Applied Data Science for Cyber Security
This interactive course will teach security professionals how to use data science techniques to quickly manipulate and analyze network and security data and ultimately, uncover valuable insights. You will learn how to read data in common formats and write scripts to analyze and visualize that data. Topics range from data preparation and machine learning to model evaluation, optimization and implementation—at scale.
Classes are limited. Get registered!
Learn the following key skills:
Finally, you will be introduced to cutting edge Big Data tools including Apache Spark (PySpark), Apache Drill, and GPU accelerated parallel computing frameworks and learn how to apply these techniques to extremely large datasets.
All skill levels
Columbia, MD (East Coast) San Francisco, CA (West Coast)
5 days, 40 hours
If you're in network security and have been thinking of getting into data science... this course is for you. However, this course is also designed for data scientist who have wanted to get into Cybersecurity. We teach fundamental to advanced Data Science and how to apply it to Cybersecurity.
Students should bring a laptop with either: Virtualbox (or VMWare) installed, 6GB of RAM and 10GB of storage. Anaconda and IPython installed.
Why choose the Center for Cyber Security Training
Interactive, classroom-based learning
Subject matter experts
Trusted by US government agencies
The knowledge I gained through this course was substantial. From learning new script writing techniques to understanding big data tools, the instructor covered everything I was hoping for and more!
- Sarah H., Washington, DC
Want more information?
Download the Applied Data Science for Cyber Security course outline now.
Upcoming Training Sessions
March 16-20, 2020 June 8-12, 2020 September 7-11, 2020
Classes are limited.
Our classroom delivers the most in-demand content from the highest profile subject matter experts. Intense and interactive, our courses prepare students with actionable insight and proven strategies.
Physical Penetration Testing
In this intense five-day course, students will learn a variety of covert techniques used to enter secure commercial facilities. From lock picking and key decoding to RFID cloning and alarm sensor bypassing, students who demonstrate hands-on proficiency in key tactics will earn a Certificate of Completion.
Exploit Development Bootcamp & Advanced
Our three-day Bootcamp will teach both basic & advanced techniques from a leading exploit developer. In our Advanced course, experienced students will learn how to write exploits that bypass modern memory protections for the Win32 platform in a fast-paced, interactive learning environment.