Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Webinars and Workshops

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.

Filter by:

Hands On Workshop: Cyber42: Operational Cybersecurity Leader

Enhance your proficiency in operational cybersecurity decision-making through immersive team-based simulations with Cyber42. Practice agile decision-making and information synthesis, key skills required for success in leadership roles. Engage in thought-provoking discussions and gain practical insights to improve your cybersecurity competencies.

WebinarCyber Defense
Webcast Abstract Image
  • 25 Jan 2024
  • 10:00 UTC
  • Mark Orlando
View details

An Intro to C for Windows - Part 6

After enumerating a list of loaded modules, it's only fitting to get started with what normally comes next, parsing exports of a DLL. Before we can do that, we will have to understand the anatomy of executable images. This means parsing PE headers. It would be great to have the following programs installed before this Part 6: WinDbg, PE Explorer by Pavel.PS: don't forget your files from Part 5; you'll need them!

WebinarOffensive Operations
Webcast Abstract Image
  • 27 Jan 2024
  • 14:00 UTC
  • Jonathan Reiter
View details

Cyber Threat Intelligence Summit Solutions Track 2024

In an increasingly complex and dynamic cyber threat landscape, decision-makers are turning to actionable, contextualized threat intelligence to bolster cyber resilience and fulfill mission or business objectives. With the advent of advanced AI technologies, including Large Language Models (LLMs), the scope and effectiveness of Cyber Threat Intelligence (CTI) are being revolutionized.

WebinarCyber Defense
Man presenting webcast
  • 30 Jan 2024
  • 09:20 UTC
  • Ismael Valenzuela
View details

Mastering Adversary Emulation with Caldera: A Practical Guide

Adversary emulation stands as an indispensable cornerstone in the cybersecurity domain, empowering organizations to proactively evaluate and bolster their defensive capabilities against real-world threats. In this presentation, we delve into the practical application of adversary emulation, leveraging the robust Caldera open-source platform. This demonstration serves as a preview of one of the engaging labs featured in our cutting-edge course, SEC598: Security Automation for Offense, Defense, and Cloud.

WebinarCyber Defense
Webcast Abstract Image
  • 31 Jan 2024
  • 11:00 UTC
  • Jeroen Vandeleur & Jason Ostrom
View details

Cloud Flight Simulator Part 3: Safeguarding the Software Supply Chain

Part 3: Continuing the Cloud Security Flight Simulator series, join SEC540: Cloud Native Security and DevSecOps Automation instructor Jon Zeolla for a webcast on software supply chain security.

WebinarCloud Security
Webcast Abstract Image
  • 1 Feb 2024
  • 10:00 UTC
  • Jon Zeolla
View details

Unmasking Threats in the Digital Shadows: Leveraging Machine Learning for Enhanced Detection in a Connected World

In today's connected world, where threat actors make every effort to blend in, easily detecting their malicious activities is becoming more difficult. In this webcast, SANS Certified Instructor Nik Alleyne, will help us to understand how we can use machine learning and deep learning algorithms, to potentially highlight these threats as they fly under our traditional monitoring radar.

WebinarCybersecurity Leadership
Two people presenting a webcast
  • 1 Feb 2024
  • 11:00 JST
  • Nik Alleyne
View details

デジタルの影に潜む脅威の正体を暴く:機械学習の活用による電脳世界での検知強化

近年脅威アクターは複雑な技術を悪用して攻撃の痕跡を隠すようになっているため、悪意ある兆候を検知することが難しくなっています。このWebcastではSANS認定インストラクターのNik Alleyneが機械学習とディープラーニングのアルゴリズムを活用することで、従来の監視・検出手法を潜り抜けていたこれらの脅威を潜在的に浮き彫りにする方法を共有します.

WebinarCybersecurity Leadership
Two people presenting a webcast
  • 1 Feb 2024
  • 11:00 JST
  • Nik Alleyne
View details

Fortifying Resilience: An In-Depth Exploration of the Overall Product Security Assessment Poster

Join SEC568: Product Security Penetration Testing - Safeguarding Supply Chains and Managing Third-Party Risk course author Douglas McKee for an insightful webcast presentation as he walks through the work flow of product security assessment depicted in the Overall Product Security Assessment Process poster.

WebinarOffensive Operations
Two people presenting a webcast
  • 1 Feb 2024
  • 16:30 UTC
  • Douglas McKee
View details

ICS/OT Cybersecurity Survey: 2023 APAC insights.

The 2023 SANS ICS/OT Cybersecurity Survey received over 700 responses representing a wide range of industrial verticals from energy, chemical, critical manufacturing, and nuclear to water management and several others.

WebinarIndustrial Control Systems Security
Webcast Abstract Image
  • 7 Feb 2024
  • 13:30 AEDT
  • Peter Jackson
View details

OT Pen-testing: How Not to Sink an Oil Rig

As part of a mature cybersecurity program, organizations rely on penetration testing to find vulnerabilities before attackers do. But operational technology/industrial control systems are critical, and often fragile systems! How do we dare conduct pentests in these environments? Join Chris in a discussion of real-world experience testing water systems, an oil rig, and other critical systems - SAFELY.

WebinarCyber Defense
Webcast Abstract Image
  • 12 Feb 2024
  • 17:30 AST
  • Christopher Elgee
View details

Cloud Flight Simulator Part 4: Least Privileged Pods with Kubernetes Workloads

In the final part of the Cloud Security Flight Simulator series, join SEC540 lead author and instructor Eric Johnson to learn how to enable workload identity for AWS Elastic Kubernetes Service (EKS) and Azure Kubernetes Service (AKS).

WebinarCloud Security
Webcast Abstract Image
  • 15 Feb 2024
  • 10:00 UTC
  • Eric Johnson
View details

Enhancing Threat Hunting Efficiency with AI and Machine Learning

Corporations with a mature security organization should be doing threat hunting. Is this as simple as searching for known IOCs in our environment? While this is an important task, this is not threat hunting. Threat hunting is looking for unknown bad, which implies that there are no IOCs! Can AI and machine learning help us to do effective threat hunting? Are there real-world applications of these technologies that are useful today? Yes! This one hour webcast will discuss a variety of practical applications of machine learning and AI that organizations can implement today to augment our threat hunting capability.

WebinarCybersecurity Leadership
Two people presenting a webcast
  • 19 Feb 2024
  • 11:00 JST
  • David Hoelzer
View details