SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis role investigates, analyzes and responds to cyber incidents. Find the SANS courses that map to the Incident Response SCyWF Work Role.
Identifies, analyzes, monitors, mitigates and manages threats and vulnerabilities to IT systems and networks. Uses defensive measures and multi-source information to report events and respond to incidents.
Job titles associated to this role:
Explore the courses below that are aligned with this job role.
Essentials courses are designed for individuals with a foundational understanding of IT or cybersecurity concepts.
Intermediate courses are designed for cybersecurity professionals with practical, hands-on experience.
Advanced courses are designed for highly experienced cybersecurity professionals seeking expert-level mastery.
This role uses cybersecurity tools to protect information, systems and networks from cyber threats. Find the SANS courses that map to the Protection SCyWF Work Role.
Explore learning pathThis role collects and analyzes information about threats, searches for undetected threats and provides actionable insights to support cybersecurity decision-making. Find the SANS courses that map to the Threat Management SCyWF Work Role.
Explore learning pathThis role uses monitoring and analysis tools to identify and analyze events and to detect incidents. Find the SANS courses that map to the Defense SCyWF Work Role.
Explore learning pathThis role tests IT systems and networks and assesses their threats and vulnerabilities. Find the SANS courses that map to the Vulnerability Assessment SCyWF Work Role.
Explore learning pathThere are numerous different roles in cybersecurity and where you fit depends on your interest level. SANS New to Cyber offers courses, certifications, and free resources for anyone interested in getting started in cybersecurity.
Explore New to Cyber