SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
Apply your credits to renew your certifications
Attend a live, instructor-led class from a location near you or virtually from anywhere
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
An intense advanced red team course focusing on advanced tradecraft: stealthy initial access, privesc, cloud/on-prem tradecraft, EDR internals and research.
SEC665 is an advanced red teaming course for experienced operators. It dives deep into stealthy tradecraft: covert infrastructure automation, AiTM phishing, EDR evasion, advanced privilege escalation, cloud/on-prem pivoting, kernel exploitation, custom tool development (BOFs, .NET), persistence, and advanced lateral movement.


Jonathan is an officer in the Maryland Air National Guard serving as a cyberspace capabilities developer. With expertise in Windows implant development and kernel research, he brings practical defensive and offensive cybersecurity experience to SANS.
Read more about Jonathan Reiter

Kevin is a seasoned red team professional experienced in running attack simulations across different industries, including finance, retail, manufacturing, and energy sectors. His focus is to develop offensive capabilities and tooling for engagements.
Read more about Kevin Ott

Karim brings 15+ years of hands-on offensive security experience, leading high-level teams across government and Fortune 500 environments. A SEC665 co-author and instructor for SEC565 and SEC588, he blends real-world insight with elite expertise.
Read more about Karim LaljiExplore the course syllabus below to view the full range of topics covered in SEC665: Advanced Red Team Operations.
This module covers various topics required to build a successful initial access campaign for covert red team operations. From creating the infrastructure to building evasive payloads and delivery techniques, students will learn how to properly weaponize payloads for initial access.
This section covers advanced lateral movement techniques in modern environments as a follow-on from topics covered in intermediate red team operations courses. Focus areas include credential attacks against hardened systems, Windows authentication protocols, relays over C2, OPSEC-focused stealth lateral movement, EDR architecture, telemetry, and evasion.
Section 3 introduces lesser-known techniques to achieve persistence on a compromised endpoint, cloud initial access, and lateral movement and attacks on AD CS and Configuration Manager (formerly known as SCCM). Students will understand how to leverage CI/CD pipelines to reach their objectives.
This section focuses on advanced red team engineering and R&D, teaching operators to research defenses, master .NET tradecraft, obfuscation, develop BOFs, and discover novel persistence mechanisms.
Explore Windows kernel internals from a red team perspective, including EDR drivers, kernel callbacks, minifilters, and driver exploitation, to understand how modern defenses operate below user mode and where blind spots and evasion opportunities exist.
Rogue One is a self-paced Capture the Flag (CTF) operation that will force you to put into place what you learned during training. You are the rebellion red team now and you must make your way through a labyrinth of networks as you try to gain access, persist, move, and exploit weaknesses along the way. Only a few will recover and escape with the plans.
In this fairly recent job position, you have a keen understanding of both how cybersecurity defenses (“Blue Team”) work and how adversaries operate (“Red Team”). During your day-today activities, you will organize and automate emulation of adversary techniques, highlight possible new log sources and use cases that help increase the detection coverage of the SOC, and propose security controls to improve resilience against the techniques. You will also work to help coordinate effective communication between traditional defensive and offensive roles.
Explore learning pathAssess the effectiveness of security controls, reveals and utilise cybersecurity vulnerabilities, assessing their criticality if exploited by threat actors.
Explore learning pathMonitor and analyze activity across cloud environments, proactively detect and assess threats, and implement preventive controls and targeted defenses to protect critical business systems and data.
Explore learning path
Get feedback from the world’s best cybersecurity experts and instructors

Choose how you want to learn - online, on demand, or at our live in-person training events

Get access to our range of industry-leading courses and resources