Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Webinars and Workshops

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts here.

Filter by:

Mastering PE Parsing with WinDbg

Dive into the intricacies of Portable Executable (PE) parsing in this presentation showcasing the usefulness of the PE Parsing with WinDbg cheat sheet.

WebinarOffensive Operations
Man presenting webcast
  • 13 Jan 2025
  • 15:00 UTC
  • Jonathan Reiter
View details

Community-Powered Risk Management: Tools for Small Businesses

This webcast, led by James Tarala, Senior Faculty at the SANS Institute and Managing Partner at Cyverity, is designed to empower small businesses with the knowledge and resources they need to effectively manage cybersecurity risks without breaking the bank.

WebinarCybersecurity Leadership
Webcast Abstract Image
  • 14 Jan 2025
  • 13:00 UTC
  • James Tarala
View details

When the Nearest Neighbor becomes the Nearest Adversary

Discover the covert world of wireless network exploitation in our webcast on the "Nearest Neighbor Attack," as recently detailed by Volexity.

WebinarOffensive Operations
Webcast Abstract Image
  • 14 Jan 2025
  • 14:00 UTC
  • Larry Pesce & James Leyte-Vidal
View details

Strengthen Organizational Security Posture with Role-Based Training from SANS

Join SANS for a special webcast introducing and demonstrating role-based trainings for targeted user groups. SANS experts will provide an overview of training packages designed specifically for staff with key roles in securing organizational data. This training will also help your organization comply with various data security mandates.

WebinarCyber Defense
Webcast Abstract Image
  • 15 Jan 2025
  • 14:00 UTC
  • Stacy Dunn
View details

SANS Nashville Winter 2025: SANS@Night - Getting Involved in a Startup: Make a Dent in The Universe

The classic way to make a massive difference with technology, or “Dent in The Universe,” is via a startup. We can define a startup as a company with high growth possibilities that is innovative and potentially disruptive. This describes most startups in the infosec space. Also, essentially every startup has a strong technology component today and infosec concerns. This translates to lots of startup opportunities for infosec professionals, whether as a founder, early-stage employee, rank and file employee, or even investor. In this talk we’ll discuss startups, including how important having a “great idea” may or may not be, funding options, as well as “exit” strategies. Funding options include bootstrapping, which means using existing resources, starting a business without external help or capital. Angel investors, affluent individuals who provide capital for a startup, are another option, as are venture capitalists, and crowd sourcing. An exit strategy is how illiquid assets like company ownership and stock are changed into liquid assets like cash. Even if you do not plan on exiting the company, you may want to convert some assets to cash. And of course any investors will want their money back with profits at some point. If you are focused on outcomes instead of inputs, a startup can be absolutely fantastic. If you are happy hacking more than just technology, but also happy to figure out and execute business concerns, such as hacking procedures and whatever it takes to make things work, a startup is an option to consider.

WebinarCybersecurity and IT Essentials
Webcast Abstract Image
  • 15 Jan 2025
  • 19:15 CST
  • Ted Demopoulos
View details

Twenty New Labs, Infinite Possibilities: The SEC587 Overhaul

Get ready to deep dive into the all-new SANS SEC587 Advanced Open-Source Intelligence course, where 20 new labs and enhanced content redefine the landscape of OSINT training. This overhaul includes content on Russian and Chinese OSINT, cutting-edge audio analysis powered by AI, and timely new sections on cryptocurrency and drone detection, among others.

WebinarCyber Defense
Webcast Abstract Image
  • 16 Jan 2025
  • 10:00 UTC
  • Matt Edmondson
View details

Getting Started with Malware Analysis - A Practical Journey

Join Lenny Zeltser, a Faculty Fellow at SANS Institute, to learn how to excel in the field of malware analysis. This webcast is designed for aspiring analysts, incident responders, and general cybersecurity professionals wondering about the process of examining malicious software. Lenny will break down the key stages of the malware analysis process, helping you identify your current capabilities and chart a path forward.

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 16 Jan 2025
  • 10:00 JST
  • Lenny Zeltser
View details

マルウェア解析を始める - 実践の旅

SANS Institute のFaculty Fellowである Lenny Zeltser と一緒に、マルウェア解析の分野で卓越する方法を学びましょう。このWebcastは、アナリストになりたい方、インシデント対応担当者、および悪意のあるソフトウェアを調査するプロセスについて疑問を抱いている一般的なサイバーセキュリティ専門家を対象としています。Lennyは、マルウェア解析プロセスの主要な段階を説明し、現在の能力を確認し、前進するための道筋を描くお手伝いをします。

WebinarDigital Forensics and Incident Response
Webcast Abstract Image
  • 16 Jan 2025
  • 10:00 JST
  • Lenny Zeltser
View details

SANS Holiday Hack Challenge 2024 | Closing Ceremony & Winners Announcement

Join us for the grand finale of the Holiday Hack Challenge 2024 where we’ll reveal the names of the big winners as we bid farewell to another chapter of challenges, victories, and innovation!

WebinarCyber Defense
Webcast Abstract Image
  • 16 Jan 2025
  • 14:00 UTC
  • Ed Skoudis
View details

Intro to Kerberos and Common AD Privesc Attacks with Empire

In this workshop, SANS instructor and lead author of SEC565: Red Team Operations and Adversary Emulation, Jean-Francois Maes, will walk the audience through a guided hands-on workshop where common Active Directory Privilege Escalation Attacks are going to be discussed and executed using Empire version 5.

WebinarOffensive Operations
Webcast Abstract Image
  • 21 Jan 2025
  • 12:00 UTC
  • Jean-François Maes
View details

Google SecOps: The SIEM’s Third Act

SIEM's complicated evolution has resulted in unsustainable cost increases, scope creep, and the occasional declaration that the product space is essentially dead. Thanks to deep expertise in search and data management, access to OSINT and frontline intelligence, and AI-infused features, Google SecOps demonstrates that the SIEM still has plenty of gas in the tank. Discover how SecOps is ushering in the "SIEM's Third Act" by addressing the limitations of traditional SIEMs and empowering security teams with cutting-edge tools for threat-informed defense.

WebinarCyber Defense
Webcast Abstract Image
  • 22 Jan 2025
  • 15:30 UTC
  • Mark Orlando & Greg Kushmerek
View details

The Cloud Won't Save You from Ransomware: Here's What Will

Cloud enthusiasts often tout how using a public cloud service provider helps mitigate ransomware attacks. Unfortunately, this is not true by default. Regardless of where files are stored, an attacker can download them, make them inaccessible to the target organization, and demand a payment for restoring their mission-critical data.

WebinarCloud Security
Webcast Abstract Image
  • 23 Jan 2025
  • 10:30 UTC
  • Brandon Evans
View details