✕ Clear filters
1,356 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,442📚 Coursera 18,118🎤 TED 1
What Do I Need to Know About CVE-2020-5902; the F5 Networks BigIP RCE Vulnerability
📰 AI News & Updates
What Do I Need to Know About CVE-2020-5902; the F5 Networks BigIP RCE Vulnerability
SANS Institute Advanced 5y ago
What You Need to Know About the Windows DNS Vulnerability - CVE-2020-1350
📰 AI News & Updates
What You Need to Know About the Windows DNS Vulnerability - CVE-2020-1350
SANS Institute Intermediate 5y ago
Course Preview: Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
📄 Research Papers Explained
Course Preview: Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk
SANS Institute Beginner 5y ago
Training Yourself in a Quarantined World
🛠️ AI Tools & Apps
Training Yourself in a Quarantined World
SANS Institute Advanced 5y ago
Checkm8, Checkra1n and the new "golden age" for iOS Forensics | SANS@MIC Talk
✍️ Prompt Engineering
Checkm8, Checkra1n and the new "golden age" for iOS Forensics | SANS@MIC Talk
SANS Institute Advanced 5y ago
Welcome to SANS Community CTF - Services Challenges
🔐 Cybersecurity
Welcome to SANS Community CTF - Services Challenges
SANS Institute Beginner 5y ago
The 14 Absolute Truths of Security | SANS@MIC Talk
🔐 Cybersecurity
The 14 Absolute Truths of Security | SANS@MIC Talk
SANS Institute Advanced 5y ago
Understanding and Applying Threat Intelligence
🔐 Cybersecurity
Understanding and Applying Threat Intelligence
SANS Institute Intermediate 5y ago
Defending Lift and Shift Cloud Applications | SANS@MIC Talk
🔐 Cybersecurity
Defending Lift and Shift Cloud Applications | SANS@MIC Talk
SANS Institute Beginner 5y ago
#LevelUpLabs | SANS@MIC Talk
🔐 Cybersecurity
#LevelUpLabs | SANS@MIC Talk
SANS Institute Advanced 5y ago
Leveraging Organizational Change to Build a Strong Security Culture
🛡️ AI Safety & Ethics
Leveraging Organizational Change to Build a Strong Security Culture
SANS Institute Intermediate 5y ago
Privacy Laws: The Future Driver of Cyber Security
🛠️ AI Tools & Apps
Privacy Laws: The Future Driver of Cyber Security
SANS Institute Intermediate 5y ago
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
🔐 Cybersecurity
SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk
SANS Institute Advanced 5y ago
Threat Hunting via DNS | SANS@MIC Talk
🔐 Cybersecurity
Threat Hunting via DNS | SANS@MIC Talk
SANS Institute Advanced 5y ago
No SQL Injection in MongoDB Applications | SANS@MIC Talk
🔐 Cybersecurity
No SQL Injection in MongoDB Applications | SANS@MIC Talk
SANS Institute Advanced 5y ago
Untapped Potential - SANS Blue Team Summit 2020
🔐 Cybersecurity
Untapped Potential - SANS Blue Team Summit 2020
SANS Institute Beginner 5y ago
Using the Cloud to Provision Infrastructure with Software | SANS@MIC Talk
📄 Research Papers Explained
Using the Cloud to Provision Infrastructure with Software | SANS@MIC Talk
SANS Institute Advanced 5y ago
Creativity and Choices: Talking About Thinking
📄 Research Papers Explained
Creativity and Choices: Talking About Thinking
SANS Institute Intermediate 5y ago
Cyber Security Career Development: Personal Branding
🖌️ UI/UX Design
Cyber Security Career Development: Personal Branding
SANS Institute Beginner 5y ago
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
🔐 Cybersecurity
The Only Constant is Change: Tracking Adversary Trends | STAR Webcast
SANS Institute Advanced 5y ago
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
🔐 Cybersecurity
Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
🔐 Cybersecurity
Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Arcane Web and Mobile Application Vulnerabilities | SANS@MIC Talk
🔐 Cybersecurity
Arcane Web and Mobile Application Vulnerabilities | SANS@MIC Talk
SANS Institute Beginner 5y ago
A Walk Through Logs Hell | SANS@MIC Talk
🔐 Cybersecurity
A Walk Through Logs Hell | SANS@MIC Talk
SANS Institute Beginner 5y ago
