<!DOCTYPE html><html data-theme="dark" lang="en-US"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" as="image" imageSrcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=16&amp;quality=75&amp;format=webp 16w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=32&amp;quality=75&amp;format=webp 32w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=48&amp;quality=75&amp;format=webp 48w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=64&amp;quality=75&amp;format=webp 64w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=96&amp;quality=75&amp;format=webp 96w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=128&amp;quality=75&amp;format=webp 128w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=3840&amp;quality=75&amp;format=webp 3840w" imageSizes="300px, (min-width: 768px) 445px"/><link rel="stylesheet" href="/_next/static/css/8f4c1d5ac92728b5.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/f60c4c18eaea2539.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/10a162551269c449.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/19ce4d406e564b03.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/206023683b1c0579.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-11f4915bd98f8a25.js"/><script src="/_next/static/chunks/c05f6132-04ed626f2288e828.js" async=""></script><script src="/_next/static/chunks/2328-7afeeffa74a984be.js" async=""></script><script src="/_next/static/chunks/main-app-5ac86ba54cb5ca21.js" async=""></script><script src="/_next/static/chunks/0ac02ab0-9734b1a658ed1114.js" async=""></script><script src="/_next/static/chunks/3970-9261773f9c0e8d18.js" async=""></script><script src="/_next/static/chunks/1299-897517986f6d760d.js" async=""></script><script src="/_next/static/chunks/2534-c754c698a60b8575.js" async=""></script><script src="/_next/static/chunks/2682-17379429f0b93fb5.js" async=""></script><script src="/_next/static/chunks/1800-14fa0c06af0073b0.js" async=""></script><script src="/_next/static/chunks/1638-693bfc588657e07c.js" async=""></script><script src="/_next/static/chunks/181-8557cc112cd03503.js" async=""></script><script src="/_next/static/chunks/1413-6d820c3bb613cd06.js" async=""></script><script src="/_next/static/chunks/app/page-d57d6546cb7e66be.js" async=""></script><script src="/_next/static/chunks/6676-20e4890b05aafbf0.js" async=""></script><script src="/_next/static/chunks/2411-d7e1899bfb2358fc.js" async=""></script><script src="/_next/static/chunks/5463-5252e78b2dd34d4e.js" async=""></script><script src="/_next/static/chunks/6551-731be90d7a47741b.js" async=""></script><script src="/_next/static/chunks/app/layout-db05aba00a9dacde.js" async=""></script><script src="/_next/static/chunks/app/error-8391fd18fc444d3f.js" async=""></script><script src="/_next/static/chunks/1044-687250a180f48329.js" async=""></script><script src="/_next/static/chunks/1049-097a54a192c2924a.js" async=""></script><script src="/_next/static/chunks/9633-b2d87d5d19bd0ffd.js" async=""></script><script src="/_next/static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js" async=""></script><link rel="preload" href="https://cdn.optimizely.com/js/28081820005.js" as="script"/><link rel="preload" href="https://www.googletagmanager.com/gtm.js?id=GTM-5T9DW3B" as="script"/><meta name="next-size-adjust" content=""/><meta content="cC-8xOerZ3opiLx9VloUCzc6SgMfOZHYihJzWA19-KI" name="google-site-verification"/><title>Offensive Operations, Pen Testing and Red Teaming Training | SANS Institute</title><meta name="description" content="Training in penetration testing, red teaming, purple teaming, and exploit development, provides the skills needed to simulate real-world attacks, evade defenses, and enhance security through adversary emulation and improving defense strategies. "/><meta name="language" content="en"/><link rel="canonical" href="https://www.sans.org/cybersecurity-focus-areas/offensive-operations"/><meta property="og:title" content="Offensive Security Training, Courses &amp; Certifications"/><meta property="og:description" content="Training in penetration testing, red teaming, purple teaming, and exploit development, provides the skills needed to simulate real-world attacks, evade defenses, and enhance security through adversary emulation and improving defense strategies. "/><meta property="og:url" content="https://www.sans.org/cybersecurity-focus-areas/offensive-operations"/><meta property="og:site_name" content="SANS Institute"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary"/><meta name="twitter:site" content="@SANSInstitute"/><meta name="twitter:title" content="Offensive Security Training, Courses &amp; Certifications"/><meta name="twitter:description" content="Training in penetration testing, red teaming, purple teaming, and exploit development, provides the skills needed to simulate real-world attacks, evade defenses, and enhance security through adversary emulation and improving defense strategies. "/><link rel="icon" href="/favicon.ico" type="image/x-icon" sizes="48x48"/><link rel="icon" href="/icon1.png?2951f2f1b780f8ac" type="image/png" sizes="96x96"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="__variable_71459b __variable_5c0054 __variable_9e78df"><div hidden=""><!--$--><!--/$--></div><!--$--><!--/$--><!--$--><!--/$--><noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-N9Z5JVC" style="display:none;visibility:hidden" width="0"></iframe></noscript><script>((a,b,c,d,e,f,g,h)=>{let i=document.documentElement,j=["light","dark"];function k(b){var c;(Array.isArray(a)?a:[a]).forEach(a=>{let c="class"===a,d=c&&f?e.map(a=>f[a]||a):e;c?(i.classList.remove(...d),i.classList.add(b)):i.setAttribute(a,b)}),c=b,h&&j.includes(c)&&(i.style.colorScheme=c)}if(d)k(d);else try{let a=localStorage.getItem(b)||c,d=g&&"system"===a?window.matchMedia("(prefers-color-scheme: dark)").matches?"dark":"light":a;k(d)}catch(a){}})("data-theme","theme","system",null,["light","dark"],null,true,false)</script><div class="c-skip-links"><ul class="skip-links__list u-container"><li class="skip-links__list-item"><button class="c-button button--tertiary-white skip-links__list-item-button" type="button"><span class="button__label">Skip to main content</span></button></li><li class="skip-links__list-item"><button class="c-button button--tertiary-white skip-links__list-item-button" type="button"><span class="button__label">Go to search</span></button></li><li class="skip-links__list-item"><button class="c-button button--tertiary-white skip-links__list-item-button" type="button"><span class="button__label">Go to footer</span></button></li></ul></div><header class="c-header header--is-visible"><div class="c-topbar"><div class="c-container topbar__container"><nav aria-label="Topbar navigation" class="topbar__nav"><div class="topbar__nav-item"><a class="topbar__nav-item-link" href="/account/login"><svg height="16" width="16"><use href="/icons.svg#login"></use></svg>Log In</a></div><div class="topbar__nav-item"><a class="topbar__nav-item-link" href="/account/create"><svg height="16" width="16"><use href="/icons.svg#new"></use></svg>Join - It&#x27;s Free</a></div></nav><button class="c-theme-switcher" type="button"><svg height="24" width="24" class="theme-switcher__icon"><use href="/icons.svg#moon"></use></svg><span class="sr-only"></span><span class="theme-switcher__toggle"></span><svg height="24" width="24" class="theme-switcher__icon"><use href="/icons.svg#sun"></use></svg></button></div></div><div class="header__wrapper"><div class="c-container header__container"><a aria-disabled="false" aria-label="Go to homepage" href="/"><svg height="33" width="65" class="header__logo"><use href="/icons.svg#logo"></use></svg></a><div class="header__drawer"><div class="c-mobile-drawer-search" role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="mobile-drawer-search-label"><form class="mobile-drawer-search__form" noValidate="" role="search" action="" method="GET"><label class="sr-only" for="mobile-drawer-search-input" id="mobile-drawer-search-label">Search</label><div class="c-search-input mobile-drawer-search__input"><input autoCapitalize="none" class="search-input__field" type="search" aria-autocomplete="both" aria-labelledby="mobile-drawer-search-label" id="mobile-drawer-search-input" autoComplete="off" autoCorrect="off" enterKeyHint="search" spellCheck="false" placeholder="What are you looking for?" maxLength="512"/><div class="search-input__buttons"><button class="c-button button--primary button--icon-right button--is-icon-only" type="submit"><div class="c-loading-spinner loading-spinner--size-md button__loader"><div class="loading-spinner__spinner"></div></div><span class="sr-only">Search</span></button></div></div></form><div class="search-results--mobile-drawer"></div></div><div class="c-header-navigation"><div aria-label="Main tab navigation" class="header-navigation__tabs" role="tablist"><button id="header-navigation-tab-0" role="tab" tabindex="0" class="c-button button--tertiary-white button--icon-right button--icon-translate-right header-navigation__tab" aria-controls="header-navigation-tabpanel-0" aria-selected="false" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Training</span></button><button id="header-navigation-tab-1" role="tab" tabindex="0" class="c-button button--tertiary-white button--icon-right button--icon-translate-right header-navigation__tab" aria-controls="header-navigation-tabpanel-1" aria-selected="false" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learning Paths</span></button><button id="header-navigation-tab-2" role="tab" tabindex="0" class="c-button button--tertiary-white button--icon-right button--icon-translate-right header-navigation__tab" aria-controls="header-navigation-tabpanel-2" aria-selected="false" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Free Resources</span></button><button id="header-navigation-tab-3" role="tab" tabindex="0" class="c-button button--tertiary-white button--icon-right button--icon-translate-right header-navigation__tab" aria-controls="header-navigation-tabpanel-3" aria-selected="false" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">For Organizations</span></button></div><div aria-labelledby="header-navigation-tab-0" id="header-navigation-tab-0" role="tabpanel" class="header-navigation__tabpanel"><div class="u-container header-navigation__tabpanel-container"><button class="c-button button--tertiary-white button--icon-left button--icon-translate-right header-navigation__tabpanel-back-button" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Back</span></button><a class="header-navigation__tabpanel-link" href="/cyber-security-training-overview">Training</a><div class="c-grid grid--columns-12"><nav aria-label="navigation for: training" class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-8 header-navigation__tabpanel-items"><div class="header-navigation__tabpanel-item-single"><a aria-label="Courses" class="header-navigation__tabpanel-link-container" href="/cybersecurity-courses"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#courses-cards-three"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Courses</p><p class="c-text header-navigation__tabpanel-item-single-description">Build cyber prowess with training from renowned experts</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Ways to Train" class="header-navigation__tabpanel-link-container" href="/cyber-security-training-formats"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#training"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Ways to Train</p><p class="c-text header-navigation__tabpanel-item-single-description">Multiple training options to best fit your schedule and preferred learning style</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Cyber Ranges" class="header-navigation__tabpanel-link-container" href="/cyber-ranges"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#hands-on-solutions"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Cyber Ranges</p><p class="c-text header-navigation__tabpanel-item-single-description">Hands-on training to keep you at the top of your game</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a href="/cyber-security-training-events" aria-label="Training Events &amp; Summits" class="header-navigation__tabpanel-link-container" target="_self"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#location"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Training Events &amp; Summits</p><p class="c-text header-navigation__tabpanel-item-single-description">Expert-led training at locations around the world</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Certifications" class="header-navigation__tabpanel-link-container" href="/cyber-security-certifications"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#sealcheck-certification"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Certifications</p><p class="c-text header-navigation__tabpanel-item-single-description">Demonstrate cybersecurity expertise with GIAC certifications</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Free Training Events" class="header-navigation__tabpanel-link-container" href="/free-cybersecurity-events"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#calendar-check"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Free Training Events</p><p class="c-text header-navigation__tabpanel-item-single-description">Upcoming workshops, webinars and local events
</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Workforce Security and Risk Training " class="header-navigation__tabpanel-link-container" href="/for-organizations/workforce"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#shield-workforce"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Workforce Security and Risk Training </p><p class="c-text header-navigation__tabpanel-item-single-description">Harden enterprise security with end-user and role-based training</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Meet Our Instructors" class="header-navigation__tabpanel-link-container" href="/instructors"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#user-private-training"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Meet Our Instructors</p><p class="c-text header-navigation__tabpanel-item-single-description">Train with world-class cybersecurity experts who bring real-world expertise to class.</p></div></a></div></nav><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-10 grid__item--col-end-13 header-navigation__tabpanel-featured header-navigation__tabpanel-featured--is-card"><div class="header-navigation__tabpanel-card"><div class="header-navigation__tabpanel-card-title"><span class="c-heading heading--is-h6 heading--is-h6-desktop">Featured Course</span><a class="c-button button--tertiary header-navigation__tabpanel-card-button" href="/cyber-security-courses"><span class="button__label">View All Courses</span></a></div><article class="c-course-card course-card--is-default header-navigation__tabpanel-course-card" id="SEC595"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals</h3><header class="course-card__header"></header><div class="course-card__labels"><span class="course-card__label-code">SEC595</span><span class="course-card__label-focus-area">Cyber Defense, Artificial Intelligence</span></div><div class="course-card__image-wrapper"><img alt="SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=3840&amp;quality=75&amp;format=webp"/></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/applied-data-science-machine-learning"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/applied-data-science-machine-learning#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></div></div></div></div><div class="header-navigation__tabpanel-bottom-bar"><div class="c-container"><span class="c-text header-navigation__tabpanel-bottom-bar-title">Get a Free Hour of SANS Training</span><div class="header-navigation__tabpanel-bottom-bar-wrapper"><p class="c-text header-navigation__tabpanel-bottom-bar-description">Experience SANS training through course previews.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right header-navigation__tabpanel-bottom-bar-button" href="/course-preview"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn More</span></a></div></div></div></div><div aria-labelledby="header-navigation-tab-1" id="header-navigation-tab-1" role="tabpanel" class="header-navigation__tabpanel"><div class="u-container header-navigation__tabpanel-container"><button class="c-button button--tertiary-white button--icon-left button--icon-translate-right header-navigation__tabpanel-back-button" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Back</span></button><a class="header-navigation__tabpanel-link" href="/learning-paths">Learning Paths</a><div class="c-grid grid--columns-12"><nav aria-label="navigation for: learning paths" class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-8 header-navigation__tabpanel-items"><div class="header-navigation__tabpanel-item-single"><a aria-label="By Focus Area" class="header-navigation__tabpanel-link-container" href="/cybersecurity-focus-areas"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#focus"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">By Focus Area</p><p class="c-text header-navigation__tabpanel-item-single-description">Chart your path to job-specific training courses</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="New to Cyber" class="header-navigation__tabpanel-link-container" href="/mlp/new-to-cyber"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#new"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">New to Cyber</p><p class="c-text header-navigation__tabpanel-item-single-description">Give your cybersecurity career the right foundation for success</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="By Job Role" class="header-navigation__tabpanel-link-container" href="/job-roles"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#briefcase-management"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">By Job Role</p><p class="c-text header-navigation__tabpanel-item-single-description">Find the courses and certifications that align with our current or desired role</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Leadership" class="header-navigation__tabpanel-link-container" href="/cybersecurity-focus-areas/leadership"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#ranking"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Leadership</p><p class="c-text header-navigation__tabpanel-item-single-description">Training designed to help security leaders reduce organizational risk</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="By Skills Framework or Directive" class="header-navigation__tabpanel-link-container" href="/frameworks-and-directives"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#atom"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">By Skills Framework or Directive</p><p class="c-text header-navigation__tabpanel-item-single-description">Explore how SANS courses align with leading cybersecurity skills frameworks including NICE, ECSF and DoD 8140</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Degree and Certificate Programs" class="header-navigation__tabpanel-link-container" href="https://www.sans.edu/"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#degree"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Degree and Certificate Programs</p><p class="c-text header-navigation__tabpanel-item-single-description">Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="By Skills Roadmap" class="header-navigation__tabpanel-link-container" href="/cyber-security-skills-roadmap"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#learning-paths"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">By Skills Roadmap</p><p class="c-text header-navigation__tabpanel-item-single-description">Find the right training path based on critical skills</p></div></a></div></nav><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-10 grid__item--col-end-13 header-navigation__tabpanel-featured header-navigation__tabpanel-featured--is-card"><div class="header-navigation__tabpanel-card"><div class="header-navigation__tabpanel-card-title"><span class="c-heading heading--is-h6 heading--is-h6-desktop">Featured</span><a class="c-button button--tertiary header-navigation__tabpanel-card-button" href="/cybersecurity-focus-areas"><span class="button__label">View all Focus Areas</span></a></div><div class="c-learning-paths-card learning-parths-card--is-simplified learning-paths-card--is-color-ai header-navigation__tabpanel-learning-path-card"><svg height="24" width="24" class="learning-paths-card__icon"><use href="/icons.svg#related"></use></svg><a class="c-button button--tertiary-white button--icon-right button--icon-translate-right learning-paths-card__cta" href="/cybersecurity-focus-areas/ai"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">NEW - AI Security Training</span></a></div></div></div></div></div><div class="header-navigation__tabpanel-bottom-bar"><div class="c-container"><span class="c-text header-navigation__tabpanel-bottom-bar-title">Can&#x27;t find what you are looking for?