SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsRole: Forensic Analyst
Role Definition: Impartially conducts investigations, recovery, and preservation of electronically stored information to protect Chevron.
Gain essential skills in digital forensic acquisition and rapid triage. Learn to collect and preserve data from diverse sources and then rapidly extract actionable intelligence.
Gain an essential understanding of Windows artifacts and learn to perform digital forensics in Microsoft Windows operating systems to recover, analyze, and authenticate data and solve a forensic case.
Improve persuasive communication techniques to breach readers' defenses, ensuring security reports influence decisions even when audiences resist engaging with technical content.
Learn the advanced incident response and threat hunting skills you need to identify, counter, and recover from a wide range of threats within enterprise networks.
Learn how to uncover new evidence sources that only exist in the cloud. Expand your ability to perform enterprise cloud forensics and incident response.
Conduct detailed, in-depth analysis on raw data from Mac and iOS cases. Gain confidence in your forensic analysis and incident response skills with hands-on labs.
Deepen your advanced network forensics experience, including threat hunting, analysis, and incident response. Explore the tools, technology, and processes needed to integrate network evidence sources.
Smartphones Have Minds of Their Own. Don't Make the Mistake of Reporting System Evidence, AI Created Date, Incorrect Locations, Smartphone Suggestions, or Application Cache as User Activity.
Learn to perform effective, secure OSINT research with practical techniques. Explore critical OSINT tools and apply your skills in hands-on labs based on real-world scenarios.
Transform your incident response skills; think like an attacker as you investigate cybersecurity incidents, develop threat intelligence, and apply defense strategies against real-world threats.