✕ Clear filters
1,356 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,442📚 Coursera 18,118🎤 TED 1
Hands-On Learning:  How and Why You Should Build a Home Lab
📄 Research Papers Explained
Hands-On Learning: How and Why You Should Build a Home Lab
SANS Institute Advanced 4y ago
How to Get Experience When You Have No Experience
📄 Research Papers Explained
How to Get Experience When You Have No Experience
SANS Institute Intermediate 4y ago
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
🔐 Cybersecurity
Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org
SANS Institute Beginner 4y ago
Infosec Snake Wrangling:  Intro to Python
📄 Research Papers Explained
Infosec Snake Wrangling: Intro to Python
SANS Institute Intermediate 4y ago
Ransomware - Pagar ou não pagar? – Especialistas debatem
🛡️ AI Safety & Ethics
Ransomware - Pagar ou não pagar? – Especialistas debatem
SANS Institute Intermediate 4y ago
Ransomware: ¿se paga o no se paga? - Los expertos debaten
🛡️ AI Safety & Ethics
Ransomware: ¿se paga o no se paga? - Los expertos debaten
SANS Institute Advanced 4y ago
John Hubbard: Key lessons and takeaways from Blueprint Season 2 + A Special Announcement!
📰 AI News & Updates
John Hubbard: Key lessons and takeaways from Blueprint Season 2 + A Special Announcement!
SANS Institute Intermediate 4y ago
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
🔐 Cybersecurity
Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS
SANS Institute Beginner 4y ago
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
🔐 Cybersecurity
Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
SANS Institute Beginner 4y ago
Cloud Security Begins with the Shared Responsibility Model
📄 Research Papers Explained
Cloud Security Begins with the Shared Responsibility Model
SANS Institute Advanced 4y ago
AJ Yawn: Cloud, Compliance and Automating Security
🔐 Cybersecurity
AJ Yawn: Cloud, Compliance and Automating Security
SANS Institute Beginner 4y ago
Healthcare Lightning Summit - SANS Institute
📄 Research Papers Explained
Healthcare Lightning Summit - SANS Institute
SANS Institute Beginner 4y ago
How to Become a Cybersecurity Expert: Stories and Lessons from SANS’ Nik Alleyne
📄 Research Papers Explained
How to Become a Cybersecurity Expert: Stories and Lessons from SANS’ Nik Alleyne
SANS Institute Advanced 4y ago
I Want to Work in Cybersecurity...Whatever That Means!
🔐 Cybersecurity
I Want to Work in Cybersecurity...Whatever That Means!
SANS Institute Advanced 4y ago
SANS Institute
📄 Research Papers Explained
SANS Institute
SANS Institute Advanced 4y ago
Jamie Williams: Adversary Emulation
📄 Research Papers Explained
Jamie Williams: Adversary Emulation
SANS Institute Intermediate 4y ago
Ransoming Critical Infrastructure: Ransomware Attack on Colonial Pipeline  - SANS Emergency Webcast
📄 Research Papers Explained
Ransoming Critical Infrastructure: Ransomware Attack on Colonial Pipeline - SANS Emergency Webcast
SANS Institute Advanced 4y ago
Ransoming Critical Infrastructure: Colonial Pipeline - Snippet from SANS Emergency Webcast
📄 Research Papers Explained
Ransoming Critical Infrastructure: Colonial Pipeline - Snippet from SANS Emergency Webcast
SANS Institute Advanced 4y ago
Josh Johnson: PowerShell and Defensive Automation for the Blue Team
🔐 Cybersecurity
Josh Johnson: PowerShell and Defensive Automation for the Blue Team
SANS Institute Intermediate 4y ago
Chris Baker: Get A Handle On Your Vulnerabilities
🔐 Cybersecurity
Chris Baker: Get A Handle On Your Vulnerabilities
SANS Institute Advanced 4y ago
Mick Douglas & Flynn Weeks: Simplifying your Logging Strategy with the What2Log Project
🔐 Cybersecurity
Mick Douglas & Flynn Weeks: Simplifying your Logging Strategy with the What2Log Project
SANS Institute Intermediate 4y ago
The Foundation of Accelerating your Cybersecurity Career - SANS@Mic Keynote w/ James Lyne
🔐 Cybersecurity
The Foundation of Accelerating your Cybersecurity Career - SANS@Mic Keynote w/ James Lyne
SANS Institute Beginner 4y ago
5-Day Blueprint for the Supercharged SOC: MGT551, Building & Leading Security Operations
📄 Research Papers Explained
5-Day Blueprint for the Supercharged SOC: MGT551, Building & Leading Security Operations
SANS Institute Advanced 4y ago
