✕ Clear filters
1,356 lessons

Browse Lessons

Curated from top practitioners. Filtered, not flooded.

All ▶ YouTube 198,538📚 Coursera 18,120🎤 TED 1
What's it like being a SANS instructor
📄 Research Papers Explained
What's it like being a SANS instructor
SANS Institute Advanced 6y ago
What sets SANS apart from other cyber security training providers
🔐 Cybersecurity
What sets SANS apart from other cyber security training providers
SANS Institute Intermediate 6y ago
Classifying Evil: Lessons from Hunting Human Traffickers | SANS Threat Hunting & IR Summit
📊 Data Analytics & Business Intelligence
Classifying Evil: Lessons from Hunting Human Traffickers | SANS Threat Hunting & IR Summit
SANS Institute Intermediate 6y ago
Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
🔐 Cybersecurity
Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
SANS Institute Beginner 6y ago
SANS Pen Test HackFest Summit & Training 2019: Sneak Peek
🔐 Cybersecurity
SANS Pen Test HackFest Summit & Training 2019: Sneak Peek
SANS Institute Beginner 6y ago
What you need to know about SEC555: SIEM with Tactical Analysis
🏗️ Systems Design & Architecture
What you need to know about SEC555: SIEM with Tactical Analysis
SANS Institute Beginner 6y ago
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
🔐 Cybersecurity
ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation
SANS Institute Intermediate 6y ago
Gaining Endpoint Log Visibility in ICS Environments - SANS ICS Security Summit 2019
🛠️ AI Tools & Apps
Gaining Endpoint Log Visibility in ICS Environments - SANS ICS Security Summit 2019
SANS Institute Advanced 6y ago
What you need to know about SEC530: Defensible Security Architecture and Engineering
🏗️ Systems Design & Architecture
What you need to know about SEC530: Defensible Security Architecture and Engineering
SANS Institute Advanced 6y ago
What you need to know about SEC503: Intrusion Detection In-Depth
🔐 Cybersecurity
What you need to know about SEC503: Intrusion Detection In-Depth
SANS Institute Beginner 6y ago
What you need to know about SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
🔐 Cybersecurity
What you need to know about SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
SANS Institute Beginner 6y ago
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
🔐 Cybersecurity
Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 2019
SANS Institute Intermediate 6y ago
Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 2019
🔐 Cybersecurity
Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 2019
SANS Institute Intermediate 6y ago
Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit
🔐 Cybersecurity
Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit
SANS Institute Beginner 6y ago
Scanners, Tunnels, and Sims, Oh My! - SANS ICS Security Summit 2019
📰 AI News & Updates
Scanners, Tunnels, and Sims, Oh My! - SANS ICS Security Summit 2019
SANS Institute Beginner 6y ago
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
🔐 Cybersecurity
Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019
SANS Institute Intermediate 6y ago
Threat Hunting via Sysmon - SANS Blue Team Summit
📰 AI News & Updates
Threat Hunting via Sysmon - SANS Blue Team Summit
SANS Institute Intermediate 6y ago
Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019
📣 Digital Marketing & Growth
Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019
SANS Institute Intermediate 6y ago
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
🔐 Cybersecurity
To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
SANS Institute Intermediate 6y ago
OSINT: Not Just Offensive - SANS Blue Team Summit
🔍 RAG & Vector Search
OSINT: Not Just Offensive - SANS Blue Team Summit
SANS Institute Intermediate 6y ago
Defeating Attackers with Preventative Security
🔐 Cybersecurity
Defeating Attackers with Preventative Security
SANS Institute Intermediate 6y ago
Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking
🔐 Cybersecurity
Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking
SANS Institute Beginner 6y ago
Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
🔐 Cybersecurity
Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
SANS Institute Intermediate 6y ago
Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
🔐 Cybersecurity
Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
SANS Institute Intermediate 6y ago
Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
🔐 Cybersecurity
Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
SANS Institute Intermediate 6y ago
Key Take-Aways from SEC401: Security Essentials Bootcamp Style
🔐 Cybersecurity
Key Take-Aways from SEC401: Security Essentials Bootcamp Style
SANS Institute Beginner 6y ago
Key Take-Aways from SEC503: Intrusion Detection In-Depth
🔐 Cybersecurity
Key Take-Aways from SEC503: Intrusion Detection In-Depth
SANS Institute Beginner 6y ago
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
🔐 Cybersecurity
What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
SANS Institute Intermediate 6y ago
Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Not Using Parallel Structure - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Not Using Parallel Structure - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Using More Words Than Necessary - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Using More Words Than Necessary - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Applying Inconsistent Formatting - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Applying Inconsistent Formatting - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Including Indecipherable Graphics - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Including Indecipherable Graphics - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Overstuffing the Paragraphs - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Overstuffing the Paragraphs - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Burying the Main Point - Common Cybersecurity Writing Mistakes
🔐 Cybersecurity
Burying the Main Point - Common Cybersecurity Writing Mistakes
SANS Institute Beginner 6y ago
Top 5 Things to Know About Azure Active Directory Logs - SANS Tactical Detection Summit
🛡️ AI Safety & Ethics
Top 5 Things to Know About Azure Active Directory Logs - SANS Tactical Detection Summit
SANS Institute Intermediate 7y ago
SANS Security Operations Summit & Training 2019: Sneak Peek
🔐 Cybersecurity
SANS Security Operations Summit & Training 2019: Sneak Peek
SANS Institute Intermediate 7y ago
Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
🔐 Cybersecurity
Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them
SANS Institute Beginner 7y ago
The Hitchhiker’s Guide to Evidence Sources - SANS Webcast
🔐 Cybersecurity
The Hitchhiker’s Guide to Evidence Sources - SANS Webcast
SANS Institute Beginner 7y ago
Purple Teaming Explained
📄 Research Papers Explained
Purple Teaming Explained
SANS Institute Beginner 7y ago
ICS Security Summit 2019: What to Expect
🔐 Cybersecurity
ICS Security Summit 2019: What to Expect
SANS Institute Advanced 7y ago
Network Visualizations: Understand what's happening faster and easier than ever! - SANS Webcast
📊 Data Analytics & Business Intelligence
Network Visualizations: Understand what's happening faster and easier than ever! - SANS Webcast
SANS Institute Intermediate 7y ago
Unconventional Logging and Detection - SANS Tactical Detection Summit 2018
🤖 AI Agents & Automation
Unconventional Logging and Detection - SANS Tactical Detection Summit 2018
SANS Institute Intermediate 7y ago
SANS Blue Team Summit & Training 2019
🛡️ AI Safety & Ethics
SANS Blue Team Summit & Training 2019
SANS Institute Advanced 7y ago
The Changing Landscape of Offense - SANS Pen Test HackFest 2018
🔐 Cybersecurity
The Changing Landscape of Offense - SANS Pen Test HackFest 2018
SANS Institute Intermediate 7y ago