SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
Apply your credits to renew your certifications
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Learn the attacks real-world adversaries are executing against enterprise AI deployments spanning LLMs, RAG pipelines, ML models, and vision systems.
Every organization wants AI features. Very few are asking what those features look like from an attacker's view. Teams are skipping foundational security work and building systems that fail in ways traditional appsec tools were never designed to catch. SEC536 puts you in the attacker's seat so you can see exactly how those failures happen.


A Marine Corps veteran and founder of Fortisec, Foster Nethercott is a SANS course author and cybersecurity professional specializing in offensive operations and AI TTPs, bringing real-world experience into SEC535.
Read more about Foster Nethercott

Mick Douglas is a SANS Principal Instructor, cybersecurity practitioner, and community mentor with 20+ years helping defenders master detection, incident response, and OSINT—combining hands-on tools, real-world frameworks, and a knack for making hard concepts stick.
Read more about Mick DouglasExplore the course syllabus below to view the full range of topics covered in SEC536: Adversarial AI - Penetration Testing AI Systems.
In this section, we explore how AI systems are probed, manipulated, and exploited by adversaries. Each module highlights specific issues, moving from basic abuse patterns through reconnaissance, injection, jailbreaks, and adversarial attacks.
In this section, we explore how the components surrounding AI models create their own attack surface. From infrastructure weaknesses and API misconfigurations to alignment failures and the emerging risks of agentic architectures, this section focuses on exploiting the implementation layer: where and how AI meets the real world.
We're updating our course schedule - please check back later.

Get feedback from the world’s best cybersecurity experts and instructors

Choose how you want to learn - online, on demand, or at our live in-person training events

Get access to our range of industry-leading courses and resources