Knowing Your Applicants. How to Stay Current to Best Assess your Cyber Applicants w/ Kevin Garvey
🔐 Cybersecurity
Knowing Your Applicants. How to Stay Current to Best Assess your Cyber Applicants w/ Kevin Garvey
SANS Institute Beginner 4y ago
Anton Chuvakin: The Current State and Future of Security Operations
📄 Research Papers Explained
Anton Chuvakin: The Current State and Future of Security Operations
SANS Institute Advanced 4y ago
SANS New to Cyber Summit 2021
🔐 Cybersecurity
SANS New to Cyber Summit 2021
SANS Institute Beginner 4y ago
Rob van Os: Maturing your Cyber Defense
🔐 Cybersecurity
Rob van Os: Maturing your Cyber Defense
SANS Institute Intermediate 4y ago
AppSec, DevOps and DevSecOps
🔐 Cybersecurity
AppSec, DevOps and DevSecOps
SANS Institute Beginner 4y ago
Playbook for Security Onion
🛠️ AI Tools & Apps
Playbook for Security Onion
SANS Institute Intermediate 5y ago
The Blue Teamer's Blueprint for Malware Triage
🔐 Cybersecurity
The Blue Teamer's Blueprint for Malware Triage
SANS Institute Beginner 5y ago
SOC Metrics: Measuring Success and Preventing Burnout
🔐 Cybersecurity
SOC Metrics: Measuring Success and Preventing Burnout
SANS Institute Intermediate 5y ago
Learn more about SANS SEC301: Introduction to Cyber Security
📄 Research Papers Explained
Learn more about SANS SEC301: Introduction to Cyber Security
SANS Institute Beginner 5y ago
Rekt Casino Hack Assessment Operational Series – Putting It All Together Part 4 of 4
📄 Research Papers Explained
Rekt Casino Hack Assessment Operational Series – Putting It All Together Part 4 of 4
SANS Institute Beginner 5y ago
Discover What Risks Your Organization Should Prioritize for Security Awareness Training
📊 Data Analytics & Business Intelligence
Discover What Risks Your Organization Should Prioritize for Security Awareness Training
SANS Institute Beginner 5y ago
Skilling the Gap: Creative Ways to Recruit Top Cyber Talent
🔐 Cybersecurity
Skilling the Gap: Creative Ways to Recruit Top Cyber Talent
SANS Institute Beginner 5y ago
SANS Data Science Lightning Summit
🔐 Cybersecurity
SANS Data Science Lightning Summit
SANS Institute Advanced 5y ago
Part 3: Rekt Casino Hack - Security Operations Center Ill-equipped and Unprepared
🔐 Cybersecurity
Part 3: Rekt Casino Hack - Security Operations Center Ill-equipped and Unprepared
SANS Institute Beginner 5y ago
SANS Institute Stay Sharp Training
🔐 Cybersecurity
SANS Institute Stay Sharp Training
SANS Institute Intermediate 5y ago
Keynote Speaker Anne Neuberger at SANS ICS Summit 2021
🛡️ AI Safety & Ethics
Keynote Speaker Anne Neuberger at SANS ICS Summit 2021
SANS Institute Intermediate 5y ago
SANS OnDemand Cyber Security Courses
🔐 Cybersecurity
SANS OnDemand Cyber Security Courses
SANS Institute Advanced 5y ago
Part 2: Rekt Casino Hack - What?! There are Critical Security Controls We Should Follow?
🧠 Large Language Models
Part 2: Rekt Casino Hack - What?! There are Critical Security Controls We Should Follow?
SANS Institute Beginner 5y ago
Making sense of SolarWinds through the lens of MITRE ATT&CK | STAR Webcast
🔐 Cybersecurity
Making sense of SolarWinds through the lens of MITRE ATT&CK | STAR Webcast
SANS Institute Beginner 5y ago
SANS Institute Celebrates International Women's Day
🔐 Cybersecurity
SANS Institute Celebrates International Women's Day
SANS Institute Beginner 5y ago
Part 1: Rekt Casino Hack - Vulnerability Management Gone Wrong
📄 Research Papers Explained
Part 1: Rekt Casino Hack - Vulnerability Management Gone Wrong
SANS Institute Intermediate 5y ago
Metrics for Managing Human Risk
🛡️ AI Safety & Ethics
Metrics for Managing Human Risk
SANS Institute Advanced 5y ago
Part 4: Rekt Casino Hack - Pulling It All Together
🔐 Cybersecurity
Part 4: Rekt Casino Hack - Pulling It All Together
SANS Institute Advanced 5y ago
Part 3: Rekt Casino Hack - Feeble Security Culture Disconnected from Business Objectives
📄 Research Papers Explained
Part 3: Rekt Casino Hack - Feeble Security Culture Disconnected from Business Objectives
SANS Institute Advanced 5y ago
Part 2: Rekt Casino Hack - Weak Security Program, Unprotected Systems, and Poor Detection & Response
🧠 Large Language Models
Part 2: Rekt Casino Hack - Weak Security Program, Unprotected Systems, and Poor Detection & Response
SANS Institute Intermediate 5y ago