✕ Clear filters
504 lessons

Beginner Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,243📚 Coursera 18,118🎤 TED 1
Value of Mentorship: Building a Better Approach to Support Neurodiversity in Cybersecurity
🧠 Large Language Models
Value of Mentorship: Building a Better Approach to Support Neurodiversity in Cybersecurity
SANS Institute Beginner 1y ago
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
🔐 Cybersecurity
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
SANS Institute Beginner 1y ago
The Autistic Advantage: Thriving in Cybersecurity
🧠 Large Language Models
The Autistic Advantage: Thriving in Cybersecurity
SANS Institute Beginner 1y ago
Workforce Readiness | The 8 Domains of the Cloud Security Maturity Model | Part 8
🛡️ AI Safety & Ethics
Workforce Readiness | The 8 Domains of the Cloud Security Maturity Model | Part 8
SANS Institute Beginner 1y ago
Cyber Wars: The Legal Force Awakens
🛡️ AI Safety & Ethics
Cyber Wars: The Legal Force Awakens
SANS Institute Beginner 1y ago
Detection and Response | The 8 Domains of the Cloud Security Maturity Model | Part 6
📄 Research Papers Explained
Detection and Response | The 8 Domains of the Cloud Security Maturity Model | Part 6
SANS Institute Beginner 1y ago
Understanding the New NIS2 Directive: Compliance for EU Businesses
📊 Data Analytics & Business Intelligence
Understanding the New NIS2 Directive: Compliance for EU Businesses
SANS Institute Beginner 1y ago
Application & Workload Protection | The 8 Domains of the Cloud Security Maturity Model | Part 5
📄 Research Papers Explained
Application & Workload Protection | The 8 Domains of the Cloud Security Maturity Model | Part 5
SANS Institute Beginner 1y ago
Part 1 - The Achilles Systems Hack Assessment Series: Breach or Blueprint?
🤖 AI Agents & Automation
Part 1 - The Achilles Systems Hack Assessment Series: Breach or Blueprint?
SANS Institute Beginner 1y ago
Security Assurance | The 8 Domains of the Cloud Security Maturity Model | Part 4
📄 Research Papers Explained
Security Assurance | The 8 Domains of the Cloud Security Maturity Model | Part 4
SANS Institute Beginner 1y ago
For the Win: Aligning Security Initiatives with the Business
🔐 Cybersecurity
For the Win: Aligning Security Initiatives with the Business
SANS Institute Beginner 1y ago
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
🔐 Cybersecurity
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
SANS Institute Beginner 1y ago
Supply Chain Compromises Pt. 1 | The Incident Commander Series Ep. 3
📰 AI News & Updates
Supply Chain Compromises Pt. 1 | The Incident Commander Series Ep. 3
SANS Institute Beginner 1y ago
Top Five Trends in CISO Leadership
🧠 Large Language Models
Top Five Trends in CISO Leadership
SANS Institute Beginner 1y ago
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
🔐 Cybersecurity
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
SANS Institute Beginner 1y ago
Learn to Manage Human Risk | LDR433 Training
🛡️ AI Safety & Ethics
Learn to Manage Human Risk | LDR433 Training
SANS Institute Beginner 1y ago
Masterclass with Leading CISOs: Elevating Cybersecurity Talent
🛡️ AI Safety & Ethics
Masterclass with Leading CISOs: Elevating Cybersecurity Talent
SANS Institute Beginner 1y ago
Meet Concierge
🧠 Large Language Models
Meet Concierge
SANS Institute Beginner 1y ago
Expertise isn't all you need - Building an AI Red Team
🔐 Cybersecurity
Expertise isn't all you need - Building an AI Red Team
SANS Institute Beginner 1y ago
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
🔐 Cybersecurity
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
SANS Institute Beginner 1y ago
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
🔐 Cybersecurity
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
SANS Institute Beginner 1y ago
Data Protection | The 8 Domains of the Cloud Security Maturity Model | Part 1
🔐 Cybersecurity
Data Protection | The 8 Domains of the Cloud Security Maturity Model | Part 1
SANS Institute Beginner 1y ago
The 8 Domains of the Cloud Security Maturity Model | Overview
🔐 Cybersecurity
The 8 Domains of the Cloud Security Maturity Model | Overview
SANS Institute Beginner 1y ago
Panel | Your First Cyber Role: Aspiring Cybersecurity Professional to Employed
📰 AI News & Updates
Panel | Your First Cyber Role: Aspiring Cybersecurity Professional to Employed
SANS Institute Beginner 1y ago
Panel | Paving Our Own Path: Leveraging Diverse Perspectives to a Successful Career in Cybersecurity
🧠 Large Language Models
Panel | Paving Our Own Path: Leveraging Diverse Perspectives to a Successful Career in Cybersecurity
SANS Institute Beginner 1y ago
Breaking the Mold: How Two Women from Non-Technical Backgrounds Broke into Cybersecurity.
🔐 Cybersecurity
Breaking the Mold: How Two Women from Non-Technical Backgrounds Broke into Cybersecurity.
