@SANSCyberDefense - 355 本の動画
チャンネル登録者数 2.33万人
The Cyber Defense curriculum, epitomizes security professionals on the front-line of defending, day-in and day-out. Heavy emphasis on facilitating the detect...
Pros of ADINT | SANS OSINT Summit 2025
OSINT Resources — What Motivates You? | SANS OSINT Summit 2025
Why Are Security Certificates Useful? | SANS OSINT Summit 2025
Next Era of OSINT | SANS OSINT Summit 2025
Hidden in Plain Site: Leverage Commented Code and Web Metadata for Website Research
Tracing Code Lineage: Using OSINT to Illuminate the Origins of Open Source Software
Investigating Fentanyl Supply Chains: An OSINT Analysis of Chinese Biotechnology Companies
Chinese Social Media Intelligence
Mastering Email OSINT: Techniques for Uncovering Online Footprints
Matt Edmondson's Freestyle AI talk
Beyond Google Lens: How Real Estate Sites Can Assist Geolocation Efforts
Creating Social Network Graphs Using GEPHI
Social Media Discussion with the @OSINTMillennial
Fireside Chat with Jason Barrett
Navigating the Balance Between Public Information and Internal Threat Protection
Hunt Them Where They Play
Ads as Intel: Exploring ADINT's Capability to Pinpoint Personal Locations
Crowdsourced Intelligence: The Role of the OSINT Community in Global Investigations
Shadow Hunting: Advanced OSINT Skills to Navigate the Breach Data Labyrinth
Finding Threat Actor Infrastructure With SSL Certificates
Data Processing Cheat Codes for OSINT at Scale
Back to Basics: Keywords and Listening in
Keynote | The Power of OSINT: Navigating the New Hybrid Cold War
Unlock Advanced OSINT: Inside the Revamped SEC587 Course
Supply Chain Security Incident Response: Strategies for Responding to Emerging Threats
MAVIS: Machine Assisted Vulnerability Identification System
Mastering the Journal
Hybrid Fortresses: How A Defensible Security Architecture Raises the Bar Against Modern Attacks
APT Takedown: The 2024 Blueprint for Cyber Victory
Encrypted DNS Developments
Edge Out Your Next BEC Adversary: Investigation and Prevention Strategies Using OSINT
CYA by Using CIA...Correctly for a Change
Stand out from the crowd! Using PowerShell to automate your daily tasks
The SBOM Makeover
Guardrails for Innovation: Navigating Security Standards in Generative AI and LLMs
The Python Security Pickle
Next Gen SOC
OSINT & Vicarious Trauma
Automating Log Analysis
The Impact of AI with OSINT
Unlock 2024’s Top Cyber Defense Talks | SANS Secure Your Fortress
Building and Scaling SBOM Programs: Navigating the Challenges for Effective Risk Management
Enhanced Vendor Risk Assessments: Maximize Risk Reduction and Strengthening Vendor Relations
Get to Know Sean Thomas
Who is SEC401 for?: Security Essentials for Everyone!
Why Take SEC401?
SEC401 Labs: Finding Vulnerabilities Caused by Rushed Production
SEC401 Labs: Investigating Phishing Attacks
SEC401 Labs: Preventing Data Loss and Insider Threats
SEC401 Labs: Addressing AWS Compromise Issues
What is the Goal of SEC401?
What Is a Next-Gen Lab? | SANS SEC401
Meet Rich Greene: New SEC301 Instructor | Cybersecurity Expert Introduction
Detecting Command and Control Frameworks via Sysmon and Windows Event Logging
Simplifying SSH Key Management: Leveraging ssh config for Security and Efficiency
Cracking the Code: The Role of Programming in Information Security
Relentless Defense - Rules for Security Operations That Keep Attackers Off Your Network
Unlocking Cybersecurity: From Zero to Hero in the Digital Age
AI Powered BladeRunners: The Role of AI in Implementing Zero Trust
Breach Data Infrastructure
A View From the Trenches
OSINT Psychology: Understanding the Human Element of Intelligence Gathering
Uncover the Invisible Gold Mines: How to Dump Raw Data From TikTok
Trailblazer: Piercing the Veil of VehicleSecrets with OSINT Alchemy
A Practical Guide To OSINT On the Russian Internet
Stunt OSINT: AI and Content Networking Display
From the Public Archive to the Wayback Machine: Thinking Like a Historian for OSINT Practitioners
Every Contact Leaves a Trace
Oh My Stars! Using Astronavigation Techniques to Do Image Geo-Positioning
Telegram 101 to 401
Maximizing Social Media Data Extraction Dumping and Preserving Content for OSINT
toADS Hunting Online Advertisements
Identifying the Secret Military Helicopters of Washington, D C
Keynote | Humans Are More Important Than Hardware
Defining and Defending the GenAI Supply Chain
AI and Machine Learning For the Win!
Common Security Pitfalls: Don't Worry You're Not Alone
Using OSINT and AI to Tackle Disinformation and Analyze Information
Who Knew Grandpa was a Supply Chain Security Expert?
From Cyber Lemons to Lemonade: A Refreshing Take on Exposed Data
Python Applications are a Pain
A QUICk decode
🔐 Top Defense Strategies 2024: Inside SANS Secure Your Fortress Event! 🛡️
2024 Cyber Defense Trends and Predictions
Threat Detection Trends 2023
Open Source Tools and Techniques for AML and Sanctions Compliance
Decoding Russian Propaganda, Disinformation & Military Strategy: The Role of Open-Source Intel
Demystifying Data Dumps
The Importance of Reproducable Methodologies in OSINT Investigations
Lessons Learned From Using OSINT to Track Cybercrime in LATAM
OSINT Uncovered: Enhancing Investigations with the ObSINT Guidelines
The Puzzle Palace Model in OSINT Analytic Mindset
Uncovering Law Enforcement Activities: Darknet Vendor OSINT Perspectives
Tips & Tricks For Digital Dumpster Diving
Unlocking the Digital Landscape: Exploring the Power of OSINT for a Connected World
The Growth of Global Election Disinformation: The Role & Methodology of Govt-linked Cyber Actors
Detection Engineering: The Blue Team Cheat Code | Host: Mark Orlando | September 12, 2023
Hunting for Suspicious HTTPS and TLS Connections
What does it take to author a cybersecurity book?
Join us for the SANS Open-Source Intelligence (OSINT) Summit 2023 - September 22!
Fundamentals: 11 Strategies of a World-Class SOC | SANS Blueprint Podcast Season 4 Intro
9285 回視聴 - 2 年前
Strategy 3: Build a SOC Structure to Match Your Organizational Needs | SANS Blueprint Podcast
2225 回視聴 - 1 年前
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence | SANS Blueprint Podcast
2303 回視聴 - 1 年前
Strategy 8: Leverage Tools and Support Analyst Workflow | SANS Blueprint Podcast
813 回視聴 - 1 年前
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously | SANS Blueprint Podcast
594 回視聴 - 1 年前
Strategy 10: Measure Performance to Improve Performance | SANS Blueprint Podcast
671 回視聴 - 1 年前