✕ Clear filters
484 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,243📚 Coursera 18,118🎤 TED 1
The Myth: The Cloud is Less Secure Than Traditional On-Premises Environments
🛡️ AI Safety & Ethics
The Myth: The Cloud is Less Secure Than Traditional On-Premises Environments
SANS Institute Intermediate 9mo ago
The Myth: If Nothing Bad has Happened, We’re Secure
🛡️ AI Safety & Ethics
The Myth: If Nothing Bad has Happened, We’re Secure
SANS Institute Intermediate 9mo ago
The Myth: AI Is Coming for Your Job
🔐 Cybersecurity
The Myth: AI Is Coming for Your Job
SANS Institute Intermediate 9mo ago
Stay Ahead of Ransomware: How Threat Actor Profiling Can Help Prevent Ransomware Attacks
🛡️ AI Safety & Ethics
Stay Ahead of Ransomware: How Threat Actor Profiling Can Help Prevent Ransomware Attacks
SANS Institute Intermediate 9mo ago
Beyond the Patch: Measuring the Unknown in Vulnerability Management
🔐 Cybersecurity
Beyond the Patch: Measuring the Unknown in Vulnerability Management
SANS Institute Intermediate 9mo ago
From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard
🔐 Cybersecurity
From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard
SANS Institute Intermediate 9mo ago
Redefining Security Operations: Lessons in AI Integration with James Spiteri
🧠 Large Language Models
Redefining Security Operations: Lessons in AI Integration with James Spiteri
SANS Institute Intermediate 9mo ago
Securing the Supply Chain with Christine Gadsby
🛡️ AI Safety & Ethics
Securing the Supply Chain with Christine Gadsby
SANS Institute Intermediate 9mo ago
Sink or Swim: Riding the Rising Tide of AI
🛡️ AI Safety & Ethics
Sink or Swim: Riding the Rising Tide of AI
SANS Institute Intermediate 10mo ago
Vulnerability Chaining in the Age of AI
🛠️ AI Tools & Apps
Vulnerability Chaining in the Age of AI
SANS Institute Intermediate 10mo ago
Securing Communications in the Human Supply Chain
🛡️ AI Safety & Ethics
Securing Communications in the Human Supply Chain
SANS Institute Intermediate 10mo ago
The Robs: Fireside Chat
🤖 AI Agents & Automation
The Robs: Fireside Chat
SANS Institute Intermediate 10mo ago
From Assistant to Adversary: When Agentic AI Becomes an Insider Threat
🤖 AI Agents & Automation
From Assistant to Adversary: When Agentic AI Becomes an Insider Threat
SANS Institute Intermediate 10mo ago
Preparing for the Quantum Threat: Practical Steps for Cybersecurity Teams
🧠 Large Language Models
Preparing for the Quantum Threat: Practical Steps for Cybersecurity Teams
SANS Institute Intermediate 10mo ago
Inside Pacific Rim with Ross McKerchar
🔐 Cybersecurity
Inside Pacific Rim with Ross McKerchar
SANS Institute Intermediate 10mo ago
Keynote | How to Become a CISO
🔐 Cybersecurity
Keynote | How to Become a CISO
SANS Institute Intermediate 10mo ago
CISOs: Your Cyber Program Is A Profit Center, Not A Cost Center
🔐 Cybersecurity
CISOs: Your Cyber Program Is A Profit Center, Not A Cost Center
SANS Institute Intermediate 10mo ago
Bridging The Gap: The Playbook Of A BISO
🛡️ AI Safety & Ethics
Bridging The Gap: The Playbook Of A BISO
SANS Institute Intermediate 10mo ago
Who Dares Wins: Effective Crisis Management
🔐 Cybersecurity
Who Dares Wins: Effective Crisis Management
SANS Institute Intermediate 10mo ago
The Fifth Domain: NATO’s Cyber Frontline with Manfred Boudreaux-Dehmer
🛡️ AI Safety & Ethics
The Fifth Domain: NATO’s Cyber Frontline with Manfred Boudreaux-Dehmer
SANS Institute Intermediate 10mo ago
SANS Cyber Leaders Season 2 Trailer
🛡️ AI Safety & Ethics
SANS Cyber Leaders Season 2 Trailer
SANS Institute Intermediate 10mo ago
The Five Must-Haves of an AI Governance Framework
🛡️ AI Safety & Ethics
The Five Must-Haves of an AI Governance Framework
SANS Institute Intermediate 10mo ago
Fireside Chat with Kate Marshall and Helen Oakley
🔐 Cybersecurity
Fireside Chat with Kate Marshall and Helen Oakley
SANS Institute Intermediate 10mo ago
AI in the Crosshairs: Exploring Novel Attacks on AWS AI as a Service
🛠️ AI Tools & Apps
AI in the Crosshairs: Exploring Novel Attacks on AWS AI as a Service
SANS Institute Intermediate 10mo ago
The Dark Side of AI: Developing Unsecure Applications in Minutes!
🛠️ AI Tools & Apps
The Dark Side of AI: Developing Unsecure Applications in Minutes!
