✕ Clear filters
241 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,151📚 Coursera 18,118🏛 Archive.org 58🎤 TED 1
How Secure by Design and Public Partnerships Drive Deterrence: A Conversation with Jen Easterly
🔐 Cybersecurity
How Secure by Design and Public Partnerships Drive Deterrence: A Conversation with Jen Easterly
SANS Institute Intermediate 1w ago
Data Security in the Age of AI: Proactive Strategies to Protect Your Most Valuable Assets
🔐 Cybersecurity
Data Security in the Age of AI: Proactive Strategies to Protect Your Most Valuable Assets
SANS Institute Intermediate 3w ago
Blue Team | Unveiling Insider Threats Beyond the Logs
🔐 Cybersecurity
Blue Team | Unveiling Insider Threats Beyond the Logs
SANS Institute Intermediate 1mo ago
Red Team | MEDSHIELD: Threat Modeling for Medical IoT
🔐 Cybersecurity
Red Team | MEDSHIELD: Threat Modeling for Medical IoT
SANS Institute Intermediate 1mo ago
Red Team | Weaponizing Windows Crash Dumps
🔐 Cybersecurity
Red Team | Weaponizing Windows Crash Dumps
SANS Institute Intermediate 1mo ago
Blue Team | Final Thoughts and Q&A
🔐 Cybersecurity
Blue Team | Final Thoughts and Q&A
SANS Institute Intermediate 1mo ago
Blue Team | Intelligence-Driven Defense for the Real World
🔐 Cybersecurity
Blue Team | Intelligence-Driven Defense for the Real World
SANS Institute Intermediate 1mo ago
Keynote | Blue Team | SOC of the Future…the Future Is Now
🔐 Cybersecurity
Keynote | Blue Team | SOC of the Future…the Future Is Now
SANS Institute Intermediate 1mo ago
Red Team | Subverting macOS Apps and Security Controls
🔐 Cybersecurity
Red Team | Subverting macOS Apps and Security Controls
SANS Institute Intermediate 1mo ago
Blue Team | From Exploit to Risk: Scaling Purple Team Insights
🔐 Cybersecurity
Blue Team | From Exploit to Risk: Scaling Purple Team Insights
SANS Institute Intermediate 1mo ago
Blue Team | Hunting Cloud Persistence Without Malware
🔐 Cybersecurity
Blue Team | Hunting Cloud Persistence Without Malware
SANS Institute Intermediate 1mo ago
Blue Team | Determining Malice Through Context and Analytics
🔐 Cybersecurity
Blue Team | Determining Malice Through Context and Analytics
SANS Institute Intermediate 1mo ago
The 2 AM Call: A Ransomware Negotiator's Playbook with Wade Gettle
🔐 Cybersecurity
The 2 AM Call: A Ransomware Negotiator's Playbook with Wade Gettle
SANS Institute Intermediate 1mo ago
Keynote | Failing Forward: Neurodiversity in Cyber
🔐 Cybersecurity
Keynote | Failing Forward: Neurodiversity in Cyber
SANS Institute Intermediate 1mo ago
AI as a Neurodivergent Ally in Cybersecurity
🔐 Cybersecurity
AI as a Neurodivergent Ally in Cybersecurity
SANS Institute Intermediate 1mo ago
Infiltration Alert! How to Catch Fake IT Employees in Your Network with Zak Stufflebeam
🔐 Cybersecurity
Infiltration Alert! How to Catch Fake IT Employees in Your Network with Zak Stufflebeam
SANS Institute Intermediate 2mo ago
Live Special: Securing the Connected World with Thomas Harvey 
🔐 Cybersecurity
Live Special: Securing the Connected World with Thomas Harvey 
SANS Institute Intermediate 3mo ago
Beyond Best Practice: How We Really Build a Safer Digital World with Curtis Dukes
🔐 Cybersecurity
Beyond Best Practice: How We Really Build a Safer Digital World with Curtis Dukes
SANS Institute Intermediate 3mo ago
MFA: The One Click That Blocks 90% of Hackers
🔐 Cybersecurity
MFA: The One Click That Blocks 90% of Hackers
SANS Institute Intermediate 3mo ago
Free Wi-Fi? Free for Hackers Too.
🔐 Cybersecurity
Free Wi-Fi? Free for Hackers Too.
