1. | SANS Emergency Webcast: What you need to know about the SolarWinds Supply-Chain Attack | 345 | |
|
2. | The Dark Arts of Social Engineering – SANS Security Awareness Summit 2018 | 95 | |
|
3. | How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017 | 72 | |
|
4. | Russian Cyber Attack Escalation in Ukraine - What You Need To Know! | 47 | |
|
5. | What do you need to know about the log4j (Log4Shell) vulnerability? | 31 | |
|
6. | How to Present Cyber Security Risk to Senior Leadership | SANS Webcast | 28 | Guide |
|
7. | Introduction to Malware Analysis | 21 | |
|
8. | Threat Hunting via Sysmon - SANS Blue Team Summit | 21 | |
|
9. | Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk | 20 | Guide |
|
10. | SANS Cyber Security Foundations Course | 18 | |
|
11. | Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 2019 | 17 | |
|
12. | SOLARWINDS – A SANS Lightning Summit | 16 | Guide |
|
13. | Threat Hunting via DNS | SANS@MIC Talk | 15 | |
|
14. | SANS Webcast - Zero Trust Architecture | 15 | |
|
15. | Introduction to Security Architecture | 13 | |
|
16. | The 20 Critical Security Controls: From Framework to Operational to Implementation | 12 | Guide |
|
17. | Real-Time OSINT: Investigating Events as They Happen | SANS OSINT Summit 2020 | 12 | |
|
18. | Weaponizing the Deep Web | SANS OSINT Summit 2020 | 12 | |
|
19. | Black Swans, Gray Rhinos, and Pink Elephants: Why We Should Think More Slowly About Cybersecurity | 12 | |
|
20. | Applied Data Science and Machine Learning for Cybersecurity - SANS Tactical Detection Summit 2018 | 11 | |
|
21. | Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them | 11 | |
|
22. | SANS Institute - GIAC Certifications | 11 | |
|
23. | I Want to Work in Cybersecurity...Whatever That Means! | 10 | Guide |
|
24. | Purple Teaming Explained | 10 | |
|
25. | Introduction to Reverse Engineering for Penetration Testers – SANS Pen Test HackFest Summit 2017 | 10 | |
|
26. | Ransomware - Do You Pay It Or Not? - Experts debate the costs ethics around paying ransomware - SANS | 9 | |
|
27. | Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk | 9 | Guide |
|
28. | What You Need to Know About OpenAI's New ChatGPT Bot - And How it Affects Cybersecurity? SANS Panel | 9 | |
|
29. | SANS Holiday Hack Challenge 2021 Q&A with Ed Skoudis | 8 | |
|
30. | What You Need to Know About the Windows DNS Vulnerability - CVE-2020-1350 | 8 | |
|
31. | Hunting for Post-Exploitation Stage Attacks with Elastic Stack and the MITRE ATT&CK Framework | 8 | Guide |
|
32. | Ransoming Critical Infrastructure: Ransomware Attack on Colonial Pipeline - SANS Emergency Webcast | 7 | |
|
33. | How to Become a Cybersecurity Expert: Stories and Lessons from SANS’ Nik Alleyne | 7 | Guide |
|
34. | SANS Threat Analysis Rundown (STAR) | Live Stream | 7 | |
|
35. | Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019 | 7 | Guide |
|
36. | SANS Virtual Summits Will Be FREE for the Community in 2021 | 7 | |
|
37. | Find_Evil - Threat Hunting | SANS@MIC Talk | 7 | |
|
38. | Job Role Spotlight: Cyber Threat Intelligence | 6 | |
|
39. | CVE-2022-26809 MS-RPC Vulnerability Analysis - SANS Institute | 6 | |
|
40. | Why Level Up with SANS SEC401? | 6 | |
|
41. | Meet SANS Senior Instructor: Mark Baggett | 6 | Guide |
|
42. | SANS Webcast - Consuming OSINT: Watching You Eat, Drink, and Sleep | 6 | Show |
|
43. | What’s New in SEC401: Security Essentials Bootcamp Style | 6 | |
|
44. | The 14 Absolute Truths of Security | 6 | |
|
45. | Checkm8, Checkra1n and the new "golden age" for iOS Forensics | SANS@MIC Talk | 6 | |
|
46. | SANS Institute | 6 | |
|
47. | SANS Cybersecurity Programs for the Department of Defense | 6 | |
|
48. | Reality Check: An Honest Look at Cybersecurity Jobs | 6 | |
|
49. | Introduction to Linux | 6 | |
|
50. | PowerShell 2020: State of the Art / Hack / Infection - SANS@Mic Keynote Network Security | 6 | |
