SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsYou have spent many hours implementing security on your network. Your firewall is running smoothly, you have installed every service pack and patch available. You could wall paper your office with the audits you have been logging. Yet, despite your best efforts criminal hackers somehow compromise your network. What do you do? When an incident happens you may not have the time or focus to search for the proper way of reporting it or the authorities to which it should be reported. This document will provide such information in a few simple steps. The scope of this document is limited to the actions that should be taken after an illegal infiltration into a private or corporate network. It is assumed that the reader already has a good working knowledge of technology security.