✕ Clear filters
303 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,151📚 Coursera 18,118🏛 Archive.org 58🎤 TED 1
SANS Share Your Story: How SEC401 Builds Your Security Foundation with Genie-Rose Luluquisin
🔐 Cybersecurity
SANS Share Your Story: How SEC401 Builds Your Security Foundation with Genie-Rose Luluquisin
SANS Institute Beginner 1w ago
Red Team | Looting Credentials from Modern Browsers
🔐 Cybersecurity
Red Team | Looting Credentials from Modern Browsers
SANS Institute Beginner 1mo ago
SANS Share Your Story: Becoming a Cross-Functional Leader with Dr. Natalie Foster Johnson
🔐 Cybersecurity
SANS Share Your Story: Becoming a Cross-Functional Leader with Dr. Natalie Foster Johnson
SANS Institute Beginner 1mo ago
Panel | Global Views on Neuroinclusion
🔐 Cybersecurity
Panel | Global Views on Neuroinclusion
SANS Institute Beginner 1mo ago
Why Cybersecurity Is Anything But Boring
🔐 Cybersecurity
Why Cybersecurity Is Anything But Boring
SANS Institute Beginner 4mo ago
Cybersecurity Mythbusters – Volume 2
🔐 Cybersecurity
Cybersecurity Mythbusters – Volume 2
SANS Institute Beginner 4mo ago
AWS Keynote: AI for Security, and Security for AI
🔐 Cybersecurity
AWS Keynote: AI for Security, and Security for AI
SANS Institute Beginner 5mo ago
What is a Cyber Range
🔐 Cybersecurity
What is a Cyber Range
SANS Institute Beginner 5mo ago
ICS310: ICS Cybersecurity Foundations
🔐 Cybersecurity
ICS310: ICS Cybersecurity Foundations
SANS Institute Beginner 6mo ago
Leading by Example: Confidence and Responsibility in Cybersecurity with Zak Stufflebeam
🔐 Cybersecurity
Leading by Example: Confidence and Responsibility in Cybersecurity with Zak Stufflebeam
SANS Institute Beginner 7mo ago
Supply Chain Forum 2025: Advancing Transparency with the BOM Maturity Model
🔐 Cybersecurity
Supply Chain Forum 2025: Advancing Transparency with the BOM Maturity Model
SANS Institute Beginner 8mo ago
Fighting Back with John Hubbard
🔐 Cybersecurity
Fighting Back with John Hubbard
SANS Institute Beginner 9mo ago
AI Security Demystified
🔐 Cybersecurity
AI Security Demystified
SANS Institute Beginner 10mo ago
Believing in Yourself to Lead Your Team
🔐 Cybersecurity
Believing in Yourself to Lead Your Team
SANS Institute Beginner 10mo ago
AI Security Made Easy
🔐 Cybersecurity
AI Security Made Easy
SANS Institute Beginner 10mo ago
Giving Back to the Cybersecurity Community Through Teaching
🔐 Cybersecurity
Giving Back to the Cybersecurity Community Through Teaching
SANS Institute Beginner 11mo ago
Level Up Your Security Team Through Automation
🔐 Cybersecurity
Level Up Your Security Team Through Automation
SANS Institute Beginner 11mo ago
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
🔐 Cybersecurity
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
SANS Institute Beginner 11mo ago
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
🔐 Cybersecurity
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
SANS Institute Beginner 11mo ago
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
🔐 Cybersecurity
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
SANS Institute Beginner 11mo ago
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
🔐 Cybersecurity
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
SANS Institute Beginner 11mo ago
From TV news to cybersecurity: the 5 steps I took to completely change careers
🔐 Cybersecurity
From TV news to cybersecurity: the 5 steps I took to completely change careers
SANS Institute Beginner 11mo ago
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
🔐 Cybersecurity
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
SANS Institute Beginner 11mo ago
Understanding Continuous Threat Exposure Management (CTEM) | Jonathan Risto
🔐 Cybersecurity
Understanding Continuous Threat Exposure Management (CTEM) | Jonathan Risto
SANS Institute Beginner 1y ago
Ask the Authors: The Foundations and Future of ICS/OT Security
🔐 Cybersecurity
Ask the Authors: The Foundations and Future of ICS/OT Security
SANS Institute Beginner 1y ago
Sponsorship Opportunities at SANS Cyber Fest
🔐 Cybersecurity
Sponsorship Opportunities at SANS Cyber Fest
SANS Institute Beginner 1y ago
Sponsorship Opportunities at SANS Summits
🔐 Cybersecurity
Sponsorship Opportunities at SANS Summits
SANS Institute Beginner 1y ago
Inside the World of Cyber Threat Intelligence with Ondra Rojcik
🔐 Cybersecurity
Inside the World of Cyber Threat Intelligence with Ondra Rojcik
SANS Institute Beginner 1y ago
Empowering the Future of Cybersecurity: Women Leading the Way
🔐 Cybersecurity
Empowering the Future of Cybersecurity: Women Leading the Way
SANS Institute Beginner 1y ago
Level Up Your Cyber Skills with the KC7 Threat Hunter CTF | New2Cyber Summit 2025
🔐 Cybersecurity
Level Up Your Cyber Skills with the KC7 Threat Hunter CTF | New2Cyber Summit 2025
SANS Institute Beginner 1y ago
Break Into Cybersecurity Through Cyber-Adjacent Roles | Aaron Yerian
🔐 Cybersecurity
Break Into Cybersecurity Through Cyber-Adjacent Roles | Aaron Yerian
SANS Institute Beginner 1y ago
Break Into Cybersecurity with the New2Cyber Summit 2025!
