Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Job Roles Listing Page

Military Operations / Law Enforcement Agents

Digital Forensics and Incident Response

Execute digital forensic operations under demanding conditions, rapidly extracting critical intelligence from diverse devices. Leverage advanced threat hunting and malware analysis skills to neutralize sophisticated cyber adversaries.

Explore learning path

Multi-Disciplined Language Analyst (DCWF 151)

DoD 8140: Intelligence (Cyberspace)

Applies language and cultural knowledge with technical expertise to analyze and disseminate language-derived intel and support cyber mission execution.

Explore learning path

Network Analyst (DCWF 443)

DoD 8140: Cyber Effects

Analyzes network traffic and packet captures to detect anomalies and intrusions, while building advanced network detection rules and alerts.

Explore learning path

Network Operations (OPM 441)

NICE: Implementation and Operation

Responsible for planning, implementing, and operating network services and systems, including hardware and virtual environments.

Explore learning path

Network Operations Specialist (DCWF 441)

DoD 8140: Cyber IT

Implements and maintains network services, including hardware and virtual systems, ensuring operational support for infrastructure platforms.

Explore learning path

Network Technician (DCWF 442)

DoD 8140: Cyber Effects

Supports Cyber Protection Team with infrastructure knowledge, mission scoping, and understanding of enterprise and tactical network systems.

Explore learning path

Operational Leader

Cybersecurity Leadership

Operate from the point of view of an adversary in order to protect you most sensitive assets.

Explore learning path

Operational Technology (OT) Cybersecurity Engineering (NICE)

Responsible for working within the engineering department to design and create systems, processes, and procedures that maintain the safety, reliability, controllability, and security of industrial systems in the face of intentional and incidental cyber-related events. Interfaces with Chief Information Security Officer, plant managers, and industrial cybersecurity technicians.

Explore learning path

OSINT Investigator/Analyst

Cyber Defense

These resourceful professionals gather requirements from their customers and then, using open sources and mostly resources on the internet, collect data relevant to their investigation. They may research domains and IP addresses, businesses, people, issues, financial transactions, and other targets in their work. Their goals are to gather, analyze, and report their objective findings to their clients so that the clients might gain insight on a topic or issue prior to acting.

Explore learning path

Penetration Tester

European Cybersecurity Skills Framework

Assess the effectiveness of security controls, reveals and utilise cybersecurity vulnerabilities, assessing their criticality if exploited by threat actors.

Explore learning path

Privacy Compliance (OPM 732)

NICE: Oversight and Governance

Responsible for developing and overseeing an organization’s privacy compliance program and staff, including establishing and managing privacy-related governance, policy, and incident response needs.

Explore learning path

Privacy Compliance Manager (DCWF 732)

DoD 8140: Cyber Enablers

Leads privacy program development and compliance oversight to ensure adherence to privacy laws, standards, and executive data protection needs.

Explore learning path