SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsWe begin this discussion with a brief look at some of the ways in which malicious code tries to circumvent protection products and establish a foothold on a local computer. To better understand how to protect the desktop from malicious code, we will also discuss methods for identifying and intercepting such code before it causes any damage. And since there is no magic pill that cures all malicious code ills, we will examine how these different methods respond against some of the different types of attack mechanisms that are available. Overall, the most important point to remember is to employ a strategy of defense in depth. Whether you have one desktop or one thousand, a layered system will give you the best chance of stopping malicious code from invading the desktop.