SANS - SEC Courses, FOR, MGT, ICS, AUD (Update 11.2020)
Sample Files: not provided
Video Format: MKV
Video: MPEG4 (H264) 1280x720 280kbps
Audio: AAC 32000 Hz
The SANS Institute (officially the Escal Institute of Advanced Technologies) is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. SANS stands for SysAdmin, Audit, Network, and Security.
Video:
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems
2013
FOR500 - Windows Forensic Analysis
2018
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting
2019
FOR610 - Reverse-Engineering Malware: Malware Analysis Tools and Techniques
2015
FOR526 - Advanced Memory Forensics and Threat Detection
2018
SEC401 - Security Essentials Bootcamp Style
2017
SEC503 - Network Intrusion Detection
2018
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling
2018
SEC505 - Securing Windows and PowerShell Automation
2020
SEC506 - Securing Linux-Unix
2011
SEC542 - Web App Penetration Testing and Ethical Hacking
2018
SEC560 - Network Penetration Testing and Ethical Hacking
2018
SEC564 - Red Team Exercises and Adversary Emulation
2020
SEC575 - Mobile Device Security and Ethical Hacking
2017
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing
2011
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses
2019
SEC617 - Wireless Penetration Testing and Ethical Hacking
2019
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
2018
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
2019
PDF:
ICS410 - ICS/SCADA Security Essentials
2018
AUD507 - Auditing & Monitoring Networks, Perimeters & Systems
2016
DEV540 - Secure DevOps and Cloud Application Security
2017
FOR500 - Windows Forensic Analysis
2017
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting
2019
FOR518 - Mac and iOS Forensic Analysis and Incident Response
2015
FOR526 - Advanced Memory Forensics and Threat Detection
2018
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response
2017
FOR578 - Cyber Threat Intelligence
2018
FOR585 - Advanced Smartphone Forensics
2017
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques
2017
MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression
2011
MGT514 - Security Strategic Planning, Policy, and Leadership
2016
MGT517 - Managing Security Operations Detection, Response, and Intelligence
2018
SEC201 - Computing & Technology Essentials
2017
SEC401 - Security Essentials Bootcamp Style
2017
SEC460 - Enterprise Threat and Vulnerability Assessment
2018
SEC487 - Open-Source Intelligence (OSINT) Gathering and Analysis
2018
SEC501 - Advanced Security Essentials - Enterprise Defender
2016
SEC503 - Intrusion Detection In-Depth
2015
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling
2019
SEC505 - Securing Windows and PowerShell Automation
2020
SEC506 - Securing Linux-Unix
2017
SEC511 - Continuous Monitoring and Security Operations
2016
SEC524 - Cloud Security Fundamentals
2012
SEC542 - Web App Penetration Testing and Ethical Hacking
2016
SEC545 - Cloud Security Architecture and Operations
2017
SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception
2016
SEC555 - SIEM with Tactical Analytics
2017
SEC560 - Network Penetration Testing and Ethical Hacking
2018
SEC561 - Immersive Hands-On Hacking Techniques
2015
SEC564 - Red Team Operations and Threat Emulation
2020
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth
2016
SEC573 - Automating Information Security with Python
2017
SEC579 - Virtualization and Software-Defined Security
2016
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing
2016
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses
2019
SEC617 - Wireless Penetration Testing and Ethical Hacking
2019
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques
2017
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
2019
SEC760 - Advanced Exploit Development for Penetration Testers
2019
Year: 2011-2020
Manufacturer: SANS
Manufacturer Website: sans.org
Author: SANS instructors
Duration: 600 hours.