</span><div class="header-navigation__tabpanel-bottom-bar-wrapper"><p class="c-text header-navigation__tabpanel-bottom-bar-description">Let us help.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right header-navigation__tabpanel-bottom-bar-button" href="/about/contact"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Contact us</span></a></div></div></div></div><div aria-labelledby="header-navigation-tab-2" id="header-navigation-tab-2" role="tabpanel" class="header-navigation__tabpanel"><div class="u-container header-navigation__tabpanel-container"><button class="c-button button--tertiary-white button--icon-left button--icon-translate-right header-navigation__tabpanel-back-button" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Back</span></button><a class="header-navigation__tabpanel-link" href="/security-resources">Free Resources</a><div class="c-grid grid--columns-12"><div aria-label="navigation for: free resources" class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-9 header-navigation__tabpanel-items header-navigation__tabpanel-items--is-3-grid"><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Watch &amp; Listen</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/webcasts"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Webinars</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/presentations"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Summit Presentations</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/podcasts"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Podcasts &amp; Live Streams</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/security-resources/watch-and-listen"><span class="button__label">Overview</span></a></nav><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Read</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/blog"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Blog</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/newsletters"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Newsletters</span></a><a href="https://isc.sans.edu/" class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" target="_blank"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Internet Storm Center</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/security-resources/read"><span class="button__label">Overview</span></a></nav><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Download</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/tools"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Open Source Tools</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/posters"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Posters &amp; Cheat Sheets</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/information-security-policy"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Policy Templates</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/white-papers"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">White Papers</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/security-resources/download"><span class="button__label">Overview</span></a></nav></div><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-10 grid__item--col-end-13 header-navigation__tabpanel-featured header-navigation__tabpanel-featured--is-items"><div class="header-navigation__tabpanel-item-single"><a aria-label="SANS Community Benefits" class="header-navigation__tabpanel-link-container" href="/member-benefits"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#new"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">SANS Community Benefits</p><p class="c-text header-navigation__tabpanel-item-single-description">Connect, learn, and share with other cybersecurity professionals</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Customer Case Studies" class="header-navigation__tabpanel-link-container" href="/customer-reviews"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#people-3"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Customer Case Studies</p><p class="c-text header-navigation__tabpanel-item-single-description">Discover how organizations and individual cyber practitioners use SANS training and GIAC certifications</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="AI Risk &amp; Readiness" class="header-navigation__tabpanel-link-container" href="/artificial-intelligence"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#head"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">AI Risk &amp; Readiness</p><p class="c-text header-navigation__tabpanel-item-single-description">Explore expert-driven guidance, training, and tools to help defend against AI-powered threats and adopt AI securely</p></div></a></div></div></div></div><div class="header-navigation__tabpanel-bottom-bar"><div class="c-container"><span class="c-text header-navigation__tabpanel-bottom-bar-title">Join the SANS Community</span><div class="header-navigation__tabpanel-bottom-bar-wrapper"><p class="c-text header-navigation__tabpanel-bottom-bar-description">Become a member for instant access to our free resources.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right header-navigation__tabpanel-bottom-bar-button" href="/member-benefits"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Sign Up</span></a></div></div></div></div><div aria-labelledby="header-navigation-tab-3" id="header-navigation-tab-3" role="tabpanel" class="header-navigation__tabpanel"><div class="u-container header-navigation__tabpanel-container"><button class="c-button button--tertiary-white button--icon-left button--icon-translate-right header-navigation__tabpanel-back-button" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Back</span></button><a class="header-navigation__tabpanel-link" href="/for-organizations">For Organizations</a><div class="c-grid grid--columns-12"><div aria-label="navigation for: for organizations" class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-9 header-navigation__tabpanel-items header-navigation__tabpanel-items--is-3-grid"><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Team Development</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/team-development/why-partner-with-sans"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Why Partner with SANS</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/team-development/group-purchasing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Group Purchases</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/team-development/cybersecurity-assessments"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Skills &amp; Talent Assessments</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/team-development/private-training"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Private &amp; Custom Training Programs</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/for-organizations/team-development"><span class="button__label">Overview</span></a></nav><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Leadership Development</span><a href="/cyber-security-courses?refinementList%5Bfacets.focusArea%5D%5B0%5D=Cybersecurity%20Leadership" class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Management Courses &amp; Accreditation</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/cyber-ranges/cyber-crisis-exercises"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Cyber Crisis Exercises</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/cyber-leaders-network"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">SANS Cyber Leaders Network</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/cybersecurity-focus-areas/leadership"><span class="button__label">Overview</span></a></nav><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Workforce Security &amp; Risk</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/security-awareness-training"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Security Awareness Training</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/compliance-training"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Compliance Training</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/risk-management"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Risk Management</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/services"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Services</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/resources"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Resources</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/for-organizations/workforce"><span class="button__label">Overview</span></a></nav></div><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-10 grid__item--col-end-13 header-navigation__tabpanel-featured header-navigation__tabpanel-featured--is-items"><div class="header-navigation__tabpanel-item-single"><a aria-label="Public Sector" class="header-navigation__tabpanel-link-container" href="/for-organizations/public-sector"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#building-office-enterprise"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Public Sector</p><p class="c-text header-navigation__tabpanel-item-single-description">Mission-focused cybersecurity training for government, defense, and education</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Partnerships" class="header-navigation__tabpanel-link-container" href="/partnerships"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#people-2"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Partnerships</p><p class="c-text header-navigation__tabpanel-item-single-description">Explore industry-specific programming and customized training solutions</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Sponsorship Opportunities" class="header-navigation__tabpanel-link-container" href="/sponsorship"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#info"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Sponsorship Opportunities</p><p class="c-text header-navigation__tabpanel-item-single-description">Sponsor a SANS event or research paper</p></div></a></div></div></div></div><div class="header-navigation__tabpanel-bottom-bar"><div class="c-container"><span class="c-text header-navigation__tabpanel-bottom-bar-title">Interested in developing a training plan to fit your organization’s needs?</span><div class="header-navigation__tabpanel-bottom-bar-wrapper"><p class="c-text header-navigation__tabpanel-bottom-bar-description">We&#x27;re here to help.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right header-navigation__tabpanel-bottom-bar-button" href="/about/contact"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Contact Us</span></a></div></div></div></div></div><a class="c-button button--primary button--icon-right button--icon-translate-right header__button" target="_top" href="/about/contact#connect-with-a-training-advisor"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Contact Sales</span></a><div class="c-topbar header__drawer-topbar"><div class="c-container topbar__container"><nav aria-label="Topbar navigation" class="topbar__nav"><div class="topbar__nav-item"><a class="topbar__nav-item-link" href="/account/login"><svg height="16" width="16"><use href="/icons.svg#login"></use></svg>Log In</a></div><div class="topbar__nav-item"><a class="topbar__nav-item-link" href="/account/create"><svg height="16" width="16"><use href="/icons.svg#new"></use></svg>Join - It&#x27;s Free</a></div></nav><button class="c-theme-switcher" type="button"><svg height="24" width="24" class="theme-switcher__icon"><use href="/icons.svg#moon"></use></svg><span class="sr-only"></span><span class="theme-switcher__toggle"></span><svg height="24" width="24" class="theme-switcher__icon"><use href="/icons.svg#sun"></use></svg></button></div></div></div><button class="c-button button--tertiary-white button--icon-right header__button-modal" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#menu"></use></svg><span class="button__label">Menu</span></button><div class="header__buttons"><div id="search"><button class="c-button button--secondary button--icon-left header__button header__button--search" aria-label="Open search" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#search"></use></svg><span class="button__label">Search</span></button><div class="desktop-header-search__modal" role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="desktop-header-search-label"><div class="desktop-header-search__input-wrapper"><div class="c-container desktop-header-search__input-container"><form class="desktop-header-search__form" noValidate="" role="search" action="" method="GET"><label class="sr-only" for="desktop-header-search-input" id="desktop-header-search-label">Search</label><input class="desktop-header-search__input" aria-autocomplete="both" aria-labelledby="desktop-header-search-label" id="desktop-header-search-input" autoComplete="off" autoCorrect="off" autoCapitalize="none" enterKeyHint="search" spellCheck="false" placeholder="What are you looking for?" maxLength="512" type="search" name="query"/><button class="c-button button--unstyled button--icon-right button--is-icon-only desktop-header-search__close-button" aria-label="Close" type="reset"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#close"></use></svg></button></form></div></div><div class="desktop-header-search__panel"></div></div></div><a class="c-button button--primary button--icon-right button--icon-translate-right header__button" target="_top" href="/about/contact#connect-with-a-training-advisor"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Contact Sales</span></a></div></div></div></header><main id="main"><div class="secondary-hero secondary-hero--has-sticky-links secondary-hero--has-image"><div class="c-grid grid--has-container grid--columns-6 grid--columns-tablet-8 grid--columns-desktop-12"><div class="grid__item grid__item--col-span-6 grid__item--col-span-tablet-4 grid__item--col-span-desktop-6 secondary-hero__text-grid-item"><div class="c-animate-in slide-in-from-bottom secondary-hero__animate-in-content"><script type="application/ld+json">{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"item":"https://www.sans.org/cybersecurity-focus-areas","name":"Cybersecurity Focus Areas"},{"@type":"ListItem","position":2,"item":"https://www.sans.org/cybersecurity-focus-areas/offensive-operations","name":"Offensive Operations, Pen Testing and Red Teaming Training"}]}</script><nav aria-label="Breadcrumbs" class="c-breadcrumbs secondary-hero__breadcrumbs"><ol class="breadcrumbs__list"><li class="breadcrumbs__list-item"><a class="breadcrumbs__list-item-link" href="/cybersecurity-focus-areas">Cybersecurity Focus Areas</a></li><li class="breadcrumbs__list-item breadcrumbs__list-item--is-active"><span aria-current="page" class="breadcrumbs__list-item-link">Offensive Operations, Pen Testing and Red Teaming Training</span></li></ol><a class="c-button button--tertiary-white button--icon-left button--icon-translate-right breadcrumbs__button" href="/cybersecurity-focus-areas"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Previous level</span></a></nav><div class="secondary-hero__content-wrappper"><div class="secondary-hero__body"><h1 class="c-heading secondary-hero__title">Offensive Operations, Pen Testing and Red Teaming Training</h1></div></div></div></div><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-7 grid__item--col-start-desktop-9 grid__item--col-end-7 grid__item--col-end-tablet-13 grid__item--col-end-desktop-13 secondary-hero__image-grid-item"><div class="secondary-hero__image-container"><div class="c-background-rings" style="--ring-color:var(--color-focusarea-offensive-operations)"><div class="background-rings__ring background-rings__ring--default"></div><div class="background-rings__ring background-rings__ring--default"></div><div class="background-rings__ring background-rings__ring--default"></div></div><div class="secondary-hero__image-holder"><img alt="Offensive Operations, Pen Testing and Red Teaming Training" decoding="async" data-nimg="fill" class="secondary-hero__image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="300px, (min-width: 768px) 445px" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=16&amp;quality=75&amp;format=webp 