✕ Clear filters
104 lessons

📄 Research Papers Explained

The latest AI papers broken down — attention, RLHF, diffusion, MoE and more

All ▶ YouTube 198,226📚 Coursera 18,118🎤 TED 1
Inside Digital Forensics: Hunting for Truth in the Dark with Heather Barnhart
📄 Research Papers Explained
Inside Digital Forensics: Hunting for Truth in the Dark with Heather Barnhart
SANS Institute Advanced 4mo ago
Panel: Navigating AI-Driven Threats with CISA and HHS: Guidance for Healthcare Leaders
📄 Research Papers Explained
Panel: Navigating AI-Driven Threats with CISA and HHS: Guidance for Healthcare Leaders
SANS Institute Advanced 6mo ago
Bonus Episode: The Human Edge of AI
📄 Research Papers Explained
Bonus Episode: The Human Edge of AI
SANS Institute Advanced 7mo ago
The Cyber Battlefield with Max Smeets
📄 Research Papers Explained
The Cyber Battlefield with Max Smeets
SANS Institute Advanced 9mo ago
Insider Threat with Lisa Forte
📄 Research Papers Explained
Insider Threat with Lisa Forte
SANS Institute Advanced 10mo ago
SANS Threat Analysis Rundown with Katie Nickels | March 2025
📄 Research Papers Explained
SANS Threat Analysis Rundown with Katie Nickels | March 2025
SANS Institute Advanced 1y ago
SANS Threat Analysis Rundown with Katie Nickels | February 2025
📄 Research Papers Explained
SANS Threat Analysis Rundown with Katie Nickels | February 2025
SANS Institute Advanced 1y ago
Understanding the Geopolitical Landscape of Cyber Security with Shashank Joshi
📄 Research Papers Explained
Understanding the Geopolitical Landscape of Cyber Security with Shashank Joshi
SANS Institute Advanced 1y ago
Into the Looking Glass, Medical Device Cybersecurity | Veronica Schmitt
📄 Research Papers Explained
Into the Looking Glass, Medical Device Cybersecurity | Veronica Schmitt
SANS Institute Advanced 1y ago
Welcome to the SANS Healthcare Forum 2024 | Rich Greene and Stacy D
📄 Research Papers Explained
Welcome to the SANS Healthcare Forum 2024 | Rich Greene and Stacy D
SANS Institute Advanced 1y ago
Healthcare Threat Landscape and Risk Mitigation | Nitin Natarajan, CISA
📄 Research Papers Explained
Healthcare Threat Landscape and Risk Mitigation | Nitin Natarajan, CISA
SANS Institute Advanced 1y ago
Understanding the New NIS2 Directive: Compliance for EU Businesses
📄 Research Papers Explained
Understanding the New NIS2 Directive: Compliance for EU Businesses
SANS Institute Advanced 1y ago
Infrastructure Architecture & Protection | The 8 Domains of the Cloud Security Maturity Model | Pt 7
📄 Research Papers Explained
Infrastructure Architecture & Protection | The 8 Domains of the Cloud Security Maturity Model | Pt 7
SANS Institute Advanced 1y ago
Unlocking Your Future: Launch Your Careers with SANS Foundations Live Q&A
📄 Research Papers Explained
Unlocking Your Future: Launch Your Careers with SANS Foundations Live Q&A
SANS Institute Advanced 1y ago
2024 Ransomware Trends and Predictions | FEATURE SEGMENT
📄 Research Papers Explained
2024 Ransomware Trends and Predictions | FEATURE SEGMENT
SANS Institute Advanced 2y ago
2024 Cloud Security Trends and Predictions | FEATURE SEGMENT
📄 Research Papers Explained
2024 Cloud Security Trends and Predictions | FEATURE SEGMENT
SANS Institute Advanced 2y ago
2024 Cyber Defense Trends and Predictions | FEATURE SEGMENT
📄 Research Papers Explained
2024 Cyber Defense Trends and Predictions | FEATURE SEGMENT
SANS Institute Advanced 2y ago
Celebrating Cybersecurity Difference Makers | December 19, 2023
