✕ Clear filters
504 lessons

Beginner Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,285📚 Coursera 18,118🎤 TED 1
Create Your Own Awareness Videos at Home | Kerry Tomlinson
📰 AI News & Updates
Create Your Own Awareness Videos at Home | Kerry Tomlinson
SANS Institute Beginner 5y ago
A Step-by-Step Guide to Engaging a Global Workforce With Podcasts | Paige Ishii
🛠️ AI Tools & Apps
A Step-by-Step Guide to Engaging a Global Workforce With Podcasts | Paige Ishii
SANS Institute Beginner 5y ago
Becoming the Adversary: Creating a Defensive Lab to Understand the Offense
🔐 Cybersecurity
Becoming the Adversary: Creating a Defensive Lab to Understand the Offense
SANS Institute Beginner 5y ago
The 20 Critical Security Controls: From Framework to Operational to Implementation
🔐 Cybersecurity
The 20 Critical Security Controls: From Framework to Operational to Implementation
SANS Institute Beginner 5y ago
SANS Security Awareness Learning Management System - Litmos
🔐 Cybersecurity
SANS Security Awareness Learning Management System - Litmos
SANS Institute Beginner 5y ago
Cleaning Up Our Cyber Hygiene
🔐 Cybersecurity
Cleaning Up Our Cyber Hygiene
SANS Institute Beginner 5y ago
10 Visibility Gaps Every CISO Must Fill | SANS@MIC Talk
📄 Research Papers Explained
10 Visibility Gaps Every CISO Must Fill | SANS@MIC Talk
SANS Institute Beginner 5y ago
How to Present Cyber Security Risk to Senior Leadership | SANS Webcast
📄 Research Papers Explained
How to Present Cyber Security Risk to Senior Leadership | SANS Webcast
SANS Institute Beginner 5y ago
Course Preview: Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
📄 Research Papers Explained
Course Preview: Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
SANS Institute Beginner 5y ago
Welcome to SANS Community CTF - Services Challenges
🔐 Cybersecurity
Welcome to SANS Community CTF - Services Challenges
SANS Institute Beginner 5y ago
Defending Lift and Shift Cloud Applications | SANS@MIC Talk
🔐 Cybersecurity
Defending Lift and Shift Cloud Applications | SANS@MIC Talk
SANS Institute Beginner 5y ago
Untapped Potential - SANS Blue Team Summit 2020
🔐 Cybersecurity
Untapped Potential - SANS Blue Team Summit 2020
SANS Institute Beginner 5y ago
Cyber Security Career Development: Personal Branding
🖌️ UI/UX Design
Cyber Security Career Development: Personal Branding
SANS Institute Beginner 5y ago
Arcane Web and Mobile Application Vulnerabilities | SANS@MIC Talk
🔐 Cybersecurity
Arcane Web and Mobile Application Vulnerabilities | SANS@MIC Talk
SANS Institute Beginner 5y ago
A Walk Through Logs Hell | SANS@MIC Talk
🔐 Cybersecurity
A Walk Through Logs Hell | SANS@MIC Talk
SANS Institute Beginner 5y ago
Introducing Blueprint
🔐 Cybersecurity
Introducing Blueprint
SANS Institute Beginner 5y ago
Waiting for a cyber range exercise is not enough | SANS@MIC Talk
🔐 Cybersecurity
Waiting for a cyber range exercise is not enough | SANS@MIC Talk
SANS Institute Beginner 5y ago
Case Study: Airbus
🔍 RAG & Vector Search
Case Study: Airbus
SANS Institute Beginner 5y ago
Introduction to Docker for security work | SANS@MIC Talk
🔍 RAG & Vector Search
Introduction to Docker for security work | SANS@MIC Talk
SANS Institute Beginner 5y ago
Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk
🔐 Cybersecurity
Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk
SANS Institute Beginner 5y ago
SANS – Your Source for Cybersecurity Training – Live Online
🔐 Cybersecurity
SANS – Your Source for Cybersecurity Training – Live Online
SANS Institute Beginner 5y ago
Coalfire penetration testers charged with criminal trespass | SANS@MIC Talk
🔐 Cybersecurity
Coalfire penetration testers charged with criminal trespass | SANS@MIC Talk
SANS Institute Beginner 5y ago
Course Preview: Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
📄 Research Papers Explained
Course Preview: Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
SANS Institute Beginner 5y ago
Accessing Data in the Cloud | SANS@MIC Talk
🔐 Cybersecurity
Accessing Data in the Cloud | SANS@MIC Talk
SANS Institute Beginner 5y ago
Reflections of a New CISO: 5 Lessons Learned | SANS@MIC Talk
🔐 Cybersecurity
Reflections of a New CISO: 5 Lessons Learned | SANS@MIC Talk
SANS Institute Beginner 5y ago
Modern Domain Deception - Risks, Limits and potentiality | SANS@MIC Talk
🔐 Cybersecurity
Modern Domain Deception - Risks, Limits and potentiality | SANS@MIC Talk
SANS Institute Beginner 5y ago
What Students Are Saying About SANS Live Online - New SANS Training Platform
📣 Digital Marketing & Growth
What Students Are Saying About SANS Live Online - New SANS Training Platform
SANS Institute Beginner 5y ago
Learning From The Adversary: Automated Malware Analysis For The Win! | SANS@MIC Talk
