SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsEffective Cyber Defense enables organizations to anticipate, withstand, and recover from cyber-attacks through proactive monitoring, threat detection, and incident response. It combines security operations, automation, and resilient architecture to reduce risk and minimize attack impact.
Cyber threats are constant—and defenders must be faster, smarter, and more proactive than their adversaries. At SANS, we train cybersecurity teams to detect, respond to, and outmaneuver attacks using real-world tactics, automation, and resilient infrastructure. Our hands-on cyber defense courses equip professionals with the skills and confidence to minimize risk and build lasting defense strategies in a dynamic threat landscape.
Skillfully and confidently monitor, detect, and respond to cyber threats.
Build resilient systems with security-first design principles that withstand modern attacks.
Streamline detection and response with automation techniques that enhance efficiency and precision.
As usual, SANS courses give incredible insight into the reality of the threats that are present in the cyber world. I have a better understanding of each threat, and the means to mitigate those threats.
Mark Baggett has revolutionized cybersecurity through his leadership at SANS. His development of tools like Freq Server has strengthened threat detection, while his work in automation has empowered professionals to defend against evolving threats.
Learn moreEric Conrad, a SANS Faculty Fellow and course author, has 28 years of information security experience. Eric is the CTO of Backshore Communications and his specialties include Intrusion Detection, Threat Hunting, and Penetration Testing.
Learn moreRich is a seasoned cybersecurity professional with over two decades of experience in the cyber domain. He has participated in offensive and defensive cyber operations for the Department of Defense (DoD) in more than 17 countries.
Learn moreDavid Hoelzer has fundamentally advanced cybersecurity by pioneering the GIAC Security Expert (GSE) certification, leading AI-driven threat detection initiatives, and developing MAVIS, an open-source ML tool enhancing code review processes.
Learn moreJohn redefined modern SOC operations by engineering globally adopted blue team strategies and co-creating the GSOC cert. Through the Blueprint podcast and SANS leadership, he’s unified thousands of defenders around real-world detection tactics.
Learn moreAs a SANS Fellow and Principal Consultant at Context Security, Seth’s work bridges traditional operations with next-gen AI security practices. His pioneering threat detection strategies have shaped global blue team standards.
Learn moreWe are lucky in Infosec. It may not be an easy field to get into, but once you’re in infosec, there is plenty of work available and many work models.
This Attack Surface & Vulnerability Management Survey gathers insights from security leaders, practitioners, and researchers to map out the current state of attack surface and vulnerability management.
Join us to hear how others are succeeding and failing to maintain an operational balance between competing internal priorities and threats which seem to relentlessly improve.
In 2025, with AI and automation everywhere, it’s more important than ever to stay ahead of attackers, arming yourself with clear intelligence, full visibility, and smart processes to catch problems before they become crises.
Many people want to consult so they can choose their work, have more freedom, and have more opportunities to make great money. Yet many never start or start late.
Cybersecurity leaders and compliance professionals are under increasing pressure to meet a growing array of global regulations—all while maintaining effective threat detection and response capabilities. Traditional monitoring is no longer enough. Full Packet Capture (FPC) is rapidly emerging as a foundational requirement—not only for real-time visibility and forensic analysis, but as a direct response to regulatory mandates in the U.S., EU, and beyond.
This talk will use little PowerPoint but instead offer an engaging walk-through of recent events, how they manifested themselves in the ISC's data, how our different data feeds work, and more. A talk not just for packet connoisseurs but for everybody interested in a good story.
In this talk, we'll take a look at an AI pentest report augmentation framework and the hurdles we faced whilst building it.
In this fast-paced, fun talk, we'll cover the top ways that I've improved my efficiency and productivity by changing the way I interact with AI in 2025 and into 2026.
This isn't your typical "don't pay ransoms" talk. We'll explore the harsh realities where business continuity and regulatory pressure create impossible choices, providing practical frameworks for decision-making under duress, technical protocols for verifying attacker claims, and strategies for maintaining leverage when all seems lost.
As adversaries harness AI to deploy polymorphic malware, agentic automation, and high-speed deception, defenders must respond with intelligent, explainable, and resilient threat intelligence systems.
Overview Identity has become the new battleground. From SaaS to cloud to legacy Active Directory, it is now the central control point—and attackers know it.