SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact Us
Roles: Cybersecurity Threat Intelligence Analyst and Cyber Product Line Threat Analyst
Role Definition: The Cyber Threat Intelligence Analyst produces integrated threat and technical intelligence products (threat assessments, briefings, intelligence studies, country studies, etc.) regarding cyber threats of relevance to Chevron. Requires demonstrated excellent written and oral communication skills and the ability to effectively interact with persons from a range of backgrounds and positions. Requires analytical skills, specifically in intelligence analysis methodologies as applied to cyber threats, critical thinking, research, and report production. Requires the analyst to execute an intelligence life cycle, including requirements gathering, intelligence collection, analysis, targeted distribution, and feedback to produce relevant, timely, accurate, and actionable intelligence providing the who, what, when, where, why, how, and importance of cyber threats including those associated with espionage, hacktivism, cybercrime, malware, geopolitics, social engineering, and emerging threats.
Learn how to investigate cybercrime from end to end — uncover attacker tactics, trace financial activity, and analyze digital evidence to support attribution and incident response.

Gain foundational ICS and OT security knowledge and hands-on experience in this one-day course.

SEC301 introduces cybersecurity fundamentals for non-technical professionals, empowering them to understand risks, terminology, and best practices to support security in any role.

Gain essential cybersecurity skills to quickly detect, respond to, and remediate threats. Learn how to protect critical information and technology assets, whether on-premises or in the cloud.

Plan, execute, and defend against social engineering attacks by mastering the psychology, tools, and techniques used by adversaries and professional testers.

Learn to perform effective, secure OSINT research with practical techniques. Explore critical OSINT tools and apply your skills in hands-on labs based on real-world scenarios.

Master tactical, operational, and strategic cyber threat intelligence skills. Improve analytic processes and incident response effectiveness to support your detection and response programs.

Reinforce critical cybersecurity skills to secure industrial control systems and operational technology against emerging threats while maintaining operational resilience in industrial environments.

SEC301 introduces cybersecurity fundamentals for non-technical professionals, empowering them to understand risks, terminology, and best practices to support security in any role.

Gain tactical expertise to configure, monitor, and defend cloud environments while addressing data security and compliance challenges.

Prevent cloud incidents from becoming breaches with attack-driven controls. Explore real-world case studies, build multicloud defenses, and secure emerging GenAI workloads through hands-on labs.

Transform your incident response skills; think like an attacker as you investigate cybersecurity incidents, develop threat intelligence, and apply defense strategies against real-world threats.

Master tactical, operational, and strategic cyber threat intelligence skills. Improve analytic processes and incident response effectiveness to support your detection and response programs.

Acquire critical visibility, detection, and response capabilities to protect ICS/OT environments against sophisticated threats while ensuring the safety and reliability of operations.

Learn to perform effective, secure OSINT research with practical techniques. Explore critical OSINT tools and apply your skills in hands-on labs based on real-world scenarios.

Gain the skills you need to understand and mitigate vulnerabilities and secure web applications, APIs, and microservices.

Learn Python in depth and gain essential skills for customizing and developing your own information security tools.

Learn to comprehensively assess and test the security of iOS and Android devices and applications through hands-on analysis and penetration testing techniques.

Learn the advanced incident response and threat hunting skills you need to identify, counter, and recover from a wide range of threats within enterprise networks.

Deepen your advanced network forensics experience, including threat hunting, analysis, and incident response. Explore the tools, technology, and processes needed to integrate network evidence sources.

Develop comprehensive defenses in industrial control systems, and master methodologies through hands-on exercises in a simulated operational technology environment with real-world components.

Security professionals gain critical skills to conduct safe, effective penetration tests and assessments in ICS/OT environments without compromising operational integrity.

Gain essential technical and leadership skills to effectively manage security programs, covering key topics like security architecture, vulnerability management, cloud security, and GenAI security.

This course offers an MBA-level approach, preparing cybersecurity leaders to build strategic plans, craft effective policies, and lead across technical and business teams.

Learn to implement the most effective ways to mature your vulnerability management program and move from identifying vulnerabilities to successfully treating them.

Learn to leverage the principles of organizational change to develop, maintain, and measure a strong security culture.

Learn a repeatable process for web application penetration testing and gain the skills to uncover vulnerabilities and communicate their business impact.

Master enterprise-scale penetration testing; learn to identify, exploit, and assess real business risks across on-prem, Azure, and Entra ID environments through hands-on labs and an intensive CTF.

Master Red Team operations by leveraging adversary emulation, cyber threat intelligence, and Red Team tradecraft to execute consistent, repeatable engagements that improve defense effectiveness.

Learn advanced defensive techniques through hands-on labs and real-world scenarios to effectively prevent, detect, and respond to sophisticated cyber-attacks through a purple team strategy.

Learn advanced penetration testing skills to develop custom exploits, perform network attacks, analyze cryptographic implementations, and master advanced exploitation techniques.

Advanced purple team training empowers security professionals to simulate sophisticated threat actor techniques through comprehensive adversary emulation across complex enterprise environments.
