Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Webinars and Workshops

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.

Filter by:

SANS Workshop – Advanced Python Automation Hands On Workshop

Have you heard that SANS has a new Advanced Python Automation class?  Are you interested in trying out some of the content?  Join us for this workshop where Senior SANS Instructor and course author Mark Baggett will deliver the first hour and a half of content.  But wait, isn't the first hour and a half always introductions and no real hands on material?  Maybe in other classes but not in this one. Come check it out!

WebinarCyber Defense
Webcast Abstract Image
  • 23 Feb 2023
  • 13:00 UTC
  • Mark Baggett
View details

2022 ICS/OT Cybersecurity Year in Review Executive Briefing

The ICS/OT community has long suffered from a lack of insight into cyber threats, vulnerabilities, and incident response observations. The annual Dragos ICS/OT Cybersecurity Year in Review provides a comprehensive look at the events that shaped the ICS/OT community and the current threat landscape. It also reports on how the community is performing, and surfaces areas of improvement needed to provide safe and reliable operations.

WebinarDigital Forensics and Incident Response
Man presenting webcast to laptop screen
  • 23 Feb 2023
  • 13:00 UTC
  • Robert M. Lee & Ben Miller
View details

Rise of the Infostealers

Surge in infostealer malware in recent months has allowed threat actors to gain access to victim machines. It has become very common for threat actors to spend time in the target environment, harvest confidential information, gain better understanding about the victim's environment and tailor the attack to impose maximum damage, move laterally and escalate privileges to maintain persistence and maximize their revenue.

WebinarCloud Security
Webcast Abstract Image
  • 28 Feb 2023
  • 13:00 UTC
  • Nirmal Singh
View details

Foiling Modern Attacks: Map MITRE ATT&CK Tactics to Falco Rules

With more and more companies moving their applications and infrastructure to the cloud, the potential attack surface has expanded dramatically. Attackers know they have a window of opportunity and have become savvier at carrying out advanced cloud and container attacks. Within seconds of entering your cloud environment, they can begin conducting cryptomining, supply chain attacks, and other forms of advanced attacks. Without the ability to detect and respond to these attacks in real-time, it’s almost impossible to stop them from causing significant damage.

WebinarCloud Security
Webcast Abstract Image
  • 28 Feb 2023
  • 15:30 UTC
  • Matt Bromiley & Nigel Douglas
View details

Beyond ChatGPT, Building Security Applications using OpenAI API

ChatGPT was launched by OpenAI in November 2022. Since then, it has been the subject of many discussions. ChatGPT itself is one application that was built on top of OpenAI’s GPT-3 models. We can programmatically interact with these models via OpenAI API. In this talk, we will go beyond ChatGPT and discuss OpenAI API, fine-tuning our own models for specific tasks, and building security applications on top of them. We will be building a sample application that interprets human requests and performs the basic tasks requested.

WebinarCloud Security
Two people presenting a webcast
  • 1 Mar 2023
  • 10:00 UTC
  • Ahmed Abugharbia
View details

SANS Dubai Community Night - Data Recovery (beyond the software)

Data recovery is probably one of the most misunderstood technologies in the computer world. Myths abound about how to recover data, with freezing your hard drive being a very common one of these myths. This presentation will get down to the nuts and bolts of data recovery, including the actual internal workings of the drive, what to do when a drive motor fails, when read/write heads fail, and when programming turns the hard drive into a brick. This is presented in layman’s terms so it is very easy to understand. We will be showcasing the best software to use for easier recoveries, as well as live demonstrations of some of our lab equipment for advanced data recovery! We will be discussing rotational media (spinning hard drives), SSD hard drive recovery, thumb drives, cellular, and monolith recovery. By the end of this lecture, you will be much more knowledgeable on how hard drives work, how data lives, and how to recover it when all seems lost.

