This comprehensive catalog of more than 60 cyber security courses will advance your technical skills in any focus area, including pen test, cyber defense, forensics, threat intelligence and incident response, security management, critical infrastructure security, and secure development. Explore the full list of courses below, or use the SANS training roadmap to develop a personalized training path of your own.
Whether you're new to the field, a seasoned professional, or an experienced leader in the industry, there's a SANS course that will deliver the knowledge you need, along with relevant, practical hands-on skills you can use immediately.
Security
Course |
Certification |
Course Demo |
Delivery Methods |
SEC301: Introduction to Cyber Security
|
GISF |
SEC301 |
|
SEC401: Security Essentials Bootcamp Style
|
GSEC |
SEC401 |
|
New SEC402: Cybersecurity Writing: Hack the Reader
|
— |
SEC402 |
|
SEC440: Critical Security Controls: Planning, Implementing, and Auditing
|
— |
SEC440 |
|
New SEC450: Blue Team Fundamentals: Security Operations and Analysis
|
— |
SEC450 |
|
SEC455: SIEM Design & Implementation
|
— |
SEC455 |
|
SEC460: Enterprise Threat and Vulnerability Assessment
|
GEVA |
SEC460 |
|
SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
|
— |
SEC487 |
|
SEC501: Advanced Security Essentials - Enterprise Defender
|
GCED |
SEC501 |
|
SEC503: Intrusion Detection In-Depth
|
GCIA |
SEC503 |
|
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
|
GCIH |
SEC504 |
|
SEC505: Securing Windows and PowerShell Automation
|
GCWN |
SEC505 |
|
SEC506: Securing Linux/Unix
|
GCUX |
SEC506 |
|
SEC511: Continuous Monitoring and Security Operations
|
GMON |
SEC511 |
|
SEC524: Cloud Security and Risk Fundamentals
|
— |
— |
|
SEC530: Defensible Security Architecture and Engineering
|
GDSA |
SEC530 |
|
SEC534: Secure DevOps: A Practical Introduction
|
— |
SEC534 |
|
SEC540: Cloud Security and DevOps Automation
|
— |
SEC540 |
|
SEC542: Web App Penetration Testing and Ethical Hacking
|
GWAPT |
SEC542 |
|
SEC545: Cloud Security Architecture and Operations
|
— |
SEC545 |
|
SEC546: IPv6 Essentials
|
— |
— |
|
SEC550: Active Defense, Offensive Countermeasures and Cyber Deception
|
— |
— |
|
SEC555: SIEM with Tactical Analytics
|
GCDA |
— |
|
SEC560: Network Penetration Testing and Ethical Hacking
|
GPEN |
SEC560 |
|
SEC562: CyberCity Hands-on Kinetic Cyber Range Exercise
|
— |
— |
|
New SEC564: Red Team Exercises & Adversary Emulation
|
— |
— |
|
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
|
GCCC |
— |
|
SEC567: Social Engineering for Penetration Testers
|
— |
— |
|
SEC573: Automating Information Security with Python
|
GPYC |
SEC573 |
|
SEC575: Mobile Device Security and Ethical Hacking
|
GMOB |
SEC575 |
|
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
|
— |
SEC580 |
|
SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses
|
GDAT |
SEC599 |
|
SEC617: Wireless Penetration Testing and Ethical Hacking
|
GAWN |
SEC617 |
|
SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
|
— |
— |
|
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
|
GXPN |
SEC660 |
|
Beta SEC699: Purple Team Tactics - Adversary Emulation for Breach Prevention & Detection
|
— |
— |
|
SEC760: Advanced Exploit Development for Penetration Testers
|
— |
— |
|
Incident Response & Forensics
Industrial Control Systems