Channel Avatar

SANS Cyber Defense @UCCtOSdF1YCUeh_lsbPWIQoQ@youtube.com

21K subscribers - no pronouns :c

The Cyber Defense curriculum, epitomizes security profession


01:06:40
Enhanced Vendor Risk Assessments: Maximize Risk Reduction and Strengthening Vendor Relations
03:38
Get to Know Sean Thomas
00:40
Who is SEC401 for?: Security Essentials for Everyone!
00:58
Why Take SEC401?
00:50
SEC401 Labs: Finding Vulnerabilities Caused by Rushed Production
00:42
SEC401 Labs: Investigating Phishing Attacks
01:12
SEC401 Labs: Preventing Data Loss and Insider Threats
00:51
SEC401 Labs: Addressing AWS Compromise Issues
00:27
What is the Goal of SEC401?
00:42
What Is a Next-Gen Lab? | SANS SEC401
02:16
Meet Rich Greene: New SEC301 Instructor | Cybersecurity Expert Introduction
28:07
Detecting Command and Control Frameworks via Sysmon and Windows Event Logging
28:58
Simplifying SSH Key Management: Leveraging ssh config for Security and Efficiency
30:00
Cracking the Code: The Role of Programming in Information Security
31:01
Relentless Defense - Rules for Security Operations That Keep Attackers Off Your Network
31:21
Unlocking Cybersecurity: From Zero to Hero in the Digital Age
35:04
AI Powered BladeRunners: The Role of AI in Implementing Zero Trust
31:24
Breach Data Infrastructure
27:01
A View From the Trenches
26:57
OSINT Psychology: Understanding the Human Element of Intelligence Gathering
34:15
Uncover the Invisible Gold Mines: How to Dump Raw Data From TikTok
32:04
Trailblazer: Piercing the Veil of VehicleSecrets with OSINT Alchemy
37:21
A Practical Guide To OSINT On the Russian Internet
34:45
Stunt OSINT: AI and Content Networking Display
35:04
From the Public Archive to the Wayback Machine: Thinking Like a Historian for OSINT Practitioners
27:31
Every Contact Leaves a Trace
24:09
Oh My Stars! Using Astronavigation Techniques to Do Image Geo-Positioning
35:07
Telegram 101 to 401
31:52
Maximizing Social Media Data Extraction Dumping and Preserving Content for OSINT
36:37
toADS Hunting Online Advertisements
30:04
Identifying the Secret Military Helicopters of Washington, D C
47:16
Keynote | Humans Are More Important Than Hardware
34:36
Defining and Defending the GenAI Supply Chain
29:07
AI and Machine Learning For the Win!
31:01
Common Security Pitfalls: Don't Worry You're Not Alone
51:24
Using OSINT and AI to Tackle Disinformation and Analyze Information
29:13
Who Knew Grandpa was a Supply Chain Security Expert?
31:33
From Cyber Lemons to Lemonade: A Refreshing Take on Exposed Data
25:40
Python Applications are a Pain
28:30
A QUICk decode
01:11:07
Threat Detection Trends 2023
01:02:44
Open Source Tools and Techniques for AML and Sanctions Compliance
32:03
Decoding Russian Propaganda, Disinformation & Military Strategy: The Role of Open-Source Intel
37:55
Demystifying Data Dumps
33:56
The Importance of Reproducable Methodologies in OSINT Investigations
25:59
Lessons Learned From Using OSINT to Track Cybercrime in LATAM
26:15
OSINT Uncovered: Enhancing Investigations with the ObSINT Guidelines
27:28
The Puzzle Palace Model in OSINT Analytic Mindset
44:47
Uncovering Law Enforcement Activities: Darknet Vendor OSINT Perspectives
38:12
Tips & Tricks For Digital Dumpster Diving
28:38
Unlocking the Digital Landscape: Exploring the Power of OSINT for a Connected World
33:57
The Growth of Global Election Disinformation: The Role & Methodology of Govt-linked Cyber Actors
01:02:50
Hunting for Suspicious HTTPS and TLS Connections
01:20:50
What does it take to author a cybersecurity book?
00:31
Join us for the SANS Open-Source Intelligence (OSINT) Summit 2023 - September 22!
53:41
The Risk to Space: Satellite Communications Systems and Ground Networks as Attack Targets
34:50
Drop It Like It's Qbot Separating malicious droppers, loaders, and crypters from their payloads
01:23:19
Panel | 1%: Tiny Gains producing Big Improvements
32:07
Zero Trust Architecture: Beyond Proxy or Point Solutions
30:46
Ecosystem of Insights: Building Operation Dashboards That Enable Teams