SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsToday, detection engineers and blue teamers are focused on cloud threat detection. However, are we thinking about these threats holistically?
There are many pathways that threat actors utilize to gain access to cloud resources. Among these are endpoints that contain various cloud credential material.
This cloud credential material - in the form of various files, tokens and cookies is often overlooked, with little visibility and telemetry generated.
Megan is a Senior Security Engineer at Datadog, SANS DFIR faculty, and co-author of FOR509. She holds two master’s degrees, serves as CFO of Mental Health Hackers, and is a strong advocate for hands-on cloud forensics training and mental wellness.
Learn moreAnton Ovrutsky is a speaker, volunteer, and holds multiple security certifications, including OSCE, OSCP, CISSP, CSSP, and KCNA.
Learn more