✕ Clear filters
157 lessons

📄 Research Papers Explained

The latest AI papers broken down — attention, RLHF, diffusion, MoE and more

All ▶ YouTube 198,151📚 Coursera 18,118🏛 Archive.org 58🎤 TED 1
Cybersecurity Standards Scorecard (2025 Edition)
📄 Research Papers Explained
Cybersecurity Standards Scorecard (2025 Edition)
SANS Institute Beginner 3w ago
Inside Digital Forensics: Hunting for Truth in the Dark with Heather Barnhart
📄 Research Papers Explained
Inside Digital Forensics: Hunting for Truth in the Dark with Heather Barnhart
SANS Institute Advanced 4mo ago
Panel: Navigating AI-Driven Threats with CISA and HHS: Guidance for Healthcare Leaders
📄 Research Papers Explained
Panel: Navigating AI-Driven Threats with CISA and HHS: Guidance for Healthcare Leaders
SANS Institute Advanced 6mo ago
Bonus Episode: The Human Edge of AI
📄 Research Papers Explained
Bonus Episode: The Human Edge of AI
SANS Institute Advanced 7mo ago
The Cyber Battlefield with Max Smeets
📄 Research Papers Explained
The Cyber Battlefield with Max Smeets
SANS Institute Advanced 9mo ago
Insider Threat with Lisa Forte
📄 Research Papers Explained
Insider Threat with Lisa Forte
SANS Institute Advanced 10mo ago
SANS Threat Analysis Rundown with Katie Nickels | March 2025
📄 Research Papers Explained
SANS Threat Analysis Rundown with Katie Nickels | March 2025
SANS Institute Advanced 1y ago
SANS Threat Analysis Rundown with Katie Nickels | February 2025
📄 Research Papers Explained
SANS Threat Analysis Rundown with Katie Nickels | February 2025
SANS Institute Advanced 1y ago
SANS Research Surveys Sponsorship
📄 Research Papers Explained
SANS Research Surveys Sponsorship
SANS Institute Beginner 1y ago
SANS Research Custom Content Sponsorship
📄 Research Papers Explained
SANS Research Custom Content Sponsorship
SANS Institute Beginner 1y ago
Countering Ransomware with Jen Ellis
📄 Research Papers Explained
Countering Ransomware with Jen Ellis
SANS Institute Beginner 1y ago
Understanding the Geopolitical Landscape of Cyber Security with Shashank Joshi
📄 Research Papers Explained
Understanding the Geopolitical Landscape of Cyber Security with Shashank Joshi
SANS Institute Advanced 1y ago
Into the Looking Glass, Medical Device Cybersecurity | Veronica Schmitt
📄 Research Papers Explained
Into the Looking Glass, Medical Device Cybersecurity | Veronica Schmitt
SANS Institute Advanced 1y ago
Welcome to the SANS Healthcare Forum 2024 | Rich Greene and Stacy D
📄 Research Papers Explained
Welcome to the SANS Healthcare Forum 2024 | Rich Greene and Stacy D
SANS Institute Advanced 1y ago
Healthcare Threat Landscape and Risk Mitigation | Nitin Natarajan, CISA
📄 Research Papers Explained
Healthcare Threat Landscape and Risk Mitigation | Nitin Natarajan, CISA
SANS Institute Advanced 1y ago
Crisis Management in Healthcare | Steve Armstrong-Godwin
📄 Research Papers Explained
Crisis Management in Healthcare | Steve Armstrong-Godwin
SANS Institute Intermediate 1y ago
SANS | GIAC Workforce Report Outcomes Panel Conversation
📄 Research Papers Explained
SANS | GIAC Workforce Report Outcomes Panel Conversation
SANS Institute Intermediate 1y ago
A Story of One Cybersecurity Professional Parenting Two Neurodivergent Youngsters
📄 Research Papers Explained
A Story of One Cybersecurity Professional Parenting Two Neurodivergent Youngsters
