SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsConfront emerging threats, secure your environment, and strengthen cyber resilience with SANS
Equip yourself or your team with comprehensive hands-on cybersecurity training. Explore 85+ courses covering technical skills, leadership, and real-world defense against evolving cyber threats.









Play to learn or practice your skills and stand a chance to win prizes like a SANS OnDemand course of your choice or a six-month subscription for the newest self-paced cyber range, SANS Skills Quest by NetWars!

Explore SANS training in Asia Pacific either in person or online. Learn from industry experts and build mission-critical skills.

Industrial organizations are detecting faster—but recovery still lags. Discover what 330+ global professionals revealed about remote access risks, visibility gaps, and the path to practical resilience in the 2025 State of ICS/OT Security Report.

From hot topics to hands-on tips, SANS Community Nights bring learning and connection to cyber pros across Asia Pacific. Find the latest events and join us for a great night of learning.

Whether you're getting started or advancing your skills, choose from world-class training, industry-recognized certifications, or explore with free course demos. Start building your path with SANS.
Learn your way, whether in person, live instruction delivered in an online format, or self-paced, on your own schedule, with cybersecurity courses from top industry experts.
Master the skills to earn GIAC certifications, the industry's most rigorous credentials, with expert exam preparation from SANS.
Preview 70+ SANS courses, assess course difficulty, watch expert instructors, and experience the SANS OnDemand training platform firsthand.
The real value of this training lies at the intersection of quality content and delivery by a subject-matter expert actively working in the field, making it incredibly relevant and immediately applicable to my job.
You cannot beat the quality of SANS classes and instructors. I came back to work and was able to implement my skills learned in class on day one. Invaluable.
SANS is the best information security training you’ll find anywhere. World-class instructors, hands-on instruction, actionable information you can really use, and NetWars.
Effective cybersecurity operations rely on layers of offensive testing, defensive architecture and monitoring, forensics and incident response, cloud security, and leadership. Advancing your capabilities in these focus areas is our mission because it furthers your ability to protect us all.
Training in penetration testing, red teaming, purple teaming, and exploit development, provides the skills needed to simulate real-world attacks, evade defenses, and enhance security through adversary emulation and improving defense strategies.
Learn moreEffective Cyber Defense enables organizations to anticipate, withstand, and recover from cyber-attacks through proactive monitoring, threat detection, and incident response. It combines security operations, automation, and resilient architecture to reduce risk and minimize attack impact.
Learn moreCloud security encompasses technologies, policies, and controls that protect data, applications, and infrastructure in cloud environments. Knowing how to safeguard sensitive information in cloud environments is crucial for preventing cyber threats, ensuring compliance, and maintaining business continuity.
Learn moreNew-to-Cyber Field Manual: How to Break In, Build Skills, and Find Your Path in Cybersecurity





Governments around the world rely on SANS for best-in-class training, equipping local and international cybersecurity teams with the skills necessary to protect critical infrastructure and stay ahead of adversaries

Cybersecurity professionals of all skill levels train with SANS to learn from industry experts and gain hands-on, practical knowledge that can be applied immediately, effectively preparing them for real-world threats.

SANS Institute is GIAC’s preferred partner for exam preparation, offering focused curriculums that help individuals pass with confidence and validate their expertise in various cybersecurity domains.

Fortune 500 companies partner with SANS to recruit, build, and retain high-performing, outcome-driven teams through industry-leading training solutions that bolster cyber resilience.
Equip your team with cutting-edge cybersecurity skills, designed to address your organization’s most critical security needs.
Empower your leaders with strategies that drive better decision-making, stronger risk management, and improved cyber resilience.
Mitigate human risk and ensure compliance with advanced training that addresses evolving threats and security regulations.
Adapt to new SEC mandates with a 10-module training course designed to expand cyber literacy and help leaders facilitate an engaged, united cybersecurity culture.

Join the SANS CISO network, exclusively for senior security executives. Connect with experts and thought leaders, share ideas and lessons learned and help drive industry breakthroughs.

