SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
Apply your credits to renew your certifications
Course material is for individuals with an understanding of IT or cyber security concepts
Apply what you learn with hands-on exercises and labs
Build core CTI skills through expert-led instruction, labs, and panel discussions on program architecture, research, workflows, and stakeholder support.
FOR478 provides a foundational understanding of Cyber Threat Intelligence (CTI) and its role within enterprise, government, and vendor contexts. It focuses on CTI program architecture, operationalized workflows, and delivering actionable insights to stakeholders. Expert-led panel discussions on CTI operations and labs complement course instruction.


John has over sixteen years of experience working in Cyber Threat Intelligence, Digital Forensics, Cyber Policy, and Security Awareness and Education.
Read more about John Doyle

Andreas is a seasoned cyber threat intelligence professional with over 15 years in cybersecurity. He specializes in cyber threat analysis and building threat management programs.
Read more about Andreas Sfakianakis

Josh is a Cyber Threat Intelligence professional with experience in CTI and geopolitical risk in the North American and European financial and tech sectors. He has spoken at conferences including SANS CTI Summit and FIRST CTI Conference, and holds the CISSP and CCSP certifications.
Read more about Josh Darby MacLellanExplore the course syllabus below to view the full range of topics covered in FOR478: Cyber Threat Intelligence Foundations.
Day 1 builds the foundational elements of a CTI program, covering the evolution of the CTI discipline, program structure, analyst KSA development and career planning, stakeholder analysis, collection management, and the CTI analyst workbench. The day features four hands-on labs.
Day 2 deconstructs the anatomy of cyber operations, tracing how state and non-state actor tradecraft evolves during geopolitical tensions and conflict. After baselining adversary behavior, students navigate the professional perils of threat research and media engagement. The day concludes by mapping workflows to various stakeholder audiences.
We're updating our course schedule - please check back later.
In DFIR, things rarely go as planned. This course teaches you about the options to control when things aren't working as expected.
FOR498 provided information I can take back to my company and begin using immediately. It will be very easy to show leadership the ROI on this course.
I've said it a few times, but this is the most robust digital acquisition course I have taken for overall content covered when it comes to methods and tools. I took this course mainly to learn how to do MacBook Acquisitions, but I've learned so much more already. It just goes to show how there's always more to learn in digital forensics and I appreciate a course that points out my weaknesses to me in a non-vendor specific way.
It's not easy to get exposure to forensics tools and methodology. This is a great class for someone already in the field trying to expand their knowledge. SANS is a well-known and trusted organization. With so many options to choose from and limited time, it's a huge benefit to go straight to a trusted source to get what you need.

Get feedback from the world’s best cybersecurity experts and instructors

Choose how you want to learn - online, on demand, or at our live in-person training events

Get access to our range of industry-leading courses and resources