Type of material handed out: Video Tutorial
English language
http://nitroflare.com/view/435D408C9FC54CF/AUD507_-_Auditing_&_Monitoring_Networks
http://nitroflare.com/view/AC0E4C216DD1689/FOR500_-_Windows_Forensic_Analysis.rar
http://nitroflare.com/view/F8AD8F09423BB0E/FOR508_-_Advanced_Digital_Forensics
http://nitroflare.com/view/0FCC9FA107E1E40/FOR518_-_Mac_and_iOS_Forensic_Analysis_and_Incident_Response.rar
http://nitroflare.com/view/4A9ED9B01D6867C/FOR526_-_Advanced_Memory_Forensics_and_Threat_Detection.rar
http://nitroflare.com/view/D50B3988EE10164/FOR572_-_Advanced_Network_Forensics_Threat_Hunting
http://nitroflare.com/view/0E57F08E7F12265/FOR578_-_Cyber_Threat_Intelligence.rar
http://nitroflare.com/view/3331FDAE70D0076/FOR585_-_Advanced_Smartphone_Forensics.rar
http://nitroflare.com/view/55D017BB9411947/FOR610_-_Reverse-Engineering_Malware_Malware_Analysis_Tools_and_Techniques.rar
http://nitroflare.com/view/EBB22A10EFE4320/ICS410_-_ICS_SCADA_Security_Essentials.rar
http://nitroflare.com/view/B56C84E4F918300/MGT414_-_SANS_Training_Program_for_CISSP_Certification.rar
http://nitroflare.com/view/2D4EA9113E5152A/MGT512_-_SANS_Security_Leadership_Essentials_For_Managers_with_Knowledge_Compression.rar
http://nitroflare.com/view/E7D9FF81F11BF16/MGT514_-_Security_Strategic_Planning
http://nitroflare.com/view/05D43138DD2D18A/MGT517_-_Managing_Security_Operations_Detection
http://nitroflare.com/view/C0DF0593BE57B07/SEC201_-_Computing_&_Technology_Essentials.rar
http://nitroflare.com/view/FB04C3C18EC4287/SEC401_-_Security_Essentials_Bootcamp_Style.rar
http://nitroflare.com/view/051CF38DA731116/SEC450_-_Blue_Team_Fundamentals._Security_Operations_and_Analysis.rar
http://nitroflare.com/view/C0F5D483A545ED2/SEC460_-_Enterprise_Threat_and_Vulnerability_Assessment.rar
http://nitroflare.com/view/AFE0BFF7AF313F4/SEC487_-_Open_Source_Intelligence_(OSINT)_Gathering_and_Analysis.rar
http://nitroflare.com/view/837652C5011CA66/SEC501_-_Advanced_Security_Essentials_-_Enterprise_Defender.rar
http://nitroflare.com/view/4B35E0061CD28B8/SEC503_-_Network_Intrusion_Detection.rar
http://nitroflare.com/view/0A527CF2FCE6155/SEC504_-_Hacker_Tools
http://nitroflare.com/view/B5B2C949B504647/SEC505_-_Securing_Windows_and_PowerShell_Automation.rar
http://nitroflare.com/view/8614BE8B84ABD0E/SEC506_-_Securing_Linux-Unix.part1.rar
http://nitroflare.com/view/2171267AC7ACB96/SEC506_-_Securing_Linux-Unix.part2.rar
http://nitroflare.com/view/A5229F3ADACEEDF/SEC506_-_Securing_Linux-Unix.part3.rar
http://nitroflare.com/view/01F9702E22757C7/SEC511_-_Continuous_Monitoring_and_Security_Operations.rar
http://nitroflare.com/view/9302429F48336D7/SEC524_-_Cloud_Security_Fundamentals.rar
http://nitroflare.com/view/917DE39E5AD0879/SEC530_-_Defensible_Security_Architecture_and_Engineering.rar
http://nitroflare.com/view/69A9C011CAD3EAE/SEC540_-_Cloud_Security_and_DevOps_Automation.rar
http://nitroflare.com/view/3EAF95F016667D3/SEC542_-_Web_App_Penetration_Testing_and_Ethical_Hacking.rar
http://nitroflare.com/view/AA78BA455346B95/SEC545_-_Cloud_Security_Architecture_and_Operations.rar
http://nitroflare.com/view/8BA3FF8D49BCC13/SEC550_-_Active_Defense
http://nitroflare.com/view/068678FC378A3C0/SEC555_-_SIEM_with_Tactical_Analytics.rar
http://nitroflare.com/view/839CE0C51E6E50D/SEC560_-_Network_Penetration_Testing_and_Ethical_Hacking.rar
http://nitroflare.com/view/910A0320365C744/SEC561_-_Immersive_Hands-on_Hacking_Techniques.rar