Gain exclusive access to free resources, tools, and expert content—news, training, podcasts, whitepapers, and more. Explore unique member benefits designed for cybersecurity professionals that you won’t find anywhere else.

When you join the SANS community, you gain access to free cybersecurity resources, including free training, 150+ instructor-developed tools, the latest industry updates, and more.
Modern smartphones collect an extensive array of data that offers insights into a user's daily behavior, often without them being fully aware of it. This presentation will delve into how digital forensics can analyze such data to reconstruct an individual's actions, routines, and habits.

Join Jonathan Risto, SANS Principal Instructor, Jesse Harris, Tanium Technical Leader, and Adam Janosek, AHEAD Senior Solutions Architect for a webcast that shows how Tanium Autonomous Endpoint Management (AEM) transforms this challenge into a competitive advantage.

The SANS 2025 Detection and Response Survey webcast will delve into the current state of cybersecurity operations, questioning whether the heavy emphasis on endpoint detection is creating new blind spots.

This talk will use little PowerPoint but instead offer an engaging walk-through of recent events, how they manifested themselves in the ISC's data, how our different data feeds work, and more. A talk not just for packet connoisseurs but for everybody interested in a good story.

In this webcast, we explore Quantum Xchange’s Phio TX platform—a quantum-safe key distribution solution designed to provide crypto-agility, out-of-band key delivery, and future-proof protection for regulated industries and critical infrastructure.

Starting a consulting career isn’t difficult. Many people do it successfully in the short term. So, what do consultants who have built sustainable, thriving careers do differently?

Chris will present challenges and lessons learned implementing cyber security on multiple large and complex offshore greenfield projects.

Large Language Models (LLMs) and Generative AI have inherent limitations, such as outdated knowledge, lack of private data access, and the potential for hallucinations. In this session, we will introduce a strategy for overcoming these challenges: Retrieval-Augmented Generation (RAG).

Cybersecurity policies are the foundation of any governance program, setting expectations for workforce behavior and establishing the rules that support compliance and risk management.

This talk will walk through real-world defense impairment techniques across AWS and Azure. We'll dig into what it looks like when attackers suppress their own IPs in GuardDuty, redirect CloudTrail logs to buckets they control, tamper with Azure diagnostic settings, or disable Defender entirely.

Register for the SANS 2025 SOC Survey webcast today and learn how to use results from this year’s survey to inform and recalibrate your near-term plans and long-term goals.

This presentation aims to equip attendees with the skills necessary to harness AI in the OSINT Intelligence Cycle.

Come learn what you can do to build evergreen security leadership skills to transform for your team, your organization, and ultimately yourself.

Using lessons from the SANS LDR521 course, Lance Spitzner will start with how to decipher your organizational culture and how to use that to create your guiding principles. We then will cover the four key drivers of security culture and how to align those drivers your strategy. The end result will be a custom strategy you can being to implement right away.

Deputy Assistant Secretary Gharun Lacy will share Diplomatic Security's cybersecurity strategies for navigating the evolving cyber threat landscape and leveraging emerging technologies as a uniquely positioned law enforcement entity in the U.S. government's most global agency.

In this fast-paced, fun talk, we'll cover the top ways that I've improved my efficiency and productivity by changing the way I interact with AI in 2025 and into 2026.

In this talk we will take a look at the most recent attack techniques, targets, and trends.

Organizations keep deploying AI "agents" without understanding what autonomy level they're getting or what governance it warrants. Chinese state-sponsored hackers used Claude Code to automate a cyberattack campaign across 30 organizations. Replit's AI coding agent deleted a production database, then tried to cover up its mistake. These aren't anomalies. They're predictable governance failures.

This isn't your typical "don't pay ransoms" talk. We'll explore the harsh realities where business continuity and regulatory pressure create impossible choices, providing practical frameworks for decision-making under duress, technical protocols for verifying attacker claims, and strategies for maintaining leverage when all seems lost.

Join the renowned investigators of Baker221b and step into the role of a digital detective.
