101. | Information Security Training from SANS Institute - Student Testimonials | 3 | Guide |
|
102. | Learn more about SANS SEC301: Introduction to Cyber Security | 3 | |
|
103. | Unconventional Logging and Detection - SANS Tactical Detection Summit 2018 | 3 | Vlog |
|
104. | Cyber Wars: The Legal Force Awakens | 3 | Guide |
|
105. | SANS Emergency Webcast: Follina MSDT (MS Word) 0-day - Analysis and Remediation w/ Jake Williams | 3 | Guide |
|
106. | Unleashing AI on Red Team Tactics and Malware Development | Host: Thomas Wolfe | June 6, 2023 | 3 | |
|
107. | SANS Training in One Word | 3 | |
|
108. | Part 1: Rekt Casino Hack - Business Security Strategy, Policies, and Leadership Gone Wrong | 3 | |
|
109. | Sleeping with the Enemy: A Best Practice Guide for Attacker Engagement | 3 | Guide |
|
110. | Detecting and Defending Social Engineering Attacks | 3 | |
|
111. | Are You Certifiable? | SANS@MIC Talk | 3 | Guide |
|
112. | OSINT: Not Just Offensive - SANS Blue Team Summit | 3 | |
|
113. | Cleaning Up Our Cyber Hygiene | 3 | Guide |
|
114. | Cyber Executive Communications Master Class | 3 | |
|
115. | SANS Live Online Interactive Live Lab Environment Demo: Slack, Local and Remote Lab Demonstrations | 3 | |
|
116. | The Anatomy of a Targeted Industrial Ransomware Attack | 3 | |
|
117. | Applying the Science of Human Behavior to Cybersecurity | 3 | |
|
118. | Ransomware - Pagar ou não pagar? – Especialistas debatem | 3 | |
|
119. | Domain Password Auditing with the Cloud | SANS@MIC Talk | 3 | |
|
120. | Ransomware and Healthcare: A Deadly Combination | 3 | |
|
121. | The Real STEM Sadie: Owning Your Story | 3 | |
|
122. | Kaseya Ransomware Reaction - Lessons Learned | 3 | |
|
123. | How to Work With Jerks | 3 | Guide |
|
124. | Latest Techniques in Hacking the Human | SANS Security Awareness Summit | 3 | |
|
125. | What do you need to know about the log4j (Log4Shell) vulnerability? | 3 | |
|
126. | CISSP Test-Taking Tactics: Successfully Navigating Adaptive Exams | 3 | |
|
127. | Using the OSINT Mind-State for Better Online Investigations | SANS@MIC Talk | 3 | |
|
128. | What Every Pen Tester Needs to Know About ICS | 3 | |
|
129. | Your Career in Application Security | 3 | |
|
130. | The Secret to Vulnerability Management | 3 | Guide |
|
131. | Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk | 3 | |
|
132. | What Do I Need to Know About CVE-2020-5902; the F5 Networks BigIP RCE Vulnerability | 3 | |
|
133. | Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them | 3 | Guide |
|
134. | SANS Netwars Core Tournament Version 8 Demo | 3 | |
|
135. | Holiday Hack Revisited: Past Winners Tell All | 3 | |
|
136. | The Clouds Are Out to Get Me! - SANS Pen Test HackFest Summit 2018 | 3 | |
|
137. | What you Need to Know about CVE-2021-30860 aka FORCEDENTRY w/ Chris Crowley | 2 | |
|
138. | 2023 SANS Difference Makers Awards Ceremony | 2 | |
|
139. | Becoming a CISO: Leading Transformation | 2 | |
|
140. | The Frontier of Cybersecurity: Defending Against AI-Based Threats | 2 | |
|
141. | Virtuous Cycles: Rethinking the SOC for Long-Term Success | SANS Security Operations Summit 2019 | 2 | |
|
142. | Fireside Chat | Leading Cybersecurity: Risks, Relationships, and Resilience | 2 | |
|
143. | SANS Cyber Threat Intelligence Summit 2023 Graphic Illustrations | 2 | |
|
144. | Technologies Disrupting Financial Audit Process | 2 | Vlog |
|
145. | Promoted from CISO to CIO | 2 | |
|
146. | Cyber Security Expertise - Where Should You Begin? | 2 | |
|
147. | log4j(Log4Shell)의 취약점에 대해 우리가 알아야 할 사항들은 무엇일까요? | 2 | |
|
148. | Zero Hype Real-World Applied AI/ML in Cybersecurity | 2 | |
|
149. | Signal Safari: Investigating RF Controls with RTL-SDR – SANS Pen Test HackFest 2017 | 2 | |
|
150. | A Recap from Chris Krebs's Keynote - SANS Cyber Threat Intelligence 2021 | 2 | |
|