16w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=32&amp;quality=75&amp;format=webp 32w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=48&amp;quality=75&amp;format=webp 48w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=64&amp;quality=75&amp;format=webp 64w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=96&amp;quality=75&amp;format=webp 96w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=128&amp;quality=75&amp;format=webp 128w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png?width=3840&amp;quality=75&amp;format=webp"/></div></div></div></div></div><div class="c-sticky-anchor-links"><div class="c-container sticky-anchor-links__container"><div class="sticky-anchor-links__divider"></div><span class="c-text sticky-anchor-links__jump-label">Jump to:</span><div class="sticky-anchor-links__select-wrapper"><select class="sticky-anchor-links__select c-button button--secondary"><option disabled="" value="" selected="">Please select</option><option value="#related-courses">Related Courses</option><option value="#instructors">Instructors</option><option value="#featured-content">Featured Content</option><option value="#faqs">FAQs</option></select><svg height="12" width="12" class="sticky-anchor-links__select-icon"><use href="/icons.svg#arrow-right-heavy"></use></svg></div><ul class="sticky-anchor-links__list sticky-anchor-links__list-anchors"><li class="sticky-anchor-links__list-item"><a class="c-button button--secondary sticky-anchor-links__list-item-button" href="#related-courses"><span class="button__label">Related Courses</span></a></li><li class="sticky-anchor-links__list-item"><a class="c-button button--secondary sticky-anchor-links__list-item-button" href="#instructors"><span class="button__label">Instructors</span></a></li><li class="sticky-anchor-links__list-item"><a class="c-button button--secondary sticky-anchor-links__list-item-button" href="#featured-content"><span class="button__label">Featured Content</span></a></li><li class="sticky-anchor-links__list-item"><a class="c-button button--secondary sticky-anchor-links__list-item-button" href="#faqs"><span class="button__label">FAQs</span></a></li></ul></div></div><div class="c-stacked-wrapper stacked-wrapper--has-spacing-top u-bg-color-surface-primary"><div class="c-stacked-wrapper u-bg-color-surface-primary c-dynamic-content-wrapper"><div class="c-animate-in slide-in-from-bottom generic-content-block__wrapper" id=""><div class="c-grid c-generic-content-block grid--has-container grid--columns-12"><div class="generic-content-block__grid-item generic-content-block__grid-item--is-aligned-left"><div class="c-rich-text generic-content-block__rich-text"><h2>Outsmart Hackers with Real-World Offensive Security Training</h2><p>As cyberthreats grow more sophisticated, it is critical to proactively identify and address vulnerabilities before adversaries exploit them. SANS Offensive Operations delivers expert-led training across the entire attack surface, covering everything from penetration testing and red teaming to exploit development and hardware hacking. Through hands-on labs and industry-recognized certifications, we equip professionals to master real-world offensive techniques and adversarial tactics.</p></div></div></div></div></div><div class="c-animate-in slide-in-from-bottom"><section class="c-container c-promotional-icon-block"><div class="c-grid c-headline promotional-icon-block__headline grid--columns-6 grid--columns-tablet-12"><div class="grid__item grid__item--col-span-6 grid__item--col-span-tablet-9 headline__content"><div class="headline__title-wrapper"><h2 class="c-heading heading--is-h3 heading--is-h3-desktop headline__title">What You&#x27;ll Learn</h2></div></div></div><div class="c-grid promotional-icon-block__grid grid--columns-12"><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-4 promotional-icon-block__item"><h3 class="promotional-icon-block__item-title">Penetration Testing</h3><p class="promotional-icon-block__item-description">Use real-world tactics, tools and methodologies to identify, exploit, and remediate security vulnerabilities.</p><svg height="24" width="24" class="promotional-icon-block__item-icon"><use href="/icons.svg#crosshair"></use></svg></div><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-4 promotional-icon-block__item"><h3 class="promotional-icon-block__item-title">Red Teaming</h3><p class="promotional-icon-block__item-description">Learn adversary emulation, stealth, and evasion techniques to test and improve an organization&#x27;s security posture against persistent threats.</p><svg height="24" width="24" class="promotional-icon-block__item-icon"><use href="/icons.svg#workshops"></use></svg></div><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-4 promotional-icon-block__item"><h3 class="promotional-icon-block__item-title">Purple Teaming</h3><p class="promotional-icon-block__item-description">Bridge the gap between offense and defense, to foster collaboration between red and blue teams and strengthen detection, response, and overall security resilience.</p><svg height="24" width="24" class="promotional-icon-block__item-icon"><use href="/icons.svg#detective-experts"></use></svg></div></div></section></div><div class="c-animate-in slide-in-from-bottom quote-card-carousel__wrapper"><div class="c-grid c-carousel grid--has-container grid--columns-12"><div class="grid__item sr-only carousel__title"><h2 class="c-heading heading--is-h3 heading--is-h3-desktop" id="heading-_R_1uav5u9bb_">Student Insights</h2></div><div aria-atomic="true" aria-labelledby="heading-_R_1uav5u9bb_" aria-live="polite" aria-roledescription="carousel" class="carousel__root carousel--with-auto-height" role="region"><div class="grid__item carousel__grid-item-slider"><article class="c-quote-card c-wide-card wide-card--default wide-card--surface-secondary"><div class="c-background-rings wide-card__background-rings"><div class="background-rings__ring background-rings__ring--default"></div><div class="background-rings__ring background-rings__ring--default"></div><div class="background-rings__ring background-rings__ring--default"></div><div class="background-rings__ring background-rings__ring--default"></div></div><div class="wide-card__body"><blockquote><div class="quote-card__quote">In one week, my instructor built a bridge from typical vulnerability scanning to the true art of penetration testing. Thank you, SANS, for making myself and my company much more capable in information security.</div><footer class="quote-card__author"><span>Mike Dozier</span><cite class="quote-card__author-title">Savannah River Nuclear Solutions</cite></footer></blockquote></div></article></div></div></div></div><div class="c-animate-in slide-in-from-bottom"><div id="related-courses" class="c-grid c-carousel carousel--is-fullwidth grid--has-container grid--columns-12"><div class="grid__item carousel__title"><h2 class="c-heading heading--is-h3-desktop" id="heading-_R_2eav5u9bb_">Featured Courses</h2><div class="carousel__link-item-headline"><a class="c-button button--tertiary" href="https://www.sans.org/cyber-security-courses?refinementList%5Bfacets.focusArea%5D%5B0%5D=Offensive%20Operations"><span class="button__label">View All Courses</span></a></div></div><div aria-atomic="true" aria-labelledby="heading-_R_2eav5u9bb_" aria-live="polite" aria-roledescription="carousel" class="carousel__root" role="region"><div class="grid__item carousel__grid-item-slider"><div class="carousel__base" style="--slides-per-view:1;--slides-per-view-desktop:3;--slides-per-view-tablet:2"><ul class="carousel__container"><li class="carousel__slide"><span class="sr-only">Slide 1 of 12</span><article class="c-course-card course-card--is-default" id="SEC504"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC504: Hacker Tools, Techniques, and Incident Handling</h3><header class="course-card__header"><span class="c-tag tag--lightgreen"><span class="tag__text">MAJOR UPDATES</span></span><div class="course-card__tags-wrapper"><span class="c-tag tag--lightgreen course-hero__tag"><span class="tag__text">AI SKILLS</span></span></div><span class="course-card__header-skill-level">Essentials</span></header><div class="course-card__labels"><span class="course-card__label-code">SEC504</span><span class="course-card__label-focus-area">Offensive Operations</span></div><div class="course-card__image-wrapper"><img alt="SEC504: Hacker Tools, Techniques, and Incident Handling" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-offensive-operations" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaaf30504c4a3f451/67efb8e60ffb5bac39121508/course_social_SEC504_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaaf30504c4a3f451/67efb8e60ffb5bac39121508/course_social_SEC504_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaaf30504c4a3f451/67efb8e60ffb5bac39121508/course_social_SEC504_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaaf30504c4a3f451/67efb8e60ffb5bac39121508/course_social_SEC504_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaaf30504c4a3f451/67efb8e60ffb5bac39121508/course_social_SEC504_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaaf30504c4a3f451/67efb8e60ffb5bac39121508/course_social_SEC504_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaaf30504c4a3f451/67efb8e60ffb5bac39121508/course_social_SEC504_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaaf30504c4a3f451/67efb8e60ffb5bac39121508/course_social_SEC504_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaaf30504c4a3f451/67efb8e60ffb5bac39121508/course_social_SEC504_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaaf30504c4a3f451/67efb8e60ffb5bac39121508/course_social_SEC504_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-offensive-operations"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->38 CPEs / 38 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 44 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j8baeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j8baeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j8baeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j8baeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/hacker-techniques-incident-handling"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/hacker-techniques-incident-handling#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 2 of 12</span><article class="c-course-card course-card--is-default" id="SEC535"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC535: Offensive AI - Attack Tools and Techniques</h3><header class="course-card__header"><span class="c-tag tag--yellow"><span class="tag__text">NEW</span></span><div class="course-card__tags-wrapper"><span class="c-tag tag--gradient-ai course-hero__tag"><span class="tag__text">AI-FOCUSED</span></span></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">SEC535</span><span class="course-card__label-focus-area">Offensive Operations, Artificial Intelligence</span></div><div class="course-card__image-wrapper"><img alt="SEC535: Offensive AI - Attack Tools and Techniques" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-offensive-operations" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1ffb095261c6cb94/67fd01fb259f5b1751ae6bc9/course_social_SEC535_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1ffb095261c6cb94/67fd01fb259f5b1751ae6bc9/course_social_SEC535_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1ffb095261c6cb94/67fd01fb259f5b1751ae6bc9/course_social_SEC535_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1ffb095261c6cb94/67fd01fb259f5b1751ae6bc9/course_social_SEC535_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1ffb095261c6cb94/67fd01fb259f5b1751ae6bc9/course_social_SEC535_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1ffb095261c6cb94/67fd01fb259f5b1751ae6bc9/course_social_SEC535_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1ffb095261c6cb94/67fd01fb259f5b1751ae6bc9/course_social_SEC535_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1ffb095261c6cb94/67fd01fb259f5b1751ae6bc9/course_social_SEC535_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1ffb095261c6cb94/67fd01fb259f5b1751ae6bc9/course_social_SEC535_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1ffb095261c6cb94/67fd01fb259f5b1751ae6bc9/course_social_SEC535_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-offensive-operations"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->3 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->18 CPEs / 18 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 14 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j8jaeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j8jaeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j8jaeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j8jaeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/offensive-ai-attack-tools-techniques"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/offensive-ai-attack-tools-techniques#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 3 of 12</span><article class="c-course-card course-card--is-default" id="SEC560"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC560: Enterprise Penetration Testing</h3><header class="course-card__header"><span class="c-tag tag--lightgreen"><span class="tag__text">UPDATED</span></span><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">SEC560</span><span class="course-card__label-focus-area">Offensive Operations</span></div><div class="course-card__image-wrapper"><img alt="SEC560: Enterprise Penetration Testing" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-offensive-operations" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta08167b4d563963d/67e54e2a23211a53ff7fb897/course_social_SEC560_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta08167b4d563963d/67e54e2a23211a53ff7fb897/course_social_SEC560_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta08167b4d563963d/67e54e2a23211a53ff7fb897/course_social_SEC560_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta08167b4d563963d/67e54e2a23211a53ff7fb897/course_social_SEC560_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta08167b4d563963d/67e54e2a23211a53ff7fb897/course_social_SEC560_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta08167b4d563963d/67e54e2a23211a53ff7fb897/course_social_SEC560_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta08167b4d563963d/67e54e2a23211a53ff7fb897/course_social_SEC560_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta08167b4d563963d/67e54e2a23211a53ff7fb897/course_social_SEC560_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta08167b4d563963d/67e54e2a23211a53ff7fb897/course_social_SEC560_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta08167b4d563963d/67e54e2a23211a53ff7fb897/course_social_SEC560_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-offensive-operations"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 30 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j8raeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j8raeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j8raeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j8raeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/enterprise-penetration-testing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/enterprise-penetration-testing#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 4 of 12</span><article class="c-course-card course-card--is-default" id="SEC542"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC542: Web App Penetration Testing and Ethical Hacking</h3><header class="course-card__header"><span class="c-tag tag--lightgreen"><span class="tag__text">MAJOR UPDATES</span></span><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">SEC542</span><span class="course-card__label-focus-area">Offensive Operations</span></div><div class="course-card__image-wrapper"><img alt="SEC542: Web App Penetration Testing and Ethical Hacking" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-offensive-operations" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3873ac7df18461ca/67e5735c6a6ba66996e70faa/course_social_SEC542_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3873ac7df18461ca/67e5735c6a6ba66996e70faa/course_social_SEC542_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3873ac7df18461ca/67e5735c6a6ba66996e70faa/course_social_SEC542_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3873ac7df18461ca/67e5735c6a6ba66996e70faa/course_social_SEC542_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3873ac7df18461ca/67e5735c6a6ba66996e70faa/course_social_SEC542_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3873ac7df18461ca/67e5735c6a6ba66996e70faa/course_social_SEC542_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3873ac7df18461ca/67e5735c6a6ba66996e70faa/course_social_SEC542_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3873ac7df18461ca/67e5735c6a6ba66996e70faa/course_social_SEC542_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3873ac7df18461ca/67e5735c6a6ba66996e70faa/course_social_SEC542_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3873ac7df18461ca/67e5735c6a6ba66996e70faa/course_social_SEC542_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-offensive-operations"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 35 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j93aeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j93aeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j93aeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j93aeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/web-app-penetration-testing-ethical-hacking"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/web-app-penetration-testing-ethical-hacking#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 5 of 12</span><article class="c-course-card course-card--is-default" id="SEC565"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC565: Red Team Operations and Adversary Emulation</h3><header class="course-card__header"><span class="c-tag tag--lightgreen"><span class="tag__text">UPDATED</span></span><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">SEC565</span><span class="course-card__label-focus-area">Offensive Operations</span></div><div class="course-card__image-wrapper"><img alt="SEC565: Red Team Operations and Adversary