Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Webinars and Workshops

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.

Filter by:

Same Findings, Different Org - Common Vulnerabilities Across Organizations And How To Fix Them

During offensive operations engagements, We often find ourselves repeating the same playbooks over and over again, getting success every time. Are we actually becoming better as an industry in improving security posture? Attend the talk to find out! Warning: Rants inside!

WebinarOffensive Operations
Webinar placeholder image
  • 28 May 2025
  • 10:30 EDT
  • Jean-François Maes
View details

SANS / REN-ISAC Educational Institutions Summer 2025 Program Overview

This webcast will provide a detailed overview of all the products and pricing offered to accredited educational institutions, in the US and Canada through the SANS Educational Institutions Summer Buy program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.

WebinarCybersecurity and IT Essentials
Webcast Abstract Image
  • 28 May 2025
  • 14:00 UTC
View details

Prevent Real Cloud Attacks with Terraform

Implementing cloud security controls is hard. Implementing them at scale is harder.

WebinarCloud Security
Man presenting webcast to laptop screen
  • 28 May 2025
  • 14:00 UTC
  • Brandon Evans
View details

Intro to WinDbg Part 2: Back to the Future Using TTD

Following up on part 1 of the series, you now have your basics of WinDbg down. You jump into your first debugging session, stepping over code you do not want to inspect, just to realize that the function you just stepped over was actually important. You restart the debugging session and go again. If only it was possible to go back in time...

WebinarOffensive Operations
Two people presenting a webcast
  • 29 May 2025
  • 11:00 UTC
  • Kevin Ott
View details

The Future of Cloud Security Starts with Runtime

Detecting and responding to cloud attacks has never been more challenging. Modern attacks and the ever-changing nature of cloud infrastructure and applications make security teams’ lives more difficult than ever. A new approach is needed – one that can provide a fully traceable & explainable runtime security story spanning the entire cloud technologies stack.

WebinarCloud Security
Man presenting webcast to laptop screen
  • 29 May 2025
  • 13:00 UTC
  • Shauli Rozen & James Berthoty
View details

Combatting Stress and Burnout in Security Operations

Join cybersecurity leader Mark Orlando and researcher and consultant Dr. Daniel Shore as they share strategies for recognizing and mitigating burnout.

WebinarCybersecurity Leadership
Webcast Abstract Image
  • 29 May 2025
  • 13:00 UTC
  • Mark Orlando & Dr. Dr. Daniel Shore
View details

SANS/CIS SLTT Summer 2025 Program Overview

This webcast will provide a detailed overview of all the products and pricing offered to qualified state, provincial and local government organizations, in the US and Canada through the SANS SLTT Government’s Aggregate Buy program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.

WebinarCybersecurity and IT Essentials
Man presenting webcast
  • 29 May 2025
  • 14:00 UTC
View details

Modern Multi-Factor Authentication Bypass Techniques: A Taste of SANS SEC660

With the proliferation of multi-factor authentication, penetration testers need to apply existing tooling to manipulate even internal applications. Building attack infrastructure internally during a penetration test is resource exhausting, but modern tools like evilginx can do most of the heavy lifting for us.

WebinarOffensive Operations
Man presenting webcast
  • 30 May 2025
  • 15:00 UTC
  • James Shewmaker
View details

SANS Ransomware Summit Solutions Track 2025

Join us for the Ransomware Summit Solutions Track 2025 to explore the full spectrum of ransomware dynamics. Learn how threat actors are adapting their strategies, where vulnerabilities still exist, and why the cycle of paying ransoms endures.

WebinarDigital Forensics and Incident Response
Webcast
  • 30 May 2025
  • 10:00 EDT
  • Matt Bromiley, Jamie Moles, Andrey Voitenko + 5 more
View details

SANS 5 ICS Critical Controls for Oil and Natural Energy - Control 1 - ICS-Specific Incident Response Plan

The first training module for the energy sector provides an overview of the elements of an ICS Specific Incident Response Plan, how it differs from astandard IT Incident Response Plan, and how to prepare your team to respond. Simulate an incident response to a remote cyber intrusion into a drilling rig’s control system network to access programmable logic controllers (PLCs) to validate industrial network visibility of the rig control system’s threat.

WebinarIndustrial Control Systems Security
Two people presenting a webcast
  • 1 Jun 2025
  • 13:00 UTC
  • Dean Parsons
View details

SANS 5 ICS Critical Controls for Oil and Natural Energy - Control 3 - ICS Network Visibility and Monitoring

Module 3 of the training relates to continuous network security monitoringof the ICS networked environment, with protocol-aware tool sets andsystem-to system interaction analysis capabilities used to informengineering of potential risks to the control, view, and safety of operations.

WebinarIndustrial Control Systems Security
Webcast Abstract Image
  • 1 Jun 2025
  • 13:00 UTC
  • Dean Parsons
View details

SANS 5 ICS Critical Controls for Oil and Natural Energy - Control 4 - Secure Remote Access

This 4th control involves the identification and inventory of all remote access points and allowed destination environments, on-demand access and MFA authentication where possible, and jump host platforms to provide control and monitoring points within secure segments.

WebinarIndustrial Control Systems Security
Webcast Abstract Image
  • 1 Jun 2025
  • 13:00 UTC
  • Dean Parsons
View details