DFIRCON - Live Online: The ALL Digital Forensics, Threat Hunting and Incident Response Training Event. Save $300 thru 10/7.

Upcoming Course RSS Feeds

Security Courses
SEC450: Blue Team Fundamentals: Security Operations and Analysis
SEC455: SIEM Design & implementation
SEC460: Enterprise Threat and Vulnerability Assessment
SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
SEC488: Cloud Security Essentials
SEC510: Multicloud Security Assessment and Defense
SEC511: Continuous Monitoring and Security Operations
SEC530: Defensible Security Architecture and Engineering
SEC534: Secure DevOps: A Practical Introduction
SEC540: Cloud Security and DevOps Automation
SEC545: Cloud Security Architecture and Operations
SEC552: Bug Bounties and Responsible Disclosure
SEC555: SIEM with Tactical Analytics
SEC564: Red Team Exercises and Adversary Emulation
SEC573: Automating Information Security with Python
SEC582: Mastering TShark Packet Analysis
SEC583: Crafting Packets
SEC584: Defending Cloud Native Infrastructure
SEC586: Blue Team Operations: Defensive PowerShell
SEC588: Cloud Penetration Testing
SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses
SEC699: Purple Team Tactics - Adversary Emulation for Breach Prevention & Detection
SEC760: Advanced Exploit Development for Penetration Testers
SEC401: Security Essentials Bootcamp Style
SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
SEC560: Network Penetration Testing and Ethical Hacking
SEC542: Web App Penetration Testing and Ethical Hacking
SEC503: Intrusion Detection In-Depth
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
SEC505: Securing Windows and PowerShell Automation
SEC501: Advanced Security Essentials - Enterprise Defender
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
SEC617: Wireless Penetration Testing and Ethical Hacking
SEC575: Mobile Device Security and Ethical Hacking
SEC301: Introduction to Cyber Security
SEC522: Defending Web Applications Security Essentials
SEC440: Critical Security Controls: Planning, Implementing and Auditing
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
SEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
Forensics Courses
FOR308: Digital Forensics Essentials
FOR498: Battlefield Forensics & Data Acquisition
FOR518: Mac and iOS Forensic Analysis and Incident Response
FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
FOR578: Cyber Threat Intelligence
FOR585: Smartphone Forensic Analysis In-Depth
FOR500: Windows Forensic Analysis
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
FOR526: Advanced Memory Forensics & Threat Detection
Management Courses
MGT415: A Practical Introduction to Cyber Security Risk Management
MGT516: Managing Security Vulnerabilities: Enterprise and Cloud
MGT521: Driving Cybersecurity Change - Establishing a Culture of Protect, Detect and Respond
MGT551: Building and Leading Security Operations Centers
MGT512: Security Leadership Essentials for Managers
MGT414: SANS Training Program for the CISSP Certification
MGT514: Security Strategic Planning, Policy, and Leadership
MGT433: SANS Security Awareness: How to Build, Maintain, and Measure a Mature Awareness Program
Audit Courses
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
LEG523: Law of Data Security and Investigations
Industrial Control Systems Courses
ICS410: ICS/SCADA Security Essentials
ICS456: Essentials for NERC Critical Infrastructure Protection
ICS515: ICS Active Defense and Incident Response