SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsSANS is here to support Chevron through every security challenge.

Discover the dynamic collaboration between SANS and Chevron, forging a powerful alliance to cultivate a robust cybersecurity culture. Our microsite provides an array of exceptional tools and resources, empowering you to stay ahead of ever-evolving threats. Explore an extensive range of training opportunities, dive into FAQs for expert insights, and elevate your skills through GIAC certifications and renewals. Embrace the future of cybersecurity and unlock endless possibilities with us.
The AI Cybersecurity Summit brings together the most critical aspects of AI in cybersecurity. From leveraging AI to strengthen your defenses to protecting against sophisticated AI-powered attacks that are already reshaping the threat landscape.

Join the global cybersecurity community in the most festive and challenging event of the year! The SANS Holiday Hack Challenge cyber range offers FREE, high-quality, and super fun hands-on cybersecurity challenges designed for all skill levels.


Obtain hands-on, practical skills from the world's best instructors by taking a SANS course at SANS Cyber Threat Intelligence Summit & Training 2026.






On this webcast, we will explore results from our 2025 survey. We will cover specific topics with an eye toward providing asset owners and operators with clear benchmarks for improving cyber threats, vulnerabilities, and risks across industrial environments.







With the proliferation of multi-factor authentication, penetration testers need to apply existing tooling to manipulate even internal applications. Building attack infrastructure internally during a penetration test is resource exhausting, but modern tools like evilginx can do most of the heavy lifting for us.

