✕ Clear filters
670 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,250📚 Coursera 18,118🎤 TED 1
SANS Security Awareness Learning Management System - Litmos
🔐 Cybersecurity
SANS Security Awareness Learning Management System - Litmos
SANS Institute Beginner 5y ago
Cleaning Up Our Cyber Hygiene
🔐 Cybersecurity
Cleaning Up Our Cyber Hygiene
SANS Institute Beginner 5y ago
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
🔐 Cybersecurity
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
A Machine Learning Primer for the Blue Team
🔐 Cybersecurity
A Machine Learning Primer for the Blue Team
SANS Institute Intermediate 5y ago
No SQL Injection in MongoDB Applications | SANS@MIC Talk
🔐 Cybersecurity
No SQL Injection in MongoDB Applications | SANS@MIC Talk
SANS Institute Advanced 5y ago
Git'ing Users for OSINT: Analysis of All GitHub Users | SANS@MIC Talk
🔐 Cybersecurity
Git'ing Users for OSINT: Analysis of All GitHub Users | SANS@MIC Talk
SANS Institute Advanced 5y ago
Welcome to SANS Community CTF - Services Challenges
🔐 Cybersecurity
Welcome to SANS Community CTF - Services Challenges
SANS Institute Beginner 5y ago
The 14 Absolute Truths of Security | SANS@MIC Talk
🔐 Cybersecurity
The 14 Absolute Truths of Security | SANS@MIC Talk
SANS Institute Advanced 5y ago
Understanding and Applying Threat Intelligence
🔐 Cybersecurity
Understanding and Applying Threat Intelligence
SANS Institute Intermediate 5y ago
Defending Lift and Shift Cloud Applications | SANS@MIC Talk
🔐 Cybersecurity
Defending Lift and Shift Cloud Applications | SANS@MIC Talk
SANS Institute Beginner 5y ago
#LevelUpLabs | SANS@MIC Talk
🔐 Cybersecurity
#LevelUpLabs | SANS@MIC Talk
SANS Institute Advanced 5y ago
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
🔐 Cybersecurity
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
SANS Institute Advanced 5y ago
Threat Hunting via DNS | SANS@MIC Talk
🔐 Cybersecurity
Threat Hunting via DNS | SANS@MIC Talk
SANS Institute Advanced 5y ago
No SQL Injection in MongoDB Applications | SANS@MIC Talk
🔐 Cybersecurity
No SQL Injection in MongoDB Applications | SANS@MIC Talk
SANS Institute Advanced 5y ago
Untapped Potential - SANS Blue Team Summit 2020
🔐 Cybersecurity
Untapped Potential - SANS Blue Team Summit 2020
SANS Institute Beginner 5y ago
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
🔐 Cybersecurity
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
SANS Institute Advanced 5y ago
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
🔐 Cybersecurity
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
🔐 Cybersecurity
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Arcane Web and Mobile Application Vulnerabilities | SANS@MIC Talk
🔐 Cybersecurity
Arcane Web and Mobile Application Vulnerabilities | SANS@MIC Talk
SANS Institute Beginner 5y ago
A Walk Through Logs Hell | SANS@MIC Talk
🔐 Cybersecurity
A Walk Through Logs Hell | SANS@MIC Talk
SANS Institute Beginner 5y ago
Shock to the System: Re-Evaluating Your Security Operations
🔐 Cybersecurity
Shock to the System: Re-Evaluating Your Security Operations
SANS Institute Intermediate 5y ago
The Art of Blue Teaming
🔐 Cybersecurity
The Art of Blue Teaming
SANS Institute Intermediate 5y ago
Shellcode Analysis 101 | SANS@MIC Talk
🔐 Cybersecurity
Shellcode Analysis 101 | SANS@MIC Talk
SANS Institute Advanced 5y ago
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
🔐 Cybersecurity
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
SANS Institute Advanced 5y ago
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
🔐 Cybersecurity
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
🔐 Cybersecurity
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Introducing Blueprint
🔐 Cybersecurity
Introducing Blueprint
SANS Institute Beginner 5y ago
Waiting for a cyber range exercise is not enough | SANS@MIC Talk
🔐 Cybersecurity
Waiting for a cyber range exercise is not enough | SANS@MIC Talk
SANS Institute Beginner 5y ago
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
🔐 Cybersecurity
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
SANS Institute Advanced 5y ago
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
🔐 Cybersecurity
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Find_Evil - Threat Hunting | SANS@MIC Talk
🔐 Cybersecurity
Find_Evil - Threat Hunting | SANS@MIC Talk
SANS Institute Advanced 5y ago
Tricking modern endpoint security products | SANS@MIC Talk
🔐 Cybersecurity
Tricking modern endpoint security products | SANS@MIC Talk
SANS Institute Advanced 5y ago
Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk
🔐 Cybersecurity
Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk
SANS Institute Beginner 5y ago
Incident Response in ICS in times of Lockdown | SANS@MIC Talk
🔐 Cybersecurity
Incident Response in ICS in times of Lockdown | SANS@MIC Talk
SANS Institute Intermediate 5y ago
SANS – Your Source for Cybersecurity Training – Live Online
🔐 Cybersecurity
SANS – Your Source for Cybersecurity Training – Live Online
SANS Institute Beginner 5y ago
Coalfire penetration testers charged with criminal trespass | SANS@MIC Talk
🔐 Cybersecurity
Coalfire penetration testers charged with criminal trespass | SANS@MIC Talk
SANS Institute Beginner 5y ago
Discovering Vulnerabilities Using IDA Scripting - SANS Pen Test HackFest Summit 2019
🔐 Cybersecurity
Discovering Vulnerabilities Using IDA Scripting - SANS Pen Test HackFest Summit 2019
SANS Institute Intermediate 5y ago
The Hackers Apprentice | SANS@MIC Talk
🔐 Cybersecurity
The Hackers Apprentice | SANS@MIC Talk
SANS Institute Advanced 5y ago
Information Security Misconceptions 2020 | SANS@MIC Talk
🔐 Cybersecurity
Information Security Misconceptions 2020 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Accessing Data in the Cloud | SANS@MIC Talk
🔐 Cybersecurity
Accessing Data in the Cloud | SANS@MIC Talk
SANS Institute Beginner 5y ago
Reflections of a New CISO: 5 Lessons Learned | SANS@MIC Talk
🔐 Cybersecurity
Reflections of a New CISO: 5 Lessons Learned | SANS@MIC Talk
SANS Institute Beginner 5y ago
Modern Domain Deception - Risks, Limits and potentiality | SANS@MIC Talk
🔐 Cybersecurity
Modern Domain Deception - Risks, Limits and potentiality | SANS@MIC Talk
SANS Institute Beginner 5y ago
Learning From The Adversary: Automated Malware Analysis For The Win! | SANS@MIC Talk
🔐 Cybersecurity
Learning From The Adversary: Automated Malware Analysis For The Win! | SANS@MIC Talk
SANS Institute Beginner 5y ago
Self-Compiling Malware | SANS@MIC Talk
🔐 Cybersecurity
Self-Compiling Malware | SANS@MIC Talk
SANS Institute Intermediate 5y ago
C2 Matrix | SANS@MIC Talk
🔐 Cybersecurity
C2 Matrix | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Check out SEC573! More Python3! More Pywars! | SANS@MIC Talk
🔐 Cybersecurity
Check out SEC573! More Python3! More Pywars! | SANS@MIC Talk
SANS Institute Beginner 5y ago
How Threats are Responding to COVID-19 | STAR Webcast
🔐 Cybersecurity
How Threats are Responding to COVID-19 | STAR Webcast
SANS Institute Advanced 5y ago
Take Back The Advantage - Cyber Deception for the Win | SANS@MIC Talk
🔐 Cybersecurity
Take Back The Advantage - Cyber Deception for the Win | SANS@MIC Talk
SANS Institute Beginner 5y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Awareness and Innovation
📚 Coursera Course ↗
Self-paced
Cybersecurity Awareness and Innovation
Opens on Coursera ↗
Introduction to Cybersecurity Foundations
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity Foundations
Opens on Coursera ↗
Handling Security Incidents Across Domains
📚 Coursera Course ↗
Self-paced
Handling Security Incidents Across Domains
Opens on Coursera ↗
Exploit Development, Malware, & Defensive Strategies
📚 Coursera Course ↗
Self-paced
Exploit Development, Malware, & Defensive Strategies
Opens on Coursera ↗
AWS: Infrastructure Security
📚 Coursera Course ↗
Self-paced
AWS: Infrastructure Security
Opens on Coursera ↗
SD-WAN: Optimizing Network Performance & Security
📚 Coursera Course ↗
Self-paced
SD-WAN: Optimizing Network Performance & Security
Opens on Coursera ↗