✕ Clear filters
669 lessons

🔐 Cybersecurity

Ethical hacking, penetration testing, network security, CTFs and defensive security

All ▶ YouTube 198,003📚 Coursera 18,118🏛 Archive.org 35🎤 TED 1
How Secure by Design and Public Partnerships Drive Deterrence: A Conversation with Jen Easterly
🔐 Cybersecurity
How Secure by Design and Public Partnerships Drive Deterrence: A Conversation with Jen Easterly
SANS Institute Intermediate 1w ago
SANS Share Your Story: How SEC401 Builds Your Security Foundation with Genie-Rose Luluquisin
🔐 Cybersecurity
SANS Share Your Story: How SEC401 Builds Your Security Foundation with Genie-Rose Luluquisin
SANS Institute Beginner 1w ago
Two generations. One powerful learning journey.
🔐 Cybersecurity
Two generations. One powerful learning journey.
SANS Institute Advanced 2w ago
Data Security in the Age of AI: Proactive Strategies to Protect Your Most Valuable Assets
🔐 Cybersecurity
Data Security in the Age of AI: Proactive Strategies to Protect Your Most Valuable Assets
SANS Institute Intermediate 3w ago
Keynote | The Augmented Era: Disrupt or be Disrupted
🔐 Cybersecurity
Keynote | The Augmented Era: Disrupt or be Disrupted
SANS Institute Advanced 1mo ago
Red Team | AI’s Role in the Future of Vulnerability Research
🔐 Cybersecurity
Red Team | AI’s Role in the Future of Vulnerability Research
SANS Institute Advanced 1mo ago
Blue Team | Unveiling Insider Threats Beyond the Logs
🔐 Cybersecurity
Blue Team | Unveiling Insider Threats Beyond the Logs
SANS Institute Intermediate 1mo ago
Red Team | MEDSHIELD: Threat Modeling for Medical IoT
🔐 Cybersecurity
Red Team | MEDSHIELD: Threat Modeling for Medical IoT
SANS Institute Intermediate 1mo ago
Red Team | Looting Credentials from Modern Browsers
🔐 Cybersecurity
Red Team | Looting Credentials from Modern Browsers
SANS Institute Beginner 1mo ago
Red Team | Weaponizing Windows Crash Dumps
🔐 Cybersecurity
Red Team | Weaponizing Windows Crash Dumps
SANS Institute Intermediate 1mo ago
Blue Team | Final Thoughts and Q&A
🔐 Cybersecurity
Blue Team | Final Thoughts and Q&A
SANS Institute Intermediate 1mo ago
Blue Team | Intelligence-Driven Defense for the Real World
🔐 Cybersecurity
Blue Team | Intelligence-Driven Defense for the Real World
SANS Institute Intermediate 1mo ago
Keynote | Blue Team | SOC of the Future…the Future Is Now
🔐 Cybersecurity
Keynote | Blue Team | SOC of the Future…the Future Is Now
SANS Institute Intermediate 1mo ago
Red Team | Subverting macOS Apps and Security Controls
🔐 Cybersecurity
Red Team | Subverting macOS Apps and Security Controls
SANS Institute Intermediate 1mo ago
Blue Team | From Exploit to Risk: Scaling Purple Team Insights
🔐 Cybersecurity
Blue Team | From Exploit to Risk: Scaling Purple Team Insights
SANS Institute Intermediate 1mo ago
Blue Team | Hunting Cloud Persistence Without Malware
🔐 Cybersecurity
Blue Team | Hunting Cloud Persistence Without Malware
SANS Institute Intermediate 1mo ago
Blue Team | Determining Malice Through Context and Analytics
🔐 Cybersecurity
Blue Team | Determining Malice Through Context and Analytics
SANS Institute Intermediate 1mo ago
SANS Share Your Story: Becoming a Cross-Functional Leader with Dr. Natalie Foster Johnson
🔐 Cybersecurity
SANS Share Your Story: Becoming a Cross-Functional Leader with Dr. Natalie Foster Johnson
SANS Institute Beginner 1mo ago
The 2 AM Call: A Ransomware Negotiator's Playbook with Wade Gettle
🔐 Cybersecurity
The 2 AM Call: A Ransomware Negotiator's Playbook with Wade Gettle
SANS Institute Intermediate 1mo ago
Panel | Global Views on Neuroinclusion
🔐 Cybersecurity
Panel | Global Views on Neuroinclusion
SANS Institute Beginner 1mo ago
Keynote | Failing Forward: Neurodiversity in Cyber
🔐 Cybersecurity
Keynote | Failing Forward: Neurodiversity in Cyber
SANS Institute Intermediate 1mo ago
AI as a Neurodivergent Ally in Cybersecurity
🔐 Cybersecurity
AI as a Neurodivergent Ally in Cybersecurity
SANS Institute Intermediate 1mo ago
From Training to Impact: A SANS India Alumnus Speaks
🔐 Cybersecurity
From Training to Impact: A SANS India Alumnus Speaks
SANS Institute Advanced 1mo ago
CyberStar 2025
🔐 Cybersecurity
CyberStar 2025
SANS Institute Advanced 1mo ago
Infiltration Alert! How to Catch Fake IT Employees in Your Network with Zak Stufflebeam
🔐 Cybersecurity
Infiltration Alert! How to Catch Fake IT Employees in Your Network with Zak Stufflebeam
SANS Institute Intermediate 2mo ago
Live Special: Securing the Connected World with Thomas Harvey 
🔐 Cybersecurity
