SANS Institute

SANS Institute

Views:
2,689,731
Subscribers:
63,700
Videos:
1,143
Duration:
21:00:55:13
United States
United States

SANS Institute is an American YouTube content creator with at least 63.7 thousand subscribers. He published around 1.14 thousand videos which altogether total at least 2.69 million views.

Created on ● Channel Link: https://www.youtube.com/channel/UC2uPNhGken-ogEpJDi4ly6w





Top 300 Most Viewed Videos by SANS Institute


Video TitleViewsCategoryGame
201.Modern Malware Demands Modern Defense – SANS ICS Summit 20181,678
202.Security Isn’t Just a Job, It’s a Lifestyle: Tips for Ransomware Prevention1,665
203.Landing a Job: Resumes and the Application Process1,655
204.ChatGPT with Dave Hoelzer | Neurodiversity with Jen Santiago | Host Rob Lee | April 4, 20231,653
205.SANS CyberCity1,647
206.Scanners, Tunnels, and Sims, Oh My! - SANS ICS Security Summit 20191,643
207.Defeating Attackers with Preventative Security1,634
208.Threat Hunting in the Microsoft Cloud: Times They Are a-Changin' | John Stoner1,633
209.Reality Check: An Honest Look at Cybersecurity Jobs1,619
210.DNS: What It Is, What It Does, and How to Defend It1,618Guide
211.Cybersecurity Careers: Where Do You Fit?1,612
212.Vulnerability Prioritization: Peeling Back the Layers1,584
213.Critical Infrastructure Protection– Part 4 of 4 SANS Emerging Cyber Guidance to Ukraine-Russia War1,570
214.Networking 101: Introverts Only1,567
215.Elite SOC Teams Rely on These 4 Steps for Defensive Success | Pt.1 SOC Success1,556
216.The Human Side of Threats: Why it Matters that Adversaries are Human Too | Katie Nickels1,540
217.Cybersecurity Standards Scorecard: 2022 Edition1,518
218.Introduction to AI and Leveraging it in Cybersecurity1,515
219.What the Heck is Going on with Cybersecurity Higher Ed? | Host: Ed Skoudis | May 30, 20231,511
220.2024 SANS Difference Makers Awards Ceremony1,507
221.Network Visualizations: Understand what's happening faster and easier than ever! - SANS Webcast1,505Show
222.Securing Your Kids Online1,500
223.Ransomware Management and Recovery Tactics1,500
224.Building on the Foundations of OSINT with SEC587: Advanced Open-Source Intelligence1,490
225.Discover What Risks Your Organization Should Prioritize for Security Awareness Training1,460
226.Understand Vulnerability Management Maturity with a Self-Assessment Tool1,458Guide
227.Introduction to Docker for security work | SANS@MIC Talk1,446
228.Preventing Email Phishing1,444
229.Part 2: Rekt Casino Hack - Weak Security Program, Unprotected Systems, and Poor Detection & Response1,442
230.Cloud Wars; Episode I - The IAM Menace1,441
231.Case Study: Airbus1,439
232.Metrics for Managing Human Risk1,438
233.The Science of Security: The Psychological Impacts of Security Awareness Programs1,420Vlog
234.SANS Institute Cyber Academy Graduation Day1,409
235.Securing Cloud Deployments: A Red Team Perspective | Matt Burrough1,406
236.SANS VetSuccess Academy: Hands-on Skills1,401Preview
237.The Best Part about Being a SANS Student1,397
238.Pen Testing ICS and Other Highly Restricted Environments - SANS Pen Test HackFest Summit 20191,392Guide
239.Not in Cyber Security? No Problem! Creative Ways to Gain Experience With No Experience1,392
240.The SANS Difference1,387
241.Understanding Ransomware Threats to ESXi: Essential Insights1,385
242.This is Who You Want to Learn From1,385
243.Serverless Security: Attackers and Defenders | SANS Cloud Security Summit 20191,381
244.What do you need to know about the log4j (Log4Shell) vulnerability?1,380
245.SANS Institute Online Training Introduction1,372
246.Privesc Playground - SANS Pen Test HackFest Summit 20171,368
247.Analysis 101 for the Incident Responder1,358Guide
248.Git'ing Users for OSINT: Analysis of All GitHub Users | SANS@MIC Talk1,358
