SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsTailored for practitioners and team leaders, discover targeted resources to address the growing challenges of supply chain cybersecurity risks – find exactly what you need to strengthen your security posture against third-party risks.
Increase in supply chain attacks from 2023-to 2024
of organizations disrupted by third-party breaches last year
Average cost of a supply chain attack in 2024 (USD)
of vendors must provide an SBOM by 2025
Limited visibility into your supply chain ecosystem increases the risk of costly disruptions, delays, and vulnerabilities. Explore related resources:
Focuses on SBOM driven risk assessments and vendor monitoring to uncover blind spots in your supply chain
Learn MoreBridge the gap between security and procurement by learning how to test and validate third-party risks.
Learn MoreLearn to identifying hidden vulnerabilities in software and hardware products.
Learn MoreWhen your supply chain is under attack, every second matters. A slow or ineffective incident response can lead to costly disruptions and lasting damage. Explore related resources:
Built for incident response — provides structured playbooks and cross-functional coordination for handling supply chain attacks.
Learn MoreOffers hands-on labs for detecting threats from third parties and mitigating supply chain-specific attacks.
Learn MoreSANS Technology Institute | Applications Accepted Monthly Protect your organization from emerging software supply chain threats. The SANS.edu Graduate Certificate in Software Supply Chain Security delivers real-world, expert-led training and four GIAC certifications. Available 100% online and designed for working professionals who want to upgrade their skills in this fast-evolving area of cybersecurity.
Explore the SANS.edu ProgramYour security is only as strong as your least secure vendor. Transform fragmented assessments into a systematic strategy that scales with your business. Explore related resources:
Focuses on scalable vendor risk methodologies and continuous monitoring beyond onboarding.
Learn MoreBridge the gap between security and procurement by learning how to test and validate third-party risks
Learn MoreEven with constrained budgets and teams, you can reduce third-party risk. Explore practical tools and strategies to help you do more with what you have:
Learn processes and hands-on techniques to test supply chain software and hardware.
Learn MoreOffers hands-on labs for detecting threats from third parties and mitigating supply chain-specific attacks.
Learn MoreHelps security leaders build more coordinated and efficient response efforts, improving team capability despite staffing or budget constraints.
Learn MoreAs standards evolve and regulatory demands increase, staying compliant can feel overwhelming. Explore related resources to help you navigate complexity, meet requirements with confidence, and protect your organization from compliance gaps.
Explores how to meet SBOM-related regulatory requirements and build defensible compliance practices.
Learn MorePrepares leaders to respond effectively to overlapping mandates and lead compliant incident response efforts.
Learn MoreA supply chain breach is inevitable; your response doesn’t have to be improvised. Learn how to create chain-specific playbooks and explore other related resources:
Learn how to detect and respond to threats originating from vendors or software dependencies.
Learn MoreSupply Chain Security Incident Response: Strategies for Responding to Emerging Threats
DownloadDevelop dedicated playbooks for third-party and supply chain compromise response.
Learn More