Emulation" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-offensive-operations" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltadb8bb807dd43bfc/67fd01fc92c489f542cfa4a0/course_social_SEC565_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltadb8bb807dd43bfc/67fd01fc92c489f542cfa4a0/course_social_SEC565_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltadb8bb807dd43bfc/67fd01fc92c489f542cfa4a0/course_social_SEC565_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltadb8bb807dd43bfc/67fd01fc92c489f542cfa4a0/course_social_SEC565_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltadb8bb807dd43bfc/67fd01fc92c489f542cfa4a0/course_social_SEC565_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltadb8bb807dd43bfc/67fd01fc92c489f542cfa4a0/course_social_SEC565_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltadb8bb807dd43bfc/67fd01fc92c489f542cfa4a0/course_social_SEC565_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltadb8bb807dd43bfc/67fd01fc92c489f542cfa4a0/course_social_SEC565_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltadb8bb807dd43bfc/67fd01fc92c489f542cfa4a0/course_social_SEC565_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltadb8bb807dd43bfc/67fd01fc92c489f542cfa4a0/course_social_SEC565_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-offensive-operations"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 28 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j9baeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j9baeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j9baeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j9baeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/red-team-operations-adversary-emulation"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/red-team-operations-adversary-emulation#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 6 of 12</span><article class="c-course-card course-card--is-default" id="SEC598"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC598: AI and Security Automation for Red, Blue, and Purple Teams</h3><header class="course-card__header"><div class="course-card__tags-wrapper"><span class="c-tag tag--gradient-ai course-hero__tag"><span class="tag__text">AI-FOCUSED</span></span></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">SEC598</span><span class="course-card__label-focus-area">Offensive Operations, Artificial Intelligence</span></div><div class="course-card__image-wrapper"><img alt="SEC598: AI and Security Automation for Red, Blue, and Purple Teams" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-offensive-operations" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0fec8a865cfbcd45/67fd0204259f5b89e0ae6bcf/course_social_SEC598_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0fec8a865cfbcd45/67fd0204259f5b89e0ae6bcf/course_social_SEC598_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0fec8a865cfbcd45/67fd0204259f5b89e0ae6bcf/course_social_SEC598_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0fec8a865cfbcd45/67fd0204259f5b89e0ae6bcf/course_social_SEC598_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0fec8a865cfbcd45/67fd0204259f5b89e0ae6bcf/course_social_SEC598_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0fec8a865cfbcd45/67fd0204259f5b89e0ae6bcf/course_social_SEC598_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0fec8a865cfbcd45/67fd0204259f5b89e0ae6bcf/course_social_SEC598_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0fec8a865cfbcd45/67fd0204259f5b89e0ae6bcf/course_social_SEC598_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0fec8a865cfbcd45/67fd0204259f5b89e0ae6bcf/course_social_SEC598_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0fec8a865cfbcd45/67fd0204259f5b89e0ae6bcf/course_social_SEC598_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-offensive-operations"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 25 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j9jaeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j9jaeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j9jaeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j9jaeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/ai-security-automation"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/ai-security-automation#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 7 of 12</span><article class="c-course-card course-card--is-default" id="SEC660"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking</h3><header class="course-card__header"><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Advanced</span></header><div class="course-card__labels"><span class="course-card__label-code">SEC660</span><span class="course-card__label-focus-area">Offensive Operations</span></div><div class="course-card__image-wrapper"><img alt="SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-offensive-operations" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt44cfd9ee227a32a1/67e54ab5a3b7857151f788eb/course_social_SEC660_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt44cfd9ee227a32a1/67e54ab5a3b7857151f788eb/course_social_SEC660_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt44cfd9ee227a32a1/67e54ab5a3b7857151f788eb/course_social_SEC660_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt44cfd9ee227a32a1/67e54ab5a3b7857151f788eb/course_social_SEC660_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt44cfd9ee227a32a1/67e54ab5a3b7857151f788eb/course_social_SEC660_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt44cfd9ee227a32a1/67e54ab5a3b7857151f788eb/course_social_SEC660_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt44cfd9ee227a32a1/67e54ab5a3b7857151f788eb/course_social_SEC660_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt44cfd9ee227a32a1/67e54ab5a3b7857151f788eb/course_social_SEC660_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt44cfd9ee227a32a1/67e54ab5a3b7857151f788eb/course_social_SEC660_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt44cfd9ee227a32a1/67e54ab5a3b7857151f788eb/course_social_SEC660_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-offensive-operations"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->46 CPEs / 46 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 30 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j9raeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j9raeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j9raeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j9raeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/advanced-penetration-testing-exploits-ethical-hacking"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/advanced-penetration-testing-exploits-ethical-hacking#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 8 of 12</span><article class="c-course-card course-card--is-default" id="SEC588"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC588: Cloud Penetration Testing</h3><header class="course-card__header"><span class="c-tag tag--lightgreen"><span class="tag__text">MAJOR UPDATES</span></span><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">SEC588</span><span class="course-card__label-focus-area">Offensive Operations</span></div><div class="course-card__image-wrapper"><img alt="SEC588: Cloud Penetration Testing" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-offensive-operations" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4f84f2bdd8b06775/6895d9adf5108c858690c90a/course-cards_offensive-operations_SEC588_1514x792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4f84f2bdd8b06775/6895d9adf5108c858690c90a/course-cards_offensive-operations_SEC588_1514x792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4f84f2bdd8b06775/6895d9adf5108c858690c90a/course-cards_offensive-operations_SEC588_1514x792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4f84f2bdd8b06775/6895d9adf5108c858690c90a/course-cards_offensive-operations_SEC588_1514x792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4f84f2bdd8b06775/6895d9adf5108c858690c90a/course-cards_offensive-operations_SEC588_1514x792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4f84f2bdd8b06775/6895d9adf5108c858690c90a/course-cards_offensive-operations_SEC588_1514x792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4f84f2bdd8b06775/6895d9adf5108c858690c90a/course-cards_offensive-operations_SEC588_1514x792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4f84f2bdd8b06775/6895d9adf5108c858690c90a/course-cards_offensive-operations_SEC588_1514x792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4f84f2bdd8b06775/6895d9adf5108c858690c90a/course-cards_offensive-operations_SEC588_1514x792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4f84f2bdd8b06775/6895d9adf5108c858690c90a/course-cards_offensive-operations_SEC588_1514x792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-offensive-operations"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 24 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6ja3aeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2ja3aeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6ja3aeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2ja3aeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/cloud-penetration-testing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/cloud-penetration-testing#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 9 of 12</span><article class="c-course-card course-card--is-default" id="SEC599"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC599: Defeating Advanced Adversaries - Purple Team Tactics &amp; Kill Chain Defenses</h3><header class="course-card__header"><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">SEC599</span><span class="course-card__label-focus-area">Offensive Operations</span></div><div class="course-card__image-wrapper"><img alt="SEC599: Defeating Advanced Adversaries - Purple Team Tactics &amp; Kill Chain Defenses" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-offensive-operations" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt46ac50a79424adba/67fd02052b143528fbcf7cc6/course_social_SEC599_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt46ac50a79424adba/67fd02052b143528fbcf7cc6/course_social_SEC599_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt46ac50a79424adba/67fd02052b143528fbcf7cc6/course_social_SEC599_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt46ac50a79424adba/67fd02052b143528fbcf7cc6/course_social_SEC599_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt46ac50a79424adba/67fd02052b143528fbcf7cc6/course_social_SEC599_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt46ac50a79424adba/67fd02052b143528fbcf7cc6/course_social_SEC599_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt46ac50a79424adba/67fd02052b143528fbcf7cc6/course_social_SEC599_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt46ac50a79424adba/67fd02052b143528fbcf7cc6/course_social_SEC599_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt46ac50a79424adba/67fd02052b143528fbcf7cc6/course_social_SEC599_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt46ac50a79424adba/67fd02052b143528fbcf7cc6/course_social_SEC599_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-offensive-operations"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 25 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6jabaeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2jabaeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6jabaeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2jabaeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/defeating-advanced-adversaries-kill-chain-defenses"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/defeating-advanced-adversaries-kill-chain-defenses#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 10 of 12</span><article class="c-course-card course-card--is-default" id="SEC617"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC617: Wireless Penetration Testing and Ethical Hacking</h3><header class="course-card__header"><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Advanced</span></header><div class="course-card__labels"><span class="course-card__label-code">SEC617</span><span class="course-card__label-focus-area">Offensive Operations</span></div><div class="course-card__image-wrapper"><img alt="SEC617: Wireless Penetration Testing and Ethical Hacking" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-offensive-operations" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt203e71c7573b99d9/67fd0205b9c175ef01659dd7/course_social_SEC617_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt203e71c7573b99d9/67fd0205b9c175ef01659dd7/course_social_SEC617_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt203e71c7573b99d9/67fd0205b9c175ef01659dd7/course_social_SEC617_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt203e71c7573b99d9/67fd0205b9c175ef01659dd7/course_social_SEC617_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt203e71c7573b99d9/67fd0205b9c175ef01659dd7/course_social_SEC617_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt203e71c7573b99d9/67fd0205b9c175ef01659dd7/course_social_SEC617_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt203e71c7573b99d9/67fd0205b9c175ef01659dd7/course_social_SEC617_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt203e71c7573b99d9/67fd0205b9c175ef01659dd7/course_social_SEC617_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt203e71c7573b99d9/67fd0205b9c175ef01659dd7/course_social_SEC617_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt203e71c7573b99d9/67fd0205b9c175ef01659dd7/course_social_SEC617_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-offensive-operations"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 20 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6jajaeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2jajaeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6jajaeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2jajaeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/wireless-penetration-testing-ethical-hacking"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/wireless-penetration-testing-ethical-hacking#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 11 of 12</span><article class="c-course-card course-card--is-default" id="SEC575"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC575: iOS and Android Application Security Analysis and Penetration Testing</h3><header class="course-card__header"><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">SEC575</span><span class="course-card__label-focus-area">Offensive Operations</span></div><div class="course-card__image-wrapper"><img alt="SEC575: iOS and Android Application Security Analysis and Penetration Testing" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-offensive-operations" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltbc6bef44126039d5/67fd01fc4eec1310f795dbd5/course_social_SEC575_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltbc6bef44126039d5/67fd01fc4eec1310f795dbd5/course_social_SEC575_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltbc6bef44126039d5/67fd01fc4eec1310f795dbd5/course_social_SEC575_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltbc6bef44126039d5/67fd01fc4eec1310f795dbd5/course_social_SEC575_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltbc6bef44126039d5/67fd01fc4eec1310f795dbd5/course_social_SEC575_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltbc6bef44126039d5/67fd01fc4eec1310f795dbd5/course_social_SEC575_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltbc6bef44126039d5/67fd01fc4eec1310f795dbd5/course_social_SEC575_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltbc6bef44126039d5/67fd01fc4eec1310f795dbd5/course_social_SEC575_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltbc6bef44126039d5/67fd01fc4eec1310f795dbd5/course_social_SEC575_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltbc6bef44126039d5/67fd01fc4eec1310f795dbd5/course_social_SEC575_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-offensive-operations"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 20 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6jaraeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2jaraeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6jaraeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2jaraeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/ios-android-application-security-analysis-penetration-testing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/ios-android-application-security-analysis-penetration-testing#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 12 of 12</span><article class="c-course-card course-card--is-default" id="SEC670"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC670: Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control</h3><header class="course-card__header"><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Advanced</span></header><div class="course-card__labels"><span class="course-card__label-code">SEC670</span><span class="course-card__label-focus-area">Offensive Operations</span></div><div class="course-card__image-wrapper"><img alt="SEC670: Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-offensive-operations" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4da5f1628ee7af4e/67fd0205f006085b77921d57/course_social_SEC670_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4da5f1628ee7af4e/67fd0205f006085b77921d57/course_social_SEC670_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4da5f1628ee7af4e/67fd0205f006085b77921d57/course_social_SEC670_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4da5f1628ee7af4e/67fd0205f006085b77921d57/course_social_SEC670_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4da5f1628ee7af4e/67fd0205f006085b77921d57/course_social_SEC670_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4da5f1628ee7af4e/67fd0205f006085b77921d57/course_social_SEC670_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4da5f1628ee7af4e/67fd0205f006085b77921d57/course_social_SEC670_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4da5f1628ee7af4e/67fd0205f006085b77921d57/course_social_SEC670_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4da5f1628ee7af4e/67fd0205f006085b77921d57/course_social_SEC670_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4da5f1628ee7af4e/67fd0205f006085b77921d57/course_social_SEC670_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-offensive-operations"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->46 CPEs / 46 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 27 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6jb3aeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2jb3aeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6jb3aeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2jb3aeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/red-team-operations-developing-custom-tools-windows"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/red-team-operations-developing-custom-tools-windows#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li></ul></div></div><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-3 carousel__grid-item-controls"><div class="carousel__controls carousel__controls--is-disabled"><div class="carousel__link-item-controls"><a class="c-button button--tertiary" href="https://www.sans.org/cyber-security-courses?refinementList%5Bfacets.focusArea%5D%5B0%5D=Offensive%20Operations"><span class="button__label">View All Courses</span></a></div><button aria-disabled="true" class="c-button button--secondary button--icon-right button--icon-translate-right button--is-icon-only button--size-large carousel__button carousel__button-prev" aria-label="Go to previous slide" type="button" datalayer="[object Object]"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg></button><div class="carousel__controls-pagination"></div><button aria-disabled="true" class="c-button button--secondary button--icon-right button--icon-translate-right button--is-icon-only button--size-large carousel__button carousel__button-next" aria-label="Go to next slide" type="button" datalayer="[object Object]"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg></button></div></div></div></div></div><div class="c-animate-in slide-in-from-bottom"><div class="c-container c-card-grid card-grid--is-default card-grid__headline--is-load-more c-person-grid" id="instructors"><div class="c-animate-in slide-in-from-bottom card-grid__headline-wrapper"><div id="speakers" class="c-grid c-headline card-grid__headline grid--columns-6 grid--columns-tablet-12"><div class="grid__item grid__item--col-span-6 grid__item--col-span-tablet-9 headline__content"><div class="headline__title-wrapper"><h2 class="c-heading heading--is-h3 heading--is-h3-desktop headline__title">Meet Your Experts</h2></div></div></div></div><div class="c-grid card-grid__grid card-grid__grid--3-columns card-grid__grid--equal-height-rows grid--columns-12"><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-person-card-small person-card-small--small person-card--with-link"><div class="person-card__layout"><header class="person-card-small__image-holder"><div class="person-card-small__blurry-backdrop-filter"></div><img alt="Erik Van Buggenhout" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="person-card-small__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltecd6fcc0742a5838/67c5d6c56f443b2c070107ba/370x370_Erik-Van-Buggenhout.