Shock to the System: Re-Evaluating Your Security Operations
🔐 Cybersecurity
Shock to the System: Re-Evaluating Your Security Operations
SANS Institute Intermediate 5y ago
The Art of Blue Teaming
🔐 Cybersecurity
The Art of Blue Teaming
SANS Institute Intermediate 5y ago
Shellcode Analysis 101 | SANS@MIC Talk
🔐 Cybersecurity
Shellcode Analysis 101 | SANS@MIC Talk
SANS Institute Advanced 5y ago
SANS Live Online Interactive Remote Lab and Range Demo – SEC599: Defeating Advanced Adversaries
📄 Research Papers Explained
SANS Live Online Interactive Remote Lab and Range Demo – SEC599: Defeating Advanced Adversaries
SANS Institute Advanced 5y ago
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
🔐 Cybersecurity
SANS Live Online Interactive Local Lab Demo – FOR508: Advanced Incident Response
SANS Institute Advanced 5y ago
SANS Live Online Interactive Live Lab Environment Demo: Slack, Local and Remote Lab Demonstrations
📄 Research Papers Explained
SANS Live Online Interactive Live Lab Environment Demo: Slack, Local and Remote Lab Demonstrations
SANS Institute Advanced 5y ago
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
🔐 Cybersecurity
CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
🔐 Cybersecurity
Remote Forensic Investigations in the Context of COVID-19 | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Introducing Blueprint
🔐 Cybersecurity
Introducing Blueprint
SANS Institute Beginner 5y ago
Waiting for a cyber range exercise is not enough | SANS@MIC Talk
🔐 Cybersecurity
Waiting for a cyber range exercise is not enough | SANS@MIC Talk
SANS Institute Beginner 5y ago
Case Study: Airbus
🔍 RAG & Vector Search
Case Study: Airbus
SANS Institute Beginner 5y ago
WinSCP: Yeah you know me! | SANS@MIC Talk
🔍 RAG & Vector Search
WinSCP: Yeah you know me! | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Prioritizing OT Security Efforts: The Five Tactical Things to Accomplish | SANS@MIC Talk
📄 Research Papers Explained
Prioritizing OT Security Efforts: The Five Tactical Things to Accomplish | SANS@MIC Talk
SANS Institute Advanced 5y ago
Introduction to Docker for security work | SANS@MIC Talk
🔍 RAG & Vector Search
Introduction to Docker for security work | SANS@MIC Talk
SANS Institute Beginner 5y ago
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
🔐 Cybersecurity
Threat Hunting and the Rise of Targeted eCrime Intrusions | STAR Webcast
SANS Institute Advanced 5y ago
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
🔐 Cybersecurity
Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Find_Evil - Threat Hunting | SANS@MIC Talk
🔐 Cybersecurity
Find_Evil - Threat Hunting | SANS@MIC Talk
SANS Institute Advanced 5y ago
Tricking modern endpoint security products | SANS@MIC Talk
🔐 Cybersecurity
Tricking modern endpoint security products | SANS@MIC Talk
SANS Institute Advanced 5y ago
Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk
🔐 Cybersecurity
Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk
SANS Institute Beginner 5y ago
Cloud Native Payloads: A Matryoshka Doll of Exploits | SANS@MIC Talk
🚀 Entrepreneurship & Startups
Cloud Native Payloads: A Matryoshka Doll of Exploits | SANS@MIC Talk
SANS Institute Intermediate 5y ago
Incident Response in ICS in times of Lockdown | SANS@MIC Talk
🔐 Cybersecurity
Incident Response in ICS in times of Lockdown | SANS@MIC Talk
SANS Institute Intermediate 5y ago
SANS – Your Source for Cybersecurity Training – Live Online
🔐 Cybersecurity
SANS – Your Source for Cybersecurity Training – Live Online
SANS Institute Beginner 5y ago
Coalfire penetration testers charged with criminal trespass | SANS@MIC Talk
🔐 Cybersecurity
Coalfire penetration testers charged with criminal trespass | SANS@MIC Talk
SANS Institute Beginner 5y ago
Using the OSINT Mind-State for Better Online Investigations | SANS@MIC Talk
📄 Research Papers Explained
Using the OSINT Mind-State for Better Online Investigations | SANS@MIC Talk
SANS Institute Advanced 5y ago