. While it would be impossible, not to mention expensive, to anticipate and thwart every possible risk, by taking a systematic approach, the vast majority of them can be avoided. The first step is to build a Threat Model to identify the dangers, estimate their costs, and determine the likelihood of their occurrence. A cross-platform, all purpose Protection Plan can be built based on the Threat Model, ready to customize for any situation, using the five most common OSes, Microsoft(R) Windows XP(R), Windows Vista(R), Windows 7(R), Apple(R) Mac OS(R) X and Linux.