SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Improving Windows Event Log Analysis With Yamato Security Tools and The Evolving Cyber Threat Landscape: A SANS Perspective.
Improving Windows Event Log Analysis with Yamato Security Tools presented by SANS Certified Instructor Zachary Mathis and Top Five Cloud Security Trends and Tips with SANS Professor Frank Kim.
Gain hands-on, cross-disciplinary cyber defense skills and prepare for CERT/CSIRT roles with 25+ labs using real cyber tools for network security, malware analysis, SecOps, forensics, and more.
Transform your incident response skills; think like an attacker as you investigate cybersecurity incidents, develop threat intelligence, and apply defense strategies against real-world threats.
Build your cybersecurity confidence from the ground up. This SANS Foundations course gives you the essential skills, tools, and mindset to launch your journey into the world of cyber.
Kubesec is security risk analysis for Kubernetes resources, as a web service or admission controller.
If you work in or lead a SOC role then the SANS Guide To Security Operations is for you. This booklet distills the core lessons from LDR551: Building and Leading Security Operations Centers and SEC450: Blue Team Fundamentals: Security Operations and Analysis, into an easy to digest list of defense functions, tools, key data, metrics, and models your team needs to know to be successful.
The Birthday Problem has a number of applications to incident response. Existing tools can both narrow the focus of the incident response team and limit their experience to a small subset of alerts. This leaves specialized tools to do the analysis before anything is investigated, imposing a range of biases. We show the use of randomly selected investigation of nodes in the environment has a significant likelihood of finding the adversary. This allows for the evaluation of threat hunting and security operations. The approach is then extended to the evaluation of cybersecurity machine learning products. These products may be complicated and opaque. The approach presented avoids the need to understand the internals, shifting analyst focus to business as usual operations.
Learn Python in depth and gain essential skills for customizing and developing your own information security tools.
Dive into advanced Python coding techniques from top open-source security tools and empower yourself to build secure, scalable solutions across a wide range of high-demand fields.