SANS Institute Intermediate 10mo ago
Watching the Watchers: Safeguards and Security for Artificial Intelligence Systems
🔐 Cybersecurity
Watching the Watchers: Safeguards and Security for Artificial Intelligence Systems
SANS Institute Intermediate 10mo ago
Defending AI Models: Strategies for Securing AI Implementations Against Emerging Threats
🔐 Cybersecurity
Defending AI Models: Strategies for Securing AI Implementations Against Emerging Threats
SANS Institute Intermediate 10mo ago
Unlocking Cyber Insights with AI: Using ML and LLMs for Next-Gen Analysis
🧠 Large Language Models
Unlocking Cyber Insights with AI: Using ML and LLMs for Next-Gen Analysis
SANS Institute Intermediate 10mo ago
Securing the Grid: AI’s Promise for Cyber Resilience in Power Systems
🔐 Cybersecurity
Securing the Grid: AI’s Promise for Cyber Resilience in Power Systems
SANS Institute Intermediate 10mo ago
Building an AI Pen-Testing Assistant
🔐 Cybersecurity
Building an AI Pen-Testing Assistant
SANS Institute Intermediate 10mo ago
Data to Defense: Generative AI and RAG Powering Real-Time Threat Response
🔐 Cybersecurity
Data to Defense: Generative AI and RAG Powering Real-Time Threat Response
SANS Institute Intermediate 10mo ago
Influence Operations with AI and Cyber-Enabled Ops
🔍 RAG & Vector Search
Influence Operations with AI and Cyber-Enabled Ops
SANS Institute Intermediate 10mo ago
The AI Security Gap: Addressing the Unique Vulnerabilities of GenAI-Based Applications
📰 AI News & Updates
The AI Security Gap: Addressing the Unique Vulnerabilities of GenAI-Based Applications
SANS Institute Intermediate 10mo ago
SANS360 Talks | 5 Tips for Using GenAl in DFIR
🛠️ AI Tools & Apps
SANS360 Talks | 5 Tips for Using GenAl in DFIR
SANS Institute Intermediate 10mo ago
SANS360 Talks | GenAl risks to your business and strategies to avoid common pitfalls
🛠️ AI Tools & Apps
SANS360 Talks | GenAl risks to your business and strategies to avoid common pitfalls
SANS Institute Intermediate 10mo ago
SANS360 Talks | Change the Game: Build an Al Powered SOC
🛠️ AI Tools & Apps
SANS360 Talks | Change the Game: Build an Al Powered SOC
SANS Institute Intermediate 10mo ago
SANS360 Talks | Dancing with Al: Navigating the Cybersecurity Choreography
🛠️ AI Tools & Apps
SANS360 Talks | Dancing with Al: Navigating the Cybersecurity Choreography
SANS Institute Intermediate 10mo ago
SANS Threat Analysis Rundown with Katie Nickels | April 2025
🛠️ AI Tools & Apps
SANS Threat Analysis Rundown with Katie Nickels | April 2025
SANS Institute Intermediate 11mo ago
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
🔐 Cybersecurity
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
SANS Institute Intermediate 11mo ago
Keynote | Keys to Charting Your Own Course: Thriving Beyond Traditional Paths
🛡️ AI Safety & Ethics
Keynote | Keys to Charting Your Own Course: Thriving Beyond Traditional Paths
SANS Institute Intermediate 11mo ago
Lightning Talk | Navigating AI in Cybersecurity: Essential Skills
🛡️ AI Safety & Ethics
Lightning Talk | Navigating AI in Cybersecurity: Essential Skills
SANS Institute Intermediate 11mo ago
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
🔐 Cybersecurity
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
SANS Institute Intermediate 11mo ago
Turn Your Hard-Earned Experience into Impact
🔐 Cybersecurity
Turn Your Hard-Earned Experience into Impact
SANS Institute Intermediate 12mo ago
The State of Ransomware Payments
🛡️ AI Safety & Ethics
The State of Ransomware Payments
SANS Institute Intermediate 12mo ago
SOC Dashboards Done Right with Ryan Thompson
🛠️ AI Tools & Apps
SOC Dashboards Done Right with Ryan Thompson
SANS Institute Intermediate 1y ago
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
🔐 Cybersecurity
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
SANS Institute Intermediate 1y ago
How to Manage Cybersecurity Information Overload | Kirk Carter
📰 AI News & Updates
How to Manage Cybersecurity Information Overload | Kirk Carter
SANS Institute Intermediate 1y ago
The Anatomy of a Cyber Attack | Jonathan Mann
📰 AI News & Updates
The Anatomy of a Cyber Attack | Jonathan Mann
SANS Institute Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Introduction to TCP/IP
📚 Coursera Course ↗
Self-paced
Introduction to TCP/IP
Opens on Coursera ↗
Foundations of ML & Python for Data Science
📚 Coursera Course ↗
Self-paced
Foundations of ML & Python for Data Science
Opens on Coursera ↗
Apply Google Ads for Campaign Setup and Optimization
📚 Coursera Course ↗
Self-paced
Apply Google Ads for Campaign Setup and Optimization
Opens on Coursera ↗
Linux Security Basics and Beyond: Unit 3
📚 Coursera Course ↗
Self-paced
Linux Security Basics and Beyond: Unit 3
Opens on Coursera ↗
 Python for Beginners: Data Structures
📚 Coursera Course ↗
Self-paced
Python for Beginners: Data Structures
Opens on Coursera ↗
Designing a MEMS-Based Sensor for Exhaled Breath Analysis
📚 Coursera Course ↗
Self-paced
Designing a MEMS-Based Sensor for Exhaled Breath Analysis
Opens on Coursera ↗