SANS Institute Beginner 1y ago
Detection Engineers Unveiled: A Day in the Life and the Path to This Exciting Career
🔐 Cybersecurity
Detection Engineers Unveiled: A Day in the Life and the Path to This Exciting Career
SANS Institute Beginner 1y ago
SANS New2Cyber Summit 2024 Lightning Talk 3 | Social Engineering
🎨 Image & Video AI
SANS New2Cyber Summit 2024 Lightning Talk 3 | Social Engineering
SANS Institute Beginner 1y ago
New2Cyber en Espanol: Automatizando su salida de las cosas aburridas para los analistas de seguridad
🛡️ AI Safety & Ethics
New2Cyber en Espanol: Automatizando su salida de las cosas aburridas para los analistas de seguridad
SANS Institute Beginner 1y ago
Day in the Life of a CTI Engineer
🔐 Cybersecurity
Day in the Life of a CTI Engineer
SANS Institute Beginner 1y ago
Build a Pro-Level Detection Engineering Strategy | SOC Success Pt. 2
🔐 Cybersecurity
Build a Pro-Level Detection Engineering Strategy | SOC Success Pt. 2
SANS Institute Beginner 1y ago
Introduction to AI and Leveraging it in Cybersecurity
🛡️ AI Safety & Ethics
Introduction to AI and Leveraging it in Cybersecurity
SANS Institute Beginner 1y ago
Incident Response VS Incident Management | The Incident Commander Series Ep. 1
🔐 Cybersecurity
Incident Response VS Incident Management | The Incident Commander Series Ep. 1
SANS Institute Beginner 1y ago
The Amazingly Scary XZ SSHD Backdoor
🔍 RAG & Vector Search
The Amazingly Scary XZ SSHD Backdoor
SANS Institute Beginner 1y ago
SEC401 Security Essentials: Whose Next-Gen Lab is it Anyway?
🛡️ AI Safety & Ethics
SEC401 Security Essentials: Whose Next-Gen Lab is it Anyway?
SANS Institute Beginner 1y ago
Generative AI Insights with SANS Fellow, Frank Kim
🚀 Entrepreneurship & Startups
Generative AI Insights with SANS Fellow, Frank Kim
SANS Institute Beginner 2y ago
Elite SOC Teams Rely on These 4 Steps for Defensive Success | Pt.1 SOC Success
🔐 Cybersecurity
Elite SOC Teams Rely on These 4 Steps for Defensive Success | Pt.1 SOC Success
SANS Institute Beginner 2y ago
Introducing SANS Executive Cybersecurity Exercises
🔐 Cybersecurity
Introducing SANS Executive Cybersecurity Exercises
SANS Institute Beginner 2y ago
Fred Bret-Mounet: Eating Pasta and Not Building Fort Knox
🛠️ AI Tools & Apps
Fred Bret-Mounet: Eating Pasta and Not Building Fort Knox
SANS Institute Beginner 2y ago
Applying the Science of Human Behavior to Cybersecurity
🔐 Cybersecurity
Applying the Science of Human Behavior to Cybersecurity
SANS Institute Beginner 2y ago
SANS Institute's Lance Spitzner Breaks Down the New White House AI Executive Order
📰 AI News & Updates
SANS Institute's Lance Spitzner Breaks Down the New White House AI Executive Order
SANS Institute Beginner 2y ago
Navigating the Serverless, Containerized, and IaC Vulnerability Management Revolution
📄 Research Papers Explained
Navigating the Serverless, Containerized, and IaC Vulnerability Management Revolution
SANS Institute Beginner 2y ago
Let's Settle This in the Cyber Range | Host: Ed Skoudis | October 24, 2023
🔐 Cybersecurity
Let's Settle This in the Cyber Range | Host: Ed Skoudis | October 24, 2023
SANS Institute Beginner 2y ago
Defending Your Business Against Ransomware & Cyber Extortion | Host: Ryan Chapman
🔐 Cybersecurity
Defending Your Business Against Ransomware & Cyber Extortion | Host: Ryan Chapman
SANS Institute Beginner 2y ago
To Click or Not to Click? | Host: Lodrina Cherne | October 3, 2023
🔐 Cybersecurity
To Click or Not to Click? | Host: Lodrina Cherne | October 3, 2023
SANS Institute Beginner 2y ago
Guidance on Leading the Cloud Security Journey
🔐 Cybersecurity
Guidance on Leading the Cloud Security Journey
SANS Institute Beginner 2y ago
Tackling Cyber Threats in Healthcare | 2023 SANS Healthcare Forum
🔐 Cybersecurity
Tackling Cyber Threats in Healthcare | 2023 SANS Healthcare Forum
SANS Institute Beginner 2y ago
Cybersecurity Catalysts: The Difference Makers | Host: Rob T. Lee
🔐 Cybersecurity
Cybersecurity Catalysts: The Difference Makers | Host: Rob T. Lee
SANS Institute Beginner 2y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
AI-Powered Development with Codepal: Write & Test To-Do App
📚 Coursera Course ↗
Self-paced
AI-Powered Development with Codepal: Write & Test To-Do App
Opens on Coursera ↗
CCNA Foundations – Networking Basics and Cisco IOS Essentials
📚 Coursera Course ↗
Self-paced
CCNA Foundations – Networking Basics and Cisco IOS Essentials
Opens on Coursera ↗
Introducing Data Analytics and Analytical Thinking
📚 Coursera Course ↗
Self-paced
Introducing Data Analytics and Analytical Thinking
Opens on Coursera ↗
GenAI for Fraud Detection and Compliance
📚 Coursera Course ↗
Self-paced
GenAI for Fraud Detection and Compliance
Opens on Coursera ↗
Exam MS-100 Microsoft 365 Identity and Services Course
📚 Coursera Course ↗
Self-paced
Exam MS-100 Microsoft 365 Identity and Services Course
Opens on Coursera ↗
SwiftUI iOS 16 Crash Course - Emoji Quote App in SwiftUI
📚 Coursera Course ↗
Self-paced
SwiftUI iOS 16 Crash Course - Emoji Quote App in SwiftUI
Opens on Coursera ↗