SANS Institute

SANS Institute

Views:
2,688,311
Subscribers:
63,600
Videos:
1,140
Duration:
21:00:55:13
United States
United States

SANS Institute is an American YouTube content creator with at least 63.6 thousand subscribers. He published around 1.14 thousand videos which altogether total at least 2.69 million views.

Created on ● Channel Link: https://www.youtube.com/channel/UC2uPNhGken-ogEpJDi4ly6w





All Videos by SANS Institute



PublishedVideo TitleDurationViewsCategoryGame
2020-04-21Self-Compiling Malware | SANS@MIC Talk57:041,302
2020-04-18C2 Matrix | SANS@MIC Talk58:271,101Guide
2020-04-14SANS Live Online - New Online Training Platform0:3116,412
2020-04-14Successful Infosec Consulting, Getting Clients Deep Dive | SANS@MIC Talk1:00:10490
2020-04-14Check out SEC573! More Python3! More Pywars! | SANS@MIC Talk1:12:282,630
2020-04-10How Threats are Responding to COVID-19 | STAR Webcast1:00:33908Guide
2020-04-09Take Back The Advantage - Cyber Deception for the Win | SANS@MIC Talk1:01:55931
2020-04-07Pen Testing ICS and Other Highly Restricted Environments | SANS@MIC Talk1:07:093,579Guide
2020-04-07Domain Password Auditing with the Cloud | SANS@MIC Talk1:17:29302
2020-04-07SANS Institute - Self Paced Online Training2:239,768
2020-04-06ZOMG It's ZOOM! - Don't worry, it's safe. As long as you follow some rules. - SANS Webcast51:461,357Show
2020-04-03What Every Pen Tester Needs to Know About ICS35:002,688
2020-04-02Are You Certifiable? | SANS@MIC Talk46:49795Guide
2020-04-01The Hackers Apprentice | SANS@MIC Talk1:18:18750
2020-03-31Pen Testing ICS and Other Highly Restricted Environments - SANS Pen Test HackFest Summit 201934:151,392Guide
2020-03-31Stealth persistence strategies | SANS@MIC Talk1:05:381,286
2020-03-27Attacking Serverless Servers: Reverse Engineering the AWS, Azure, and GCP Function Runtime1:01:331,831
2020-03-25xHunt - An Anime Fan's Attack Campaign in the Middle East | STAR Webcast1:02:04629
2020-03-24I'm Sorry Dave, I Can't Do That: Practical Machine Learning for Information Security | SANS@MIC Talk1:32:051,160Guide
2020-03-24Building Your Foundation: Getting Started in Digital Forensics | SANS@MIC Talk58:412,719
2020-03-24Real-Time OSINT: Investigating Events as They Happen | SANS OSINT Summit 202024:3443,956
2020-03-24Securing Your Kids Online59:511,500
2020-03-23How I Learned to Stop Worrying and Love TLS | SANS@MIC Talk47:50404
2020-03-19Preventing Email Phishing3:561,444
2020-03-19Securely Working Remotely2:433,714
2020-03-19Creating a Cyber Secure Home3:3011,651
2020-03-19Detecting and Defending Social Engineering Attacks4:2918,221
2020-03-18Deployment Kit for Securing Your Workforce at Home43:13454Guide
2020-03-18Understanding SANS CyberCast - So Much More Than Live Virtual Training14:02535Guide
2020-03-18OUTFIGHT: Leveraging Automation & Machine Learning7:12149
2020-03-18OUTMANEUVER: Changing the Attack Surface4:10123
2020-03-18OUTPERFORM: Strategies to Get in Front of Attacks7:3489
2020-03-17Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk1:11:2131,761Guide
2020-03-17Weaponizing the Deep Web | SANS OSINT Summit 202033:5319,784
2020-03-10Serverless Security: Attackers and Defenders | SANS Cloud Security Summit 201937:061,381
2020-03-03This Will Never Work: Tales from Disappointingly Successful Pen Tests | SANS SOC Summit 201931:23758
2020-02-25Rapid Recognition and Response to Rogues | SANS Security Operations Summit 201924:23160
2020-02-18Learning from Breach Reports to Improve Cross-platform Endpoint Monitoring | SANS SOC Summit 201932:15525
2020-02-13Cyber Threats to Electric Industry - What You Need to Know | STAR Webcast1:01:04970Show
2020-02-10Cloud Security Automation: From Infrastructure to App | SANS Cloud Security Summit 201931:412,181
2020-02-03Virtuous Cycles: Rethinking the SOC for Long-Term Success | SANS Security Operations Summit 201931:572,515
2020-01-31Build Effective Cybersecurity Team Skills | SANS Team-Based Training0:59548
2020-01-30The State of Cloud Security: How Does Your Organization Compare? | SANS Cloud Security Summit 201945:002,036
2020-01-27A SOC Technology/Tools Taxonomy – And Some Uses for It | SANS Security Operations Summit 201933:043,327Vlog
2020-01-24Who Done It? Gaining Visibility and Accountability in the Cloud | SANS Cloud Security Summit28:11435
2020-01-22SANS Institute & Trace Labs partner on an OSINT Missing Persons CTF challenge at SANS CDI 20192:091,880
2020-01-17Keep it Flexible: How Cloud Makes it Easier and Harder to Detect Bad Stuff | SANS Cloud Summit26:50464
2020-01-15SPECIAL WEBCAST: What you need to know about the Crypt32.dll / CryptoAPI Flaw47:502,445Show