http://nitroflare.com/view/E63FE1D3F677499/SEC564_-_Red_Team_Exercises_and_Adversary_Emulation.rar
http://nitroflare.com/view/C3F918B1FA59E51/SEC566_-_Implementing_and_Auditing_the_Critical_Security_Controls_-_In-Depth.rar
http://nitroflare.com/view/5C548D236304F80/SEC573_-_Automating_Information_Security_with_Python.rar
http://nitroflare.com/view/A210A97374661F4/SEC575_-_Mobile_Device_Security_and_Ethical_Hacking.rar
http://nitroflare.com/view/7625197E2698FF0/SEC579_-_Virtualization_and_Software-Defined_Security.rar
http://nitroflare.com/view/667E7D7E8940B3A/SEC580_-_Metasploit_Kung_Fu_for_Enterprise_Pen_Testing.rar
http://nitroflare.com/view/26719063387EBD2/SEC599_-_Defeating_Advanced_Adversaries_-_Purple_Team_Tactics_&_Kill_Chain_Defenses.rar
http://nitroflare.com/view/5CBE310B5C24D7D/SEC617_-_Wireless_Penetration_Testing_and_Ethical_Hacking.rar
http://nitroflare.com/view/9491AC2F42FAFFE/SEC642_-_Advanced_Web_App_Penetration_Testing
http://nitroflare.com/view/0A28798B0A5F1EC/SEC660_-_Advanced_Penetration_Testing
http://nitroflare.com/view/152A8766D4E5D2C/SEC760_-_Advanced_Exploit_Development_for_Penetration_Testers.rar
https://uploadgig.com/file/download/C3fF1e6B785af875/AUD50720-20Auditing2020Monitoring20Networks20Perimeters2020Systems.rar
https://uploadgig.com/file/download/69eba6cea742C9d7/FOR50020-20Windows20Forensic20Analysis.rar
https://uploadgig.com/file/download/64A2eb63945d2496/FOR50820-20Advanced20Digital20Forensics20Incident20Response20and20Threat20Hunting.rar
https://uploadgig.com/file/download/73f167fF91Fd992f/FOR51820-20Mac20and20iOS20Forensic20Analysis20and20Incident20Response.rar
https://uploadgig.com/file/download/7a90b2cf84f49b63/FOR52620-20Advanced20Memory20Forensics20and20Threat20Detection.rar
https://uploadgig.com/file/download/39e7157acc8ee9E3/FOR57220-20Advanced20Network20Forensics20Threat20Hunting20Analysis20and20Incident20Response.rar
https://uploadgig.com/file/download/bb1e01f118CeEF41/FOR57820-20Cyber20Threat20Intelligence.rar
https://uploadgig.com/file/download/A808537ea92eC8d2/FOR58520-20Advanced20Smartphone20Forensics.rar
https://uploadgig.com/file/download/06610Fd9defdb433/FOR61020-20Reverse-Engineering20Malware20Malware20Analysis20Tools20and20Techniques.rar
https://uploadgig.com/file/download/455b610657f81682/ICS41020-20ICS20SCADA20Security20Essentials.rar
https://uploadgig.com/file/download/758Ab391C86cecd7/MGT41420-20SANS20Training20Program20for20CISSP20Certification.rar
https://uploadgig.com/file/download/aaCF1abC8671da32/MGT51220-20SANS20Security20Leadership20Essentials20For20Managers20with20Knowledge20Compression.rar
https://uploadgig.com/file/download/b6d8f61367ea6F2C/MGT51420-20Security20Strategic20Planning20Policy20and20Leadership.rar
https://uploadgig.com/file/download/44d1E45913DBB969/MGT51720-20Managing20Security20Operations20Detection20Response20and20Intelligence.rar
https://uploadgig.com/file/download/fCD65b47100c83e4/SEC20120-20Computing2020Technology20Essentials.rar
https://uploadgig.com/file/download/65Aa937e22cE5cf2/SEC40120-20Security20Essentials20Bootcamp20Style.rar
https://uploadgig.com/file/download/b5A32873035a02b2/SEC45020-20Blue20Team20Fundamentals.20Security20Operations20and20Analysis.rar
https://uploadgig.com/file/download/727dC6AC2ad5ea86/SEC46020-20Enterprise20Threat20and20Vulnerability20Assessment.rar