SANS Institute Beginner 1y ago
Understanding the New NIS2 Directive: Compliance for EU Businesses
📄 Research Papers Explained
Understanding the New NIS2 Directive: Compliance for EU Businesses
SANS Institute Advanced 1y ago
Infrastructure Architecture & Protection | The 8 Domains of the Cloud Security Maturity Model | Pt 7
📄 Research Papers Explained
Infrastructure Architecture & Protection | The 8 Domains of the Cloud Security Maturity Model | Pt 7
SANS Institute Advanced 1y ago
Detection and Response | The 8 Domains of the Cloud Security Maturity Model | Part 6
📄 Research Papers Explained
Detection and Response | The 8 Domains of the Cloud Security Maturity Model | Part 6
SANS Institute Beginner 1y ago
Application & Workload Protection | The 8 Domains of the Cloud Security Maturity Model | Part 5
📄 Research Papers Explained
Application & Workload Protection | The 8 Domains of the Cloud Security Maturity Model | Part 5
SANS Institute Beginner 1y ago
Security Assurance | The 8 Domains of the Cloud Security Maturity Model | Part 4
📄 Research Papers Explained
Security Assurance | The 8 Domains of the Cloud Security Maturity Model | Part 4
SANS Institute Beginner 1y ago
Unlocking Your Future: Launch Your Careers with SANS Foundations Live Q&A
📄 Research Papers Explained
Unlocking Your Future: Launch Your Careers with SANS Foundations Live Q&A
SANS Institute Advanced 1y ago
2024 Ransomware Trends and Predictions | FEATURE SEGMENT
📄 Research Papers Explained
2024 Ransomware Trends and Predictions | FEATURE SEGMENT
SANS Institute Advanced 2y ago
2024 Cloud Security Trends and Predictions | FEATURE SEGMENT
📄 Research Papers Explained
2024 Cloud Security Trends and Predictions | FEATURE SEGMENT
SANS Institute Advanced 2y ago
2024 Cyber Defense Trends and Predictions | FEATURE SEGMENT
📄 Research Papers Explained
2024 Cyber Defense Trends and Predictions | FEATURE SEGMENT
SANS Institute Advanced 2y ago
Celebrating Cybersecurity Difference Makers | December 19, 2023
📄 Research Papers Explained
Celebrating Cybersecurity Difference Makers | December 19, 2023
SANS Institute Advanced 2y ago
Navigating the Serverless, Containerized, and IaC Vulnerability Management Revolution
📄 Research Papers Explained
Navigating the Serverless, Containerized, and IaC Vulnerability Management Revolution
SANS Institute Beginner 2y ago
Meta Security Review of a Patient Controlled Device | Monta Elkins
📄 Research Papers Explained
Meta Security Review of a Patient Controlled Device | Monta Elkins
SANS Institute Advanced 2y ago
Artificial Intelligence Panel Discussion | David Hoelzer, Robert Wood, and Lee Kim
📄 Research Papers Explained
Artificial Intelligence Panel Discussion | David Hoelzer, Robert Wood, and Lee Kim
SANS Institute Advanced 2y ago
Securing The Patient | Heather Mahalik
📄 Research Papers Explained
Securing The Patient | Heather Mahalik
SANS Institute Advanced 2y ago
SANS Threat Analysis Rundown (STAR) | Live Stream
📄 Research Papers Explained
SANS Threat Analysis Rundown (STAR) | Live Stream
SANS Institute Beginner 2y ago
Understand Vulnerability Management Maturity with a Self-Assessment Tool
📄 Research Papers Explained
Understand Vulnerability Management Maturity with a Self-Assessment Tool
SANS Institute Intermediate 2y ago
Dip a Toe in the ISC Honeypot with Dr. Johannes Ullrich | Graphs & AI with Jess Garcia | May 9, 2023
