✕ Clear filters
670 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,226📚 Coursera 18,118🎤 TED 1
Break Into Cybersecurity Through Cyber-Adjacent Roles | Aaron Yerian
🔐 Cybersecurity
Break Into Cybersecurity Through Cyber-Adjacent Roles | Aaron Yerian
SANS Institute Beginner 1y ago
Break Into Cybersecurity with the New2Cyber Summit 2025!
🔐 Cybersecurity
Break Into Cybersecurity with the New2Cyber Summit 2025!
SANS Institute Beginner 1y ago
Kickstart Your Cyber Journey with the 2025 New2Cyber Summit! 🚀
🔐 Cybersecurity
Kickstart Your Cyber Journey with the 2025 New2Cyber Summit! 🚀
SANS Institute Beginner 1y ago
The Booming Business of Cyber Crime with Geoff White
🔐 Cybersecurity
The Booming Business of Cyber Crime with Geoff White
SANS Institute Advanced 1y ago
SANS Threat Analysis Rundown with Katie Nickels | December 2024
🔐 Cybersecurity
SANS Threat Analysis Rundown with Katie Nickels | December 2024
SANS Institute Beginner 1y ago
CyberThreat 2024 Recap: Highlights, CTF Competition, and Key Insights
🔐 Cybersecurity
CyberThreat 2024 Recap: Highlights, CTF Competition, and Key Insights
SANS Institute Beginner 1y ago
Leading Global Cybersecurity with Christine Bejerasco
🔐 Cybersecurity
Leading Global Cybersecurity with Christine Bejerasco
SANS Institute Beginner 1y ago
SANS Live Training: Network Security 2024 Recap
🔐 Cybersecurity
SANS Live Training: Network Security 2024 Recap
SANS Institute Advanced 1y ago
SANS Live Training: SANSFIRE 2024 Recap
🔐 Cybersecurity
SANS Live Training: SANSFIRE 2024 Recap
SANS Institute Advanced 1y ago
From Compliance to Leadership: What Every CISO Needs to Know
🔐 Cybersecurity
From Compliance to Leadership: What Every CISO Needs to Know
SANS Institute Beginner 1y ago
Lightning Talk: AI for SOC Teams - Enhancing Incident Response and Vulnerability Management
🔐 Cybersecurity
Lightning Talk: AI for SOC Teams - Enhancing Incident Response and Vulnerability Management
SANS Institute Beginner 1y ago
Lightning Talk: Co-bots, Not Robots: Artificial Intelligence in Security Operations
🔐 Cybersecurity
Lightning Talk: Co-bots, Not Robots: Artificial Intelligence in Security Operations
SANS Institute Intermediate 1y ago
SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition
🔐 Cybersecurity
SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition
SANS Institute Beginner 1y ago
Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons
🔐 Cybersecurity
Healthcare - Industrial Control Security for Pharmaceuticals | Dean Parsons
SANS Institute Intermediate 1y ago
Enhanced Vendor Risk Assessment | Tony Turner
🔐 Cybersecurity
Enhanced Vendor Risk Assessment | Tony Turner
SANS Institute Advanced 1y ago
SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
🔐 Cybersecurity
SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers
SANS Institute Advanced 1y ago
SANS Compliance Countdown 2024
🔐 Cybersecurity
SANS Compliance Countdown 2024
SANS Institute Beginner 1y ago
SANS Threat Analysis Rundown with Katie Nickels
🔐 Cybersecurity
SANS Threat Analysis Rundown with Katie Nickels
SANS Institute Beginner 1y ago
A Winning Partnership in Cybersecurity Talent Development
🔐 Cybersecurity
A Winning Partnership in Cybersecurity Talent Development
SANS Institute Intermediate 1y ago
Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4
🔐 Cybersecurity
Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 4
SANS Institute Beginner 1y ago
Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace
🔐 Cybersecurity
Keynote | Thriving Together: Empowering Neurodivergent Individuals in the Workplace
SANS Institute Intermediate 1y ago
I’m OK, You’re OK, We’re OK: Living with AD(H)D in InfoSec
🔐 Cybersecurity
I’m OK, You’re OK, We’re OK: Living with AD(H)D in InfoSec
SANS Institute Intermediate 1y ago
How to transition from feeling overwhelmed to achieving hyperfocus in 45 minutes or less
🔐 Cybersecurity
How to transition from feeling overwhelmed to achieving hyperfocus in 45 minutes or less
SANS Institute Intermediate 1y ago
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
🔐 Cybersecurity
Supporting Thinking outside The Box-Allyship for neurodiverse colleagues
SANS Institute Beginner 1y ago
Inclusive Cybersecurity: Bridging the Accessibility Gap for People with Disabilities
🔐 Cybersecurity
Inclusive Cybersecurity: Bridging the Accessibility Gap for People with Disabilities
SANS Institute Intermediate 1y ago
Strategies for retaining and advancing neurodivergent employees in Cybersecurity
🔐 Cybersecurity
Strategies for retaining and advancing neurodivergent employees in Cybersecurity
SANS Institute Intermediate 1y ago
Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights
🔐 Cybersecurity
Dr. Ullrich on Today’s Cyber Threats: SANSFIRE 2024 Insights
SANS Institute Advanced 1y ago
For the Win: Aligning Security Initiatives with the Business
🔐 Cybersecurity
For the Win: Aligning Security Initiatives with the Business
SANS Institute Beginner 1y ago
Keynote | Challenges and Opportunities for Modern CISOs
🔐 Cybersecurity
Keynote | Challenges and Opportunities for Modern CISOs
SANS Institute Intermediate 1y ago
Leading Without Authority: Leadership Beyond Titles
🔐 Cybersecurity
Leading Without Authority: Leadership Beyond Titles
SANS Institute Intermediate 1y ago
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
🔐 Cybersecurity
Navigating the AI Security Horizon: A CISO’s Guide to Sustaining Cyber Resilience
SANS Institute Beginner 1y ago
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
🔐 Cybersecurity
Security Governance | The 8 Domains of the Cloud Security Maturity Model | Part 3
SANS Institute Beginner 1y ago
Expertise isn't all you need - Building an AI Red Team
🔐 Cybersecurity
Expertise isn't all you need - Building an AI Red Team
SANS Institute Beginner 1y ago
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
🔐 Cybersecurity
IAM | The 8 Domains of the Cloud Security Maturity Model | Part 2
SANS Institute Beginner 1y ago
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
🔐 Cybersecurity
How Accurate is Your Recovery Timeline? | The Incident Commander Series Ep. 2
SANS Institute Beginner 1y ago
CISOs Confront AI: Adapting Cybersecurity to the AI Era
🔐 Cybersecurity
CISOs Confront AI: Adapting Cybersecurity to the AI Era
SANS Institute Intermediate 1y ago
Data Protection | The 8 Domains of the Cloud Security Maturity Model | Part 1
🔐 Cybersecurity
Data Protection | The 8 Domains of the Cloud Security Maturity Model | Part 1
SANS Institute Beginner 1y ago
Keynote | The Fast-Food Effect: Translating Fast-Food Mastery into Cross-Industry Success
🔐 Cybersecurity
Keynote | The Fast-Food Effect: Translating Fast-Food Mastery into Cross-Industry Success
SANS Institute Intermediate 1y ago
The 8 Domains of the Cloud Security Maturity Model | Overview
🔐 Cybersecurity
The 8 Domains of the Cloud Security Maturity Model | Overview
SANS Institute Beginner 1y ago
From Rogue to Vanguard: My Odyssey through the Cyber Realm
🔐 Cybersecurity
From Rogue to Vanguard: My Odyssey through the Cyber Realm
SANS Institute Intermediate 1y ago
Breaking the Mold: How Two Women from Non-Technical Backgrounds Broke into Cybersecurity.
🔐 Cybersecurity
Breaking the Mold: How Two Women from Non-Technical Backgrounds Broke into Cybersecurity.
SANS Institute Beginner 1y ago
Detection Engineers Unveiled: A Day in the Life and the Path to This Exciting Career
🔐 Cybersecurity
Detection Engineers Unveiled: A Day in the Life and the Path to This Exciting Career
SANS Institute Beginner 1y ago
Inclusive Cybersecurity: Tips for Hacking Barriers
🔐 Cybersecurity
Inclusive Cybersecurity: Tips for Hacking Barriers
SANS Institute Advanced 1y ago
Day in the Life of a CTI Engineer
🔐 Cybersecurity
Day in the Life of a CTI Engineer
SANS Institute Beginner 1y ago
CISOs Confront AI: Adapting Cybersecurity to the AI Era
🔐 Cybersecurity
CISOs Confront AI: Adapting Cybersecurity to the AI Era
SANS Institute Intermediate 1y ago
Build a Pro-Level Detection Engineering Strategy | SOC Success Pt. 2
🔐 Cybersecurity
Build a Pro-Level Detection Engineering Strategy | SOC Success Pt. 2
SANS Institute Beginner 1y ago
Incident Response VS Incident Management | The Incident Commander Series Ep. 1
🔐 Cybersecurity
Incident Response VS Incident Management | The Incident Commander Series Ep. 1
SANS Institute Beginner 1y ago
Countdown Begins: SANS to Reveal The Five Biggest Cyber Threats at RSAC 2024
🔐 Cybersecurity
Countdown Begins: SANS to Reveal The Five Biggest Cyber Threats at RSAC 2024
SANS Institute Advanced 1y ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Network Traffic Analysis with Wireshark
📚 Coursera Course ↗
Self-paced
Network Traffic Analysis with Wireshark
Opens on Coursera ↗
Practical Cybersecurity Fundamentals: Unit 2
📚 Coursera Course ↗
Self-paced
Practical Cybersecurity Fundamentals: Unit 2
Opens on Coursera ↗
Network Monitoring and Analysis
📚 Coursera Course ↗
Self-paced
Network Monitoring and Analysis
Opens on Coursera ↗
Cutting-Edge Blockchain Security Mechanisms
📚 Coursera Course ↗
Self-paced
Cutting-Edge Blockchain Security Mechanisms
Opens on Coursera ↗
AWS: Infrastructure Security
📚 Coursera Course ↗
Self-paced
AWS: Infrastructure Security
Opens on Coursera ↗
Cisco CyberOps Associate (200-201)
📚 Coursera Course ↗
Self-paced
Cisco CyberOps Associate (200-201)
Opens on Coursera ↗