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltecd6fcc0742a5838/67c5d6c56f443b2c070107ba/370x370_Erik-Van-Buggenhout.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltecd6fcc0742a5838/67c5d6c56f443b2c070107ba/370x370_Erik-Van-Buggenhout.jpg?width=768&amp;quality=75&amp;format=webp"/><img alt="" loading="lazy" decoding="async" data-nimg="fill" class="person-card-small__blurry-bg-image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="100vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltecd6fcc0742a5838/67c5d6c56f443b2c070107ba/370x370_Erik-Van-Buggenhout.jpg?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltecd6fcc0742a5838/67c5d6c56f443b2c070107ba/370x370_Erik-Van-Buggenhout.jpg?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltecd6fcc0742a5838/67c5d6c56f443b2c070107ba/370x370_Erik-Van-Buggenhout.jpg?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltecd6fcc0742a5838/67c5d6c56f443b2c070107ba/370x370_Erik-Van-Buggenhout.jpg?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltecd6fcc0742a5838/67c5d6c56f443b2c070107ba/370x370_Erik-Van-Buggenhout.jpg?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltecd6fcc0742a5838/67c5d6c56f443b2c070107ba/370x370_Erik-Van-Buggenhout.jpg?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltecd6fcc0742a5838/67c5d6c56f443b2c070107ba/370x370_Erik-Van-Buggenhout.jpg?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltecd6fcc0742a5838/67c5d6c56f443b2c070107ba/370x370_Erik-Van-Buggenhout.jpg?width=3840&amp;quality=75&amp;format=webp"/></header><div class="person-card-small__text"><div><h3 class="person-card__name">Erik Van Buggenhout</h3><span class="person-card__role">Co-Founder &amp; Partner</span></div><p class="person-card__description">NVISO co-founder and SANS Senior Instructor, leading cybersecurity education in advanced adversary tactics. Experienced in offensive security with extensive background in penetration testing and ethical hacking across Europe.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right person-card__cta-button person-card__cta-button--single" href="/profiles/erik-van-buggenhout"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn more</span></a></div></div></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-person-card-small person-card-small--small person-card--with-link"><div class="person-card__layout"><header class="person-card-small__image-holder"><div class="person-card-small__blurry-backdrop-filter"></div><img alt="Chris Elgee" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="person-card-small__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt307886f079b69b56/67e566b2697ba11a975fdbc1/Christopher_Elgee_370x370.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt307886f079b69b56/67e566b2697ba11a975fdbc1/Christopher_Elgee_370x370.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt307886f079b69b56/67e566b2697ba11a975fdbc1/Christopher_Elgee_370x370.jpg?width=768&amp;quality=75&amp;format=webp"/><img alt="" loading="lazy" decoding="async" data-nimg="fill" class="person-card-small__blurry-bg-image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="100vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt307886f079b69b56/67e566b2697ba11a975fdbc1/Christopher_Elgee_370x370.jpg?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt307886f079b69b56/67e566b2697ba11a975fdbc1/Christopher_Elgee_370x370.jpg?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt307886f079b69b56/67e566b2697ba11a975fdbc1/Christopher_Elgee_370x370.jpg?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt307886f079b69b56/67e566b2697ba11a975fdbc1/Christopher_Elgee_370x370.jpg?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt307886f079b69b56/67e566b2697ba11a975fdbc1/Christopher_Elgee_370x370.jpg?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt307886f079b69b56/67e566b2697ba11a975fdbc1/Christopher_Elgee_370x370.jpg?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt307886f079b69b56/67e566b2697ba11a975fdbc1/Christopher_Elgee_370x370.jpg?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt307886f079b69b56/67e566b2697ba11a975fdbc1/Christopher_Elgee_370x370.jpg?width=3840&amp;quality=75&amp;format=webp"/></header><div class="person-card-small__text"><div><h3 class="person-card__name">Chris Elgee</h3><span class="person-card__role">Builder and Breaker</span></div><p class="person-card__description">Chris is a senior security analyst for Counter Hack and Cyber Range Lead (S-6) for the Army National Guard&#x27;s 91st Cyber Brigade. Through his work, he shares his unique insights into cyber security threats to prepare and inspire students.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right person-card__cta-button person-card__cta-button--single" href="/profiles/chris-elgee"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn more</span></a></div></div></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-person-card-small person-card-small--small person-card--with-link"><div class="person-card__layout"><header class="person-card-small__image-holder"><div class="person-card-small__blurry-backdrop-filter"></div><img alt="Moses Frost" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="person-card-small__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt145e40fc0ce3a381/67c5d712938bf57815f9db61/370x370_Moses-Frost.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt145e40fc0ce3a381/67c5d712938bf57815f9db61/370x370_Moses-Frost.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt145e40fc0ce3a381/67c5d712938bf57815f9db61/370x370_Moses-Frost.jpg?width=768&amp;quality=75&amp;format=webp"/><img alt="" loading="lazy" decoding="async" data-nimg="fill" class="person-card-small__blurry-bg-image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="100vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt145e40fc0ce3a381/67c5d712938bf57815f9db61/370x370_Moses-Frost.jpg?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt145e40fc0ce3a381/67c5d712938bf57815f9db61/370x370_Moses-Frost.jpg?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt145e40fc0ce3a381/67c5d712938bf57815f9db61/370x370_Moses-Frost.jpg?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt145e40fc0ce3a381/67c5d712938bf57815f9db61/370x370_Moses-Frost.jpg?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt145e40fc0ce3a381/67c5d712938bf57815f9db61/370x370_Moses-Frost.jpg?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt145e40fc0ce3a381/67c5d712938bf57815f9db61/370x370_Moses-Frost.jpg?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt145e40fc0ce3a381/67c5d712938bf57815f9db61/370x370_Moses-Frost.jpg?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt145e40fc0ce3a381/67c5d712938bf57815f9db61/370x370_Moses-Frost.jpg?width=3840&amp;quality=75&amp;format=webp"/></header><div class="person-card-small__text"><div><h3 class="person-card__name">Moses Frost</h3><span class="person-card__role">Solutions Consultant</span></div><p class="person-card__description">Moses has built an impressive career as a Network Architect, DevOps Engineer, and Information Security professional. Today, he works in the Offensive Operations space as a Red Team Operator and serves as the course author for SEC588.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right person-card__cta-button person-card__cta-button--single" href="/profiles/moses-frost"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn more</span></a></div></div></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-person-card-small person-card-small--small person-card--with-link"><div class="person-card__layout"><header class="person-card-small__image-holder"><div class="person-card-small__blurry-backdrop-filter"></div><img alt="Jean-François Maes" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="person-card-small__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt209cf83fb5ac9952/67c5d6e0cdb05a3ceb5e275a/370x370_Jean-Francois-Maes.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt209cf83fb5ac9952/67c5d6e0cdb05a3ceb5e275a/370x370_Jean-Francois-Maes.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt209cf83fb5ac9952/67c5d6e0cdb05a3ceb5e275a/370x370_Jean-Francois-Maes.jpg?width=768&amp;quality=75&amp;format=webp"/><img alt="" loading="lazy" decoding="async" data-nimg="fill" class="person-card-small__blurry-bg-image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="100vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt209cf83fb5ac9952/67c5d6e0cdb05a3ceb5e275a/370x370_Jean-Francois-Maes.jpg?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt209cf83fb5ac9952/67c5d6e0cdb05a3ceb5e275a/370x370_Jean-Francois-Maes.jpg?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt209cf83fb5ac9952/67c5d6e0cdb05a3ceb5e275a/370x370_Jean-Francois-Maes.jpg?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt209cf83fb5ac9952/67c5d6e0cdb05a3ceb5e275a/370x370_Jean-Francois-Maes.jpg?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt209cf83fb5ac9952/67c5d6e0cdb05a3ceb5e275a/370x370_Jean-Francois-Maes.jpg?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt209cf83fb5ac9952/67c5d6e0cdb05a3ceb5e275a/370x370_Jean-Francois-Maes.jpg?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt209cf83fb5ac9952/67c5d6e0cdb05a3ceb5e275a/370x370_Jean-Francois-Maes.jpg?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt209cf83fb5ac9952/67c5d6e0cdb05a3ceb5e275a/370x370_Jean-Francois-Maes.jpg?width=3840&amp;quality=75&amp;format=webp"/></header><div class="person-card-small__text"><div><h3 class="person-card__name">Jean-François Maes</h3><span class="person-card__role">CEO</span></div><p class="person-card__description">Jean-François is based in Portugal, where he is the CEO of Offensive Guardian, a boutique red and purple teaming shop providing freelance services to various organizations. He has worked for other noteworthy firms, including, but not limited to: Neuvik, TrustedSec, Fortra&#x27;s Cobalt-Strike team, and NVISO.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right person-card__cta-button person-card__cta-button--single" href="/profiles/jeanfrancois-maes"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn more</span></a></div></div></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-person-card-small person-card-small--small person-card--with-link"><div class="person-card__layout"><header class="person-card-small__image-holder"><div class="person-card-small__blurry-backdrop-filter"></div><img alt="Jeff McJunkin" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="person-card-small__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt17697ef43272b87e/67c5d6e08c6f4e14abb7ffc5/370x370_Jeff-McJunkin.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt17697ef43272b87e/67c5d6e08c6f4e14abb7ffc5/370x370_Jeff-McJunkin.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt17697ef43272b87e/67c5d6e08c6f4e14abb7ffc5/370x370_Jeff-McJunkin.jpg?width=768&amp;quality=75&amp;format=webp"/><img alt="" loading="lazy" decoding="async" data-nimg="fill" class="person-card-small__blurry-bg-image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="100vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt17697ef43272b87e/67c5d6e08c6f4e14abb7ffc5/370x370_Jeff-McJunkin.jpg?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt17697ef43272b87e/67c5d6e08c6f4e14abb7ffc5/370x370_Jeff-McJunkin.jpg?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt17697ef43272b87e/67c5d6e08c6f4e14abb7ffc5/370x370_Jeff-McJunkin.jpg?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt17697ef43272b87e/67c5d6e08c6f4e14abb7ffc5/370x370_Jeff-McJunkin.jpg?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt17697ef43272b87e/67c5d6e08c6f4e14abb7ffc5/370x370_Jeff-McJunkin.jpg?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt17697ef43272b87e/67c5d6e08c6f4e14abb7ffc5/370x370_Jeff-McJunkin.jpg?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt17697ef43272b87e/67c5d6e08c6f4e14abb7ffc5/370x370_Jeff-McJunkin.jpg?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt17697ef43272b87e/67c5d6e08c6f4e14abb7ffc5/370x370_Jeff-McJunkin.jpg?width=3840&amp;quality=75&amp;format=webp"/></header><div class="person-card-small__text"><div><h3 class="person-card__name">Jeff McJunkin</h3><span class="person-card__role">CEO</span></div><p class="person-card__description">Jeff McJunkin, Rogue Valley InfoSec founder, has led Fortune 100 pen tests and shaped Core NetWars. His key role in SANS Holiday Hack Challenge and hands-on security innovations continue to elevate the industry, advancing defenses worldwide.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right person-card__cta-button person-card__cta-button--single" href="/profiles/jeff-mcjunkin"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn more</span></a></div></div></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-person-card-small person-card-small--small person-card--with-link"><div class="person-card__layout"><header class="person-card-small__image-holder"><div class="person-card-small__blurry-backdrop-filter"></div><img alt="Larry Pesce" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="person-card-small__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2fe03a27312522aa/67c5d77ef4b0b1ec5c98a5cf/Larry_Pesce.png?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2fe03a27312522aa/67c5d77ef4b0b1ec5c98a5cf/Larry_Pesce.png?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2fe03a27312522aa/67c5d77ef4b0b1ec5c98a5cf/Larry_Pesce.png?width=768&amp;quality=75&amp;format=webp"/><img alt="" loading="lazy" decoding="async" data-nimg="fill" class="person-card-small__blurry-bg-image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="100vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2fe03a27312522aa/67c5d77ef4b0b1ec5c98a5cf/Larry_Pesce.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2fe03a27312522aa/67c5d77ef4b0b1ec5c98a5cf/Larry_Pesce.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2fe03a27312522aa/67c5d77ef4b0b1ec5c98a5cf/Larry_Pesce.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2fe03a27312522aa/67c5d77ef4b0b1ec5c98a5cf/Larry_Pesce.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2fe03a27312522aa/67c5d77ef4b0b1ec5c98a5cf/Larry_Pesce.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2fe03a27312522aa/67c5d77ef4b0b1ec5c98a5cf/Larry_Pesce.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2fe03a27312522aa/67c5d77ef4b0b1ec5c98a5cf/Larry_Pesce.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2fe03a27312522aa/67c5d77ef4b0b1ec5c98a5cf/Larry_Pesce.png?width=3840&amp;quality=75&amp;format=webp"/></header><div class="person-card-small__text"><div><h3 class="person-card__name">Larry Pesce</h3><span class="person-card__role">Vice President of Services</span></div><p class="person-card__description">Larry has revolutionized embedded device security with decades of hands-on offensive research, co-authoring SANS&#x27;s flagship wireless and IoT penetration testing courses, and pioneering SBOM exploitation techniques for supply chain defense strategies.