SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsHone your skills with premier training courses developed within the SCyWF framework, a reference model and a guideline for preparing, developing, recruiting, promoting and managing the cybersecurity workforce in Saudi Arabia.
The NCA – Saudi Cybersecurity Workforce Framework (SCyWF) is a practical tool to support the identification and articulation of tasks, competences, skills and knowledge associated with the roles of Saudi Arabia cybersecurity professionals. The SCyWF provides profiles of 12 typical cybersecurity professional roles. The main purpose of the SCyWF is to create a common understanding between individuals, employers and providers of learning programmes across the region.
For more information on this framework and how it can assist you in finding the right cybersecurity training for you or your organisation, speak to a SANS representative.
The SCyWF outlines all cybersecurity roles across five work categories and a total of 12 specialty areas across those categories. We've aligned our expert training with this framework to ensure you get the most relevant, targeted learning. Our courses are specifically mapped to these areas, offering professionals practical skills that address the evolving challenges of today’s security landscape. Whether you're advancing your career or strengthening your team, our comprehensive training equips you with the knowledge and expertise to succeed in the industry.
Conducts cybersecurity design, architecture, research and development activities.
Leads cybersecurity teams and work. Develops cybersecurity human capital.
Develops organisational cybersecurity policies. Governs cybersecurity structures and processes, manages cyber risks and assures compliance with the organization’s cybersecurity, risk management and related legal requirements.
Identifies, analyses, monitors, mitigates and manages threats and vulnerabilities to IT systems and networks. Uses defensive measures and multi-source information to report events and respond to incident
Conducts cybersecurity tasks for Industrial Control Systems and Operational Technologies (ICS/OT).