SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsToday, detection engineers and blue teamers are focused on cloud threat detection. However, are we thinking about these threats holistically?
There are many pathways that threat actors utilize to gain access to cloud resources. Among these are endpoints that contain various cloud credential material.
This cloud credential material - in the form of various files, tokens and cookies is often overlooked, with little visibility and telemetry generated.
Megan is a Senior Security Engineer at IBM and SANS course author, combining her expertise in digital forensics with a fierce competitive edge as a Muay Thai fighter with 7 sanctioned bouts.
Learn moreAnton Ovrutsky is a speaker, volunteer, and holds multiple security certifications, including OSCE, OSCP, CISSP, CSSP, and KCNA.
Learn more