The question gets asked constantly: a security professional wants to add AI and data science to their toolkit and does not know where to start. The honest answer is that training exists, but the market is fragmented, the quality varies, and most of the loudest offerings are built for data scientists or software engineers, not security practitioners. The translation tax is real.
Here is a direct survey of what actually exists, organized by format and depth, with notes on what each is good for.
Conference Training: Intensive and Expensive
Multi-day workshops at Black Hat, Hack In The Box, and DEF CON are the densest format for adding AI and data science skills quickly. Two to four days, instructor-led, lab-heavy. Cost per hour is high but signal density is high too.
What this format is good for: practitioners who already have security domain expertise and want a compressed onramp. The student walks out with working notebooks, applied feature engineering experience, and a network of peers at the same point in their learning. GTK Cyber teaches four courses at Black Hat USA 2026: Applied Data Science & AI for Cybersecurity, AI Red-Teaming, the AI Cyber Bootcamp, and A Cyber Executive’s Guide for Artificial Intelligence.
What this format is not good for: greenfield learners with no Python comfort. A 2-day intensive assumes you can read and modify scripts. If you cannot, do a Python primer first.
Custom On-Site Training: Corporate and Federal Teams
When a security team needs the same curriculum delivered to their organization, on-site training is the route. The instructor brings the labs and data; the team shows up and works through them. Most boutique training firms (GTK Cyber included) offer this format. The advantage is that the data and threat model can be tuned to the organization: a financial services SOC works with banking-shaped log data and regulatory context; a federal team works with cleared lab environments.
Format is typically 3 to 5 days for an intensive, or a series of half-day sessions spread across a quarter. Cost is per engagement rather than per seat, which makes the per-student economics better than conference training when you have a full team.
Bootcamps: Multi-Week Intensives
Bootcamps run longer than conference training (1 to 4 weeks) and cover more ground. They suit practitioners willing to step away from day-to-day work. GTK Cyber’s AI Cyber Bootcamp is one option in this format. Outside of security, bootcamps from DataCamp and similar platforms cover data science fundamentals but use non-security data, so expect to do your own translation work.
Vendor-Led Training: Tool-Specific Depth
Lakera, HiddenLayer, Protect AI, Prompt Security, and Robust Intelligence run educational programs tied to their products. The training is sharp on the slice each vendor owns (mostly LLM security and runtime defenses). Skills transfer to other tooling but the curriculum bends toward the vendor’s ecosystem. Useful when your organization has bought their product. Less useful as a general foundation.
Self-Paced and Free: Strong Foundation Material
A practitioner can get surprisingly far on free material if they pick the right sources.
- The scikit-learn user guide is the reference for classical ML in Python. Read it cover to cover at least once.
- The Hugging Face NLP course covers transformer models, fine-tuning, and the
transformerslibrary. - pandas documentation and the 10 Minutes to pandas guide cover data wrangling.
- MITRE ATLAS case studies document real-world AI security incidents with techniques mapped to the ATLAS framework (AML.T0051 prompt injection, AML.T0015 model evasion, AML.T0020 data poisoning).
- The OWASP Top 10 for LLM Applications is the working taxonomy for LLM vulnerabilities.
- Jupyter and the Centaur VM (free, Apache 2.0) give you a pre-configured environment without setup overhead.
What self-paced does not give you: realistic security datasets at scale, feedback on your tuning choices, and adversarial scenarios where you need rapid iteration. Pair self-paced foundations with a live intensive once you have the basics.
University and MOOC Programs: General, Not Security-Specific
Coursera, edX, and university certificate programs in data science teach the algorithms with non-security data (Titanic, MNIST, movie reviews). The transfer to security work is real but indirect. A security practitioner who completes Andrew Ng’s Machine Learning course has a foundation, not a job-ready skill set for security work. Use these as supplements to the foundation, not as the primary path.
SANS Institute: Broad Catalog, Variable Depth
SANS has multiple ML and AI-adjacent courses including SEC595 (Applied Data Science and AI/Machine Learning for Cybersecurity Professionals) and related tracks. Large catalog, strong brand recognition, GIAC certification path. Depth-per-day on a single topic is typically less than what smaller specialist firms offer, so SANS works well as one input in a stacked curriculum rather than the only source.
How to Pick Between Them
A working decision framework:
- You need skills in a quarter. Conference training or a bootcamp. Compressed timeline, high signal.
- You are training a whole team. Custom on-site. Per-engagement pricing is friendlier for teams of 5 to 20.
- You are exploring whether this is for you. Start with free self-paced (scikit-learn guide, Hugging Face NLP course). If you finish a project you are proud of, escalate to a paid intensive.
- You need a credential for HR. SANS GIAC if your organization values it. Otherwise prioritize artifacts (working code, public write-ups, conference talks) over certifications.
- You are a CISO or executive. A strategic course like GTK Cyber’s A Cyber Executive’s Guide for Artificial Intelligence is shorter, focused on decision-making and governance rather than Python.
The shortest honest path: do enough self-study to be Python-comfortable with pandas and scikit-learn, then take a hands-on intensive with realistic security data and adversarial labs. GTK Cyber built its course catalog around that gap, with practitioners teaching practitioners. The same evaluation criteria you apply to any other program should apply to ours.