1. | SANS Emergency Webcast: What you need to know about the SolarWinds Supply-Chain Attack | 345 | |
|
2. | The Dark Arts of Social Engineering – SANS Security Awareness Summit 2018 | 95 | |
|
3. | How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017 | 72 | |
|
4. | Russian Cyber Attack Escalation in Ukraine - What You Need To Know! | 47 | |
|
5. | What do you need to know about the log4j (Log4Shell) vulnerability? | 31 | |
|
6. | How to Present Cyber Security Risk to Senior Leadership | SANS Webcast | 28 | Guide |
|
7. | Threat Hunting via Sysmon - SANS Blue Team Summit | 21 | |
|
8. | Introduction to Malware Analysis | 21 | |
|
9. | Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk | 20 | Guide |
|
10. | SANS Cyber Security Foundations Course | 18 | |
|
11. | Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019 | 17 | |
|
12. | SOLARWINDS – A SANS Lightning Summit | 16 | Guide |
|
13. | Threat Hunting via DNS | SANS@MIC Talk | 15 | |
|
14. | SANS Webcast - Zero Trust Architecture | 15 | |
|
15. | Introduction to Security Architecture | 13 | |
|
16. | Weaponizing the Deep Web | SANS OSINT Summit 2020 | 12 | |
|
17. | Black Swans, Gray Rhinos, and Pink Elephants: Why We Should Think More Slowly About Cybersecurity | 12 | |
|
18. | The 20 Critical Security Controls: From Framework to Operational to Implementation | 12 | Guide |
|
19. | Real-Time OSINT: Investigating Events as They Happen | SANS OSINT Summit 2020 | 12 | |
|
20. | Applied Data Science and Machine Learning for Cybersecurity - SANS Tactical Detection Summit 2018 | 11 | |
|
21. | Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them | 11 | |
|
22. | SANS Institute - GIAC Certifications | 11 | |
|
23. | I Want to Work in Cybersecurity...Whatever That Means! | 10 | Guide |
|
24. | Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017 | 10 | |
|
25. | Purple Teaming Explained | 10 | |
|
26. | Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk | 9 | Guide |
|
27. | What You Need to Know About OpenAI's New ChatGPT Bot - And How it Affects Cybersecurity? SANS Panel | 9 | |
|
28. | Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS | 9 | |
|
29. | What You Need to Know About the Windows DNS Vulnerability - CVE-2020-1350 | 8 | |
|
30. | Hunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK Framework | 8 | Guide |
|
31. | SANS Holiday Hack Challenge 2021 Q&A with Ed Skoudis | 8 | |
|
32. | SANS Virtual Summits Will Be FREE for the Community in 2021 | 7 | |
|
33. | Ransoming Critical Infrastructure: Ransomware Attack on Colonial Pipeline - SANS Emergency Webcast | 7 | |
|
34. | Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019 | 7 | Guide |
|
35. | How to Become a Cybersecurity Expert: Stories and Lessons from SANS’ Nik Alleyne | 7 | Guide |
|
36. | SANS Threat Analysis Rundown (STAR) | Live Stream | 7 | |
|
37. | Find_Evil - Threat Hunting | SANS@MIC Talk | 7 | |
|
38. | CVE-2022-26809 MS-RPC Vulnerability Analysis - SANS Institute | 6 | |
|
39. | Why Level Up with SANS SEC401? | 6 | |
|
40. | Job Role Spotlight: Cyber Threat Intelligence | 6 | |
|
41. | Introduction to Linux | 6 | |
|
42. | The 14 Absolute Truths of Security | 6 | |
|
43. | PowerShell 2020: State of the Art / Hack / Infection - SANS@Mic Keynote Network Security | 6 | |
|
44. | Live with Rob T Lee | RSA Conference 2022 | 6 | Discussion |
|
45. | Reality Check: An Honest Look at Cybersecurity Jobs | 6 | |
|
46. | Meet SANS Senior Instructor: Mark Baggett | 6 | Guide |
|
47. | SANS Institute | 6 | |
|
48. | What’s New in SEC401: Security Essentials Bootcamp Style | 6 | |
|
49. | Checkm8, Checkra1n and the new "golden age" for iOS Forensics | SANS@MIC Talk | 6 | |
|
50. | SANS Cybersecurity Programs for the Department of Defense | 6 | |