📄 Research Papers Explained
Dip a Toe in the ISC Honeypot with Dr. Johannes Ullrich | Graphs & AI with Jess Garcia | May 9, 2023
SANS Institute Beginner 2y ago
Wait Just An Infosec @ RSAC 2023:  Dr. Johannes Ullrich
📄 Research Papers Explained
Wait Just An Infosec @ RSAC 2023: Dr. Johannes Ullrich
SANS Institute Advanced 2y ago
Improve Your Cyber Security Culture
📄 Research Papers Explained
Improve Your Cyber Security Culture
SANS Institute Intermediate 2y ago
Pivot! – Success Stories from Career Changers
📄 Research Papers Explained
Pivot! – Success Stories from Career Changers
SANS Institute Beginner 2y ago
SANS Expert Line Up Live from RSAC Conference | April 25, 2023
📄 Research Papers Explained
SANS Expert Line Up Live from RSAC Conference | April 25, 2023
SANS Institute Advanced 2y ago
Meet SANS Certified Instructor: Lodrina Cherne
📄 Research Papers Explained
Meet SANS Certified Instructor: Lodrina Cherne
SANS Institute Intermediate 3y ago
Meet SANS Senior Instructor: Ismael Valenzuela
📄 Research Papers Explained
Meet SANS Senior Instructor: Ismael Valenzuela
SANS Institute Advanced 3y ago
Meet SANS Fellow: Heather Mahalik
📄 Research Papers Explained
Meet SANS Fellow: Heather Mahalik
SANS Institute Advanced 3y ago
Meet SANS Fellow: David Hoelzer
📄 Research Papers Explained
Meet SANS Fellow: David Hoelzer
SANS Institute Advanced 3y ago
2022 CDI Keynote: An Industry on Fire! A Cybersecurity Fireside Chat with Brandon Wales and Rob Lee
📄 Research Papers Explained
2022 CDI Keynote: An Industry on Fire! A Cybersecurity Fireside Chat with Brandon Wales and Rob Lee
SANS Institute Advanced 3y ago
Cybersecurity Standards Scorecard: 2022 Edition
📄 Research Papers Explained
Cybersecurity Standards Scorecard: 2022 Edition
SANS Institute Intermediate 3y ago
Anton Chuvakin: Remapping Mental Models in IT, Security, and  Compliance for the Cloud
📄 Research Papers Explained
Anton Chuvakin: Remapping Mental Models in IT, Security, and Compliance for the Cloud
SANS Institute Intermediate 3y ago
SANS Cyber Solutions Fest 2022 | Explore Topic Tracks
📄 Research Papers Explained
SANS Cyber Solutions Fest 2022 | Explore Topic Tracks
SANS Institute Advanced 3y ago
Quick Wins in Cloud Compliance: AWS
📄 Research Papers Explained
Quick Wins in Cloud Compliance: AWS
SANS Institute Beginner 3y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
The New Nordic Diet - from Gastronomy to Health
📚 Coursera Course ↗
Self-paced
The New Nordic Diet - from Gastronomy to Health
Opens on Coursera ↗
Measuring Disease in Epidemiology
📚 Coursera Course ↗
Self-paced
Measuring Disease in Epidemiology
Opens on Coursera ↗
Introduction to Self-Determination Theory: An approach to motivation, development and wellness
📚 Coursera Course ↗
Self-paced
Introduction to Self-Determination Theory: An approach to motivation, development and wellness
Opens on Coursera ↗
Introduction to Integrative Therapies and Healing Practices
📚 Coursera Course ↗
Self-paced
Introduction to Integrative Therapies and Healing Practices
Opens on Coursera ↗
WebSockets Protocol Explained – Master Web Development
📚 Coursera Course ↗
Self-paced
WebSockets Protocol Explained – Master Web Development
Opens on Coursera ↗
Data Mining Methods
📚 Coursera Course ↗
Self-paced
Data Mining Methods
Opens on Coursera ↗