SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsWhat can an IT person working on a private, but interconnected, network do to prevent against an influx of 'malcontented software' which causes most other IT work to come to a halt while each new outbreak is contained and eradicated? The answer lies in 'defense in depth' a military term that means you deploy your defenses in a pattern so you have more than one chance to stop the enemy. This paper describes several common practices which when implemented together will greatly decrease and perhaps almost stop this undesirable traffic.