SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe Code Red worms provided another example of a known security hole being widely exploited after fixes to the vulnerability had been made available. For many unknown reasons, available patches were not applied to vulnerable systems. This allowed the worm to propagate more than a month after fixes to this vulnerability were made publicly available. However, people and organizations can minimize their risk of being affected by similar vulnerabilities by following an in-depth defensive strategy