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right person-card__cta-button person-card__cta-button--single" href="/profiles/larry-pesce"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn more</span></a></div></div></div></div></div></div><div class="c-animate-in slide-in-from-bottom"><div class="card-grid__load-more-button-container"><button class="c-button button--tertiary button--icon-right card-grid__load-more-button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Show all</span></button></div></div></div></div><div class="c-container c-card-grid card-grid--is-skill-cards card-grid__headline--is-load-more"><div class="c-animate-in slide-in-from-bottom card-grid__headline-wrapper"><div class="c-grid c-headline card-grid__headline grid--columns-6 grid--columns-tablet-12"><div class="grid__item grid__item--col-span-6 grid__item--col-span-tablet-9 headline__content"><div class="headline__title-wrapper"><h2 class="c-heading heading--is-h3 heading--is-h3-desktop headline__title">Explore Careers Within Offensive Operations</h2></div></div></div></div><div class="c-grid card-grid__grid card-grid__grid--4-columns grid--columns-12"><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-skills-card skills-card--is-offensive-operations"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop skills-card__title">Red Teamer</h3><span class="skills-card__category skills-card__category--fixed">Offensive Operations</span><a class="c-button button--tertiary button--icon-right button--icon-translate-right skills-card__button" href="/job-roles/red-teamer"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Explore learning path</span></a></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-skills-card skills-card--is-offensive-operations"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop skills-card__title">Purple Teamer</h3><span class="skills-card__category skills-card__category--fixed">Offensive Operations</span><a class="c-button button--tertiary button--icon-right button--icon-translate-right skills-card__button" href="/job-roles/purple-teamer"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Explore learning path</span></a></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-skills-card skills-card--is-offensive-operations"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop skills-card__title">Application Pen Tester</h3><span class="skills-card__category skills-card__category--fixed">Offensive Operations</span><a class="c-button button--tertiary button--icon-right button--icon-translate-right skills-card__button" href="/job-roles/application-pen-tester"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Explore learning path</span></a></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-skills-card skills-card--is-offensive-operations"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop skills-card__title">Vulnerability Researcher &amp; Exploit Developer</h3><span class="skills-card__category skills-card__category--fixed">Offensive Operations</span><a class="c-button button--tertiary button--icon-right button--icon-translate-right skills-card__button" href="/job-roles/vulnerability-researcher-exploit-developer"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Explore learning path</span></a></div></div></div></div></div><div class="c-animate-in slide-in-from-bottom"><div class="c-grid c-carousel carousel--is-fullwidth grid--has-container grid--columns-12"><div class="grid__item carousel__title"><h2 class="c-heading heading--is-h3-desktop" id="heading-_R_4eav5u9bb_">Upcoming Events</h2></div><div aria-atomic="true" aria-labelledby="heading-_R_4eav5u9bb_" aria-live="polite" aria-roledescription="carousel" class="carousel__root" role="region"><div class="grid__item carousel__grid-item-slider"><div class="carousel__base" style="--slides-per-view:1;--slides-per-view-desktop:3;--slides-per-view-tablet:2"><ul class="carousel__container"><li class="carousel__slide"><span class="sr-only">Slide 1 of 5</span><a class="c-podcast-card c-webinar-card webinar-card--margin" href="/webcasts/defending-speed-of-ai-outpacing-tomorrows-attackers"><div class="podcast-card__grid"> <div><h2 class="c-heading heading--is-h5 heading--is-h5-desktop podcast-card__title">Defending at the Speed of AI: Outpacing Tomorrow&#x27;s Attackers</h2></div> <div><p class="c-text podcast-card__description">This talk explores the emerging landscape of AI-driven cyber threats and argues that organizations must defend at the speed of AI to survive. </p></div><div class="podcast-card__labels"><span class="podcast-card__label-code">Webinar</span><span class="podcast-card__label-name">Offensive Operations</span></div><img alt="Webcast Abstract Image" loading="lazy" width="600" height="510" decoding="async" data-nimg="1" class="podcast-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt664e9c51c099870a/684bda917eeacd560d816105/assets_2-column_WebcastAbstract4_600x510.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt664e9c51c099870a/684bda917eeacd560d816105/assets_2-column_WebcastAbstract4_600x510.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt664e9c51c099870a/684bda917eeacd560d816105/assets_2-column_WebcastAbstract4_600x510.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt664e9c51c099870a/684bda917eeacd560d816105/assets_2-column_WebcastAbstract4_600x510.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt664e9c51c099870a/684bda917eeacd560d816105/assets_2-column_WebcastAbstract4_600x510.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt664e9c51c099870a/684bda917eeacd560d816105/assets_2-column_WebcastAbstract4_600x510.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt664e9c51c099870a/684bda917eeacd560d816105/assets_2-column_WebcastAbstract4_600x510.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt664e9c51c099870a/684bda917eeacd560d816105/assets_2-column_WebcastAbstract4_600x510.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt664e9c51c099870a/684bda917eeacd560d816105/assets_2-column_WebcastAbstract4_600x510.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt664e9c51c099870a/684bda917eeacd560d816105/assets_2-column_WebcastAbstract4_600x510.png?width=3840&amp;quality=75&amp;format=webp"/><ul class="c-detail-list podcast-card__detail-list"><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->14 Apr 2026<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->14:00 PHST<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#instructors"></use></svg> <!-- -->Bryce Galbraith<!-- --> </li></ul><span class="c-button button--secondary button--icon-right button--icon-translate-right podcast-card__cta"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View details</span></span></div></a></li><li class="carousel__slide"><span class="sr-only">Slide 2 of 5</span><a class="c-podcast-card c-webinar-card webinar-card--margin" href="/webcasts/hackventures-josh-better-password-attacks-ai"><div class="podcast-card__grid"> <div><h2 class="c-heading heading--is-h5 heading--is-h5-desktop podcast-card__title">Hackventures with Josh: Better Password Attacks with AI</h2></div> <div><p class="c-text podcast-card__description">The Verizon DBIR says stolen credentials cause more breaches than phishing and exploits combined. Now, AI is making these attacks even more effective. Join SANS Fellow Joshua Wright to learn what you can do to protect your environment.</p></div><div class="podcast-card__labels"><span class="podcast-card__label-code">Webinar</span><span class="podcast-card__label-name">Offensive Operations</span></div><img alt="Webcast Abstract Image" loading="lazy" width="600" height="510" decoding="async" data-nimg="1" class="podcast-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=3840&amp;quality=75&amp;format=webp"/><ul class="c-detail-list podcast-card__detail-list"><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->15 Apr 2026<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->13:00 EDT<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#instructors"></use></svg> <!-- -->Joshua Wright<!-- --> </li></ul><span class="c-button button--secondary button--icon-right button--icon-translate-right podcast-card__cta"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View details</span></span></div></a></li><li class="carousel__slide"><span class="sr-only">Slide 3 of 5</span><a class="c-podcast-card c-webinar-card webinar-card--margin" href="/webcasts/vibe-coding-evasion-framework-ai-assisted-red-team-tool-development"><div class="podcast-card__grid"> <div><h2 class="c-heading heading--is-h5 heading--is-h5-desktop podcast-card__title">Vibe Coding Your Own Evasion Framework: AI-Assisted Red Team Tool Development</h2></div> <div><p class="c-text podcast-card__description">AI can accelerate red team tool development, but only with the right approach. This hands-on workshop explores “vibe coding,” showing how to use LLMs to design, validate, and build evasion tooling step by step, resulting in a functional, AI-assisted red team framework.</p></div><div class="podcast-card__labels"><span class="podcast-card__label-code">Webinar</span><span class="podcast-card__label-name">Offensive Operations</span></div><img alt="Man presenting webcast to screen" loading="lazy" width="363" height="336" decoding="async" data-nimg="1" class="podcast-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=3840&amp;quality=75&amp;format=webp"/><ul class="c-detail-list podcast-card__detail-list"><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->16 Apr 2026<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->10:00 EDT<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#instructors"></use></svg> <!-- -->Jean-François Maes<!-- --> </li></ul><span class="c-button button--secondary button--icon-right button--icon-translate-right podcast-card__cta"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View details</span></span></div></a></li><li class="carousel__slide"><span class="sr-only">Slide 4 of 5</span><a class="c-podcast-card c-webinar-card webinar-card--margin" href="/webcasts/network-security-2026-how-ai-reshaping-threat-landscape"><div class="podcast-card__grid"> <div><h2 class="c-heading heading--is-h5 heading--is-h5-desktop podcast-card__title">SANS Network Security 2026 - Featured Keynote: Offense at Machine Speed: How AI Is Reshaping the Threat Landscape</h2></div> <div><p class="c-text podcast-card__description">The session will demonstrate how AI can be applied as both a SAST and DAST capability for discovering and exploiting zero-day vulnerabilities in web applications, as well as its growing role in binary exploitation. </p></div><div class="podcast-card__labels"><span class="podcast-card__label-code">Webinar</span><span class="podcast-card__label-name">Offensive Operations</span></div><img alt="Woman presenting webcast" loading="lazy" width="600" height="510" decoding="async" data-nimg="1" class="podcast-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt815aa3e11b971b71/684bdbdb6ffa4e370b4f54b3/assets_2-column_Webcast6_600x510.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt815aa3e11b971b71/684bdbdb6ffa4e370b4f54b3/assets_2-column_Webcast6_600x510.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt815aa3e11b971b71/684bdbdb6ffa4e370b4f54b3/assets_2-column_Webcast6_600x510.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt815aa3e11b971b71/684bdbdb6ffa4e370b4f54b3/assets_2-column_Webcast6_600x510.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt815aa3e11b971b71/684bdbdb6ffa4e370b4f54b3/assets_2-column_Webcast6_600x510.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt815aa3e11b971b71/684bdbdb6ffa4e370b4f54b3/assets_2-column_Webcast6_600x510.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt815aa3e11b971b71/684bdbdb6ffa4e370b4f54b3/assets_2-column_Webcast6_600x510.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt815aa3e11b971b71/684bdbdb6ffa4e370b4f54b3/assets_2-column_Webcast6_600x510.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt815aa3e11b971b71/684bdbdb6ffa4e370b4f54b3/assets_2-column_Webcast6_600x510.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt815aa3e11b971b71/684bdbdb6ffa4e370b4f54b3/assets_2-column_Webcast6_600x510.png?width=3840&amp;quality=75&amp;format=webp"/><ul class="c-detail-list podcast-card__detail-list"><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->22 Sep 2026<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->18:00 PDT<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#instructors"></use></svg> <!-- -->Stephen Sims<!-- --> </li></ul><span class="c-button button--secondary button--icon-right button--icon-translate-right podcast-card__cta"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View details</span></span></div></a></li><li class="carousel__slide"><span class="sr-only">Slide 5 of 5</span><a class="c-podcast-card c-webinar-card webinar-card--margin" href="/webcasts/sans-2026-threat-hunting-survey"><div class="podcast-card__grid"> <div><h2 class="c-heading heading--is-h5 heading--is-h5-desktop podcast-card__title">SANS 2026 Threat Hunting Survey: The Evolution of Threat Hunting</h2></div> <div><p class="c-text podcast-card__description">Threat hunting is no longer just a niche skill—it’s a critical pillar of modern defense.</p></div><div class="podcast-card__labels"><span class="podcast-card__label-code">Webinar</span><span class="podcast-card__label-name">Offensive Operations</span></div><img alt="Webcast Abstract Image" loading="lazy" width="600" height="510" decoding="async" data-nimg="1" class="podcast-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltad9456150ee87c5b/684bda916a67a9b2405a37be/assets_2-column_WebcastAbstract3_600x510.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltad9456150ee87c5b/684bda916a67a9b2405a37be/assets_2-column_WebcastAbstract3_600x510.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltad9456150ee87c5b/684bda916a67a9b2405a37be/assets_2-column_WebcastAbstract3_600x510.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltad9456150ee87c5b/684bda916a67a9b2405a37be/assets_2-column_WebcastAbstract3_600x510.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltad9456150ee87c5b/684bda916a67a9b2405a37be/assets_2-column_WebcastAbstract3_600x510.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltad9456150ee87c5b/684bda916a67a9b2405a37be/assets_2-column_WebcastAbstract3_600x510.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltad9456150ee87c5b/684bda916a67a9b2405a37be/assets_2-column_WebcastAbstract3_600x510.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltad9456150ee87c5b/684bda916a67a9b2405a37be/assets_2-column_WebcastAbstract3_600x510.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltad9456150ee87c5b/684bda916a67a9b2405a37be/assets_2-column_WebcastAbstract3_600x510.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltad9456150ee87c5b/684bda916a67a9b2405a37be/assets_2-column_WebcastAbstract3_600x510.png?width=3840&amp;quality=75&amp;format=webp"/><ul class="c-detail-list podcast-card__detail-list"><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->23 Sep 2026<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->10:30 EDT<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#instructors"></use></svg> <!-- -->Josh Lemon<!-- --> </li></ul><span class="c-button button--secondary button--icon-right button--icon-translate-right podcast-card__cta"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View details</span></span></div></a></li></ul></div></div><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-3 carousel__grid-item-controls"><div class="carousel__controls carousel__controls--is-disabled"><button aria-disabled="true" class="c-button button--secondary button--icon-right button--icon-translate-right button--is-icon-only button--size-large carousel__button carousel__button-prev" aria-label="Go to previous slide" type="button" datalayer="[object Object]"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg></button><div class="carousel__controls-pagination"></div><button aria-disabled="true" class="c-button button--secondary button--icon-right button--icon-translate-right button--is-icon-only button--size-large carousel__button carousel__button-next" aria-label="Go to next slide" type="button" datalayer="[object Object]"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg></button></div></div></div></div></div><section class="c-container c-insights-card-holder" id="featured-content"><div class="c-animate-in slide-in-from-bottom"><div class="insights-card-holder__intro"><h2 class="c-heading heading--is-h3 heading--is-h2-desktop">Offensive Operations Insights From The Experts</h2><div class="insights-card-holder__author-images"><img alt="James Shewmaker" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="insights-card-holder__author-image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf2a60ec79e83c031/67c5d6d4accfe0fe6095613e/370x370_James-Shewmaker.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf2a60ec79e83c031/67c5d6d4accfe0fe6095613e/370x370_James-Shewmaker.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf2a60ec79e83c031/67c5d6d4accfe0fe6095613e/370x370_James-Shewmaker.jpg?width=768&amp;quality=75&amp;format=webp"/><img alt="SANS Institute" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="insights-card-holder__author-image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt12dfb7ac1329de96/69bd2121daccab04d60ba5e1/SANS_Profile_Image_2.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt12dfb7ac1329de96/69bd2121daccab04d60ba5e1/SANS_Profile_Image_2.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt12dfb7ac1329de96/69bd2121daccab04d60ba5e1/SANS_Profile_Image_2.jpg?width=768&amp;quality=75&amp;format=webp"/><img alt="Joshua Wright" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="insights-card-holder__author-image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3fa43bed83b3b520/67c5d772d1b1de8bfeca796d/Josh_Wright_-_Headshot_-_370x370_2025.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3fa43bed83b3b520/67c5d772d1b1de8bfeca796d/Josh_Wright_-_Headshot_-_370x370_2025.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3fa43bed83b3b520/67c5d772d1b1de8bfeca796d/Josh_Wright_-_Headshot_-_370x370_2025.jpg?width=768&amp;quality=75&amp;format=webp"/></div></div></div><div class="c-animate-in slide-in-from-bottom"><div class="c-grid c-insight-card-featured insights-card-holder__featured grid--columns-12"><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-6 insight-card-featured__grid-content"><div class="insight-card__content"><a class="insight-card__title-link" href="/webcasts/modern-multi-factor-authentication-bypass-techniques-a-taste-of-sans-sec660"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop insight-card__title">Modern Multi-Factor Authentication Bypass Techniques: A Taste of SANS SEC660</h3></a><p class="c-text text--is-md insight-card__description">With the proliferation of multi-factor authentication, penetration testers need to apply existing tooling to manipulate even internal applications. Building attack infrastructure internally during a penetration test is resource exhausting, but modern tools like evilginx can do most of the heavy lifting for us.</p><div class="insight-card__labels"><span class="insight-card__label-code">Webinar</span></div><div class="insight-card__author"><span class="c-text text--is-sm insight-card__author-name"><span class="c-text text--is-xs insight-card__author-name-intro">Features</span>James Shewmaker</span><div class="insight-card__author-images"><a class="insight-card__author-image-link" href="/profiles/james-shewmaker"><img alt="James Shewmaker" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="insight-card__author-image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf2a60ec79e83c031/67c5d6d4accfe0fe6095613e/370x370_James-Shewmaker.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf2a60ec79e83c031/67c5d6d4accfe0fe6095613e/370x370_James-Shewmaker.