✕ Clear filters
484 lessons

Intermediate Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,250📚 Coursera 18,118🎤 TED 1
The Art of Blue Teaming
🔐 Cybersecurity
The Art of Blue Teaming
SANS Institute Intermediate 5y ago
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
🔐 Cybersecurity
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
🔐 Cybersecurity
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
WinSCP: Yeah you know me! | SANS@MIC Talk
🔍 RAG & Vector Search
WinSCP: Yeah you know me! | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
🔐 Cybersecurity
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Cloud Native Payloads: A Matryoshka Doll of Exploits | SANS@MIC Talk
🚀 Entrepreneurship & Startups
Cloud Native Payloads: A Matryoshka Doll of Exploits | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Incident Response in ICS in times of Lockdown | SANS@MIC Talk
🔐 Cybersecurity
Incident Response in ICS in times of Lockdown | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Discovering Vulnerabilities Using IDA Scripting - SANS Pen Test HackFest Summit 2019
🔐 Cybersecurity
Discovering Vulnerabilities Using IDA Scripting - SANS Pen Test HackFest Summit 2019
SANS Institute Intermediate 5y ago
Information Security Misconceptions 2020 | SANS@MIC Talk
🔐 Cybersecurity
Information Security Misconceptions 2020 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Driving Cybersecurity Change – Establishing a Culture of Protect, Detect and Respond Highlights
📄 Research Papers Explained
Driving Cybersecurity Change – Establishing a Culture of Protect, Detect and Respond Highlights
SANS Institute Intermediate 5y ago
Self-Compiling Malware | SANS@MIC Talk
🔐 Cybersecurity
Self-Compiling Malware | SANS@MIC Talk
SANS Institute Intermediate 5y ago
C2 Matrix | SANS@MIC Talk
🔐 Cybersecurity
C2 Matrix | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Domain Password Auditing with the Cloud | SANS@MIC Talk
🛡️ AI Safety & Ethics
Domain Password Auditing with the Cloud | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Are You Certifiable? | SANS@MIC Talk
🔐 Cybersecurity
Are You Certifiable? | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Pen Testing ICS and Other Highly Restricted Environments - SANS Pen Test HackFest Summit 2019
🚀 Entrepreneurship & Startups
Pen Testing ICS and Other Highly Restricted Environments - SANS Pen Test HackFest Summit 2019
SANS Institute Intermediate 6y ago
Stealth persistence strategies | SANS@MIC Talk
🔐 Cybersecurity
Stealth persistence strategies | SANS@MIC Talk
SANS Institute Intermediate 6y ago
Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime
🔐 Cybersecurity
Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime
SANS Institute Intermediate 6y ago
Preventing Email Phishing
🛠️ AI Tools & Apps
Preventing Email Phishing
SANS Institute Intermediate 6y ago
Securely Working Remotely
🛠️ AI Tools & Apps
Securely Working Remotely
SANS Institute Intermediate 6y ago
Deployment Kit for Securing Your Workforce at Home
📄 Research Papers Explained
Deployment Kit for Securing Your Workforce at Home
SANS Institute Intermediate 6y ago
Understanding SANS CyberCast - So Much More Than Live Virtual Training
🔐 Cybersecurity
Understanding SANS CyberCast - So Much More Than Live Virtual Training
SANS Institute Intermediate 6y ago
OUTMANEUVER: Changing the Attack Surface
🔐 Cybersecurity
OUTMANEUVER: Changing the Attack Surface
SANS Institute Intermediate 6y ago
OUTPERFORM: Strategies to Get in Front of Attacks
🔐 Cybersecurity
OUTPERFORM: Strategies to Get in Front of Attacks
SANS Institute Intermediate 6y ago
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
🔐 Cybersecurity
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
SANS Institute Intermediate 6y ago
Serverless Security: Attackers and Defenders | SANS Cloud Security Summit 2019
🏗️ Systems Design & Architecture
Serverless Security: Attackers and Defenders | SANS Cloud Security Summit 2019
SANS Institute Intermediate 6y ago
Cloud Security Automation: From Infrastructure to App | SANS Cloud Security Summit 2019
🔍 RAG & Vector Search
Cloud Security Automation: From Infrastructure to App | SANS Cloud Security Summit 2019
SANS Institute Intermediate 6y ago
The State of Cloud Security: How Does Your Organization Compare? | SANS Cloud Security Summit 2019
🔐 Cybersecurity
The State of Cloud Security: How Does Your Organization Compare? | SANS Cloud Security Summit 2019
SANS Institute Intermediate 6y ago
Who Done It? Gaining Visibility and Accountability in the Cloud | SANS Cloud Security Summit
🛠️ AI Tools & Apps