WebinarDigital Forensics and Incident Response
Man presenting webcast to laptop screen
  • 1 Mar 2023
  • 18:30 GST
  • Kevin Ripa
View details

Pivot and Pillage: Detecting Lateral Movement

Whether performed by an insider threat, or by an external threat that's managed to get a foothold inside, the next step in the attacker's dance is usually the pivot: moving from one host to another to expand control or pillage a particular resource. In this talk we will look at some of the more commonly encountered pivot techniques to help you understand, detect, and deter malicious, lateral movement within your network.

WebinarCyber Defense
Webcast Abstract Image
  • 1 Mar 2023
  • 18:30 JST
  • Steve Anson
View details

The State of DDoS Attacks: A Look Back at 2022

DDoS attacks are back in the headlines and disrupting businesses across the globe. Though these threats aren’t new, they are evolving and increasing in size, complexity, and frequency. During this session, we will uncover attack trends from the last year, and discuss what to expect in 2023.

WebinarCloud Security
Webcast Abstract Image
  • 2 Mar 2023
  • 13:00 UTC
  • Ameet Naik
View details

SANS Community Night Riyadh March 2023 - 5 Critical Skills for Infosec Professionals

What are the critical skills that extremely successful infosec professionals need and how can we develop these? Obviously, technology matters but it's not just about technology. In Ted Demopoulos' research, talking to, interviewing, and basically spending time with infosec professionals that are so successful that the moniker “Rock Star" is sometimes entirely appropriate, he has distilled 5 critical professional, and sometimes, life skills. This talk covers these 5 skills with plenty of practice advice.

WebinarCyber Defense
Webcast Abstract Image
  • 6 Mar 2023
  • 19:00 GST
  • Ted Demopoulos
View details

SANS Community Night Secure Singapore 2023 - Using Live Ranges for SOC & IR Training

Eric Capuano & Whitney Champion, co-founders of Recon InfoSec, share their experience building and running cyber ranges for delivering training and competitions to 1000s of students around the world. The team at Recon is well known for hosting their OpenSOC Blue Team CTF competition annually at conferences like DEF CON, providing hands-on experiential learning to cybersecurity practitioners of all skill levels. In this talk, they will share some of their approaches, methodologies, and lessons learned with running live-fire cyber ranges for high fidelity training.

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 7 Mar 2023
  • 19:00 UTC
  • Eric Capuano & Whitney Champion
View details

SOC・IRに関するトレーニングで活用できるサイバーレンジ

InfoSecの協同設立者であるEric CapuanoとWhitney Championは、世界中の何千人もの受講者向けにトレーニングや大会を提供するために、サイバーレンジの構築・運用の経験を共有します。Reconのチームは、毎年開催されているDEF CONなどカンファレンスで、OpenSOC Blue Team CTFを開催し、様々なスキルレベルを持つサイバーセキュリティの技術者向けにハンズオンの経験を提供することで知られています。この講演では、レベルの高いサイバーレンジを運用するにあたってのアプローチや手法を共有します。

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 7 Mar 2023
  • 19:00 UTC
  • Eric Capuano & Whitney Champion
View details

Attack Surface Management Solutions Forum 2023

Designed for security leaders tasked with managing a growing attack surface, the SANS Attack Surface Management Solutions Forum will take place on March 8, 2023 as a virtual event. This half-day event will bring together thought leaders, subject matter experts and practitioners to discuss, share and discover best practices for addressing the operational challenges associated with organizations’ ever-growing attack surfaces. Contributing factors would be: cloud migrations, M&A, shadow IT and the rise of ransomware attacks.Attendees will gain valuable lessons on how to operationalize attack surface management in order to improve their threat intelligence, vulnerability management and offensive security programs.Topics covered will include:• A Deep Dive into Attack Surface Management• The Current State of Regulations in Cybersecurity• How to Evaluate ASM Tools• What Attack Surface Management looks like in the wild• Key trends in Hacker behaviors• Advice from SANS Experts on attack surface management

WebinarCyber Defense
Webcast Abstract Image
  • 8 Mar 2023
  • 11:00 UTC
  • Pierre Lidome
View details