SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
Apply your credits to renew your certifications
Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months
Course material is for individuals with an understanding of IT or cyber security concepts
Apply what you learn with hands-on exercises and labs
Your forensic tools report data—but they cannot determine if the user created it. Learn to validate mobile artifacts, recover evidence tools miss, and testify with confidence in court.
This class has been amazing. I've learned so much in such a short amount of time. I'm ready to go back to work and use these new skills.
FOR585 delivers advanced iOS and Android forensics focused on artifact interpretation—not just tool operation. Master location data validation, recovery of deleted records tools miss, manual decoding of unsupported applications, and determination of whether evidence was user-created or generated automatically by the operating system.


Heather brings 24+ years of experience supporting government agencies, defense contractors, law enforcement, and Fortune 500 companies. Her extensive case experience spans fraud investigations, crimes against children, counterterrorism, and more.
Read more about Heather Barnhart

Domenica brings 20 years of mobile forensics experience supporting U.S. federal law enforcement and intelligence agencies while leading global training programs for elite investigative units including FBI and military special operations forces.
Read more about Domenica (Lee) CrognaleExplore the course syllabus below to view the full range of topics covered in FOR585: Smartphone Forensic Analysis In-Depth.
Build the foundation for advanced smartphone analysis: proper device handling for hot and cold acquisition states, acquisition terminology explained, and SQLite query development from scratch. Write complex table joins, parse databases manually, and learn exactly when tools report data incorrectly. Labs cover SD cards, Physical Analyzer, AXIOM, and SQL.
Examine Android file system structures, encryption implementations, and native application artifacts in depth. Parse third-party applications manually when tools fail, validate location data against ground truth, and leverage ALEAPP for rapid triage of large extractions. All labs use full file system acquisitions ensuring access to complete datasets.
Master iOS file system structures, backup encryption mechanisms, and jailbreak-based full file system extraction techniques. Decode native Apple applications, validate location artifacts against known positions, and leverage iLEAPP and ArtEx for rapid triage. Labs include full file system analysis, Photos.sqlite deep dives, and artifact attribution.
Identify AI-generated content using operating system metadata combined with commercial tool capabilities. Use AI assistants safely to generate forensic analysis scripts without exposing case data. Detect, decompile, and analyze mobile malware samples. Recover evidence from devices where users deleted, wiped, or concealed data. Five intensive labs.
Decode secure messaging applications, payment platforms, file sharing services, and mobile browsers across iOS and Android platforms. Write SQLite queries to recover deleted chat messages and media attachments. Parse Tor browser and incognito session artifacts. Master techniques that commercial tools miss and recover that critical evidence yourself.
Apply every technique learned throughout the week in a gamified CTF environment using prior lab datasets plus new cold case evidence from multiple smartphone devices. Work individually or in teams answering investigation questions covering identification, attribution, timeline, and motive. Prove you can decode complex data under real pressure.
Malware analysts face attackers’ capabilities head-on, ensuring the fastest and most effective response to and containment of a cyber-attack. You look deep inside malicious software to understand the nature of the threat – how it got in, what flaw it exploited, and what it has done, is trying to do, or has the potential to achieve.
Explore learning pathResponsible for identifying and assessing the capabilities and activities of cybersecurity insider threats; produces findings to help initialize and support law enforcement and counterintelligence activities and investigations.
Explore learning pathThis expert applies digital forensic skills to a plethora of media that encompass an investigation. The practice of being a digital forensic examiner requires several skill sets, including evidence collection, computer, smartphone, cloud, and network forensics, and an investigative mindset. These experts analyze compromised systems or digital media involved in an investigation that can be used to determine what really happened. Digital media contain footprints that physical forensic data and the crime scene may not include.
Explore learning pathResponsible for analyzing digital evidence from computer security incidents to derive useful information in support of system and network vulnerability mitigation.
Explore learning pathCybercrime Investigators navigate dark web forums, trace cybercriminal activity, and conduct covert investigations. They follow forensic and legal standards to gather evidence and respond to cybercrimes.
Explore learning pathExecute digital forensic operations under demanding conditions, rapidly extracting critical intelligence from diverse devices. Leverage advanced threat hunting and malware analysis skills to neutralize sophisticated cyber adversaries.
Explore learning pathThis expert applies digital forensic skills to a plethora of media that encompasses an investigation. If investigating computer crime excites you, and you want to make a career of recovering file systems that have been hacked, damaged or used in a crime, this may be the path for you. In this position, you will assist in the forensic examinations of computers and media from a variety of sources, in view of developing forensically sound evidence.
Explore learning pathAs this is one of the highest-paid jobs in the field, the skills required to master the responsibilities involved are advanced. You must be highly competent in threat detection, threat analysis, and threat protection. This is a vital role in preserving the security and integrity of an organization’s data.
Explore learning pathAdd a GIAC certification attempt and receive free two practice tests. View pricing in the info icons below.
When purchasing a live instructor-led class, add an additional 4 months of online access after your course. View pricing in the info icons below.
As someone with ZERO experience/background in this subject matter, being able to go back and rewatch the videos is priceless. It's probably the best feature I have ever seen in a class.
This course makes me want to re-work every cell phone case I've ever done.
FOR585 course content provides extremely relevant material, guiding examiners to crucial artifacts for investigations and validation. It outlines key details for every forensic challenge.
FOR585 has been, by far, the best virtual course AND the best mobile forensics course I've ever taken.

Get feedback from the world’s best cybersecurity experts and instructors

Choose how you want to learn - online, on demand, or at our live in-person training events

Get access to our range of industry-leading courses and resources