SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe following tournaments, In-Person or Virtual, are included with any 4-6 day paid course.
The most comprehensive multi-disciplinary range from the NetWars suite. The winning team and the top five solo players from every Core NetWars tournament throughout the year are offered a chance to compete in the annual SANS Core NetWars Tournament of Champions. Example Topics: Cyber Defense, Threat Hunting, Log Analysis, Packet Analysis, Cryptography, Windows Administration, Linux Administration, Network Security Monitoring, Continuous Security Monitoring, Steganography, and more.
Focused on digital forensics, incident response, threat hunting, and malware analysis, this tool-agnostic approach covers everything from low-level artifacts to high-level behavioral observations. Example Topics: Threat Hunting, Malware Analysis, SIFT Workstation, Media Exploitation, Artifact Analysis, Rapid Triage, Malicious attacks, Network traffic analysis, Reverse engineering and debugging, Intrusion detection, and more.
Focused on preventing, analyzing, and defending against complex real-world attack scenarios, including brute-force attacks and ransomware campaigns. Example Topics: Cyber Defense, Threat Hunting, Log Analysis, Packet Analysis, Cryptography, Windows Administration, Linux Administration, Network Security Monitoring, Continuous Security Monitoring, Steganography, and more.
Focused on factory machinery operations, this experience brings players onto the factory floor, exposing them to the challenges of detecting and defending physical equipment and manufacturing components from cyberattacks. Example Topics: Blue Team (Defender) actions, Asset discovery and infrastructure mapping, Identifying adversary actions, log and file analysis, Endpoint forensics, ICS-specific malware detection, Engineering application use, Process restoration, and more.