SANS Offensive Operations
SANS Offensive Operations leverages the vast experience of our esteemed faculty to produce the most thorough, cutting-edge offensive cyber security training content in the world. Our goal is to continually broaden the scope of our offensive-related course offerings to cover every possible attack vector. SANS Offensive Operations Curriculum offers courses spanning topics ranging from introductory penetration testing and hardware hacking, all the way to advanced exploit writing and red teaming, as well as specialized training such as purple teaming, wireless or mobile device security, and more.
Major Course Update | SEC598 Automate Security with Generative AI
Purple Teaming Reloaded: AI, Adversaries & the New SEC599
Securing the 5G Frontier Real Threats Deepfakes Defense Strategies
From Playbooks to Robocop: The Evolution of SOC Automation
Фишинговать или нет: понимание современных атак и защит
Offensive Security Operations with Attack Surface Management and Continuous Pen Testing
Intro to Kerberos and Common AD Privesc Attacks with Empire
When the Nearest Neighbor becomes the Nearest Adversary
Intro to WinDbg Part 3 Call Me Maybe
Введение в WinDbg. Часть 2: Назад в будущее с использованием TTD
Intro to WinDbg Part 1: The Beginning
Mastering PE Parsing with WinDbg
Keynote | Attacking Intelligence: Attacking and Defending AI on The Edge
Keynote | Memory Safe Languages Won't Save You
AI-Enhanced Purple Teaming
Использование современного C++ в имплантатах
Purple is greater than Red + Blue
Как они отреагировали так быстро?
Breaking free from the chains of fate - Bypassing AWSCompromisedKeyQuarantineV2 Policy
AI for Adversaries: Bypassing Modern Security Controls
The call is coming from inside the house: API abuse by authenticated users
Leveraging AI for Attack
Very Pwnable Networks: Exploiting the Top Corporate VPN Clients for Remote Root and SYSTEM Shells
Attacking and defending Microsoft Entra, 2024 Edition
Where's the Money: Defeating ATM Disk Encryption
What Hacking the Planet Taught Us About Defending Supply Chain Attacks
Redefining Security Boundaries: Unveiling Hypervisor-Backed Security Features For Windows Security
Adversaries Are Doing Stranger Things