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf2a60ec79e83c031/67c5d6d4accfe0fe6095613e/370x370_James-Shewmaker.jpg?width=768&amp;quality=75&amp;format=webp"/></a></div></div></div></div><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-6 insight-card-featured__grid-image"><img alt="Man presenting webcast" loading="lazy" width="600" height="510" decoding="async" data-nimg="1" class="insight-card-featured__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2e5aa171a1a622b6/684bdbdb0ee3b728de43e3b4/assets_2-column_Webcast5_600x510.png?width=768&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2e5aa171a1a622b6/684bdbdb0ee3b728de43e3b4/assets_2-column_Webcast5_600x510.png?width=1200&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2e5aa171a1a622b6/684bdbdb0ee3b728de43e3b4/assets_2-column_Webcast5_600x510.png?width=1200&amp;quality=75&amp;format=webp"/></div></div></div><div class="c-animate-in slide-in-from-bottom"><div class="c-grid c-carousel insights-card-holder__carousel carousel--is-fullwidth grid--columns-12"><div aria-atomic="true" aria-labelledby="heading-_R_suav5u9bb_" aria-live="polite" aria-roledescription="carousel" class="carousel__root" role="region"><div class="grid__item carousel__grid-item-slider"><div class="carousel__base" style="--slides-per-view:1;--slides-per-view-desktop:3;--slides-per-view-tablet:3"><ul class="carousel__container"><li class="carousel__slide"><span class="sr-only">Slide 1 of 2</span><div class="c-insight-card"><div class="insight-card__content"><div class="insight-card__content"><a class="insight-card__title-link" href="/white-papers/from-crash-compromise-unlocking-potential-windows-crash-dumps-offensive-security"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop insight-card__title">From Crash to Compromise: Unlocking the Potential of Windows Crash Dumps in Offensive Security</h3></a><div class="insight-card__labels"><span class="insight-card__label-code">Whitepaper</span></div><div class="insight-card__author"><span class="c-text text--is-sm insight-card__author-name"><span class="c-text text--is-xs insight-card__author-name-intro">Written By</span>SANS Institute</span><div class="insight-card__author-images"><a class="insight-card__author-image-link" href="/profiles/sans-institute"><img alt="SANS Institute" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="insight-card__author-image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt12dfb7ac1329de96/69bd2121daccab04d60ba5e1/SANS_Profile_Image_2.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt12dfb7ac1329de96/69bd2121daccab04d60ba5e1/SANS_Profile_Image_2.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt12dfb7ac1329de96/69bd2121daccab04d60ba5e1/SANS_Profile_Image_2.jpg?width=768&amp;quality=75&amp;format=webp"/></a></div></div></div></div><img alt="Woman Smiling with Laptop" loading="lazy" width="600" height="510" decoding="async" data-nimg="1" class="insight-card__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2d09baf4ffa836f8/684883c6dc186dbc43081537/assets_2-column_Blog4_600x510.png?width=768&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2d09baf4ffa836f8/684883c6dc186dbc43081537/assets_2-column_Blog4_600x510.png?width=1200&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2d09baf4ffa836f8/684883c6dc186dbc43081537/assets_2-column_Blog4_600x510.png?width=1200&amp;quality=75&amp;format=webp"/></div></li><li class="carousel__slide"><span class="sr-only">Slide 2 of 2</span><div class="c-insight-card"><div class="insight-card__content"><div class="insight-card__content"><a class="insight-card__title-link" href="/blog/continuous-penetration-testing-a-consultants-perspective"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop insight-card__title">Continuous Penetration Testing - A Consultant’s Perspective</h3></a><div class="insight-card__labels"><span class="insight-card__label-code">Blog</span></div><div class="insight-card__author"><span class="c-text text--is-sm insight-card__author-name"><span class="c-text text--is-xs insight-card__author-name-intro">Written By</span>Joshua Wright</span><div class="insight-card__author-images"><a class="insight-card__author-image-link" href="/profiles/joshua-wright"><img alt="Joshua Wright" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="insight-card__author-image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3fa43bed83b3b520/67c5d772d1b1de8bfeca796d/Josh_Wright_-_Headshot_-_370x370_2025.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3fa43bed83b3b520/67c5d772d1b1de8bfeca796d/Josh_Wright_-_Headshot_-_370x370_2025.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3fa43bed83b3b520/67c5d772d1b1de8bfeca796d/Josh_Wright_-_Headshot_-_370x370_2025.jpg?width=768&amp;quality=75&amp;format=webp"/></a></div></div></div></div><img alt="Man Smiling at Computer" loading="lazy" width="600" height="510" decoding="async" data-nimg="1" class="insight-card__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltb8e6cbae00448be0/684023b3116bcff39322002d/assets_2-column_Blog3_600x510.png?width=768&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltb8e6cbae00448be0/684023b3116bcff39322002d/assets_2-column_Blog3_600x510.png?width=1200&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltb8e6cbae00448be0/684023b3116bcff39322002d/assets_2-column_Blog3_600x510.png?width=1200&amp;quality=75&amp;format=webp"/></div></li></ul></div></div></div></div></div><div class="c-animate-in slide-in-from-bottom"><a class="c-button button--primary button--icon-right button--icon-translate-right insights-card-holder__cta" target="_self" href="/security-resources"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">More Insights</span></a></div></section><script type="application/ld+json">{"@context":"https://schema.org","@type":"FAQPage","mainEntity":[{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"These courses are ideal for blue teamers, red teamers, SOC analysts, incident responders, and security engineers looking to deepen their offensive cybersecurity expertise, as well as penetration testers and vulnerability researchers who require specialized training in their respective areas. "},"name":"Who Should Take Offensive Operations Courses?"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"The curriculum covers penetration testing, red teaming, purple teaming, exploit development, adversary emulation, security automation, mobile security, wireless security, and more. Each course is designed to provide deep technical knowledge and practical experience that you can apply the day you return to work. "},"name":"What Topics Are Covered In SANS Offensive Operations Training?"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"Yes, all Offensive Operations courses require at least basic familiarity with computer operations and some languages, and some require prior cybersecurity knowledge or experience with command-line tools, scripting, or networking. Please review the syllabus and prerequisites on our course pages for further information. "},"name":"Are There Any Prerequisites For Taking These Courses?"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"No, our courses go far beyond just attacker techniques. They provide a comprehensive approach to offensive cybersecurity, covering adversary tactics, security testing methodologies, evasion techniques, and strategic measures and process for improving defenses. Our courses help students understand not only how to conduct attacks but also how to analyze, adapt, and defend against them in real-world environments. "},"name":"Are Offensive Operations Courses Only Focused On Hacking?"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"Each course page provides a detailed syllabus outlining your overall course journey as well as specifically listing topics and exercises for each module of your training. If you're unsure, the SANS team can help guide you based on your background, career goals, and technical expertise. "},"name":"How Do I Know Which Offensive Operations Course Is Right For Me?"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"A wide range of cybersecurity roles are available to professionals with skills from SANS Offensive Operations, including penetration tester, red team operator, exploit developer, adversary emulation specialist, vulnerability researcher, purple team engineer, and application security tester. These roles are critical to organizations seeking to proactively assess and improve their security posture, and they often lead to senior technical or strategic positions in security consulting, threat simulation, or security architecture. "},"name":"What Career Paths Are There In Offensive Operations?"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"Yes. Most SANS Offensive Operations courses align with GIAC certifications, which validate hands-on skills and technical mastery in specific offensive disciplines. Certifications like GPEN (Penetration Tester), GXPN (Exploit Researcher and Advanced Pen Tester), GCPN (Cloud Penetration Tester), and GCIH (Certified Incident Handler) are globally recognized and can significantly boost your credibility, marketability, and career progression. "},"name":"Are There Certification Opportunities Available With SANS Offensive Operations Courses?"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"Yes. We have a wealth of resources including webcasts, workshops, blogs, and reference materials in our Community Resources that is filterable by Offensive Operations. "},"name":"Does SANS Offer Any Resources Or Hands-On Exercises Beyond The Courses? "}]}</script><div id="faqs" class="c-grid c-accordion-section accordion-section--transparent grid--has-container grid--columns-1 grid--columns-tablet-3"><div class="grid__item grid__item--col-span-1"><div class="c-animate-in slide-in-from-bottom"><h2 class="c-heading heading--is-h3 heading--is-h3-desktop">Frequently Asked Questions</h2></div></div><div class="grid__item grid__item--col-span-1 grid__item--col-span-tablet-2"><div class="c-animate-in"><div class="c-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:0ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_8mmeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_mmeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Who Should Take Offensive Operations Courses?<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_8mmeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_mmeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:100ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_96meav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_16meav5u9bb_" class="accordion__trigger" data-radix-collection-item="">What Topics Are Covered In SANS Offensive Operations Training?<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_96meav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_16meav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:200ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_9mmeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_1mmeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Are There Any Prerequisites For Taking These Courses?<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_9mmeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_1mmeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:300ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_a6meav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_26meav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Are Offensive Operations Courses Only Focused On Hacking?<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_a6meav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_26meav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:400ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_ammeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2mmeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">How Do I Know Which Offensive Operations Course Is Right For Me?<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_ammeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2mmeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:500ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_b6meav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_36meav5u9bb_" class="accordion__trigger" data-radix-collection-item="">What Career Paths Are There In Offensive Operations?<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_b6meav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_36meav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:600ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_bmmeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_3mmeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Are There Certification Opportunities Available With SANS Offensive Operations Courses?<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_bmmeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_3mmeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:700ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_c6meav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_46meav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Does SANS Offer Any Resources Or Hands-On Exercises Beyond The Courses? <svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_c6meav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_46meav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div></div></div><!--$--><!--/$--></main><footer class="c-footer" id="footer"><div class="c-container"><div class="footer__newsletter"><h2 class="c-heading footer__newsletter-title">Get Curated News, Vulnerabilities, and Essential Security Awareness Tips</h2><div class="footer__newsletter"><button class="c-button button--primary button--icon-right button--icon-translate-right footer__newsletter-button" type="button" aria-haspopup="dialog" aria-expanded="false" aria-controls="radix-_R_16pbb_" data-state="closed"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Subscribe to Newsletter </span></button></div></div><div class="c-grid footer__navigation grid--columns-12"><div class="grid__item grid__item--col-span-12 grid__item--col-span-desktop-3"><h2 class="c-heading heading--is-h4 heading--is-h4-desktop footer__navigation-title">The Highest Standard in Cybersecurity Education Since 1989</h2></div><div class="grid__item grid__item--col-start-1 grid__item--col-start-desktop-5 grid__item--col-end-13"><div class="c-accordion footer__navigation-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item footer__navigation-list-item"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_japbb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_3apbb_" class="accordion__trigger" data-radix-collection-item="">Company<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_japbb_" hidden="" role="region" aria-labelledby="radix-_R_3apbb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item footer__navigation-list-item"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_lapbb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_5apbb_" class="accordion__trigger" data-radix-collection-item="">Help &amp; Support<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_lapbb_" hidden="" role="region" aria-labelledby="radix-_R_5apbb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item footer__navigation-list-item"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_napbb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_7apbb_" class="accordion__trigger" data-radix-collection-item="">Training Programs<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_napbb_" hidden="" role="region" aria-labelledby="radix-_R_7apbb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item footer__navigation-list-item"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_papbb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_9apbb_" class="accordion__trigger" data-radix-collection-item="">Get Involved<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_papbb_" hidden="" role="region" aria-labelledby="radix-_R_9apbb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="footer__copy"><a aria-label="Go to homepage" class="footer__copy-logo-link" href="/"><svg class="footer__copy-logo" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 65 33" fill="none"><path fill="currentColor" d="M7.53 13.095C4.945 9.15 2.576 6.678 2.576 3.947c0-1.994 1.008-3.22 2.588-3.22 2.323 0 4.252 3.514 4.778 9.744h.734V.433H9.94l-.965 1.91C7.926.91 6.521 0 5.163 0 2.488.001.339 2.624.339 7.263c0 4.9 2.149 8.205 4.691 12.021 2.763 4.117 4.385 7.18 4.385 9.652 0 1.95-1.184 3.048-2.762 3.048-2.893 0-5.48-3.86-5.744-11.302H0v12.114h.91l1.183-2.306C3.583 32.224 4.986 33 6.828 33c3.157 0 5.394-3.124 5.394-8.196 0-4.076-1.886-7.503-4.691-11.709m51.9 19.038c-2.544 0-4.852-3.143-5.55-8.682h6.514c1.16 2.078 1.8 3.926 1.8 5.477 0 1.951-1.184 3.206-2.764 3.206m-23.353-9.72V5.898l7.23 16.514h-7.23zm-1.225 4.6c0 3.076-.014 4.572-2.208 4.572h-1.388l-1.43-8.133h5.026zm-15.504-4.6 2.744-16.062 2.656 16.062zm40.96-9.318c-2.586-3.945-4.953-6.417-4.953-9.148 0-1.994 1.007-3.22 2.585-3.22 2.325 0 4.254 3.514 4.78 9.744h.659V.433h-.66l-.964 1.91C60.703.91 59.3 0 57.94 0c-2.674 0-4.822 2.623-4.822 7.262 0 4.899 2.148 8.3 4.691 12.117.708 1.055 1.341 2.167 1.89 3.033h-5.94c-.033-.692-.056-.866-.071-1.731h-.984v1.73h-4.201V5.032c0-2.731.175-3.73 2.45-3.685V.433h-6.825v.913c2.1 0 2.976 1.258 2.976 4.119v14.352L39.308.433h-6.382V1.3h1.924v21.113h-5.238L25.773.433h-3.859L16.57 27.12c-.527 2.687-.442 4.054-3.068 4.445v.886h7.175v-.886c-1.924-.044-2.448-.565-2.448-1.952 0-.607.047-1.13.09-1.519l.793-4.643h5.875l1.316 8.134h-2.475v.866h15.926v-.886c-2.45-.174-3.676-1.562-3.676-4.813V23.45h7.736l3.784 9h.906v-9h4.201v9.345h.984l1.184-2.307C56.362 32.225 57.765 33 59.607 33 62.763 33 65 29.876 65 24.804c0-4.076-1.886-7.503-4.691-11.709z"></path></svg></a><nav aria-label="Social Navigation" class="footer__socials"><a aria-label="LinkedIn" class="footer__socials-link" title="LinkedIn" target="_blank" href="https://www.linkedin.com/company/sans-institute"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="M26.154 4H5.846A1.846 1.846 0 0 0 4 5.846v20.308A1.846 1.846 0 0 0 5.846 28h20.308A1.846 1.846 0 0 0 28 26.154V5.846A1.846 1.846 0 0 0 26.154 4m0 22.154H5.846V5.846h20.308zm-13.846-12v7.384a.923.923 0 0 1-1.847 0v-7.384a.923.923 0 0 1 1.847 0m10.154 3.23v4.154a.923.923 0 1 1-1.847 0v-4.153a2.308 2.308 0 1 0-4.615 0v4.153a.923.923 0 0 1-1.846 0v-7.384a.923.923 0 0 1 1.822-.206 4.153 4.153 0 0 1 6.486 3.437m-9.693-6.46a1.385 1.385 0 1 1-2.77-.001 1.385 1.385 0 0 1 2.77 0"></path></svg></a><a aria-label="X" class="footer__socials-link" title="X" target="_blank" href="https://x.com/SANSInstitute"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="m26.838 26.45-7.82-12.29 7.716-8.489a1 1 0 0 0-1.479-1.344l-7.35 8.085-5.058-7.949A1 1 