SANS Institute Intermediate 4mo ago
Job Offer or Job Scam? Watch This Before You Reply
🔐 Cybersecurity
Job Offer or Job Scam? Watch This Before You Reply
SANS Institute Intermediate 4mo ago
Quantum’s Leap: How Cyber Leaders Are Preparing for the Post-Encryption Era with Applied Quantum
🔐 Cybersecurity
Quantum’s Leap: How Cyber Leaders Are Preparing for the Post-Encryption Era with Applied Quantum
SANS Institute Intermediate 4mo ago
Think Before You Click: Phishing Red Flags
🔐 Cybersecurity
Think Before You Click: Phishing Red Flags
SANS Institute Intermediate 4mo ago
Cybersecurity Mythbusters – Volume 1
🔐 Cybersecurity
Cybersecurity Mythbusters – Volume 1
SANS Institute Intermediate 4mo ago
ICS613: ICS/OT Penetration Testing & Assessments
🔐 Cybersecurity
ICS613: ICS/OT Penetration Testing & Assessments
SANS Institute Intermediate 6mo ago
ICS456: Essentials for NERC Critical Infrastructure Protection
🔐 Cybersecurity
ICS456: Essentials for NERC Critical Infrastructure Protection
SANS Institute Intermediate 6mo ago
SANS 2025 Healthcare Forum: Tackling Challenges, Building Cyber Resilience
🔐 Cybersecurity
SANS 2025 Healthcare Forum: Tackling Challenges, Building Cyber Resilience
SANS Institute Intermediate 6mo ago
Supply Chain Forum 2025: Firmware Attacks Expanding the Enterprise Attack Surface
🔐 Cybersecurity
Supply Chain Forum 2025: Firmware Attacks Expanding the Enterprise Attack Surface
SANS Institute Intermediate 8mo ago
The Myth: AI Is Coming for Your Job
🔐 Cybersecurity
The Myth: AI Is Coming for Your Job
SANS Institute Intermediate 9mo ago
Beyond the Patch: Measuring the Unknown in Vulnerability Management
🔐 Cybersecurity
Beyond the Patch: Measuring the Unknown in Vulnerability Management
SANS Institute Intermediate 9mo ago
From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard
🔐 Cybersecurity
From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard
SANS Institute Intermediate 9mo ago
Inside Pacific Rim with Ross McKerchar
🔐 Cybersecurity
Inside Pacific Rim with Ross McKerchar
SANS Institute Intermediate 10mo ago
Keynote | How to Become a CISO
🔐 Cybersecurity
Keynote | How to Become a CISO
SANS Institute Intermediate 10mo ago
CISOs: Your Cyber Program Is A Profit Center, Not A Cost Center
🔐 Cybersecurity
CISOs: Your Cyber Program Is A Profit Center, Not A Cost Center
SANS Institute Intermediate 10mo ago
Who Dares Wins: Effective Crisis Management
🔐 Cybersecurity
Who Dares Wins: Effective Crisis Management
SANS Institute Intermediate 10mo ago
Fireside Chat with Kate Marshall and Helen Oakley
🔐 Cybersecurity
Fireside Chat with Kate Marshall and Helen Oakley
SANS Institute Intermediate 10mo ago
Watching the Watchers: Safeguards and Security for Artificial Intelligence Systems
🔐 Cybersecurity
Watching the Watchers: Safeguards and Security for Artificial Intelligence Systems
SANS Institute Intermediate 10mo ago
Defending AI Models: Strategies for Securing AI Implementations Against Emerging Threats
🔐 Cybersecurity
Defending AI Models: Strategies for Securing AI Implementations Against Emerging Threats
SANS Institute Intermediate 10mo ago
Securing the Grid: AI’s Promise for Cyber Resilience in Power Systems
🔐 Cybersecurity
Securing the Grid: AI’s Promise for Cyber Resilience in Power Systems
SANS Institute Intermediate 10mo ago
Building an AI Pen-Testing Assistant
🔐 Cybersecurity
Building an AI Pen-Testing Assistant
SANS Institute Intermediate 10mo ago
Data to Defense: Generative AI and RAG Powering Real-Time Threat Response
🔐 Cybersecurity
Data to Defense: Generative AI and RAG Powering Real-Time Threat Response
SANS Institute Intermediate 10mo ago
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
🔐 Cybersecurity
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
SANS Institute Intermediate 11mo ago
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
🔐 Cybersecurity
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
SANS Institute Intermediate 11mo ago
Turn Your Hard-Earned Experience into Impact
🔐 Cybersecurity
Turn Your Hard-Earned Experience into Impact
SANS Institute Intermediate 12mo ago
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
🔐 Cybersecurity
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
SANS Institute Intermediate 1y ago
A Day in the Life of a Network Security Engineer | Sanjay Poddar
🔐 Cybersecurity
A Day in the Life of a Network Security Engineer | Sanjay Poddar
SANS Institute Intermediate 1y ago
From IT Support to Cybersecurity Leader: Jay James’ Keynote Journey
🔐 Cybersecurity
From IT Support to Cybersecurity Leader: Jay James’ Keynote Journey
SANS Institute Intermediate 1y ago
Non-Technical to Technical: Breaking into Reverse Engineering | Alex Perotti
🔐 Cybersecurity
Non-Technical to Technical: Breaking into Reverse Engineering | Alex Perotti
SANS Institute Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Network Implementations and Operations
📚 Coursera Course ↗
Self-paced
Network Implementations and Operations
Opens on Coursera ↗
Marketing Management Essentials:The Marketing Plan Structure
📚 Coursera Course ↗
Self-paced
Marketing Management Essentials:The Marketing Plan Structure
Opens on Coursera ↗
Securing Your DevOps Pipelines
📚 Coursera Course ↗
Self-paced
Securing Your DevOps Pipelines
Opens on Coursera ↗
Leadership and Change Management for Sustainability Success
📚 Coursera Course ↗
Self-paced
Leadership and Change Management for Sustainability Success
Opens on Coursera ↗
Advanced Network Security and Analysis
📚 Coursera Course ↗
Self-paced
Advanced Network Security and Analysis
Opens on Coursera ↗
Protection of Information Assets
📚 Coursera Course ↗
Self-paced
Protection of Information Assets
Opens on Coursera ↗