Live Special: Securing the Connected World with Thomas Harvey 
SANS Institute Intermediate 3mo ago
Beyond Best Practice: How We Really Build a Safer Digital World with Curtis Dukes
🔐 Cybersecurity
Beyond Best Practice: How We Really Build a Safer Digital World with Curtis Dukes
SANS Institute Intermediate 3mo ago
MFA: The One Click That Blocks 90% of Hackers
🔐 Cybersecurity
MFA: The One Click That Blocks 90% of Hackers
SANS Institute Intermediate 3mo ago
Free Wi-Fi? Free for Hackers Too.
🔐 Cybersecurity
Free Wi-Fi? Free for Hackers Too.
SANS Institute Intermediate 4mo ago
Why Cybersecurity Is Anything But Boring
🔐 Cybersecurity
Why Cybersecurity Is Anything But Boring
SANS Institute Beginner 4mo ago
Job Offer or Job Scam? Watch This Before You Reply
🔐 Cybersecurity
Job Offer or Job Scam? Watch This Before You Reply
SANS Institute Intermediate 4mo ago
Quantum’s Leap: How Cyber Leaders Are Preparing for the Post-Encryption Era with Applied Quantum
🔐 Cybersecurity
Quantum’s Leap: How Cyber Leaders Are Preparing for the Post-Encryption Era with Applied Quantum
SANS Institute Intermediate 4mo ago
Cybersecurity Mythbusters – Volume 2
🔐 Cybersecurity
Cybersecurity Mythbusters – Volume 2
SANS Institute Beginner 4mo ago
Think Before You Click: Phishing Red Flags
🔐 Cybersecurity
Think Before You Click: Phishing Red Flags
SANS Institute Intermediate 4mo ago
Cybersecurity Mythbusters – Volume 1
🔐 Cybersecurity
Cybersecurity Mythbusters – Volume 1
SANS Institute Intermediate 4mo ago
AWS Keynote: AI for Security, and Security for AI
🔐 Cybersecurity
AWS Keynote: AI for Security, and Security for AI
SANS Institute Beginner 5mo ago
What is a Cyber Range
🔐 Cybersecurity
What is a Cyber Range
SANS Institute Beginner 5mo ago
ICS613: ICS/OT Penetration Testing & Assessments
🔐 Cybersecurity
ICS613: ICS/OT Penetration Testing & Assessments
SANS Institute Intermediate 6mo ago
ICS612: ICS Cybersecurity In-Depth
🔐 Cybersecurity
ICS612: ICS Cybersecurity In-Depth
SANS Institute Advanced 6mo ago
ICS456: Essentials for NERC Critical Infrastructure Protection
🔐 Cybersecurity
ICS456: Essentials for NERC Critical Infrastructure Protection
SANS Institute Intermediate 6mo ago
ICS410: ICS/SCADA Security Essentials
🔐 Cybersecurity
ICS410: ICS/SCADA Security Essentials
SANS Institute Advanced 6mo ago
ICS310: ICS Cybersecurity Foundations
🔐 Cybersecurity
ICS310: ICS Cybersecurity Foundations
SANS Institute Beginner 6mo ago
FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
🔐 Cybersecurity
FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
SANS Institute Advanced 6mo ago
SANS 2025 Healthcare Forum: Tackling Challenges, Building Cyber Resilience
🔐 Cybersecurity
SANS 2025 Healthcare Forum: Tackling Challenges, Building Cyber Resilience
SANS Institute Intermediate 6mo ago
SANS Cyber Compliance Countdown: Guidance to Meet Global Directives
🔐 Cybersecurity
SANS Cyber Compliance Countdown: Guidance to Meet Global Directives
SANS Institute Advanced 6mo ago
Leading by Example: Confidence and Responsibility in Cybersecurity with Zak Stufflebeam
🔐 Cybersecurity
Leading by Example: Confidence and Responsibility in Cybersecurity with Zak Stufflebeam
SANS Institute Beginner 7mo ago
Supply Chain Forum 2025: Advancing Transparency with the BOM Maturity Model
🔐 Cybersecurity
Supply Chain Forum 2025: Advancing Transparency with the BOM Maturity Model
SANS Institute Beginner 8mo ago
Supply Chain Forum 2025: Firmware Attacks Expanding the Enterprise Attack Surface
🔐 Cybersecurity
Supply Chain Forum 2025: Firmware Attacks Expanding the Enterprise Attack Surface
SANS Institute Intermediate 8mo ago
📚 Coursera Courses Opens on Coursera · Free to audit
1 / 3 View all →
Digital Forensics for Pentesters - Hands-On Learning
📚 Coursera Course ↗
Self-paced
Digital Forensics for Pentesters - Hands-On Learning
Opens on Coursera ↗
Routing, Network Devices, and Security
📚 Coursera Course ↗
Self-paced
Routing, Network Devices, and Security
Opens on Coursera ↗
Introduction to Cybersecurity Tools & Cyberattacks
📚 Coursera Course ↗
Self-paced
Introduction to Cybersecurity Tools & Cyberattacks
Opens on Coursera ↗
Data Visualization & Advanced App Logic
📚 Coursera Course ↗
Self-paced
Data Visualization & Advanced App Logic
Opens on Coursera ↗
Introduction to Bash Shell Scripting
📚 Coursera Course ↗
Self-paced
Introduction to Bash Shell Scripting
Opens on Coursera ↗
Incident Response and Risk Management
📚 Coursera Course ↗
Self-paced
Incident Response and Risk Management
Opens on Coursera ↗