🔐 Cybersecurity
Break Into Cybersecurity with the New2Cyber Summit 2025!
SANS Institute Beginner 1y ago
Kickstart Your Cyber Journey with the 2025 New2Cyber Summit! 🚀
🔐 Cybersecurity
Kickstart Your Cyber Journey with the 2025 New2Cyber Summit! 🚀
SANS Institute Beginner 1y ago
SANS Threat Analysis Rundown with Katie Nickels | December 2024
🔐 Cybersecurity
SANS Threat Analysis Rundown with Katie Nickels | December 2024
SANS Institute Beginner 1y ago
CyberThreat 2024 Recap: Highlights, CTF Competition, and Key Insights
🔐 Cybersecurity
CyberThreat 2024 Recap: Highlights, CTF Competition, and Key Insights
SANS Institute Beginner 1y ago
Leading Global Cybersecurity with Christine Bejerasco
🔐 Cybersecurity
Leading Global Cybersecurity with Christine Bejerasco
SANS Institute Beginner 1y ago
From Compliance to Leadership: What Every CISO Needs to Know
🔐 Cybersecurity
From Compliance to Leadership: What Every CISO Needs to Know
SANS Institute Beginner 1y ago
Lightning Talk: AI for SOC Teams - Enhancing Incident Response and Vulnerability Management
🔐 Cybersecurity
Lightning Talk: AI for SOC Teams - Enhancing Incident Response and Vulnerability Management
SANS Institute Beginner 1y ago
SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition
🔐 Cybersecurity
SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition
SANS Institute Beginner 1y ago
SANS Compliance Countdown 2024
🔐 Cybersecurity
SANS Compliance Countdown 2024
SANS Institute Beginner 1y ago
SANS Threat Analysis Rundown with Katie Nickels
🔐 Cybersecurity
SANS Threat Analysis Rundown with Katie Nickels
SANS Institute Beginner 1y ago
Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4
🔐 Cybersecurity
Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4
SANS Institute Beginner 1y ago
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
🔐 Cybersecurity
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
SANS Institute Beginner 1y ago
For the Win: Aligning Security Initiatives with the Business
🔐 Cybersecurity
For the Win: Aligning Security Initiatives with the Business
SANS Institute Beginner 1y ago
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
🔐 Cybersecurity
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
SANS Institute Beginner 1y ago
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
🔐 Cybersecurity
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
SANS Institute Beginner 1y ago
Expertise isn't all you need - Building an AI Red Team
🔐 Cybersecurity
Expertise isn't all you need - Building an AI Red Team
SANS Institute Beginner 1y ago
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
🔐 Cybersecurity
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
SANS Institute Beginner 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Advanced Threat Intelligence Techniques
📚 Coursera Course ↗
Self-paced
Advanced Threat Intelligence Techniques
Opens on Coursera ↗
Cybersecurity Fundamentals for High-Tech Manufacturing
📚 Coursera Course ↗
Self-paced
Cybersecurity Fundamentals for High-Tech Manufacturing
Opens on Coursera ↗
Cloud Computing Security - Bachelor's
📚 Coursera Course ↗
Self-paced
Cloud Computing Security - Bachelor's
Opens on Coursera ↗
Introduction to Penetration Testing and Ethical Hacking
📚 Coursera Course ↗
Self-paced
Introduction to Penetration Testing and Ethical Hacking
Opens on Coursera ↗
Cybersecurity Job Search, Resume, and Interview Prep
📚 Coursera Course ↗
Self-paced
Cybersecurity Job Search, Resume, and Interview Prep
Opens on Coursera ↗
Security Foundations, Threats, and Network Protection
📚 Coursera Course ↗
Self-paced
Security Foundations, Threats, and Network Protection
Opens on Coursera ↗