2020-01-14Mental Models for Effective Searching | SANS Security Operations Summit 201935:13913
2020-01-08Lessons Learned Applying ATT&CK-Based SOC Assessments | SANS Security Operations Summit 201937:303,069
2020-01-02What you Need To Know About The Critical Citrix Gateway (Netscaler) Vulnerability CVE-2019-1978122:495,457
2019-12-10Introducing Core NetWars Continuous 20:426,094
2019-11-19Not giving credit where credit is due - Common Cybersecurity Writing Mistakes4:02252
2019-11-19Including details most readers don't need - Common Cybersecurity Writing Mistakes4:51397
2019-11-19Escalating tensions in difficult situations - Common Cybersecurity Writing Mistakes3:59184
2019-11-19Using FUD to cause anxiety - Common Cybersecurity Writing Mistakes3:45126
2019-11-19Not using parallel structure - Common Cybersecurity Writing Mistakes3:09118
2019-11-19Using more words than necessary - Common Cybersecurity Writing Mistakes5:06153
2019-11-19Applying Inconsistent formatting - Common Cybersecurity Writing Mistakes6:23100
2019-11-19Including indecipherable graphics - Common Cybersecurity Writing Mistakes10:13158
2019-11-19Overstuffing the paragraphs - Common Cybersecurity Writing Mistakes3:40176
2019-11-19Burying the Main Point - Common Cybersecurity Writing Mistakes5:33306
2019-11-01John Hubbard - How were you introduced to SANS?2:08261
2019-11-01John Hubbard -If you’ve completed a 500-level course should you still give thought to taking SEC450?1:26196
2019-11-01John Hubbard - How to determine whether SEC401 or SEC450 is best?1:14525Guide
2019-11-01John Hubbard - Will SEC 450 carry a certification?0:43306
2019-11-01John Hubbard - At the end of the SEC450 course, what do students come away with?1:32231
2019-11-01John Hubbard - What are some of the key tools covered in SEC450?3:26303
2019-11-01John Hubbard - A high level walk through of each day of the SEC450 course7:04294Walkthrough
2019-11-01John Hubbard - Who exactly was the SEC450 course designed for?1:01146
2019-11-01John Hubbard – About the SEC450: Blue Team Fundamentals course2:25953
2019-11-01John Hubbard - How long did it actually take you to write the SEC450 course?2:0062
2019-11-01John Hubbard - Did you interview other analysts and dial back to your days as an analyst?1:2351
2019-11-01John Hubbard - Why were you the one to create a course for new Blue Teamers?1:3350
2019-11-01John Hubbard - How did teaching at SANS come about?2:15145
2019-11-01John Hubbard - key things that helped him rise from being an analyst to becoming a SOC manager1:17156
2019-11-01John Hubbard - some of the early challenges as a young SOC analyst2:34448
2019-11-01John Hubbard - aspirations of becoming an engineer1:38133
2019-11-01Introducing John Hubbard0:22252
2019-10-30Security Awareness Recognition Program | SANS Security Awareness Summit20:53679
2019-10-30The Creative Process Behind Fun, Low-Budget Videos | SANS Security Awareness Summit22:07721
2019-10-30How to Build Your Own Escape Room | SANS Security Awareness Summit21:322,441Guide
2019-10-30Online Digital Scavenger Hunt: Engaging Security Awareness | SANS Security Awareness Summit26:182,293
2019-10-30Latest Techniques in Hacking the Human | SANS Security Awareness Summit31:225,664
2019-10-29What's it like being a SANS instructor0:44271
2019-10-29What sets SANS apart from other cyber security training providers0:52107
2019-10-02Classifying Evil: Lessons from Hunting Human Traffickers | SANS Threat Hunting & IR Summit47:27660
2019-09-23Top 10 Writing Mistakes in Cybersecurity and How You Can Avoid Them56:027,244Guide
2019-08-27SANS Pen Test HackFest Summit & Training 2019: Sneak Peek0:56782
2019-08-15What you need to know about SEC555: SIEM with Tactical Analysis3:373,535Guide
2019-08-14ATT&CKing Your Enterprise: Adversary Detection Pipelines & Adversary Simulation55:181,885
2019-08-14Gaining Endpoint Log Visibility in ICS Environments - SANS ICS Security Summit 201936:55816Vlog
2019-08-14What you need to know about SEC530: Defensible Security Architecture and Engineering3:444,945
2019-08-13What you need to know about SEC503: Intrusion Detection In-Depth4:364,349
2019-08-12What you need to know about SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis2:059,507
2019-08-06Preventing Your Physical Access Control System from Being Used Against You - SANS ICS Summit 201932:49582
2019-08-01Practical Solutions to Supply Chain Attacks - SANS ICS Security Summit 201938:01935
2019-07-30Network Flow Data: A Cornucopia of Value - SANS Blue Team Summit44:191,192
2019-07-24Scanners, Tunnels, and Sims, Oh My! - SANS ICS Security Summit 201936:421,643
2019-07-23Zero-Trust Networks: The Future Is Here - SANS Blue Team Summit 201949:3940,413