SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
Apply your credits to renew your certifications
Attend a live, instructor-led class from a location near you or virtually from anywhere
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Attackers don't break in—they log in. Build the skills to detect, govern, and respond to identity-based attacks across the full identity lifecycle.
Today, identity is the main way to control access in organizations and is also the top target for attackers. Instead of using old methods, attackers now take advantage of tokens, applications, hybrid trust setups, and non-human identities to get ongoing and often hidden access. SEC559 gives defenders the knowledge and hands-on experience they need to secure, monitor, and respond to identity-based attacks in Microsoft Entra ID and hybrid Active Directory environments. The course covers topics like OAuth and token abuse, synchronization attacks, and cross-tenant trust risks. With real-world examples and practical labs, students learn how to spot, stop, and respond to modern identity threats throughout the entire identity lifecycle.


With over 10 years of experience in cyber defense, Max has garnered insights spanning risk and compliance, threat hunting, incident response, and SOC operations. As a trusted advisor, he has served governments, large corporations, and businesses.
Read more about Maxim DeweerdtExplore the course syllabus below to view the full range of topics covered in SEC559: Cloud and Hybrid Identity Security.
Day 1 introduces identity as the core security control plane. Students explore identity types, applications, permissions, and relationships in Microsoft Entra ID, learning how misconfigurations, privilege paths, and ownership gaps create attack surfaces attackers’ exploit.
Day 2 focuses on how authentication and token issuance define access in modern environments. Students analyze how tokens, sessions, and authentication methods work in Microsoft Entra ID, and how attackers abuse them to gain persistent, often invisible access.
Day 3 expands identity security into hybrid environments, where Active Directory and Microsoft Entra ID form a combined control plane. Students analyze how synchronization, trust, and Kerberos enable cross-plane attacks and privilege escalation.
Day 4 focuses on identity governance and lifecycle security as critical controls for limiting attack persistence. Students analyze how weak ownership, excessive privileges, and external trust in Microsoft Entra ID enable long-term access.
Day 5 focuses on detecting and responding to identity-based attacks across hybrid environments. Students use telemetry from Microsoft Entra ID and Active Directory to investigate attacks, contain compromised identities, and restore trust.
A Cloud Security Analyst monitors and analyzes activity across cloud environments, proactively detects and assesses threats, and implements preventive controls and targeted defenses to protect critical business systems and data.
Explore learning pathMonitor, test, detect, and investigate threats to cloud environments.
Explore learning path
Get feedback from the world’s best cybersecurity experts and instructors

Choose how you want to learn - online, on demand, or at our live in-person training events

Get access to our range of industry-leading courses and resources