Advancing the Cybersecurity Industry
Real World Ready: New Cyber Trends & Training in 2023
As the tactics of cyber adversaries evolve, the tools and techniques we use to defend ourselves must also adapt. This eBook offers a glimpse into the key threats that are expected to emerge as forecasted by SANS experts, and practical advice on the measures organizations can take to ensure their cyber teams are prepared to face the dynamic threat landscape.
New IT Administrator Training
IT Administrators responsible for system or network configuration are prime targets for cyber attacks. In today's threat landscape, traditional training is not enough to keep your systems safe. New IT Administrator security awareness training will prepare your information technology specialists to be your first line of defense against cybersecurity threats.
New SANS Courses
Linux is the operating system of millions of systems all around the world. No matter what area of cybersecurity you work in or the vertical you support, to do your job effectively you need to understand how Linux works and how to secure it. Skilled attackers certainly know how to use and operate in a Linux environment and love nothing more than to find your security tools running on improperly secured Linux boxes. SEC406 teaches the Linux essentials every security professional needs to know to run the many open-source tools that are crucial to doing your job.
The threat landscape has changed and gone are the days when erecting a strong perimeter is sufficient to keep adversaries at bay. Supply chain attacks are effective in bypassing traditional defenses because they act as a sort of “Maginot Line”, circumventing traditional controls and often inviting the adversary inside using “trusted” technologies. SEC547 covers the overarching threat landscape and provides real-world examples of how these attacks work and why they are effective and outlines actionable takeaways for students to bring back to their own environments.
Take a short survey
FOR589 teaches students how to hunt for Criminal Intelligence (CRIMINT) on the Dark Web and how to infiltrate adversary infrastructure through covert sock puppet accounts using advanced Human Intelligence (HUMINT) tradecraft. Analyze criminal “on-chain” financial transactions using Blockchain Intelligence (BLOCKINT) tools and learn how to identify, analyze, and extract cryptocurrency artifacts from criminal devices in computer and mobile forensics investigations.
ICS613 course is designed to introduce information and operational security professionals with the tactics, techniques, and procedures for conducting penetration testing in networks with active processes. Penetration tests in business environments avoid outages primarily because of the monetary impacts to the organization.
Supply chain attacks go unnoticed on average for 235 days and do more damage because of not having a deep understanding of the products being used on a network. Product Security tests help obtain a comprehensive understanding of how choosing to use a particular product in your organization can increase your attack surface and how your threat model and risk posture is affected. Product security testing is vital in preparing your organization to defend and recover from software supply chain attacks.
Learn how to break down an organization's security issues and define solutions to locally automate secure configurations, set a desired state configuration, deploy infrastructure as code in different environments, and detect and respond to security incidents in an automated manner.
This course will teach you how to think like a lawyer, but through the lens of cybersecurity, data privacy, intellectual property, and artificial intelligence. Increasingly, we need to work as a whole across the enterprise and much of what we need to do, whether in normal times or in crises, requires careful coordination amongst multiple business units. Frequently, however, legal counsel is the gatekeeper. This course will help you understand how lawyers that work in the cybersecurity domain process information and requests so that you can more effectively work with them.