SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAn attacker can piece together a collection of accounts within an organization using public information and compromised data, building a 'daisy chain' to a target. With the upsurge of cloud-based services and web-facing applications, many organizations face a larger attack space for compromise. Since the process isn't highly technical, and the steps of the process fall within normal business procedures, it can be difficult to detect until the data is gone. Traditional approaches to information security, like securing individual systems and rule-based perimeter intrusion detection, fail in the face of attacks that use normal transactions to infiltrate networks. However, it is possible to detect such an attack with a holistic and multi-layered approach that includes an emphasis on identity assurance.