|
51. | SANS Webcast - Consuming OSINT: Watching You Eat, Drink, and Sleep | 6 | Show |
|
52. | Ransomware: ¿se paga o no se paga? - Los expertos debaten | 5 | |
|
53. | CISSP Cram Session | 5 | |
|
54. | Risky Business: Careers in GRC | 5 | |
|
55. | The Role of Cryptocurrency in Ransomware Negotiations and Other Cybercrimes | 5 | |
|
56. | Leveraging Telegram for OSINT purposes | SANS@MIC Talk | 5 | Guide |
|
57. | Getting Started: Your First Two Years in Your Cybersecurity Career | 5 | |
|
58. | Why SecDevOps is the New Way in Cybersecurity | 5 | |
|
59. | Fast-Track Your Cybersecurity Career | 5 | |
|
60. | Welcome to SANS Community CTF - Services Challenges | 5 | |
|
61. | Panel | Self-Management Strategies for Avoiding Burnout, Staying Healthy, and Getting Stuff Done | 5 | |
|
62. | HIPAA With Two A’s | 5 | |
|
63. | The 14 Absolute Truths of Security | SANS@MIC Talk | 5 | |
|
64. | SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture | 5 | Show |
|
65. | Black Leaders in Cyber with Darold Kelly, Jr. | SANS+HBCU | 5 | |
|
66. | I Want to Work in Cybersecurity...Whatever That Means! - SANS New to Cyber Summit | 5 | |
|
67. | Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking | 5 | |
|
68. | Self-Compiling Malware | SANS@MIC Talk | 4 | |
|
69. | The Top Ten Reasons It’s GREAT to Be a Pen Tester - SANS Pen Test HackFest Summit 2018 | 4 | |
|
70. | Building a Cybersecurity Program From the Ground Up | 4 | |
|
71. | Cloud Security Begins with the Shared Responsibility Model | 4 | |
|
72. | Spooky RYUKy: The Return of UNC1878 | SANS STAR Webcast | 4 | Show |
|
73. | Security Isn’t Just a Job, It’s a Lifestyle: Tips for Ransomware Prevention | 4 | |
|
74. | Building & Sustaining TPRM Programs for e-Commerce Resilience - Cybersecurity Leadership Summit 2021 | 4 | |
|
75. | Job Role Spotlight: Incident Detection & Response | 4 | |
|
76. | Kolide & OSQuery: How to Build Solid Queries and Packs for Detection and Threat Hunting | 4 | Guide |
|
77. | SANS OnDemand Cyber Security Courses | 4 | |
|
78. | SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers | 4 | |
|
79. | Hands-On Learning: How and Why You Should Build a Home Lab | 4 | Preview |
|
80. | SANS VetSuccess Academy Overview | 4 | |
|
81. | Communicating Cyber to the Board Should Not Be Scary - Cybersecurity Leadership Summit 2021 | 4 | |
|
82. | Part 2: Rekt Casino Hack - What?! There are Critical Security Controls We Should Follow? | 4 | |
|
83. | Top Cybersecurity Risks 2022 | 4 | |
|
84. | Windows Command Line & Intro to PowerShell | 4 | |
|
85. | Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime | 4 | |
|
86. | SANS Webcast - YARA - Effectively using and generating rules | 4 | Show |
|
87. | Protecting the Cloud from Ransomware | Host: Ryan Chapman | June 20, 2023 | 4 | |
|
88. | Taking the Plunge: Advice from People Who Literally Wrote the Book on Cybersecurity Careers Panel | 4 | |
|
89. | Why Being a Destructive Architect is the Way Forward for Black in Tech | 4 | |
|
90. | How to Get Experience When You Have No Experience | 4 | Guide |
|
91. | Using the OSINT Mind-State for Better Online Investigations | SANS@MIC Talk | 3 | |
|
92. | How to Work With Jerks | 3 | Guide |
|
93. | Vulnerability Management: Finding Context - Part 1 of 3 | 3 | |
|
94. | Analysis 101 for the Incident Responder | 3 | Guide |
|
95. | SANS Netwars Core Tournament Version 8 Demo | 3 | |
|
96. | Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk | 3 | |
|
97. | SANS SEC503: Intrusion Detection In-Depth. Part-I | 3 | |
|
98. | SANS Institute | 3 | |
|
99. | Ransomware and Healthcare: A Deadly Combination | 3 | |
|
100. | What's new with SANS SEC301 Introduction to Cyber Security? | 3 | |
|