SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts by using status filter below or Click Here.
With the proliferation of multi-factor authentication, penetration testers need to apply existing tooling to manipulate even internal applications. Building attack infrastructure internally during a penetration test is resource exhausting, but modern tools like evilginx can do most of the heavy lifting for us.
Join us for the Ransomware Summit Solutions Track 2025 to explore the full spectrum of ransomware dynamics. Learn how threat actors are adapting their strategies, where vulnerabilities still exist, and why the cycle of paying ransoms endures.
This webcast will provide a detailed overview of all the products and pricing offered to qualified state, provincial and local government organizations, in the US and Canada through the SANS SLTT Government’s Aggregate Buy program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
Detecting and responding to cloud attacks has never been more challenging. Modern attacks and the ever-changing nature of cloud infrastructure and applications make security teams’ lives more difficult than ever. A new approach is needed – one that can provide a fully traceable & explainable runtime security story spanning the entire cloud technologies stack.
Join cybersecurity leader Mark Orlando and researcher and consultant Dr. Daniel Shore as they share strategies for recognizing and mitigating burnout.
Following up on part 1 of the series, you now have your basics of WinDbg down. You jump into your first debugging session, stepping over code you do not want to inspect, just to realize that the function you just stepped over was actually important. You restart the debugging session and go again. If only it was possible to go back in time...
This webcast will provide a detailed overview of all the products and pricing offered to accredited educational institutions, in the US and Canada through the SANS Educational Institutions Summer Buy program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
Implementing cloud security controls is hard. Implementing them at scale is harder.
During offensive operations engagements, We often find ourselves repeating the same playbooks over and over again, getting success every time. Are we actually becoming better as an industry in improving security posture? Attend the talk to find out! Warning: Rants inside!
In this brief, informative, and useful session, Christopher Crowley will discuss the concept of a variational autoencoder, then show how you could implement this to train an autoencoder based on your logs.
大規模言語モデル (LLM)に基づくGPT(Generative Pretrained Transformers)は、多くの課題に対して優れた性能を発揮します。しかし、ログデータ内の異常値を見つけるためのトレーニングはされていません。
Outages happen—even in the cloud. As more organizations move critical operations to cloud platforms, the risks of downtime, identity service disruption, and security gaps are rising fast. The question isn’t if your cloud provider might fail you—it’s whether your continuity strategy is ready when it does.