SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsConfront emerging threats, secure your environment, and strengthen cyber resilience with world-class, expert-led training
Equip yourself or your team with comprehensive hands-on cybersecurity training. Explore 85+ courses covering technical skills, leadership, and real-world defense against evolving cyber threats.
Explore the foundational controls for securing generative AI. This expert-driven guide outlines actionable recommendations across model protection, inference security, governance, and compliance to help teams defend against evolving threats and align with emerging standards.
Trusted by practitioners and policy leaders shaping the future of secure AI adoption.
Experience high-impact cybersecurity training on September 22-27 in Las Vegas—where the lights never dim and innovation never sleeps. Learn from real-world practitioners by day, then enjoy top-tier dining, shows, and entertainment every evening. Keynote Announced: Dr. Nikki Robinson, Dsc, PHDTalk: Vulnerability Chaining - An Exploration into Mapping Vulnerabilities for Effective Vulnerability Management. Date: September 23, 2025 | 6:30pm – 7:30pm PT (UTC-7)
Join us for the DFIR event of the year to get up-to-speed on the latest digital forensics and incident response open-source tools, effective investigative strategies, and to hear from the top practitioners in the industry. Summit: July 24-25 | Training: July 26-31
Your ICS security tools are strong, but can they stop human error? The latest SANS ICS training helps your workforce catch what tools can’t. Role-based modules for leaders, engineers, and frontline personnel cover real threats like AI, cloud, and malware.
Whether you're getting started or advancing your skills, choose from world-class training, industry-recognized certifications, or explore with free course demos. Start building your path with SANS.
Learn your way, whether in person, live instruction delivered in an online format, or self-paced, on your own schedule, with cybersecurity courses from top industry experts.
Master the skills to earn GIAC certifications, the industry's most rigorous credentials, with expert exam preparation from SANS.
Preview 70+ SANS courses, assess course difficulty, watch expert instructors, and experience the SANS OnDemand training platform firsthand.
The real value of this training lies at the intersection of quality content and delivery by a subject-matter expert actively working in the field, making it incredibly relevant and immediately applicable to my job.
You cannot beat the quality of SANS classes and instructors. I came back to work and was able to implement my skills learned in class on day one. Invaluable.
SANS is the best information security training you’ll find anywhere. World-class instructors, hands-on instruction, actionable information you can really use, and NetWars.
Effective cybersecurity operations rely on layers of offensive testing, defensive architecture and monitoring, forensics and incident response, cloud security, and leadership. Advancing your capabilities in these focus areas is our mission because it furthers your ability to protect us all.
Training in penetration testing, red teaming, purple teaming, and exploit development, provides the skills needed to simulate real-world attacks, evade defenses, and enhance security through adversary emulation and improving defense strategies.
Learn moreEffective Cyber Defense enables organizations to anticipate, withstand, and recover from cyber-attacks through proactive monitoring, threat detection, and incident response. It combines security operations, automation, and resilient architecture to reduce risk and minimize attack impact.
Learn moreCloud security encompasses technologies, policies, and controls that protect data, applications, and infrastructure in cloud environments. Knowing how to safeguard sensitive information in cloud environments is crucial for preventing cyber threats, ensuring compliance, and maintaining business continuity.
Learn moreNew research from IDC reveals the tangible business value of rigorous, practitioner-led training from SANS
Governments around the world rely on SANS for best-in-class training, equipping local and international cybersecurity teams with the skills necessary to protect critical infrastructure and stay ahead of adversaries
Cybersecurity professionals of all skill levels train with SANS to learn from industry experts and gain hands-on, practical knowledge that can be applied immediately, effectively preparing them for real-world threats.
SANS Institute is GIAC’s preferred partner for exam preparation, offering focused curriculums that help individuals pass with confidence and validate their expertise in various cybersecurity domains.
Fortune 500 companies partner with SANS to recruit, build, and retain high-performing, outcome-driven teams through industry-leading training solutions that bolster cyber resilience.
Equip your team with cutting-edge cybersecurity skills, designed to address your organization’s most critical security needs.
