SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsRecently, there has been an increase in the awareness for the need within corporations (as well as within government agencies) to protect sensitive, proprietary and company secret information. Unauthorized modification, loss or compromise of such information could very well severely damage an organization's current operations; future or even put it out of business. However, the largest threat to an organization's computer information systems and the data they contain remains the trusted or authorized user. Since wide spread reports center on the threat posed by external threats, the internal threat may go relatively unnoticed or may be inadequately addressed as resources are spent countering the external threat. At the same time, many security measures that should be implemented to counter the internal threat are relatively inexpensive and also act to close up many holes that an external threat may rely on to gain and maintain unauthorized access to an organizations system and data.