https://uploadgig.com/file/download/79b2eAA284ddc7f9/SEC48720-20Open20Source20Intelligence20OSINT20Gathering20and20Analysis.rar
https://uploadgig.com/file/download/fcBa03D4d114d4Ae/SEC50120-20Advanced20Security20Essentials20-20Enterprise20Defender.rar
https://uploadgig.com/file/download/19456abb05bd72f0/SEC50320-20Network20Intrusion20Detection.rar
https://uploadgig.com/file/download/4b2343ae1ed3d72f/SEC50420-20Hacker20Tools20Techniques20Exploits20and20Incident20Handling.rar
https://uploadgig.com/file/download/d4f352F41b729AA0/SEC50520-20Securing20Windows20and20PowerShell20Automation.rar
https://uploadgig.com/file/download/8D0832E9fE2d221a/SEC50620-20Securing20Linux-Unix.part1.rar
https://uploadgig.com/file/download/7deeecDa11fa8cF8/SEC50620-20Securing20Linux-Unix.part2.rar
https://uploadgig.com/file/download/73f0ddd61582874d/SEC50620-20Securing20Linux-Unix.part3.rar
https://uploadgig.com/file/download/0b8178639ACc3ca6/SEC51120-20Continuous20Monitoring20and20Security20Operations.rar
https://uploadgig.com/file/download/361e629e6F9e160e/SEC52420-20Cloud20Security20Fundamentals.rar
https://uploadgig.com/file/download/6109cdC3e8476152/SEC53020-20Defensible20Security20Architecture20and20Engineering.rar
https://uploadgig.com/file/download/68d26326b648B6e2/SEC54020-20Cloud20Security20and20DevOps20Automation.rar
https://uploadgig.com/file/download/070417b23e490b5f/SEC54220-20Web20App20Penetration20Testing20and20Ethical20Hacking.rar
https://uploadgig.com/file/download/8154c3a6235a60B5/SEC54520-20Cloud20Security20Architecture20and20Operations.rar
https://uploadgig.com/file/download/7d0e8587bD381604/SEC55020-20Active20Defense20Offensive20Countermeasures20and20Cyber20Deception.rar
https://uploadgig.com/file/download/3bd51CbBf7d7d003/SEC55520-20SIEM20with20Tactical20Analytics.rar
https://uploadgig.com/file/download/6825b446Ccc00A1a/SEC56020-20Network20Penetration20Testing20and20Ethical20Hacking.rar
https://uploadgig.com/file/download/c0808b6fa65249cd/SEC56120-20Immersive20Hands-on20Hacking20Techniques.rar
https://uploadgig.com/file/download/583a016fD5Ead1b3/SEC56420-20Red20Team20Exercises20and20Adversary20Emulation.rar
https://uploadgig.com/file/download/7d4aFbA92e6dF5D8/SEC56620-20Implementing20and20Auditing20the20Critical20Security20Controls20-20In-Depth.rar
https://uploadgig.com/file/download/2a0e1C41278eE059/SEC57320-20Automating20Information20Security20with20Python.rar
https://uploadgig.com/file/download/f1944bd73cE282ee/SEC57520-20Mobile20Device20Security20and20Ethical20Hacking.rar
https://uploadgig.com/file/download/D04d22aaabb1EfBd/SEC57920-20Virtualization20and20Software-Defined20Security.rar
https://uploadgig.com/file/download/ea8C927e56867085/SEC58020-20Metasploit20Kung20Fu20for20Enterprise20Pen20Testing.rar
https://uploadgig.com/file/download/436ca78685c44E07/SEC59920-20Defeating20Advanced20Adversaries20-20Purple20Team20Tactics2020Kill20Chain20Defenses.rar
https://uploadgig.com/file/download/d940169564530737/SEC61720-20Wireless20Penetration20Testing20and20Ethical20Hacking.rar
https://uploadgig.com/file/download/b47a0be07a7818fe/SEC64220-20Advanced20Web20App20Penetration20Testing20Ethical20Hacking20and20Exploitation20Techniques.rar
https://uploadgig.com/file/download/22FbF4715f9afde6/SEC66020-20Advanced20Penetration20Testing20Exploit20Writing20and20Ethical20Hacking.rar
https://uploadgig.com/file/download/e46c4482db6c7c19/SEC76020-20Advanced20Exploit20Development20for20Penetration20Testers.rar