249.ZOMG It's ZOOM! - Don't worry, it's safe. As long as you follow some rules. - SANS Webcast1,357Show
250.Fast-Track Your Cybersecurity Career1,352
251.From Rookie to Rockstar: Kickstart Your Career as a SOC Analyst1,345
252.SANS NEW AI course - AIS247: AI Security for Business Leaders1,342Guide
253.2023 SANS Difference Makers Awards Ceremony1,333
254.Practical Advice for Submitting to Speak at a Cybersecurity Conference1,330
255.What Do I Need to Know About CVE-2020-5902; the F5 Networks BigIP RCE Vulnerability1,314
256.SEC510: Multicloud Security Assessment and Defense | SANS@MIC Talk1,311
257.Getting Started: Your First Two Years in Your Cybersecurity Career1,308
258.What Your Privacy Officer Is Trying To Tell You...If only you would listen.1,304
259.Self-Compiling Malware | SANS@MIC Talk1,302
260.SANS Cybersecurity Training, Certifications & Placement for Veterans1,302
261.Cybersecurity Standards Scorecard | 2023 Edition1,291
262.Stealth persistence strategies | SANS@MIC Talk1,286
263.Top 5 Most Common Security Culture Myths and Mistakes | Host: Lance Spitzner | June 27, 20231,285
264.Ransomware and Healthcare: A Deadly Combination1,281
265.Defending Critical Infrastructure1,279
266.Cyber Security Career Development: Personal Branding1,273
267.Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking1,273
268.Data Privacy Day 20211,271
269.Part 2: Rekt Casino Hack - What?! There are Critical Security Controls We Should Follow?1,261
270.Part 3: Rekt Casino Hack - Security Operations Center Ill-equipped and Unprepared1,251
271.2024 Ransomware Trends and Predictions1,242
272.Solid on the Basics1,242
273.Cyber Leadership Analogies and Metaphors1,238Vlog
274.Multifaceted Extortion: Analysis of Data Exfiltration TTPs Used by Ransomware Threat Actors1,235
275.Leveraging Organizational Change to Build a Strong Security Culture1,218Guide
276.Untapped Potential - SANS Blue Team Summit 20201,217
277.The Myth: You Need to Be an Expert Hacker to Work in Cybersecurity1,204
278.Unleashing AI on Red Team Tactics and Malware Development | Host: Thomas Wolfe | June 6, 20231,200
279.Can you Detect This? | Inside The Ransomware Operator's Toolkit1,200
280.Cyber Executive Communications Master Class1,193
281.Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit1,192
282.The Myth: I'm Not a Target, So I Don't Need to Be Cybersecurity Aware1,173
283.Starting a Career as an Ethical Hacker1,171Guide
284.Meet The Students - SANS HM Gov Cyber Retraining Academy1,166
285.Maldocs: A Bit of Blue, A Bit of Red | SANS@MIC Talk1,165
286.I'm Sorry Dave, I Can't Do That: Practical Machine Learning for Information Security | SANS@MIC Talk1,160Guide
287.Fantastic AWS Hacks and Where to Find Them1,159
288.Cyber Risk Management: Essentials for the Practical CISO1,158Guide
289.Incident Response VS Incident Management | The Incident Commander Series Ep. 11,156The Incident
290.Open Source Intelligence – Part 2 of 4 SANS Emerging Cyber Guidance to the Ukraine-Russia War1,156Guide
291.Catch and Release: Phishing Techniques for the Good Guys | SANS@MIC Talk1,154
292.SANS Institute1,144
293.Blockchain Mining History And Process - A Preview of SEC5541,139Preview
294.The Myth: Cybersecurity Is Only For People in IT1,133
295.Cyber Defense & Threat Hunting – Part 3 of 4 SANS Emerging Cyber Guidance to the Ukraine-Russia War1,126
296.Strategies of a World-Class SOC | Host: John Hubbard | July 18, 20231,123
297.Three Keys To Becoming a Cyber Risk Officer1,122
298.Lessons Learned from Cloud Security Incidents, Past and Present | Dave Shackleford1,118
299.Thinking Outside the Firewall: Unconventional Cybersecurity Journeys | Host: Rich Greene1,111
300.Cyber Warfare Frontlines: Unveiling the Digital Battlefield with Jake Williams1,111