SANS Institute

SANS Institute

Views:
2,690,536
Subscribers:
63,800
Videos:
1,147
Duration:
21:00:55:13
United States
United States

SANS Institute is an American YouTube content creator with at least 63.8 thousand subscribers. He published around 1.15 thousand videos which altogether total at least 2.69 million views.

Created on ● Channel Link: https://www.youtube.com/channel/UC2uPNhGken-ogEpJDi4ly6w





Top 200 Videos With The Longest Duration by SANS Institute


Video TitleDurationCategoryGame
101.#ShareTheMicInCyber and SANS: From Speaking Opportunities to Faculty Positions1:00:21
102.Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk1:00:19
103.Behind The Scenes Of Law Enforcement And Private Industry Cooperation | STAR Webcawst1:00:18
104.CISSP Cram Session1:00:17
105.What Your Privacy Officer Is Trying To Tell You...If only you would listen.1:00:14
106.To Click or Not to Click? | Host: Lodrina Cherne | October 3, 20231:00:11
107.Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk1:00:10
108.2024 Cyber Defense Trends and Predictions1:00:10
109.The 20 Critical Security Controls: From Framework to Operational to Implementation1:00:09Guide
110.Waiting for a cyber range exercise is not enough | SANS@MIC Talk1:00:09
111.Shellcode Analysis 101 | SANS@MIC Talk1:00:09
112.The Value of Commercial Threat Intelligence Sources | STAR Webcast1:00:03Show
113.Rekt Casino Hack Assessment Operational Series – Putting It All Together Part 4 of 41:00:02
114.Cybersecurity Catalysts: The Difference Makers | Host: Rob T. Lee59:59
115.How to Present Cyber Security Risk to Senior Leadership | SANS Webcast59:58Guide
116.Strategies of a World-Class SOC | Host: John Hubbard | July 18, 202359:55
117.Kolide & OSQuery: How to Build Solid Queries and Packs for Detection and Threat Hunting59:54Guide
118.Introduction to Programming Workshop - SANS Cyber Camp59:54Guide
119.Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them59:53
120.Ransomware and Healthcare: A Deadly Combination59:53
121.Introducing the Newly Updated SANS Training ICS515: ICS Visibility, Detection, and Response59:51Vlog
122.Securing Your Kids Online59:51
123.Cybersecurity Standards Scorecard: 2022 Edition59:51
124.Forward Together: Women in Cyber Leading Change59:38
125.Learning to Combat Ransomware59:37
126.Should Countries Ban Ransomware Payments? | Host: Ryan Chapman | July 25, 202359:36
127.SANS Webcast – Continuous Opportunity: DevOps & Security59:35
128.Ed’s Whacky Winter Wonder Holiday Bonanza | Host: Ed Skoudis | December 12, 202359:34
129.2024 Ransomware Trends and Predictions59:30
130.2024 Industrial Control Systems Trends and Predictions59:25
131.The New ICS418: Training OT Security Managers | REBROADCAST59:15
132.CryptOSINT | Host: Sadie Gauthier | September 5, 202359:09
133.Inside SANS Holiday Hack Challenge 2023 | Host: Ed Skoudis | August 29, 202359:09
134.Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene59:08
135.CVE-2022-26809 MS-RPC Vulnerability Analysis - SANS Institute59:05
136.Vulnerability Prioritization: Peeling Back the Layers59:03
137.You came with *that* plan? You're braver than I thought!59:02Guide
138.Application Security: Web Apps, APIs & Microservices | #Replay59:01
139.Part 2: Rekt Casino Hack - What?! There are Critical Security Controls We Should Follow?58:55
140.Introduction to AI and Leveraging it in Cybersecurity58:49
141.Promoting Your Path: From Engineer to CISO58:45Guide
142.What the Heck is Going on with Cybersecurity Higher Ed? | Host: Ed Skoudis | May 30, 202358:43
143.What Keeps You Up At Night?58:42
144.Building Your Foundation: Getting Started in Digital Forensics | SANS@MIC Talk58:41