📄 Research Papers Explained
Celebrating Cybersecurity Difference Makers | December 19, 2023
SANS Institute Advanced 2y ago
Meta Security Review of a Patient Controlled Device | Monta Elkins
📄 Research Papers Explained
Meta Security Review of a Patient Controlled Device | Monta Elkins
SANS Institute Advanced 2y ago
Artificial Intelligence Panel Discussion | David Hoelzer, Robert Wood, and Lee Kim
📄 Research Papers Explained
Artificial Intelligence Panel Discussion | David Hoelzer, Robert Wood, and Lee Kim
SANS Institute Advanced 2y ago
Securing The Patient | Heather Mahalik
📄 Research Papers Explained
Securing The Patient | Heather Mahalik
SANS Institute Advanced 2y ago
Wait Just An Infosec @ RSAC 2023:  Dr. Johannes Ullrich
📄 Research Papers Explained
Wait Just An Infosec @ RSAC 2023: Dr. Johannes Ullrich
SANS Institute Advanced 2y ago
SANS Expert Line Up Live from RSAC Conference | April 25, 2023
📄 Research Papers Explained
SANS Expert Line Up Live from RSAC Conference | April 25, 2023
SANS Institute Advanced 2y ago
Meet SANS Senior Instructor: Ismael Valenzuela
📄 Research Papers Explained
Meet SANS Senior Instructor: Ismael Valenzuela
SANS Institute Advanced 3y ago
Meet SANS Fellow: Heather Mahalik
📄 Research Papers Explained
Meet SANS Fellow: Heather Mahalik
SANS Institute Advanced 3y ago
Meet SANS Fellow: David Hoelzer
📄 Research Papers Explained
Meet SANS Fellow: David Hoelzer
SANS Institute Advanced 3y ago
2022 CDI Keynote: An Industry on Fire! A Cybersecurity Fireside Chat with Brandon Wales and Rob Lee
📄 Research Papers Explained
2022 CDI Keynote: An Industry on Fire! A Cybersecurity Fireside Chat with Brandon Wales and Rob Lee
SANS Institute Advanced 3y ago
SANS Cyber Solutions Fest 2022 | Explore Topic Tracks
📄 Research Papers Explained
SANS Cyber Solutions Fest 2022 | Explore Topic Tracks
SANS Institute Advanced 3y ago
"Crime Time" | Rethinking Ransomware and How to Disrupt It
📄 Research Papers Explained
"Crime Time" | Rethinking Ransomware and How to Disrupt It
SANS Institute Advanced 3y ago
David Hoelzer: Threat Detection with Machine Learning and AI
📄 Research Papers Explained
David Hoelzer: Threat Detection with Machine Learning and AI
SANS Institute Advanced 3y ago
Blueprint Podcast Live
📄 Research Papers Explained
Blueprint Podcast Live
SANS Institute Advanced 3y ago
ICS Fireside Chat- Vulnerability Research Team Lean, Claroty
📄 Research Papers Explained
ICS Fireside Chat- Vulnerability Research Team Lean, Claroty
SANS Institute Advanced 3y ago
SANS Emergency Webcast MSDT (MS Word) Zero-day - analysis and remediation
📄 Research Papers Explained
SANS Emergency Webcast MSDT (MS Word) Zero-day - analysis and remediation
SANS Institute Advanced 3y ago
Black Swans, Gray Rhinos, and Pink Elephants: Why We Should Think More Slowly About Cybersecurity
📄 Research Papers Explained
Black Swans, Gray Rhinos, and Pink Elephants: Why We Should Think More Slowly About Cybersecurity
SANS Institute Advanced 3y ago
Critical Infrastructure Protection– Part 4 of 4 SANS Emerging Cyber Guidance to Ukraine-Russia War
📄 Research Papers Explained
Critical Infrastructure Protection– Part 4 of 4 SANS Emerging Cyber Guidance to Ukraine-Russia War
SANS Institute Advanced 4y ago
Cyber Defense & Threat Hunting – Part 3 of 4 SANS Emerging Cyber Guidance to the Ukraine-Russia War
📄 Research Papers Explained
Cyber Defense & Threat Hunting – Part 3 of 4 SANS Emerging Cyber Guidance to the Ukraine-Russia War