|
51. | Live with Rob T Lee | RSA Conference 2022 | 6 | Discussion |
|
52. | Risky Business: Careers in GRC | 5 | |
|
53. | Panel | Self-Management Strategies for Avoiding Burnout, Staying Healthy, and Getting Stuff Done | 5 | |
|
54. | Getting Started: Your First Two Years in Your Cybersecurity Career | 5 | |
|
55. | I Want to Work in Cybersecurity...Whatever That Means! - SANS New to Cyber Summit | 5 | |
|
56. | Ransomware: ¿se paga o no se paga? - Los expertos debaten | 5 | |
|
57. | CISSP Cram Session | 5 | |
|
58. | Fast-Track Your Cybersecurity Career | 5 | |
|
59. | The 14 Absolute Truths of Security | SANS@MIC Talk | 5 | |
|
60. | Why SecDevOps is the New Way in Cybersecurity | 5 | |
|
61. | Black Leaders in Cyber with Darold Kelly, Jr. | SANS+HBCU | 5 | |
|
62. | SANS Webcast - Trust No One: Introducing SEC530: Defensible Security Architecture | 5 | Show |
|
63. | HIPAA With Two A’s | 5 | |
|
64. | Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking | 5 | |
|
65. | Welcome to SANS Community CTF - Services Challenges | 5 | |
|
66. | Leveraging Telegram for OSINT purposes | SANS@MIC Talk | 5 | Guide |
|
67. | The Role of Cryptocurrency in Ransomware Negotiations and Other Cybercrimes | 5 | |
|
68. | Security Isn’t Just a Job, It’s a Lifestyle: Tips for Ransomware Prevention | 4 | |
|
69. | Self-Compiling Malware | SANS@MIC Talk | 4 | |
|
70. | Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime | 4 | |
|
71. | SANS Hacker Tools & Incident Handling Training Course: SEC504 with Kevin Tyers | 4 | |
|
72. | Part 2: Rekt Casino Hack - What?! There are Critical Security Controls We Should Follow? | 4 | |
|
73. | Hands-On Learning: How and Why You Should Build a Home Lab | 4 | Preview |
|
74. | Protecting the Cloud from Ransomware | Host: Ryan Chapman | June 20, 2023 | 4 | |
|
75. | The Top Ten Reasons It’s GREAT to Be a Pen Tester - SANS Pen Test HackFest Summit 2018 | 4 | |
|
76. | Communicating Cyber to the Board Should Not Be Scary - Cybersecurity Leadership Summit 2021 | 4 | |
|
77. | How to Get Experience When You Have No Experience | 4 | Guide |
|
78. | Cloud Security Begins with the Shared Responsibility Model | 4 | |
|
79. | Building a Cybersecurity Program From the Ground Up | 4 | |
|
80. | Top Cybersecurity Risks 2022 | 4 | |
|
81. | Job Role Spotlight: Incident Detection & Response | 4 | |
|
82. | Building & Sustaining TPRM Programs for e-Commerce Resilience - Cybersecurity Leadership Summit 2021 | 4 | |
|
83. | Taking the Plunge: Advice from People Who Literally Wrote the Book on Cybersecurity Careers Panel | 4 | |
|
84. | Kolide & OSQuery: How to Build Solid Queries and Packs for Detection and Threat Hunting | 4 | Guide |
|
85. | SANS VetSuccess Academy Overview | 4 | |
|
86. | Spooky RYUKy: The Return of UNC1878 | SANS STAR Webcast | 4 | Show |
|
87. | Windows Command Line & Intro to PowerShell | 4 | |
|
88. | Why Being a Destructive Architect is the Way Forward for Black in Tech | 4 | |
|
89. | SANS OnDemand Cyber Security Courses | 4 | |
|
90. | SANS Webcast - YARA - Effectively using and generating rules | 4 | Show |
|
91. | Cyber Executive Communications Master Class | 3 | |
|
92. | New2Cyber? Everything You Need to Know To Start Your Cybersecurity Career | 3 | Guide |
|
93. | What do you need to know about the log4j (Log4Shell) vulnerability? | 3 | |
|
94. | Applying the Science of Human Behavior to Cybersecurity | 3 | |
|
95. | Your Career in Application Security | 3 | |
|
96. | Domain Password Auditing with the Cloud | SANS@MIC Talk | 3 | |
|
97. | Information Security Training from SANS Institute - Student Testimonials | 3 | Guide |
|
98. | What Every Pen Tester Needs to Know About ICS | 3 | |
|
99. | What's new with SANS SEC301 Introduction to Cyber Security? | 3 | |
|
100. | What Do I Need to Know About CVE-2020-5902; the F5 Networks BigIP RCE Vulnerability | 3 | |
|