145.Technology is the Reasonable Accommodation | SANS Cyber Solutions Fest 202258:39Vlog
146.Identifying & Countering Cognitive Bias58:33Guide
147.Introduction to Security Architecture58:33
148.Protecting the Cloud from Ransomware | Host: Ryan Chapman | June 20, 202358:28
149.Becoming the Adversary: Creating a Defensive Lab to Understand the Offense58:27
150.C2 Matrix | SANS@MIC Talk58:27Guide
151.Cyber Security Expertise - Where Should You Begin?58:26
152.Making Order out of Chaos: How to Deal with Threat Group Names | STAR Webcast58:23Guide
153.The Secret to Vulnerability Management58:18Guide
154.Spooky RYUKy: The Return of UNC1878 | SANS STAR Webcast58:17Show
155.Part 2 - The Achilles Systems Hack Assessment Series: Revisiting Enterprise Controls58:15
156.Vulnerabilities and reports and metrics, oh my!58:15
157.SANS Threat Analysis Rundown (STAR) | Live Stream58:08
158.Your Cloud Security Journey: Key Trends, Capabilities, & Skills58:07
159.smbtimeline - An automated timeline for SMB Traffic | SANS@MIC Talk58:05
160.SANS Emergency Webcast: What you need to know about the SolarWinds Supply-Chain Attack58:01
161.Part 3: Rekt Casino Hack - Security Operations Center Ill-equipped and Unprepared57:56
162.Top 5 Most Common Security Culture Myths and Mistakes | Host: Lance Spitzner | June 27, 202357:52
163.Phase 2: Accelerate and Glide57:51
164.Applying the Science of Human Behavior to Cybersecurity57:50
165.Cleaning Up Our Cyber Hygiene57:45Guide
166.Understand Vulnerability Management Maturity with a Self-Assessment Tool57:39Guide
167.Incident Response in ICS in times of Lockdown | SANS@MIC Talk57:38
168.Cyber Security 101 for Human Resource Professionals57:38
169.The 14 Absolute Truths of Security57:30
170.The 14 Absolute Truths of Security | SANS@MIC Talk57:30
171.Panel: Hack Your Growth - #LevelUP57:24
172.SANS Threat Analysis Rundown57:21
173.SANS Institute57:14
174.Landing a Job: Resumes and the Application Process57:08
175.Self-Compiling Malware | SANS@MIC Talk57:04
176.SANS Webcast - Perimeter Security and Why it is Obsolete57:01Show
177.Information Security Misconceptions 2020 | SANS@MIC Talk56:58Guide
178.SANS Institute56:56
179.Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk56:56
180.Vulnerability Management: Is the Program Effective: Part 3 of 356:46Guide
181.Infosec Snake Wrangling: Intro to Python56:44Guide
182.Course Preview: Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk56:44
183.Introduction to Malware Analysis56:44
184.Cyber Wars: The Legal Force Awakens56:35Guide
185.Skill vs. Background: The Great Cyber Hiring Debate | July 11, 202356:31Discussion
186.Rule-Breakers Unite: Reimagining SANS HackFest56:28
187.In Hot Pursuit: Tracking Ransomware Actors | Ryan Chapman | Aug 22, 202356:24
188.SANS Threat Analysis Rundown (STAR) with Katie Nickels | August 202356:20
189.Panel | Your First Cyber Role: Aspiring Cybersecurity Professional to Employed56:11
190.Threat Hunting via DNS | SANS@MIC Talk56:04
191.Defending Lift and Shift Cloud Applications | SANS@MIC Talk56:03Guide
192.Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them56:02Guide
193.10 Visibility Gaps Every CISO Must Fill | SANS@MIC Talk56:01
194.SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture55:49Show
195.How to Become a Cybersecurity Expert: Stories and Lessons from SANS’ Nik Alleyne55:43Guide
196.Using the Cloud to Provision Infrastructure with Software | SANS@MIC Talk55:33
197.How to work in ways that will make your boss take notice! | SANS Webcast55:27Guide
198.No SQL Injection in MongoDB Applications | SANS@MIC Talk55:25
199.ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation55:18
200.Cyber Leadership Analogies and Metaphors55:17Vlog