SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
Apply your credits to renew your certifications
Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Empower yourself to take command of the full GRC lifecycle: build threat models, assess risk, prioritize safeguards, and apply AI-assisted tools to drive cybersecurity decisions that deliver results.
I really particularly enjoyed this class because not only is it relevant to my career, it is broken down into understandable content by an instructor who actually does this for a living and can recall a lot of his personal experience as he is teaching the course.
This course prepares students to manage cybersecurity risk across the full governance, risk, and compliance (GRC) lifecycle using proven practices. Students learn to establish governance structures, build threats and safeguard inventories, implement and validate controls, and communicate outcomes to both technical and executive stakeholders. Through case studies and the SANS Cyber42 simulation, they gain hands-on experience aligning security measures with business goals. Designed for assessors, auditors, and second-line professionals, the course builds the technical and organizational skills needed to lead resilient, compliant GRC programs.


James is a managing partner at Cyverity, specializing in cybersecurity risk and governance. A SANS instructor for 20+ years, he holds 14 GIAC certs including the GSE, and has helped author the CIS Controls, CRF resources, and courses like LDR419 and LDR519.
Read more about James TaralaExplore the course syllabus below to view the full range of topics covered in LDR519: Cybersecurity Governance, Risk, and Compliance (GRC).
This section builds the foundation for a cybersecurity GRC program. Students learn how governance and risk decisions align with business goals, explore risk models, tooling, and Artificial Intelligence (AI), and apply these concepts through the Initiate and Inventory phases to define program structure, ownership, and scope.
This section focuses on selecting and prioritizing cybersecurity safeguards to address risk and support business goals. Students evaluate frameworks, navigate multi-framework environments and apply threat modeling to map threats to safeguards. The result is a structured, defensible approach to safeguard selection based on likelihood, impact and business need.
This section focuses on operationalizing cybersecurity decisions by translating safeguards into governance, documentation, education, and implementation. Students learn to formalize policy, assign ownership, enable the workforce, and manage execution. The focus is on consistent, organization-wide execution that turns decisions into measurable outcomes.
This section focuses on validating whether cybersecurity safeguards are implemented and operating as intended. Students learn to design and execute risk assessments, including scoping, reviewing documentation, evaluating technical controls, and analyzing evidence. The focus is on making defensible decisions based on multiple forms of evidence.
This section focuses on transitioning cybersecurity risk management from periodic assessments to continuous, data-driven monitoring and reporting. Students learn to use business intelligence, automation, and AI to measure safeguards, reduce uncertainty, and support decisions. The focus is on continuous measurement, analysis, communication, and response.
Lead cybersecurity risk strategy at the highest level.
Explore learning pathManages compliance with cybersecurity-related standards, legal and regulatory frameworks based on the organisation’s strategy and legal requirements.
Explore learning pathDaily focus is on the oversight of technical teams while aligning them to overall business strategies. Includes titles such as Technical Director, Information Security Officer, and CISO.
Explore learning pathManage the organisation's cybersecurity-related risks aligned to the organisation’s strategy. Develop, maintain and communicate the risk management processes and reports.
Explore learning pathResponsible for developing and maintaining business, systems, and information processes to support enterprise mission needs. Develops technology rules and requirements that describe baseline and target architectures.
Explore learning pathThis role governs cybersecurity structures and processes. Find the SANS courses that map to the Governance, Risk, and Compliance SCyWF Work Role.
Explore learning pathChief Information Security Officers lead cybersecurity initiatives, aligning strategic vision with operational execution, fostering a resilient security culture, and proactively managing risks to safeguard organisational assets and reputation.
Explore learning pathResponsible for establishing vision and direction for an organization's cybersecurity operations and resources and their impact on digital and physical spaces. Possesses authority to make and execute decisions that impact an organization broadly, including policy approval and stakeholder engagement.
Explore learning pathEnroll your team as a group or arrange a private session for your organization. We’ll help you choose the format that fits your goals.
James has a wealth of risk management experience and doesn't just give us theory but real world/practical guidance to becoming better risk management professionals!

Get feedback from the world’s best cybersecurity experts and instructors

Choose how you want to learn - online, on demand, or at our live in-person training events

Get access to our range of industry-leading courses and resources