SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
Apply your credits to renew your certifications
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
SEC559 builds the skills to detect and remediate identity-driven attacks across Entra ID and hybrid Active Directory before trusted access is compromised.
Be First to Access SEC559
Sign up to be the first notified as new course updates and sessions roll out, including opportunities to secure a spot in upcoming discounted Beta sessions.
In today’s hybrid enterprises, identity is the new blast radius. Attackers aren’t kicking down doors, they’re slipping through misconfigured apps, leaked secrets, rogue certificates, and quietly abused OAuth flows. SEC559 hands practitioners the playbook to stop illegitimate access across cloud and hybrid identity control planes by analyzing OAuth abuse, token anomalies, service principal compromise, and federation trust failures.


With over 10 years of experience in cyber defense, Max has garnered insights spanning risk and compliance, threat hunting, incident response, and SOC operations. As a trusted advisor, he has served governments, large corporations, and businesses.
Read more about Maxim DeweerdtExplore the course syllabus below to view the full range of topics covered in SEC559: Cloud and Hybrid Identity Security.
On Day 1, students are introduced to the modern cloud identity threat landscape through a realistic, cloud-first breach scenario.
On Day 2, students dive into hybrid identity environments where Microsoft Entra ID, on-prem Active Directory, and federation services intersect.
A Cloud Security Analyst monitors and analyzes activity across cloud environments, proactively detects and assesses threats, and implements preventive controls and targeted defenses to protect critical business systems and data.
Explore learning pathMonitor, test, detect, and investigate threats to cloud environments.
Explore learning pathWe're updating our course schedule - please check back later.

Get feedback from the world’s best cybersecurity experts and instructors

Choose how you want to learn - online, on demand, or at our live in-person training events

Get access to our range of industry-leading courses and resources