SANS Institute

SANS Institute

Views:
2,690,536
Subscribers:
64,000
Videos:
1,147
Duration:
21:00:55:13
United States
United States

SANS Institute is an American YouTube content creator with at least 64 thousand subscribers. He published around 1.15 thousand videos which altogether total at least 2.69 million views.

Created on ● Channel Link: https://www.youtube.com/channel/UC2uPNhGken-ogEpJDi4ly6w





Top 400 Most Controversial Videos by SANS Institute


Video TitleRatingCategoryGame
301.IAM | The 8 Domains of the Cloud Security Maturity Model14
302.Workforce Readiness | The 8 Domains of the Cloud Security Maturity Model | Part 86Guide
303.Course Preview: Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk6
304.Detection Engineers Unveiled: A Day in the Life and the Path to This Exciting Career11Guide
305.Doing Cloud in China | Kenneth G. Hartman6
306.Graduation Day - SANS HM Gov Cyber Retraining Academy6
307.Using More Words Than Necessary - Common Cybersecurity Writing Mistakes6
308.Overstuffing the Paragraphs - Common Cybersecurity Writing Mistakes7
309.SANS Institute - Certifying Cyber Personnel Who Protect the Electric Grid7
310.Phase 3: Finish Strong7
311.Burying the Main Point - Common Cybersecurity Writing Mistakes7
312.Application & Workload Protection | The 8 Domains of the Cloud Security Maturity Model | Part 57Guide
313.Emerging Cyber Guidance to the Ukraine-Russia War7
314.#BuildYourBrand: Blogging & Podcasting Your Way to Leadership (Panel)7Vlog
315.John Hubbard - What are some of the key tools covered in SEC450?7
316.Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes7
317.Waiting for a cyber range exercise is not enough | SANS@MIC Talk7
318.Infrastructure Architecture & Protection | The 8 Domains of the Cloud Security Maturity Model | Pt 77Guide
319.Announcing 2022 SANS Difference Makers Awards7
320.Understanding SANS CyberCast - So Much More Than Live Virtual Training7Guide
321.Breaking the Mold: How Two Women from Non-Technical Backgrounds Broke into Cybersecurity.9
322.SANS Institute's Lance Spitzner Breaks Down the New White House AI Executive Order12
323.Security West San Diego 20237
324.Demo: The Ukraine Event In a Box – SANS ICS Security Summit 20177
325.Live with Jess Garcia | RSA Conference 20227
326.Technology is the Reasonable Accommodation | SANS Cyber Solutions Fest 20227Vlog
327.SANS Training: What's In It For You7
328.SANS Network Security in Las Vegas7
329.John Hubbard - some of the early challenges as a young SOC analyst7
330.Put a Lid on Those AWS S3 Buckets | Lily Lee and Melisa Napoles7
331.A Culture of Trust: Building and Retaining Cybersecurity Teams7
332.SEC401 Security Essentials: Whose Next-Gen Lab is it Anyway?10
333.Exceeding Expectations and Expanding Capabilities: SANS Training7
334.The New SANS Live Training Experience7
335.Take SEC301 Introduction to Cyber Security at your own pace7
336.A Teenagers Perspective on Helping Your Parents Help You - SANS Cyber Camp7Let's Play
337.SANS ICS Security Summit & Training 20197
338.Fireside Chat | Leading Cybersecurity: Risks, Relationships, and Resilience8
339.The New SANS Live Training Experience7
340.The Only Constant is Change: Tracking Adversary Trends | STAR Webcast7Show
341.Live with Carl Marrelli | RSA Conference 20227
342.Supply Chain Compromises Pt. 2 | The Incident Commander Series Ep. 411
343.The Hackers Apprentice | SANS@MIC Talk8
344.Defending Lift and Shift Cloud Applications | SANS@MIC Talk8Guide
345.Three Cloud Security Differentiators for Leaders16Guide
346.Keep it Flexible: How Cloud Makes it Easier and Harder to Detect Bad Stuff | SANS Cloud Summit8