151. | Amp Up Your Career: Careers in Energy and Critical Infrastructure Cybersecurity | 2 | |
|
152. | How Did I Get Here? | 2 | |
|
153. | Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit | 2 | |
|
154. | SANS Class Prep - Mounting an ISO file in macOS | 2 | Guide |
|
155. | Good on Paper: Packaging Your Skills and Experience (Panel) | 2 | |
|
156. | Owning Your Narrative: Lessons from #SharetheMicinCyber | Camille Stewart | 2 | |
|
157. | Meet SANS Certified Instructor: Dean Parsons | 2 | |
|
158. | Don't Get Popped: Vulnerability Management Do's and Don'ts | 2 | |
|
159. | Three Cloud Security Differentiators for Leaders | 2 | Guide |
|
160. | Classifying Evil: Lessons from Hunting Human Traffickers | SANS Threat Hunting & IR Summit | 2 | |
|
161. | Becoming the Adversary: Creating a Defensive Lab to Understand the Offense | 2 | |
|
162. | You Got a Job in Cybersecurity!... Now What?! (Panel) | 2 | |
|
163. | You Got a TOAD: A Novel Technique for Dropping Ransomware | 2 | |
|
164. | Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk | 2 | |
|
165. | Build it Once, Build it Right: Architecting for Detection - SANS Tactical Detection Summit 2018 | 2 | |
|
166. | The SANS Cyber Academy Programme, UK | 2 | |
|
167. | Privesc Playground - SANS Pen Test HackFest Summit 2017 | 2 | |
|
168. | Unpacking the New SEC Regulations with John Pescatore | 2 | |
|
169. | Panel: Safety Amongst Strangers: Why Psychological Safety Matters When Building Your Security Teams | 2 | Vlog |
|
170. | What the Heck is Going on with Cybersecurity Higher Ed? | Host: Ed Skoudis | May 30, 2023 | 2 | |
|
171. | Critical Infrastructure Protection– Part 4 of 4 SANS Emerging Cyber Guidance to Ukraine-Russia War | 2 | |
|
172. | Promoting Your Path: From Engineer to CISO | 2 | Guide |
|
173. | From Nothing to Something: Getting Experience When You Have No Experience | 2 | Guide |
|
174. | SANS Cyber Solutions Fest 2022 | 2 | |
|
175. | The Value of a SANS Training & GIAC Certification | 2 | |
|
176. | SANS Cybersecurity Standards Scorecard (2021 Edition) | 2 | |
|
177. | Small But Mighty: Building the Next Generation of Cybersecurity Professionals With Limited Resources | 2 | |
|
178. | SANS Neurodiversity in Cybersecurity Summit 2023 Graphic Illustrations | 2 | |
|
179. | Characteristics of successful CISO | 2 | |
|
180. | 7 Tips for Working with a Recruiter | 2 | |
|
181. | SANS Institute Celebrates International Women's Day | 2 | |
|
182. | Top 5 Things to Know About Azure Active Directory Logs - SANS Tactical Detection Summit | 2 | Vlog |
|
183. | SANS CyberStart | 2 | |
|
184. | Understanding Ransomware Threats to ESXi: Essential Insights | 2 | |
|
185. | What you need to know about SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis | 2 | |
|
186. | Why Zero Trust is the Key to Cybersecurity in 2024 and Beyond | 2 | |
|
187. | Introducing the NEW SANS Pen Test Poster | 2 | |
|
188. | Live at SANS Pen Test HackFest 2021 | 10a | 2 | |
|
189. | The Foundation of Accelerating your Cybersecurity Career - SANS@Mic Keynote w/ James Lyne | 2 | |
|
190. | SANS CyberCity | 2 | |
|
191. | Landing a Job: Resumes and the Application Process | 2 | |
|
192. | Panel: Hack Your Growth - #LevelUP | 2 | |
|
193. | The SANS+HBCU Cyber Academy Celebration: University of the Virgin Islands | 2 | |
|
194. | Part 3: Rekt Casino Hack - Feeble Security Culture Disconnected from Business Objectives | 2 | Guide |
|
195. | Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | 2 | |
|
196. | Lessons Learned from Cloud Security Incidents, Past and Present | Dave Shackleford | 2 | |
|
197. | Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling | 2 | |
|
198. | Cybersecurity Charisma: Unlocking Security Culture and Leadership | 2 | |
|
199. | Black Girls Hack Too | 2 | |
|
200. | CISOs Can Report to CIOs and Be Successful | 2 | |
|