SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
Apply your credits to renew your certifications
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Use AI coding agents to analyze source code, discover logic flaws, and generate custom exploits without needing software development expertise.
SEC543: AI-Assisted Source Code Analysis and Exploitation for Penetration Testers teaches pen testers to use AI coding agents as force multipliers for source code analysis. Map unfamiliar codebases more quickly, surface logic flaws that scanners often miss, and generate custom exploitation tools on demand without writing software from scratch.


Ed is the founder of the SANS Penetration Testing Curriculum and Counter Hack; leads the team that builds NetWars, Holiday Hack, and CyberCity; and is President of the SANS Technology Institute.
Read more about Ed Skoudis

Joshua Wright, Senior Technical Director at Counter Hack Challenges and author of SEC504, has spent over two decades teaching and building tools that help defenders identify and counter real-world cyber threats through practical, hands-on learning.
Read more about Joshua WrightExplore the course syllabus below to view the full range of topics covered in SEC543: AI-Assisted Source Code Analysis and Exploitation for Penetration Testers.
Build the foundations for AI-augmented penetration testing. Establish the operator mindset for working with AI models, configure a secure agent environment, learn to map unfamiliar codebases without reading every line of code, and master the context engineering techniques that determine whether AI produces actionable results or hallucinated noise.
Turn source code knowledge into validated findings. Generate custom security tools on demand, hunt for logic flaws and authorization bypasses, isolate vulnerable components for safe testing, and produce confirmed exploits with reproducible evidence structured for professional pen test reports.
We're updating our course schedule - please check back later.

Get feedback from the world’s best cybersecurity experts and instructors

Choose how you want to learn - online, on demand, or at our live in-person training events

Get access to our range of industry-leading courses and resources