347.John Hubbard - A high level walk through of each day of the SEC450 course8Walkthrough
348.AI and Its Impact on Cybersecurity8
349.Prioritizing OT Security Efforts: The Five Tactical Things to Accomplish | SANS@MIC Talk8
350.SANS Live at Pen Test HackFest | Tuesday 10am ET8
351.SANS Institute Cybersecurity Training Customer Stories8
352.SANS VetSuccess Academy: Identifying Top Cyber Talent8
353.SANS | GIAC Workforce Report Outcomes Panel Conversation14
354.CYA by Using CIA -- Correctly For a Change | SANS@MIC Talk8
355.The Ethics of AI and ML: Ensuring Cybersecurity and Privacy in Automated Decision Making8
356.The SANS Healthcare Forum 2022: Security Strategy8
357.A Day in the Life: A Sneak Peek into SANS Live Cybersecurity Training Events8
358.SANS Small Business Cyber Summit 20238
359.Deployment Kit for Securing Your Workforce at Home8Guide
360.CISSP® Prep Exam, MGT414, by SANS Institute8
361.This is Who You Want to Learn From8
362.Live at SANS Pen Test HackFest 20218
363.Live with Katie Nickels | RSA Conference 20228
364.For the Win: Aligning Security Initiatives with the Business10
365.Lessons from the Frontlines: Ransomware Attacks, New Techniques, and Old Tricks8
366.Learn to Manage Human Risk | LDR433 Training9
367.A Seat at the Table - Live!8
368.Understanding the New NIS2 Directive: Compliance for EU Businesses8Guide
369.Unpacking the New SEC Regulations with John Pescatore8
370.You Got a Job in Cybersecurity!... Now What?! (Panel)8
371.Detection-In-Depth: Out of Band Monitoring for Critical Process Parameters-Gus Serino8
372.Case Study: Airbus8
373.You've Got This: Success Stories Panel8
374.SANS Live Online Testimonial Compilation9
375.SANS New2Cyber Summit 2023: Reskilling Edition9
376.Security Leadership: How to Increase the Success of Your Projects9Guide
377.Detection and Response | The 8 Domains of the Cloud Security Maturity Model | Part 610Guide
378.Locking It Down: Best Practices for Strong Passwords and Authentication Tools.9
379.Modern Domain Deception - The risk, issues and potentiality | SANS@MIC Talk9
380.Empowering Tomorrow’s Security Leaders with the SANS Transformational Triad10
381.Slow the Revolving Door of Talent. Creative Ways to Keep Your Existing Cyber Talent in Your Org9
382.SANS OnDemand Interactive Live Lab Environment Demo: Local & Remote Lab Demonstrations9
383.Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking9
384.I’ll Let Myself In: How Threats Are Slipping In the Actual Back Door While You’re Looking at9
385.smbtimeline - An automated timeline for SMB Traffic | SANS@MIC Talk9
386.Countdown Begins: SANS to Reveal The Five Biggest Cyber Threats at RSAC 202410
387.Data Protection | The 8 Domains of the Cloud Security Maturity Model11
388.Cybersecurity is Like Ice Cream. There Are a Whole Lot of Flavors9
389.Blueprint Podcast Live9
390.Apples and Oranges?: A CompariSIEM – SANS Security Operations Summit 20189
391.How to Work With Jerks9Guide
392.Using COVID-19 to Exploit Fear, Uncertainty, and Doubt (FUD)9
393.How CISOs Can Better Connect with Their Boards and Make the Case for Cybersecurity9
394.Meet The Students - SANS HM Gov Cyber Retraining Academy9
395.SANS Institute Stay Sharp Training9
396.Forgotten But Not Gone: Gathering NTFS Artifacts of Deletion - SANS Tactical Detection Summit 20189Guide
397.Driving Cybersecurity Change – Establishing a Culture of Protect, Detect and Respond Highlights9Guide
398.The R Word: Retelling the Recent Rise and Resurgence of Resilient Ransomware-as-a-Service Operators9Discussion
399.SANS Emergency Webcast MSDT (MS Word) Zero-day - analysis and remediation9
400.How I Learned to Stop Worrying and Love TLS | SANS@MIC Talk9