SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAlthough the current threat of steganographic technology appears to lag its usefulness, the diligent information systems person needs to be mindful of the security ramifications that a covert channel in their enterprise carries. Myriad techniques for secreting information flow exist; eliminating them is an impossible task. In order to protect ourselves, we must apply the dynamics that serve so well in other unpredictable information security risk venues: assess the risk, find ways to quickly detect the exploit's use, determine an appropriate response and use whatever means available to impede the perpetrator allowing time for detection and reaction mechanisms to work.