🔐 Cybersecurity
Learning From The Adversary: Automated Malware Analysis For The Win! | SANS@MIC Talk
SANS Institute Beginner 5y ago
SANS Live Online - New Online Training Platform
📣 Digital Marketing & Growth
SANS Live Online - New Online Training Platform
SANS Institute Beginner 5y ago
Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
📄 Research Papers Explained
Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
SANS Institute Beginner 5y ago
Check out SEC573! More Python3! More Pywars! | SANS@MIC Talk
🔐 Cybersecurity
Check out SEC573! More Python3! More Pywars! | SANS@MIC Talk
SANS Institute Beginner 5y ago
Take Back The Advantage - Cyber Deception for the Win | SANS@MIC Talk
🔐 Cybersecurity
Take Back The Advantage - Cyber Deception for the Win | SANS@MIC Talk
SANS Institute Beginner 5y ago
ZOMG It's ZOOM! - Don't worry, it's safe.  As long as you follow some rules. - SANS Webcast
🔐 Cybersecurity
ZOMG It's ZOOM! - Don't worry, it's safe. As long as you follow some rules. - SANS Webcast
SANS Institute Beginner 5y ago
What Every Pen Tester Needs to Know About ICS
🛡️ AI Safety & Ethics
What Every Pen Tester Needs to Know About ICS
SANS Institute Beginner 5y ago
Real-Time OSINT: Investigating Events as They Happen | SANS OSINT Summit 2020
🔐 Cybersecurity
Real-Time OSINT: Investigating Events as They Happen | SANS OSINT Summit 2020
SANS Institute Beginner 6y ago
How I Learned to Stop Worrying and Love TLS | SANS@MIC Talk
📄 Research Papers Explained
How I Learned to Stop Worrying and Love TLS | SANS@MIC Talk
SANS Institute Beginner 6y ago
Creating a Cyber Secure Home
🖌️ UI/UX Design
Creating a Cyber Secure Home
SANS Institute Beginner 6y ago
Detecting and Defending Social Engineering Attacks
📰 AI News & Updates
Detecting and Defending Social Engineering Attacks
SANS Institute Beginner 6y ago
OUTFIGHT: Leveraging Automation & Machine Learning
📐 ML Fundamentals
OUTFIGHT: Leveraging Automation & Machine Learning
SANS Institute Beginner 6y ago
This Will Never Work: Tales from Disappointingly Successful Pen Tests | SANS SOC Summit 2019
🔐 Cybersecurity
This Will Never Work: Tales from Disappointingly Successful Pen Tests | SANS SOC Summit 2019
SANS Institute Beginner 6y ago
Rapid Recognition and Response to Rogues | SANS Security Operations Summit 2019
🔐 Cybersecurity
Rapid Recognition and Response to Rogues | SANS Security Operations Summit 2019
SANS Institute Beginner 6y ago
Learning from Breach Reports to Improve Cross-platform Endpoint Monitoring | SANS SOC Summit 2019
📄 Research Papers Explained
Learning from Breach Reports to Improve Cross-platform Endpoint Monitoring | SANS SOC Summit 2019
SANS Institute Beginner 6y ago
Keep it Flexible: How Cloud Makes it Easier and Harder to Detect Bad Stuff | SANS Cloud Summit
🏗️ Systems Design & Architecture
Keep it Flexible: How Cloud Makes it Easier and Harder to Detect Bad Stuff | SANS Cloud Summit
SANS Institute Beginner 6y ago
What you Need To Know About The Critical Citrix Gateway (Netscaler) Vulnerability CVE-2019-19781
📰 AI News & Updates
What you Need To Know About The Critical Citrix Gateway (Netscaler) Vulnerability CVE-2019-19781
SANS Institute Beginner 6y ago
Introducing Core NetWars Continuous 2
🔐 Cybersecurity
Introducing Core NetWars Continuous 2
SANS Institute Beginner 6y ago
Not giving credit where credit is due - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Not giving credit where credit is due - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Including details most readers don't need - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Including details most readers don't need - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Escalating tensions in difficult situations - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Escalating tensions in difficult situations - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction to User Experience Principles and Processes
📚 Coursera Course ↗
Self-paced
Introduction to User Experience Principles and Processes
Opens on Coursera ↗
Exploratory Data Analysis with MATLAB
📚 Coursera Course ↗
Self-paced
Exploratory Data Analysis with MATLAB
Opens on Coursera ↗
Introduction to DevSecOps
📚 Coursera Course ↗
Self-paced
Introduction to DevSecOps
Opens on Coursera ↗
Get Sponsorships And Brand Deals For Business Or Influencers
📚 Coursera Course ↗
Self-paced
Get Sponsorships And Brand Deals For Business Or Influencers
Opens on Coursera ↗
Setting Up Cost Control with Quota
📚 Coursera Course ↗
Self-paced
Setting Up Cost Control with Quota
Opens on Coursera ↗
Advanced Network Attacks, Web Hacking, and Cryptography
📚 Coursera Course ↗
Self-paced
Advanced Network Attacks, Web Hacking, and Cryptography
Opens on Coursera ↗