SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAdvanced OSINT Training techniques help security professionals and organizations identify risks, uncover insights, and anticipate emerging threats. As public data grows exponentially, OSINT is essential for collecting and analyzing available data, enhancing investigations, threat detection, and strategic decision-making.
At SANS, we believe OSINT isn’t just about collecting data—it’s about turning public information into strategic intelligence. Our hands-on OSINT courses equip professionals with the tools and techniques to uncover hidden connections, detect emerging threats, and make fast, informed decisions. In a rapidly expanding data landscape, OSINT mastery is essential for staying ahead.
Gather, analyze, and validate intelligence from social media, web archives, and digital platforms using modern, field-tested approaches.
Identify digital risks, trace adversary activity, and generate actionable intelligence to support proactive security decisions.
Correlate data, assess source reliability, and produce clear, multi-domain intelligence for high-impact investigations.
[SANS OSINT training] gives hands-on experience for using applications and websites which really helps with the collection, processing, and analysis phases of the intel cycle.
Dario Beniamini is CEO and Co-Founder of Intellexia Sris and a Senior Solutions Consultant at NUIX and an instructor of SEC497 Practical Open-Source Intelligence.
Learn moreMatt Edmondson has revolutionized open-source intelligence by operationalizing OSINT for federal law enforcement and Fortune 100 firms, spearheading dark web investigations that contributed to major cybercrime takedowns like Genesis Market.
Learn moreNico is an all-round all source analyst with years of government experience. He has taught hundreds of police, tax, and military units to conduct OSINT research & analysis.
Learn moreMick Douglas has over 10 years of experience in information security and is currently the Managing Partner for InfoSec Innovations. He specializes in PowerShell, Unix, Data Visualization, Hardware and Radio Hacking.
Learn moreJeff has digital forensic experience and training with Mac, iOS Windows, and Android operating systems. He is passionate about sharing his knowledge and experience with students to help them master the topic of mobile forensics.
Learn moreChris Pizor spent years in the U.S. Air Force protecting its network, studying hackers and plying his skills in intelligence and information security. Now he’s sharing his expertise in cybersecurity with SANS students.
Learn moreThese resourceful professionals gather requirements from their customers and then, using open sources and mostly resources on the internet, collect data relevant to their investigation. They may research domains and IP addresses, businesses, people, issues, financial transactions, and other targets in their work. Their goals are to gather, analyze, and report their objective findings to their clients so that the clients might gain insight on a topic or issue prior to acting.
Explore learning pathResponsible for identifying, collecting, examining, and preserving digital evidence using controlled and documented analytical and investigative techniques.
Explore learning pathResponsible for investigating, analyzing, and responding to network cybersecurity incidents.
Explore learning pathAs this is one of the highest-paid jobs in the field, the skills required to master the responsibilities involved are advanced. You must be highly competent in threat detection, threat analysis, and threat protection. This is a vital role in preserving the security and integrity of an organization’s data.
Explore learning pathResponsible for analyzing data from multiple disparate sources to provide cybersecurity and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
Explore learning pathAnalyzes data from multiple sources to prepare environments, respond to information requests, and support intelligence planning and collection requirements.
Explore learning pathOpen Source Intelligence plays a critical role in malware analysis, especially in understanding the broader context of the attack, enriching findings, and speeding up attribution. In this talks, we will cover many examples about useful information found in malware samples, how to access them and enrich them. I promise, no assembly!