SANS Institute Advanced 4y ago
Russia’s Cyber Capabilities – Part 1 of 4 SANS Emerging Cyber Guidance to the Ukraine-Russia War
📄 Research Papers Explained
Russia’s Cyber Capabilities – Part 1 of 4 SANS Emerging Cyber Guidance to the Ukraine-Russia War
SANS Institute Advanced 4y ago
Emerging Cyber Guidance to the Ukraine-Russia War
📄 Research Papers Explained
Emerging Cyber Guidance to the Ukraine-Russia War
SANS Institute Advanced 4y ago
Communicating Cyber to the Board Should Not Be Scary - Cybersecurity Leadership Summit 2021
📄 Research Papers Explained
Communicating Cyber to the Board Should Not Be Scary - Cybersecurity Leadership Summit 2021
SANS Institute Advanced 4y ago
Your Calling Card: Building Your Cybersecurity Leadership Brand: Part 4
📄 Research Papers Explained
Your Calling Card: Building Your Cybersecurity Leadership Brand: Part 4
SANS Institute Advanced 4y ago
Your Calling Card: Building Your Cybersecurity Leadership Brand: Part 3
📄 Research Papers Explained
Your Calling Card: Building Your Cybersecurity Leadership Brand: Part 3
SANS Institute Advanced 4y ago
Your Calling Card: Building Your Cybersecurity Leadership Brand: Part 2
📄 Research Papers Explained
Your Calling Card: Building Your Cybersecurity Leadership Brand: Part 2
SANS Institute Advanced 4y ago
Your Calling Card: Building Your Cybersecurity Leadership Brand: Part 1
📄 Research Papers Explained
Your Calling Card: Building Your Cybersecurity Leadership Brand: Part 1
SANS Institute Advanced 4y ago
Top 5 Things CISOs Need to Know About Privacy - Cybersecurity Leadership Summit 2021
📄 Research Papers Explained
Top 5 Things CISOs Need to Know About Privacy - Cybersecurity Leadership Summit 2021
SANS Institute Advanced 4y ago
Translating Cyber Risk into Business Risk - Cybersecurity Leadership Summit 2021
📄 Research Papers Explained
Translating Cyber Risk into Business Risk - Cybersecurity Leadership Summit 2021
SANS Institute Advanced 4y ago
Culture, Collaboration, & Empathy for Cyber Security Leaders - Cybersecurity Leadership Summit 2021
📄 Research Papers Explained
Culture, Collaboration, & Empathy for Cyber Security Leaders - Cybersecurity Leadership Summit 2021
SANS Institute Advanced 4y ago
Panel: Hack Your Growth - #LevelUP
📄 Research Papers Explained
Panel: Hack Your Growth - #LevelUP
SANS Institute Advanced 4y ago
Job Role Spotlight: Cyber Threat Intelligence
📄 Research Papers Explained
Job Role Spotlight: Cyber Threat Intelligence
SANS Institute Advanced 4y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cómo Invertir en Cripto
📚 Coursera Course ↗
Self-paced
Cómo Invertir en Cripto
Opens on Coursera ↗
Signaling actions of small molecules
📚 Coursera Course ↗
Self-paced
Signaling actions of small molecules
Opens on Coursera ↗
Investments II: Lessons and Applications for Investors
📚 Coursera Course ↗
Self-paced
Investments II: Lessons and Applications for Investors
Opens on Coursera ↗
Hands-on quantum error correction with Google Quantum AI
📚 Coursera Course ↗
Self-paced
Hands-on quantum error correction with Google Quantum AI
Opens on Coursera ↗
Hydrogen: Key Concepts and Use in Green Technologies
📚 Coursera Course ↗
Self-paced
Hydrogen: Key Concepts and Use in Green Technologies
Opens on Coursera ↗
The OSINT Handbook: Mastering Open Source Intelligence
📚 Coursera Course ↗
Self-paced
The OSINT Handbook: Mastering Open Source Intelligence
Opens on Coursera ↗