SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsIn today's booming e-commerce economy age, virtually every business, including the 'brick and mortal', is connected to compete for market share in the cyberspace. Enterprise's networked systems are inevitably exposed to the increasing threats from external hackers as well as from internal. The consequences can be loss or modification of critical business data, disruption of services (availability), compromise of proprietary business plans or processes (confidentiality and integrity). To counter these threats, Information Security organization today deploy many methods, tools and technology to defend the legitimacy of the systems. Methods like implementing policies and procedure, user awareness, deploying firewall and authentication systems, control systems access and forming computer incident handling teams. This approach aims to prevent, protect, detect, contain, eradicate, recover and serve as a lesson learnt. This paper will examine the intrusion detection systems, one of the relative new technologies in information security. It aims to explore, in high level, the intrusion detection systems available today, as well as new developments in the technology.