SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsApply your credits to renew your certifications
Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months
Course material is for individuals with an understanding of IT or cyber security concepts
Apply what you learn with hands-on exercises and labs
Essentials are not basics. They are the foundation every specialization is built upon—and without them, the specialization itself is unstable.
Overall, my learning experience was vital, and I see practical steps and methods that I can use when I start back work. This course changed my perspective on Cyber Security and I’m thankful for the opportunity to be around leaders in the industry.
SEC401: Security Essentials covers more than 30 topical areas of information security—not because breadth is a goal in itself, but because the industry demands it. You cannot effectively defend what you do not understand; and what you do not understand, in an industry this large and this interconnected, will eventually become the gap that matters most.


Bryan is a SANS Senior Instructor and author of SEC401. With 30+ years of cybersecurity experience and 22 GIAC certifications—including the prestigious GSE—he's trained professionals from the FBI, NATO, and the UN. He is the CEO of Xploit Security Inc.
Read more about Bryan SimonExplore the course syllabus below to view the full range of topics covered in SEC401: Security Essentials.
Every organization operates under the same uncomfortable reality: not every attack will be prevented. The question is never "how do we stop everything?" because everything cannot be stopped. The more important question is "how quickly can we detect, understand, and respond when something gets through?" Section 1 builds that answer, starting with the network itself.
No single control stops every threat. That is not a failure of security—it is the reality defense-in-depth is designed to address. Section 2 builds the layered strategy every organization needs but few implement fully: from information assurance principles through identity, authentication, and security frameworks, to data protection and mobile security.
Every compromise begins somewhere. Section 3 covers the full arc—from vulnerabilities that give adversaries a foothold, through attack methods, to logging and detection that expose post-compromise activity, and the incident response discipline that shapes effective recovery. Understanding each stage isn’t optional; the adversary already does.
Section 4 examines technologies at the core of defensive security—starting with the most misunderstood: cryptography. It then covers prevention and detection at network and endpoint levels. Awareness isn’t enough; understanding how they work, where they fail, and how they complement each other is what makes them truly defensible choices in practice.
Windows remains the most widely used—and most targeted—desktop OS; those facts are linked. Section 5 examines Windows security in today’s ecosystem: Active Directory, Azure, PowerShell, PKI, BitLocker, Microsoft 365, Hyper-V, and more. The simple desktop model no longer applies; this section focuses on the Windows organizations actually defend today.
The final section of SEC401 addresses the operating systems and deployment models that complete our discussion of the modern enterprise environment — Linux, containers, and macOS. Each presents its own security model, its own strengths, and its own commonly misunderstood limitations.
Responsible for analyzing data from multiple disparate sources to provide cybersecurity and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
Explore learning pathEnsures systems and software security from development to maintenance by analyzing and improving security across all lifecycle phases.
Explore learning pathManages and maintains databases or data systems for efficient storage, querying, and access to organizational data assets and records.
Explore learning pathDevelops and evaluates cyber training content and methods to ensure relevance, effectiveness, and alignment with organizational needs.
Explore learning pathDelivers technical support to users, helping them resolve issues with client hardware/software according to organizational service processes.
Explore learning pathResponsible for setting up and maintaining a system or specific components of a system in adherence with organizational security policies and procedures. Includes hardware and software installation, configuration, and updates; user account management; backup and recovery management; and security control implementation.
Explore learning pathOversees full lifecycle of information systems from design through evaluation, ensuring alignment with functional and operational goals.
Explore learning pathResponsible for managing a portfolio of technology investments that align with the overall needs of mission and enterprise priorities.
Explore learning pathEnroll your team as a group or arrange a private session for your organization. We’ll help you choose the format that fits your goals.
SEC401 gives you a fantastic knowledge base to build on, and I would say it's essential for anyone working in cybersecurity.
Excellent material for security professionals wanting a deeper level of knowledge on how to implement security policies, procedures, and defensive mechanisms in an organization.
SEC401 has been an excellent experience all around. It is content-heavy and rich, and regardless of your technical ability and experience, you will leave with a far better understanding of many aspects of cybersecurity.

Get feedback from the world’s best cybersecurity experts and instructors

Choose how you want to learn - online, on demand, or at our live in-person training events

Get access to our range of industry-leading courses and resources