Empower your leaders with strategies that drive better decision-making, stronger risk management, and improved cyber resilience.
Mitigate human risk and ensure compliance with advanced training that addresses evolving threats and security regulations.
Adapt to new SEC mandates with a 10-module training course designed to expand cyber literacy and help leaders facilitate an engaged, united cybersecurity culture.
Join the SANS CISO network, exclusively for senior security executives. Connect with experts and thought leaders, share ideas and lessons learned and help drive industry breakthroughs.
Gain exclusive access to free resources, tools, and expert content—news, training, podcasts, whitepapers, and more. Explore unique member benefits designed for cybersecurity professionals that you won’t find anywhere else.
When you join the SANS community, you gain access to free cybersecurity resources, including free training, 150+ instructor-developed tools, the latest industry updates, and more.
I've been a heavy user of AI since the beginning, but the way that I use AI has recently shifted. In this fast-paced, fun talk, we'll cover the top ways that I've improved my efficiency and productivity by changing the way I interact with AI so far in 2025.
With the breadth of technologies in use across many enterprise organizations today, security analysts need more visibility than ever.
Esta charla describe las tendencias en dichas disciplinas para poder responder de manera eficiente y eficaz antes los cibercriminales.
People often believe that Linux is a “secure” operating system or that they “don’t have much Linux” in their environment, so they “don’t need to worry about it.”
You’ve patched systems and prioritized risk—but if your stakeholders don’t understand what you’re doing or why it matters, progress stalls.
Are you feeling the pressure to do more with less—juggling tool sprawl, alert fatigue, and increasingly sophisticated attacks? Security automation and AI-driven decision support can help streamline operations, enhance accuracy, and accelerate response times.
The classic way to make a massive difference with technology, or “Dent in The Universe,” is via a startup. We can define a startup as a company with high growth possibilities that is innovative and potentially disruptive. This describes most startups in the infosec space. In this talk we’ll discuss startups, including how important having a “great idea” may or may not be, funding options, as well as “exit” strategies.
The widespread adoption of generative AI meant increased productivity for employees, but also for bad actors. They can now create sophisticated email attacks at scale—void of typos and grammatical errors that have become a key indicator of attack.
As cyber threats become increasingly advanced and persistent, traditional perimeter-based defenses are no longer sufficient to protect critical infrastructure.
Today’s cyber threats move fast—and the only way to stay ahead is to think like an attacker. A reactive approach is no longer enough. Organizations need to adopt a proactive, offensive security posture to uncover vulnerabilities before adversaries do.
What are the critical skills that extremely successful infosec professionals need, and how can we develop these? Obviously, technology matters, but it's not just about technology.
Discover how to install and run attacker tools to hunt vulnerabilities in your environment before the pentesters (or attackers!) do.
Prepare for the Next Era of Cloud Security
Cloud adoption continues to grow, and with it, the complexity of securing multiple cloud environments. The SANS 2025 Multicloud Survey will explore how organizations manage security at scale across diverse cloud service providers. This webcast aims to provide insights into survey results, including the tools, techniques, and strategies needed to secure multicloud environments effectively—offering valuable guidance for organizations navigating the complexities of cloud security at scale.
Watch
Did you know that much of your OT security risk comes from indirect effects to networks and operations?
This talk explores the growing threat of illicit crypto mining within enterprise networks.
Water and electric utilities form the backbone of our critical infrastructure, yet they are increasingly targeted by sophisticated cyber attacks aiming to disrupt essential services and threaten public safety. This free virtual event brings together cybersecurity professionals, utility operators, government stakeholders, and industry experts to explore the unique challenges and emerging threats facing the energy and water sectors. Participants will gain insights into recent attack trends, vulnerabilities in operational technology (OT) environments, and practical approaches to strengthening cyber resilience across interconnected systems.
This webinar explores the design and deployment of a robust detection engineering lab—built both on-prem and in the cloud—that enables engineers to simulate real world attacks, validate hypotheses, and rapidly iterate on detection logic.
Join Greg Scheidel as he demystifies the technical foundation of Zero Trust Architecture (ZTA) and outlines the key technologies that drive modern, mature implementations.