SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe Global Leader in Information Security Training
SANS Ethical Hacking training courses teach the methodologies, techniques, and tactical tools of modern adversaries. Offensively focused and hands-on training is essential for all information security practitioners. Knowing how to attack gives keen insight into proper defensive, vulnerability assessment, and forensic and incident response processes. For seasoned and skilled pen testing professionals, SANS offers advanced and intensive ethical hacking courses on exploitation development, Metasploit Kung Fu, wireless, mobile, and IoT device hacking, plus web and cloud penetration testing.
I truly believe that SANS educators are the very best in the world. It is an honor and privilege that I get to work with these fellow instructors to teach people hands-on cyber security skills all around the planet. Each and every one of these skilled and knowledgeable practitioners has earned my respect in the classroom and I know that you'll be in the very best of hands in our pen test courses.
Transform your incident response skills and get into the mindset of attackers with SEC504™ training. Through 30+ hands-on labs, you'll learn to investigate cybersecurity incidents, develop threat intelligence, and apply defense strategies against real-world threats. From password attacks to MFA bypass techniques on cloud services, this course takes you deep into the latest hacker tactics. Engage with cutting-edge tools and simulate live attacks to sharpen your defensive capabilities, all while preparing for the GIAC GCIH certification. You'll leave ready to defend both cloud and on-premises environments against evolving cyber threats.
SEC542 enables students to assess a web application's security posture and convincingly demonstrate the business impact should attackers exploit the discovered vulnerabilities. You will practice the art of exploiting web applications to find flaws in your enterprise's web apps. You'll learn about the attacker's tools and methods and, through detailed hands-on exercises, you will learn a best practice process for web application penetration testing, inject SQL into back-end databases to learn how attackers exfiltrate sensitive data, and utilize cross-site scripting attacks to dominate a target infrastructure. 30+ Hands-on Labs
SEC560 prepares you to conduct successful penetration testing for entire modern enterprises, including on-prem systems, Azure, and Entra ID. The course doesn't just focus on network devices, Windows, Linux, macOS, identity systems, etc. -- instead, it focuses on the combined business risk of the entire enterprise. You will learn the methodology and techniques used by real-world penetration testers in large organizations to identify and exploit vulnerabilities at scale and show real business risk to your organization. The course material is complemented with 30+ practical lab exercises concluding with an intensive, hands-on Capture-the-Flag exercise in which you will conduct a penetration test against a target organization and demonstrate what you've learned.
SEC575 will prepare you to effectively evaluate the security of mobile devices, assess and identify flaws in mobile applications, and conduct a mobile device penetration test, which are all critical skills required to protect and defend mobile device deployments. You will learn how to pen test the biggest attack surface in your organization; dive deep into evaluating mobile apps and operating systems and their associated infrastructure; and better defend your organization against the onslaught of mobile device attacks.
SEC580 will teach you how to apply the incredible capabilities of the Metasploit Framework in a comprehensive penetration testing and vulnerability assessment regimen. In this course, you will learn how Metasploit can fit into your day-to-day penetration testing assessment activities. You'll gain an in-depth understanding of the Metasploit Framework far beyond how to exploit a remote system. You'll also explore exploitation, post-exploitation reconnaissance, token manipulation, spear-phishing attacks, and the rich feature set of the Meterpreter, a customized shell environment specially created for exploiting and analyzing security flaws.
SEC588 will equip you with the latest cloud-focused penetration testing techniques and teach you how to assess cloud environments. The course dives into topics like cloud-based microservices, in-memory data stores, serverless functions, Kubernetes meshes, and containers. It also looks at how to identify and test cloud-first and cloud-native applications. You will also learn specific tactics for penetration testing in Azure and Amazon Web Services, particularly important given that AWS and Microsoft account for more than half the market. It is one thing to assess and secure a data center, but it takes a specialized skill set to evaluate and report on the risks to an organization if its cloud services are left insecure. 27 Hands-on Labs
SEC617™ training will give you the skills you need to understand the security strengths and weaknesses in wireless systems. In this course, you will learn how to evaluate the ever-present cacophony of Wi-Fi networks and identify the Wi-Fi access points and client devices that threaten your organization; assess, attack, and exploit deficiencies in modern Wi-Fi deployments using WPA2 technology, including sophisticated WPA2-Enterprise networks; use your understanding of the many weaknesses in Wi-Fi protocols and apply it to modern wireless systems; and identify and attack Wi-Fi access points and exploit the behavioral differences in how client devices scan for, identify, and select access points.
SEC660 is designed as a logical progression point for students who have completed SEC560: Enterprise Penetration Testing, or for those with existing penetration testing experience. This course provides you with in-depth knowledge of the most prominent and powerful attack vectors and furnishes an environment to perform these attacks in numerous hands-on scenarios. The course goes far beyond simple scanning for low-hanging fruit and teaches you how to model the abilities of an advanced attacker to find significant flaws in a target environment and demonstrate the business risk associated with these flaws. 30+ Hands-on Labs
You will learn the skills required to reverse-engineer applications to find vulnerabilities, perform remote user application and kernel debugging, analyze patches for one-day exploits, perform advanced fuzzing, and write complex exploits against targets such as the Windows kernel and the modern Linux heap, all while circumventing or working with against cutting-edge exploit mitigation.
Join the SANS Cyber Security Community now to download free ethical hacker training resources.
Great class, great content, great presenter... this is my 4th SANS class and I think every IT leader and decision maker should be taking this training. I will say that to as many people as I can.
Fantastic experience all-around. Cannot wait to take another course from SANS.
SANS training never fails to impress. Instructors who are in the trenches sharing current data, tools, and techniques, bring such value to these courses.