SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsApply your credits to renew your certifications
Train at your own pace from wherever you are
Apply what you learn with hands-on exercises and labs
Ensure resilience against threats: Fortify applications, secure data, harden infrastructure, comply with GRC programs.
SEC480: AWS Secure Builder equips non-security personnel such as cloud engineers, developers, and architects with the security fundamentals necessary to build secure AWS workloads from the beginning. This course serves as foundational AWS security training, designed to fill the critical knowledge gap for technical professionals responsible for building and deploying workloads to AWS environments. Organizations operating in AWS face a level of complexity that can introduce vulnerabilities, frequently resulting from inadvertent misconfigurations.
Participants engage in eight self-paced modules covering identity management, encryption, access control protocols, and secure coding principles—each paired with practical, real-world labs. The course delivers immediate value by empowering teams to implement protective measures without overburdening security personnel. Upon completion, learners leave with enhanced skills to construct resilient AWS environments.
Serge brings extensive technical expertise as founder/CEO of SpyderSec and President of Denver's OWASP chapter. With over 15 years' frontline experience, Borso delivers practical, implementable AWS security insights valued by global organizations.
Read more about Serge BorsoExplore the course syllabus below to view the full range of topics covered in SEC480: AWS Secure Builder.
In Section 1 of Secure AWS Development, we will concentrate on the shared responsibility model, hardening workloads, securing the CICD pipeline, and understanding the critical role of IAM in AWS.
In Section 2 of Secure AWS Development, we turn our attention to understanding what happens when there are misconfigurations in our environment and how to deal with adversaries. In addition, we will delve into what proper logging and monitoring entail, how to leverage an incident response plan, and strategies to minimize supply chain risks.
Responsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational mission and business processes.
Explore learning pathResponsible for conducting software and systems engineering and software systems research to develop new capabilities with fully integrated cybersecurity. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
Explore learning pathResponsible for developing and maintaining business, systems, and information processes to support enterprise mission needs. Develops technology rules and requirements that describe baseline and target architectures.
Explore learning pathCoordinates cyber operations plans, working with analysts and operators to support targeting and synchronization of actions in cyberspace.
Explore learning pathWith the purchase of this course, you receive the micro-credential exam attempt at no additional charge
Add 6 months of hands-on skills practice. Add to your cart when purchasing your course.
Serge is the best instructor I've ever had! He's so knowledgeable and has a great teaching style. Very relatable and helps when people have questions.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources