SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis paper presents the anatomy of a ransomware operation and the techniques used by threat actors to provide maximum disruption to your operations. It also tells you what you can do to detect the ransomware operation—before the business disruption begins.
Jake runs a successful Infosec consultancy. He's been involved in high-profile public sector cases, including the malware analysis for the 2015 cyber-attack on the Ukraine power grid. He's also a regular speaker at industry conferences.
Read more about Jake Williams