SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsBenign to the ordinary end user, crypto sciences are used in almost every electronic device to ordinary computer based software on the home personal computer. From PGP and SSL used in email and web browser packages to Elliptic Curve crypto used in the Palm pilots of tomorrow, the art of hiding messages in unreadable form has undoubtedly weaved its way into every technical facet of society. What will the future bring? Undoubtedly even longer key lengths and even more complex mathematical formulas used in symmetric algorithms. One thing is for certain, eventually there will be a certification offered by some corporation that helps endorse their own particular brand of cipher products, its only a matter of time.