Who Done It? Gaining Visibility and Accountability in the Cloud | SANS Cloud Security Summit
SANS Institute Intermediate 6y ago
SANS Institute & Trace Labs partner on an OSINT Missing Persons CTF challenge at SANS CDI 2019
🔐 Cybersecurity
SANS Institute & Trace Labs partner on an OSINT Missing Persons CTF challenge at SANS CDI 2019
SANS Institute Intermediate 6y ago
Mental Models for Effective Searching | SANS Security Operations Summit 2019
🛡️ AI Safety & Ethics
Mental Models for Effective Searching | SANS Security Operations Summit 2019
SANS Institute Intermediate 6y ago
Lessons Learned Applying ATT&CK-Based SOC Assessments | SANS Security Operations Summit 2019
🔍 RAG & Vector Search
Lessons Learned Applying ATT&CK-Based SOC Assessments | SANS Security Operations Summit 2019
SANS Institute Intermediate 6y ago
Security Awareness Recognition Program | SANS Security Awareness Summit
🔐 Cybersecurity
Security Awareness Recognition Program | SANS Security Awareness Summit
SANS Institute Intermediate 6y ago
The Creative Process Behind Fun, Low-Budget Videos | SANS Security Awareness Summit
🛡️ AI Safety & Ethics
The Creative Process Behind Fun, Low-Budget Videos | SANS Security Awareness Summit
SANS Institute Intermediate 6y ago
How to Build Your Own Escape Room | SANS Security Awareness Summit
🔐 Cybersecurity
How to Build Your Own Escape Room | SANS Security Awareness Summit
SANS Institute Intermediate 6y ago
What sets SANS apart from other cyber security training providers
🔐 Cybersecurity
What sets SANS apart from other cyber security training providers
SANS Institute Intermediate 6y ago
Classifying Evil: Lessons from Hunting Human Traffickers | SANS Threat Hunting & IR Summit
📊 Data Analytics & Business Intelligence
Classifying Evil: Lessons from Hunting Human Traffickers | SANS Threat Hunting & IR Summit
SANS Institute Intermediate 6y ago
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
🔐 Cybersecurity
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
SANS Institute Intermediate 6y ago
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
🔐 Cybersecurity
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
SANS Institute Intermediate 6y ago
Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 2019
🔐 Cybersecurity
Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 2019
SANS Institute Intermediate 6y ago
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
🔐 Cybersecurity
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
SANS Institute Intermediate 6y ago
Threat Hunting via Sysmon - SANS Blue Team Summit
📰 AI News & Updates
Threat Hunting via Sysmon - SANS Blue Team Summit
SANS Institute Intermediate 6y ago
Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019
📣 Digital Marketing & Growth
Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019
SANS Institute Intermediate 6y ago
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
🔐 Cybersecurity
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
SANS Institute Intermediate 6y ago
OSINT: Not Just Offensive - SANS Blue Team Summit
🔍 RAG & Vector Search
OSINT: Not Just Offensive - SANS Blue Team Summit
SANS Institute Intermediate 6y ago
Defeating Attackers with Preventative Security
🔐 Cybersecurity
Defeating Attackers with Preventative Security
SANS Institute Intermediate 6y ago
Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
🔐 Cybersecurity
Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
SANS Institute Intermediate 6y ago
Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
🔐 Cybersecurity
Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
SANS Institute Intermediate 6y ago
Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
🔐 Cybersecurity
Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
SANS Institute Intermediate 6y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
OpenAI: Consistent Response Strategies
📚 Coursera Course ↗
Self-paced
OpenAI: Consistent Response Strategies
Opens on Coursera ↗
Track Brand Awareness
📚 Coursera Course ↗
Self-paced
Track Brand Awareness
Opens on Coursera ↗
Introduction to Detection and Incident Response
📚 Coursera Course ↗
Self-paced
Introduction to Detection and Incident Response
Opens on Coursera ↗
Building Smart Chatbots with LangChain
📚 Coursera Course ↗
Self-paced
Building Smart Chatbots with LangChain
Opens on Coursera ↗
Construction Aspects of Formwork
📚 Coursera Course ↗
Self-paced
Construction Aspects of Formwork
Opens on Coursera ↗
Managing Network Traffic with QoS
📚 Coursera Course ↗
Self-paced
Managing Network Traffic with QoS
Opens on Coursera ↗