SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsConfront emerging threats, secure your environment, and strengthen cyber resilience with SANS
Equip yourself or your team with comprehensive hands-on cybersecurity training. Explore 85+ courses covering technical skills, leadership, and real-world defense against evolving cyber threats.
See how cybersecurity training strengthens team performance, improves retention, and cuts costs — all at a glance. This visual breakdown brings together data and insights that show what high-performing teams are doing differently.
SANS is excited to announce that you can now use your Post-Secondary Education Account (PSEA) funds to offset the cost of 23 SANS cybersecurity courses. Don't miss this opportunity to invest in your cybersecurity career with government-supported education funding.
The industry's most trusted guide to reducing human risk and driving program maturity is back. With insights from more than 2,700 peers, learn how you can benchmark your efforts and lead the shift to a stronger security culture
Join us at SANS October Singapore 2025, where you'll gain cutting-edge cybersecurity skills through 11 immersive, hands-on courses led by world-class instructors!
Whether you're getting started or advancing your skills, choose from world-class training, industry-recognized certifications, or explore with free course demos. Start building your path with SANS.
Learn your way, whether in person, live instruction delivered in an online format, or self-paced, on your own schedule, with cybersecurity courses from top industry experts.
Master the skills to earn GIAC certifications, the industry's most rigorous credentials, with expert exam preparation from SANS.
Preview 70+ SANS courses, assess course difficulty, watch expert instructors, and experience the SANS OnDemand training platform firsthand.
The real value of this training lies at the intersection of quality content and delivery by a subject-matter expert actively working in the field, making it incredibly relevant and immediately applicable to my job.
You cannot beat the quality of SANS classes and instructors. I came back to work and was able to implement my skills learned in class on day one. Invaluable.
SANS is the best information security training you’ll find anywhere. World-class instructors, hands-on instruction, actionable information you can really use, and NetWars.
Effective cybersecurity operations rely on layers of offensive testing, defensive architecture and monitoring, forensics and incident response, cloud security, and leadership. Advancing your capabilities in these focus areas is our mission because it furthers your ability to protect us all.
Training in penetration testing, red teaming, purple teaming, and exploit development, provides the skills needed to simulate real-world attacks, evade defenses, and enhance security through adversary emulation and improving defense strategies.
Learn moreEffective Cyber Defense enables organizations to anticipate, withstand, and recover from cyber-attacks through proactive monitoring, threat detection, and incident response. It combines security operations, automation, and resilient architecture to reduce risk and minimize attack impact.
Learn moreCloud security encompasses technologies, policies, and controls that protect data, applications, and infrastructure in cloud environments. Knowing how to safeguard sensitive information in cloud environments is crucial for preventing cyber threats, ensuring compliance, and maintaining business continuity.
Learn moreWe invite you to join us for this webinar, where IDC and SANS analysts will discuss the results of a recent research project that quantified the business value of training.
Governments around the world rely on SANS for best-in-class training, equipping local and international cybersecurity teams with the skills necessary to protect critical infrastructure and stay ahead of adversaries
Cybersecurity professionals of all skill levels train with SANS to learn from industry experts and gain hands-on, practical knowledge that can be applied immediately, effectively preparing them for real-world threats.
SANS Institute is GIAC’s preferred partner for exam preparation, offering focused curriculums that help individuals pass with confidence and validate their expertise in various cybersecurity domains.
Fortune 500 companies partner with SANS to recruit, build, and retain high-performing, outcome-driven teams through industry-leading training solutions that bolster cyber resilience.
Equip your team with cutting-edge cybersecurity skills, designed to address your organization’s most critical security needs.
Empower your leaders with strategies that drive better decision-making, stronger risk management, and improved cyber resilience.
Mitigate human risk and ensure compliance with advanced training that addresses evolving threats and security regulations.
Adapt to new SEC mandates with a 10-module training course designed to expand cyber literacy and help leaders facilitate an engaged, united cybersecurity culture.
Join the SANS CISO network, exclusively for senior security executives. Connect with experts and thought leaders, share ideas and lessons learned and help drive industry breakthroughs.
Gain exclusive access to free resources, tools, and expert content—news, training, podcasts, whitepapers, and more. Explore unique member benefits designed for cybersecurity professionals that you won’t find anywhere else.
When you join the SANS community, you gain access to free cybersecurity resources, including free training, 150+ instructor-developed tools, the latest industry updates, and more.
This free virtual event brings together cybersecurity professionals, utility operators, government stakeholders, and industry experts to explore the unique challenges and emerging threats facing the energy and water sectors.
We invite you to join us for this webinar, where IDC and SANS analysts will discuss the results of a recent research project that quantified the business value of training.
This webinar explores the design and deployment of a robust detection engineering lab—built both on-prem and in the cloud—that enables engineers to simulate real world attacks, validate hypotheses, and rapidly iterate on detection logic.
Join Greg Scheidel as he demystifies the technical foundation of Zero Trust Architecture (ZTA) and outlines the key technologies that drive modern, mature implementations.
Get a masterclass in ICS/OT cyber governance. Learn how to launch, right-size, and sustain a program, keep momentum alive, and maximise your risk ROI.
As 5G networks rapidly expand across North America, from public rollouts to private enterprise deployments, FWA, and ORAN, security challenges are growing just as fast.
As organizations accelerate cloud adoption and embrace AI-driven innovation, maintaining visibility and control over sensitive data has become increasingly complex.
Infrastructure as Code (IaC) gives teams speed, repeatability, and auditability, but only when it’s done securely.
This webcast is built on insights from one of our most anticipated cybersecurity surveys of the year—offering an in-depth look at how the community is adopting, adapting to, and defending against artificial intelligence in all its forms.
Security teams often find themselves reacting to cloud misconfigurations and policy violations after they occur—playing an endless game of security Whack-a-Mole.
In this exclusive webcast, course authors Jeroen Vandeleur and Jason Ostrom unveil the groundbreaking updates to SEC598: AI and Security Automation for Red, Blue, and Purple Teams.
Cybersecurity leaders and compliance professionals are under increasing pressure to meet a growing array of global regulations—all while maintaining effective threat detection and response capabilities. Traditional monitoring is no longer enough. Full Packet Capture (FPC) is rapidly emerging as a foundational requirement—not only for real-time visibility and forensic analysis, but as a direct response to regulatory mandates in the U.S., EU, and beyond.
In ICS/OT environments, network visibility isn’t just a buzzword, it’s the foundation for safe and effective cybersecurity, incident response, and operational/engineering troubleshooting.
Ransomware strikes an innocent virtual hard disk leaving its contents unrecoverable… or so we were told.
Join us on September 16, 2025, at 1:00pm ET for a deep dive into how modern enterprises can keep pace with today’s fast-moving threat landscape.
The evolving field of Governance, Risk, and Compliance (GRC) is increasingly intersecting with engineering, giving rise to a pivotal discipline known as GRC Engineering. This 45-minute webinar explores this emerging practice, clearly defining GRC Engineering and highlighting its critical role within modern enterprises.
This hands-on, scenario-driven workshop delves into how attackers move stealthily through Active Directory environments using user impersonation and lateral movement techniques.
The integration of AI in penetration testing promises to revolutionize cybersecurity assessments. Machine learning algorithms will automate vulnerability discovery, enabling real-time identification and exploitation of security weaknesses.
Modern smartphones collect an extensive array of data that offers insights into a user's daily behavior, often without them being fully aware of it. This presentation will delve into how digital forensics can analyze such data to reconstruct an individual's actions, routines, and habits.
This session examines the latest developments in GenAI, both as a potent weapon for attackers and a game-changing tool for defenders.