SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsApply your credits to renew your certifications
Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months
Apply what you learn with hands-on exercises and labs
Integrate strategic and tactical approaches to level up enterprise vulnerability management programs while addressing infrastructure and cloud environment challenges.
Excellent labs. More fun than I thought possible with vulnerability management.
This course equips security leaders with the strategies, tools, and insights needed to build and mature vulnerability management (VM) programs that reduce real-world risk. With a strong emphasis on business alignment, risk-based prioritization, and modern threat modeling, you’ll develop the skills to lead VM initiatives across traditional, cloud, and hybrid environments.
Through 11 artificial intelligence (AI)-powered labs and the Cyber42 simulation game, you’ll gain the hands-on and strategic experience needed to make vulnerability management work—at scale, and with impact.
With a career spanning 20+ years and has included working in-network design, IP telephony, service development, security and project management, Jonathan has a deep technical background that provides a wealth of knowledge he draws upon when teaching.
Read more about Jonathan RistoExplore the course syllabus below to view the full range of topics covered in LDR516: Strategic Vulnerability and Threat Management.
This section introduces the strategic role of vulnerability management and lays the foundation for building effective, business-aligned programs. You’ll explore how asset inventory, contextual data, and cloud architecture influence risk visibility and program design.
This section addresses the technical and organizational challenges of identifying vulnerabilities across infrastructure, applications, and cloud-native services. You’ll examine discovery architecture, scan methods, and third-party coordination for responsible disclosure.
This section focuses on interpreting vulnerability data, correcting inaccuracies, and turning technical risk into actionable insights. You’ll learn to prioritize vulnerabilities, measure program maturity, and communicate risk effectively across the business.
This section explores how organizations treat vulnerabilities effectively across hybrid environments. You’ll examine patching, compensating controls, automation techniques, and how to align remediation with change and configuration management.
This final section synthesizes course themes and focuses on advancing vulnerability management maturity. You'll explore stakeholder mapping, continuous improvement strategies, and program design aligned with business goals and future-readiness.
Operate from the point of view of an adversary in order to protect you most sensitive assets.
Explore learning pathDaily focus is on the leadership of technical teams. Includes titles such as Technical Director, Manager, and Team Lead.
Explore learning pathDaily focus is on the leadership of technical teams. Includes titles such as Technical Director, Manager, and Team Lead.
Explore learning pathResponsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.
Explore learning pathResearch the cybersecurity domain and incorporate results in cybersecurity solutions.
Explore learning pathWhen purchasing a live, instructor-led course, add 4 months of online access. View price in the info icons below.
Add 6 months of hands-on skills practice. Add to your cart when purchasing your course.
It is excellent for people who are creating and implementing their VMP. The course is detailed, thorough, and sets clear expectations for a successful program.
Great class full of new info for beginners and experienced VM folks. Thank you!
I have really enjoyed the discussions around these labs and hearing similarities from other users. I think this format for labs is fun.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources