✕ Clear filters
670 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,243📚 Coursera 18,118🎤 TED 1
Supply Chain Forum 2025: Firmware Attacks Expanding the Enterprise Attack Surface
🔐 Cybersecurity
Supply Chain Forum 2025: Firmware Attacks Expanding the Enterprise Attack Surface
SANS Institute Intermediate 8mo ago
The Myth: AI Is Coming for Your Job
🔐 Cybersecurity
The Myth: AI Is Coming for Your Job
SANS Institute Intermediate 9mo ago
Beyond the Patch: Measuring the Unknown in Vulnerability Management
🔐 Cybersecurity
Beyond the Patch: Measuring the Unknown in Vulnerability Management
SANS Institute Intermediate 9mo ago
From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard
🔐 Cybersecurity
From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard
SANS Institute Intermediate 9mo ago
Fighting Back with John Hubbard
🔐 Cybersecurity
Fighting Back with John Hubbard
SANS Institute Beginner 9mo ago
Smart Phone Forensics Circa 2028
🔐 Cybersecurity
Smart Phone Forensics Circa 2028
SANS Institute Advanced 10mo ago
LLM SATs FTW
🔐 Cybersecurity
LLM SATs FTW
SANS Institute Advanced 10mo ago
AI Security Demystified
🔐 Cybersecurity
AI Security Demystified
SANS Institute Beginner 10mo ago
Inside Pacific Rim with Ross McKerchar
🔐 Cybersecurity
Inside Pacific Rim with Ross McKerchar
SANS Institute Intermediate 10mo ago
Keynote | How to Become a CISO
🔐 Cybersecurity
Keynote | How to Become a CISO
SANS Institute Intermediate 10mo ago
Believing in Yourself to Lead Your Team
🔐 Cybersecurity
Believing in Yourself to Lead Your Team
SANS Institute Beginner 10mo ago
CISOs: Your Cyber Program Is A Profit Center, Not A Cost Center
🔐 Cybersecurity
CISOs: Your Cyber Program Is A Profit Center, Not A Cost Center
SANS Institute Intermediate 10mo ago
Who Dares Wins: Effective Crisis Management
🔐 Cybersecurity
Who Dares Wins: Effective Crisis Management
SANS Institute Intermediate 10mo ago
AI Security Made Easy
🔐 Cybersecurity
AI Security Made Easy
SANS Institute Beginner 10mo ago
Fireside Chat with Kate Marshall and Helen Oakley
🔐 Cybersecurity
Fireside Chat with Kate Marshall and Helen Oakley
SANS Institute Intermediate 10mo ago
Watching the Watchers: Safeguards and Security for Artificial Intelligence Systems
🔐 Cybersecurity
Watching the Watchers: Safeguards and Security for Artificial Intelligence Systems
SANS Institute Intermediate 10mo ago
Defending AI Models: Strategies for Securing AI Implementations Against Emerging Threats
🔐 Cybersecurity
Defending AI Models: Strategies for Securing AI Implementations Against Emerging Threats
SANS Institute Intermediate 10mo ago
Securing the Grid: AI’s Promise for Cyber Resilience in Power Systems
🔐 Cybersecurity
Securing the Grid: AI’s Promise for Cyber Resilience in Power Systems
SANS Institute Intermediate 10mo ago
Building an AI Pen-Testing Assistant
🔐 Cybersecurity
Building an AI Pen-Testing Assistant
SANS Institute Intermediate 10mo ago
Data to Defense: Generative AI and RAG Powering Real-Time Threat Response
🔐 Cybersecurity
Data to Defense: Generative AI and RAG Powering Real-Time Threat Response
SANS Institute Intermediate 10mo ago
Giving Back to the Cybersecurity Community Through Teaching
🔐 Cybersecurity
Giving Back to the Cybersecurity Community Through Teaching
SANS Institute Beginner 11mo ago
Level Up Your Security Team Through Automation
🔐 Cybersecurity
Level Up Your Security Team Through Automation
SANS Institute Beginner 11mo ago
SANS Cyber Compliance Countdown: Guidance to Meet Global Directives
🔐 Cybersecurity
SANS Cyber Compliance Countdown: Guidance to Meet Global Directives
SANS Institute Advanced 11mo ago
The Myth: You Need to Be an Expert Hacker to Work in Cybersecurity
🔐 Cybersecurity
The Myth: You Need to Be an Expert Hacker to Work in Cybersecurity
SANS Institute Advanced 11mo ago
The Myth: Cybersecurity Is Only For People in IT
🔐 Cybersecurity
The Myth: Cybersecurity Is Only For People in IT
SANS Institute Advanced 11mo ago
The Myth: I'm Not a Target, So I Don't Need to Be Cybersecurity Aware
🔐 Cybersecurity
The Myth: I'm Not a Target, So I Don't Need to Be Cybersecurity Aware
SANS Institute Advanced 11mo ago
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
🔐 Cybersecurity
Panel | Mentors and Mentees: Navigating Cybersecurity's Path Together
SANS Institute Intermediate 11mo ago
A Day in the Life of a Network Security Engineer
🔐 Cybersecurity
A Day in the Life of a Network Security Engineer
SANS Institute Advanced 11mo ago
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
🔐 Cybersecurity
Lightning Talk | Ever sucked into Wikipedia for three hours? CTI might be for you!
SANS Institute Beginner 11mo ago
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
🔐 Cybersecurity
A Day in the Life of a Threat Emulation Specialist: Demystifying Offensive Cybersecurity
SANS Institute Beginner 11mo ago
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
🔐 Cybersecurity
Lightning Talk | Negating the Noise: Prioritize Your Cybersecurity
SANS Institute Beginner 11mo ago
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
🔐 Cybersecurity
Cyber Adjacent: 5 Lessons Learned from a Day in the Life of an IT Project Manager
SANS Institute Beginner 11mo ago
From TV news to cybersecurity: the 5 steps I took to completely change careers
🔐 Cybersecurity
From TV news to cybersecurity: the 5 steps I took to completely change careers
SANS Institute Beginner 11mo ago
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
🔐 Cybersecurity
Going Technical, Against All Odds: From Digital Communications to Reverse Engineering Malware
SANS Institute Beginner 11mo ago
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
🔐 Cybersecurity
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
SANS Institute Intermediate 11mo ago
Turn Your Hard-Earned Experience into Impact
🔐 Cybersecurity
Turn Your Hard-Earned Experience into Impact
SANS Institute Intermediate 12mo ago
Understanding Continuous Threat Exposure Management (CTEM) | Jonathan Risto
🔐 Cybersecurity
Understanding Continuous Threat Exposure Management (CTEM) | Jonathan Risto
SANS Institute Beginner 1y ago
Achieve Strategic Security Leadership | Frank Kim on LDR514
🔐 Cybersecurity
Achieve Strategic Security Leadership | Frank Kim on LDR514
SANS Institute Advanced 1y ago
Ask the Authors: The Foundations and Future of ICS/OT Security
🔐 Cybersecurity
Ask the Authors: The Foundations and Future of ICS/OT Security
SANS Institute Beginner 1y ago
Sponsorship Opportunities at SANS Cyber Fest
🔐 Cybersecurity
Sponsorship Opportunities at SANS Cyber Fest
SANS Institute Beginner 1y ago
Sponsorship Opportunities at SANS Summits
🔐 Cybersecurity
Sponsorship Opportunities at SANS Summits
SANS Institute Beginner 1y ago
Inside the World of Cyber Threat Intelligence with Ondra Rojcik
🔐 Cybersecurity
Inside the World of Cyber Threat Intelligence with Ondra Rojcik
SANS Institute Beginner 1y ago
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
🔐 Cybersecurity
Exploring Offensive Cybersecurity: Threat Emulation | John Rodriguez
SANS Institute Intermediate 1y ago
Empowering the Future of Cybersecurity: Women Leading the Way
🔐 Cybersecurity
Empowering the Future of Cybersecurity: Women Leading the Way
SANS Institute Beginner 1y ago
A Day in the Life of a Network Security Engineer | Sanjay Poddar
🔐 Cybersecurity
A Day in the Life of a Network Security Engineer | Sanjay Poddar
SANS Institute Intermediate 1y ago
Level Up Your Cyber Skills with the KC7 Threat Hunter CTF | New2Cyber Summit 2025
🔐 Cybersecurity
Level Up Your Cyber Skills with the KC7 Threat Hunter CTF | New2Cyber Summit 2025
SANS Institute Beginner 1y ago
From IT Support to Cybersecurity Leader: Jay James’ Keynote Journey
🔐 Cybersecurity
From IT Support to Cybersecurity Leader: Jay James’ Keynote Journey
SANS Institute Intermediate 1y ago
Non-Technical to Technical: Breaking into Reverse Engineering | Alex Perotti
🔐 Cybersecurity
Non-Technical to Technical: Breaking into Reverse Engineering | Alex Perotti
SANS Institute Intermediate 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Cybersecurity Job Search, Resume, and Interview Prep
📚 Coursera Course ↗
Self-paced
Cybersecurity Job Search, Resume, and Interview Prep
Opens on Coursera ↗
Advanced Networking, Security, and IT Operations
📚 Coursera Course ↗
Self-paced
Advanced Networking, Security, and IT Operations
Opens on Coursera ↗
Critical Infrastructure Security
📚 Coursera Course ↗
Self-paced
Critical Infrastructure Security
Opens on Coursera ↗
pfSense 2.4.4: Open Source Firewall
📚 Coursera Course ↗
Self-paced
pfSense 2.4.4: Open Source Firewall
Opens on Coursera ↗
Introdução ao Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Introdução ao Cloud Next Generation Firewall
Opens on Coursera ↗
Protege tus redes de VPC con Cloud Next Generation Firewall
📚 Coursera Course ↗
Self-paced
Protege tus redes de VPC con Cloud Next Generation Firewall
Opens on Coursera ↗