0 0 0 12.004 4H6.007a1 1 0 0 0-.843 1.537l7.82 12.288-7.716 8.495a.999.999 0 1 0 1.479 1.344l7.35-8.085 5.058 7.949a1 1 0 0 0 .844.457h5.996a1 1 0 0 0 .843-1.535m-6.291-.464L7.827 6h3.623l12.725 19.987z"></path></svg></a><a aria-label="YouTube" class="footer__socials-link" title="YouTube" target="_blank" href="https://www.youtube.com/@SANSInstitute"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="m20.555 15.168-6-4A1 1 0 0 0 13 12v8a1 1 0 0 0 1.555.832l6-4a1 1 0 0 0 0-1.665M15 18.13v-4.256L18.198 16zM29.291 8.69a3 3 0 0 0-1.811-2.05C23.195 4.985 16.375 5 16 5S8.805 4.985 4.52 6.64a3 3 0 0 0-1.811 2.05C2.385 9.938 2 12.218 2 16s.385 6.063.709 7.31a3 3 0 0 0 1.811 2.051C8.625 26.945 15.05 27 15.918 27h.165c.867 0 7.296-.055 11.397-1.639a3 3 0 0 0 1.811-2.051c.324-1.25.709-3.527.709-7.31s-.385-6.062-.709-7.31m-1.936 14.125a1 1 0 0 1-.596.686c-3.957 1.528-10.685 1.5-10.75 1.5H16c-.068 0-6.791.025-10.75-1.5a1 1 0 0 1-.596-.686C4.35 21.674 4 19.571 4 16s.35-5.674.645-6.809a1 1 0 0 1 .596-.691C9.056 7.026 15.45 7 15.973 7h.033c.068 0 6.798-.022 10.75 1.5a1 1 0 0 1 .596.686C27.65 10.326 28 12.43 28 16s-.35 5.674-.645 6.809z"></path></svg></a><a aria-label="Facebook" class="footer__socials-link" title="Facebook" target="_blank" href="https://www.facebook.com/sansinstitute/"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="M16 4a12 12 0 1 0 12 12A12.013 12.013 0 0 0 16 4m.923 22.111V18.77h2.77a.923.923 0 1 0 0-1.846h-2.77v-2.77a1.846 1.846 0 0 1 1.846-1.845h1.846a.923.923 0 0 0 0-1.847H18.77a3.69 3.69 0 0 0-3.692 3.693v2.77h-2.77a.923.923 0 1 0 0 1.845h2.77v7.342a10.154 10.154 0 1 1 1.846 0"></path></svg></a><a aria-label="Tik Tok" class="footer__socials-link" title="Tik Tok" target="_blank" href="https://www.tiktok.com/@sansinstituteofficial"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="M28,9c-3.3,0-6-2.7-6-6,0-.6-.4-1-1-1h-5c-.6,0-1,.4-1,1v16.5c0,1.4-1.1,2.5-2.5,2.5s-2.5-1.1-2.5-2.5c0-1,.6-1.8,1.4-2.3.3-.2.6-.5.6-.9v-5.3c0-.6-.4-1-1-1,0,0-.1,0-.2,0-4.5.8-7.8,4.9-7.8,9.5s4.3,9.5,9.5,9.5,9.5-4.3,9.5-9.5v-5c1.9,1,3.9,1.5,6,1.5.6,0,1-.4,1-1v-5c0-.6-.4-1-1-1ZM27,14c-2-.2-3.8-.9-5.4-2-.4-.3-1.1-.2-1.4.2-.1.2-.2.4-.2.6v6.8c0,4.1-3.4,7.5-7.5,7.5s-7.5-3.4-7.5-7.5,2.1-6.1,5-7.2v3.5c-2.1,1.4-2.6,4.2-1.2,6.2,1.4,2.1,4.2,2.6,6.2,1.2,1.2-.8,2-2.2,2-3.7V4h3.1c.5,3.6,3.3,6.5,6.9,6.9v3Z"></path></svg></a></nav><small class="footer__copy-nav"><div class="footer__copyright"><nav aria-label="Legal navigation" class="footer__copy-nav-list"><a class="footer__copy-nav-list-link" target="_blank" href="/legal/privacy">Privacy Policy</a><a class="footer__copy-nav-list-link" href="/legal/terms-conditions">Terms and Conditions</a><a class="footer__copy-nav-list-link" target="_blank" href="/legal/do-not-share-sell">Do Not Sell/Share My Personal Information</a><a class="footer__copy-nav-list-link" href="/legal/cookie-notice">Cookie Notice</a></nav></div><div class="footer__trademark"><span class="c-text footer__copy-nav-trademark">© <!-- -->2026<!-- --> <!-- -->The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute.</span><span class="c-text footer__copy-nav-trademark">Our <a href="/legal/terms-conditions">Terms and Conditions</a> detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.</span></div></small></div></div></footer><script src="/_next/static/chunks/webpack-11f4915bd98f8a25.js" id="_R_" async=""></script><script>(self.__next_f=self.__next_f||[]).push([0])</script><script>self.__next_f.push([1,"1:\"$Sreact.fragment\"\n3:I[21911,[],\"\"]\n4:I[44843,[],\"\"]\n6:I[91390,[],\"OutletBoundary\"]\n8:I[851,[],\"AsyncMetadataOutlet\"]\na:I[91390,[],\"ViewportBoundary\"]\nc:I[91390,[],\"MetadataBoundary\"]\nd:\"$Sreact.suspense\"\nf:I[66461,[],\"\"]\n10:I[57730,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"PageLoadGTM\"]\n12:I[92671,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"\"]\n13:I[18373,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"GoogleTagManager\"]\n14:I[53120,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9"])</script><script>self.__next_f.push([1,"261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"default\"]\n15:I[32517,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"SendLyticsEmailCampaignId\"]\n17:I[18677,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"LangBoundaryRefresher\"]\n18:I[13146,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-1"])</script><script>self.__next_f.push([1,"7379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"default\"]\n19:I[61997,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"default\"]\n1b:I[50527,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"ThemeProvider\"]\n1c:I[91541,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"Sk"])</script><script>self.__next_f.push([1,"ipLinks\"]\n1d:I[293,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"default\"]\n1f:I[99960,[\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"8039\",\"static/chunks/app/error-8391fd18fc444d3f.js\"],\"default\"]\n22:I[57281,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"default\"]\n23:I[51312,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"SansLink\"]\n24:I[77707,[],\"IconMark\"]\n26:I[50600,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"253"])</script><script>self.__next_f.push([1,"4\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"FooterNavigation\"]\n2d:I[41912,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"HeaderProvider\"]\n2e:I[8299,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"Header\"]\n:HL[\"/_next/static/media/07f0d0991c204e49-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/1c2b560656f22784-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/25e9b8f09a8d4ee4-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/442946fed64c2011-s.p.woff2\",\"font\",{\"crossOrigin\""])</script><script>self.__next_f.push([1,":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/4f498a2054f9dc71-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/64d67560db5baada-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/794d29e41a12b5c4-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/a048339354d5408e-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/b036901809a398af-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/d644870e415613ec-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/css/8f4c1d5ac92728b5.css\",\"style\"]\n:HL[\"/_next/static/css/f60c4c18eaea2539.css\",\"style\"]\n:HL[\"/_next/static/css/10a162551269c449.css\",\"style\"]\n:HL[\"/_next/static/css/19ce4d406e564b03.css\",\"style\"]\n:HL[\"/_next/static/css/206023683b1c0579.css\",\"style\"]\n"])</script><script>self.__next_f.push([1,"0:{\"P\":null,\"b\":\"YhY6kuKTxZ6AzGAnnFTnu\",\"p\":\"\",\"c\":[\"\",\"cybersecurity-focus-areas\",\"offensive-operations\"],\"i\":false,\"f\":[[[\"\",{\"children\":[[\"slugs\",\"cybersecurity-focus-areas/offensive-operations\",\"c\"],{\"children\":[\"__PAGE__\",{}]}]},\"$undefined\",\"$undefined\",true],[\"\",[\"$\",\"$1\",\"c\",{\"children\":[[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/8f4c1d5ac92728b5.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"1\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/f60c4c18eaea2539.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"2\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/10a162551269c449.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}]],\"$L2\"]}],{\"children\":[[\"slugs\",\"cybersecurity-focus-areas/offensive-operations\",\"c\"],[\"$\",\"$1\",\"c\",{\"children\":[null,[\"$\",\"$L3\",null,{\"parallelRouterKey\":\"children\",\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L4\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"forbidden\":\"$undefined\",\"unauthorized\":\"$undefined\"}]]}],{\"children\":[\"__PAGE__\",[\"$\",\"$1\",\"c\",{\"children\":[\"$L5\",[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/19ce4d406e564b03.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"1\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/206023683b1c0579.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}]],[\"$\",\"$L6\",null,{\"children\":[\"$L7\",[\"$\",\"$L8\",null,{\"promise\":\"$@9\"}]]}]]}],{},null,false]},null,false]},null,false],[\"$\",\"$1\",\"h\",{\"children\":[null,[[\"$\",\"$La\",null,{\"children\":\"$Lb\"}],[\"$\",\"meta\",null,{\"name\":\"next-size-adjust\",\"content\":\"\"}]],[\"$\",\"$Lc\",null,{\"children\":[\"$\",\"div\",null,{\"hidden\":true,\"children\":[\"$\",\"$d\",null,{\"fallback\":null,\"children\":\"$Le\"}]}]}]]}],false]],\"m\":\"$undefined\",\"G\":[\"$f\",[]],\"s\":false,\"S\":false}\n"])</script><script>self.__next_f.push([1,"5:[[\"$\",\"$L10\",null,{\"event\":\"Page Load\",\"eventAction\":\"Selected Listing Title\",\"eventCategory\":\"Content interactions\",\"eventLabel\":\"focus_area_page\"}],\"$L11\"]\n"])</script><script>self.__next_f.push([1,"2:[\"$\",\"html\",null,{\"data-theme\":\"dark\",\"lang\":\"en-US\",\"children\":[[\"$\",\"head\",null,{\"children\":[[\"$\",\"meta\",null,{\"content\":\"cC-8xOerZ3opiLx9VloUCzc6SgMfOZHYihJzWA19-KI\",\"name\":\"google-site-verification\"}],[\"$\",\"$L12\",null,{\"id\":\"optimizely-init\",\"dangerouslySetInnerHTML\":{\"__html\":\"\\n              window[\\\"optimizely\\\"] = window[\\\"optimizely\\\"] || [];\\n              const oneTrustCookie = document.cookie\\n                .split(';')\\n                .map(function(x) { return x.trim(); })\\n                .filter(function(x) { return x.startsWith('OptanonConsent'); })[0];\\n              if (!oneTrustCookie) {\\n                window[\\\"optimizely\\\"].push({ type: \\\"disable\\\" });\\n              } else {\\n                var optOutPreference = !decodeURIComponent(oneTrustCookie).includes('C0003:1');\\n                window[\\\"optimizely\\\"].push({ type: \\\"optOut\\\", isOptOut: optOutPreference });\\n              }\\n            \"}}],[\"$\",\"$L12\",null,{\"src\":\"https://cdn.optimizely.com/js/28081820005.js\"}]]}],[\"$\",\"$L13\",null,{\"gtmId\":\"GTM-5T9DW3B\"}],[\"$\",\"$L14\",null,{}],[\"$\",\"$L15\",null,{}],[\"$\",\"body\",null,{\"className\":\"__variable_71459b __variable_5c0054 __variable_9e78df\",\"children\":[[\"$\",\"noscript\",null,{\"children\":[\"$\",\"iframe\",null,{\"height\":\"0\",\"src\":\"https://www.googletagmanager.com/ns.html?id=GTM-N9Z5JVC\",\"style\":{\"display\":\"none\",\"visibility\":\"hidden\"},\"width\":\"0\"}]}],\"$L16\",[\"$\",\"$L17\",null,{}],[\"$\",\"$L18\",null,{}]]}]]}]\n"])</script><script>self.__next_f.push([1,"b:[[\"$\",\"meta\",\"0\",{\"charSet\":\"utf-8\"}],[\"$\",\"meta\",\"1\",{\"name\":\"viewport\",\"content\":\"width=device-width, initial-scale=1\"}]]\n"])</script><script>self.__next_f.push([1,"16:[\"$\",\"$L19\",null,{\"locale\":\"en-US\",\"now\":\"$D2026-04-09T19:38:09.568Z\",\"timeZone\":\"UTC\",\"messages\":{\"facets\":{\"view\":\"View:\",\"skillLevel\":\"Skill Level\",\"focusArea\":\"Focus Area\",\"role\":\"Role\",\"tags\":\"Tags\",\"topic\":\"Topic\",\"status\":\"Status\",\"language\":\"Language\",\"policyCategory\":\"Category\",\"date\":\"Date\",\"type\":\"Type\",\"format\":\"Format\",\"location\":\"Location\",\"noMatches\":\"No possible matches found, reset or adjust the filters to refine these.\"},\"carousel\":{\"controls\":{\"currentSlideIndexAria\":\"Slide {current} of {total}\",\"next\":\"Go to next slide\",\"prev\":\"Go to previous slide\"},\"slider\":{\"slideXofY\":\"Slide {current} of {total}\"}},\"profile\":{\"noUpcomingCoursesTitle\":\"No Upcoming Courses\"},\"common\":{\"close\":\"Close\",\"closeItem\":\"Close {item}\",\"loadMore\":\"Load more\",\"readMore\":\"Read more\",\"readLess\":\"Read less\",\"moreInfo\":\"More info\",\"showAll\":\"Show all\",\"day\":\"Day {day}\",\"by\":\"by\",\"for\":\"for\",\"courses\":\"{count, plural, =0 {No Courses} =1 {1 Course} other {# Courses}}\",\"cpesEvent\":\"{count, plural, =0 {No CPEs} =1 {1 CPE} other {# CPEs}} (Summit Only)\",\"cpes\":\"{count, plural, =0 {No CPEs} =1 {1 CPE} other {# CPEs}}\",\"tournaments\":\"{count, plural, =0 {No Tournaments} =1 {1 NetWars Tournament} other {# NetWars Tournaments}}\",\"hours\":\"{count, plural, =0 {0 Hours} =1 {1 Hour} other {# Hours}}\",\"minutes\":\"{count, plural, =0 {0 Hours} =1 {1 Minute} other {# Minutes}}\",\"days\":\"{count, plural, =0 {0 Days} =1 {1 Day} other {# Days}}\",\"labs\":\"{count, plural, =0 {No Labs} =1 {Labs: 1 Hands-On Lab} other {Labs: # Hands-On Labs}}\",\"minute\":\"Minute\",\"duration\":\"Duration:\",\"durationDaysLabel\":\"(Instructor-Led)\",\"durationHoursLabel\":\"(Self-Paced)\",\"priceCourse\":\"{price} (Course)\",\"allDates\":\"All dates\",\"priceCertification\":\"{price} (Certification)\",\"plusXMore\":\"+ {count} more\",\"privacyPolicy\":\"Privacy Policy\",\"message\":\"message\",\"viewMoreFaqs\":\"View More FAQs\",\"relatedEvents\":\"Related events\",\"viewAllEvents\":\"View all events\",\"virtual\":\"Virtual\",\"authoredBy\":\"Authored by\",\"register\":\"Register\",\"webinar\":\"Webinar\",\"majorUpdates\":\"Major Updates\",\"search\":\"Search\",\"live\":\"Live\",\"date\":{\"startsAt\":\"Starts {startDatePart} at {startTimePart} {tz}\",\"to\":\"{dateString}: {startTime} to {endTime} {tz}\"},\"splitContentTags\":{\"Major Updates\":\"Major Updates\",\"Updated\":\"Updated\",\"Beta\":\"Beta\",\"Free\":\"Free\",\"New\":\"New\",\"Special Offer\":\"Special Offer\",\"Featured\":\"Featured\",\"Part One\":\"Part One\",\"Part Two\":\"Part Two\"}},\"video\":{\"play\":\"Play video\",\"youtube\":{\"error\":\"Unable to load the video due to an issue with YouTube\"},\"modal\":{\"playButtonLabel\":\"Play video in modal\",\"title\":\"Video modal: watch the video\"}},\"cards\":{\"courseCard\":{\"buttonPrimaryLabel\":\"Register\",\"buttonSecondaryLabel\":\"View course details\",\"enrollInPerson\":\"Enroll In-Person\",\"enrollVirtual\":\"Enroll Virtual\",\"logInLabel\":\"Log in to register:\",\"quickViewLabel\":\"Quick view\",\"soldOut\":\"Sold out\",\"waitingList\":\"Join waiting list\",\"AIFocused\":\"AI-FOCUSED\",\"AISkills\":\"AI SKILLS\"},\"webinarCard\":{\"ctaLabel\":\"View details\",\"cardType\":\"Webinar\",\"live\":\"Live\",\"type\":{\"technical-presentation\":\"Technical Presentation\",\"workshop\":\"Workshop\",\"solutions-forum\":\"Solutions Forum\",\"industry-research-presentation\":\"Industry Research Presentation\",\"panel-discussion\":\"Panel Discussion\",\"leadership-insights\":\"Leadership Insights\"}},\"eventCard\":{\"buttonPrimaryLabel\":\"Register\",\"buttonSecondaryLabel\":\"View event details\"},\"downloadCard\":{\"downloadExample\":\"Download example\",\"readAll\":\"Read Whitepaper\",\"readMore\":\"Read more about {title}\"},\"insightCard\":{\"authoredBy\":\"Authored by\",\"writtenBy\":\"Written By\",\"createdBy\":\"Created By\",\"features\":\"Features\",\"presentedBy\":\"Presented by\",\"typePodcast\":{\"typeTitle\":\"Podcast\",\"authorsLabel\":\"Features\",\"defaultImageAlt\":\"Podcast placeholder image\"},\"typePosterAndCheatSheet\":{\"typeTitle\":\"Poster and cheat sheet\",\"defaultImageAlt\":\"Poster and cheat sheet placeholder image\"},\"typeSummitPresentation\":{\"typeTitle\":\"Summit presentation\",\"defaultImageAlt\":\"Summit presentation placeholder image\"},\"typeWebinar\":{\"typeTitle\":\"Webinar\",\"defaultImageAlt\":\"Webinar placeholder image\",\"presented\":\"Presented:\",\"upcoming\":\"Upcoming:\"},\"typeWhitepaper\":{\"typeTitle\":\"Whitepaper\",\"defaultImageAlt\":\"Whitepaper placeholder image\"},\"typeBlog\":{\"typeTitle\":\"Blog\",\"defaultImageAlt\":\"Blog placeholder image\"},\"typeCourseSingle\":{\"typeTitle\":\"Course\",\"defaultImageAlt\":\"Course placeholder image\"},\"typeEventSingle\":{\"typeTitle\":\"Event\",\"defaultImageAlt\":\"Event placeholder image\"},\"typeCaseStudy\":{\"typeTitle\":\"Case Study\",\"defaultImageAlt\":\"Case study placeholder image\"},\"typeOpenSourceTools\":{\"typeTitle\":\"Open Source Tools\",\"defaultImageAlt\":\"Open Source Tools placeholder image\"},\"typePolicy\":{\"typeTitle\":\"Policy\",\"defaultImageAlt\":\"Policy placeholder image\"}},\"personCard\":{\"ctaLabel\":\"Learn more\",\"readMoreAbout\":\"Read more about {name}\"},\"learningPathsCard\":{\"ctaLabel\":\"Learn more\"},\"podcastCard\":{\"ctaLabel\":\"Listen now\",\"resourceType\":\"Podcast\",\"season\":\"Season {season}\"},\"scheduleCard\":{\"facilitatedBy\":\"Facilitated by\",\"moderatedBy\":\"Moderated by\",\"openToNonCourseLearners\":\"Open to non-course learners\",\"panelList\":\"Panelists\",\"presentedBy\":\"Presented by\",\"virtual\":\"Virtual\"},\"skillsCard\":{\"relatedRoleTitle\":\"Similar roles\",\"ctaLabel\":\"Explore learning path\"},\"whitepaperSplitContent\":{\"readMore\":\"Read more\",\"relatedWebinar\":\"Related Webcast\"}},\"form\":{\"downloadLabel\":\"Download\",\"requiredLabel\":\"Required\",\"sponsorsIntro\":\"The webinar is offered fre of charge through collaboration between SANS and its sponsor(s). If you prefer not to share your registration details with sponsor(s), a recorded webinar will be available approximately 30 days after its initial release through SANS archive. To access the recording, you will need to create a SANS account, but your information will not be shared with sponsors(s).\",\"sponsorsConsent\":\"I consent to sharing my information with SANS and the sponsor(s) listed below for this webinar. Registration information includes your name, title, organization, state, country, phone number and email address. Each organization will use your registration details in accordance with their respective privacy policies. You can review SANS's privacy policy bellow and the sponsors's privacy policies on their websites which are accessible by clicking on their logos below. By proceeding with registration you acknowledge and agree to these terms\",\"serverError\":\"Unable to process your request. Please try again later.\",\"successMessage\":\"Form submitted successfully\",\"submitNotice\":\"By providing this information, you agree to the processing of your personal data by SANS as described in our \u003clink\u003ePrivacy Policy\u003c/link\u003e.\",\"gdprNotice\":\"Please send me opportunities to become certified, learn new cyber skills, and find team training options.\",\"errors\":{\"required\":\"Field is required\",\"minLength\":\"Input is too short (minimium of 2 characters)\",\"maxLength\":\"Input is too long (maximum of 2000 characters)\",\"email\":\"Invalid email address\",\"phoneNumber\":\"Invalid phone number\"},\"webinar\":{\"registrationSuccess\":\"Thank you for registering!\"},\"labels\":{\"yes\":\"Yes\",\"no\":\"No\"},\"errorGeneric\":\"Unable to process your form request. Please try again later.\",\"standardFields\":{\"firstName\":{\"label\":\"First Name\"},\"lastName\":{\"label\":\"Last Name\"},\"email\":{\"label\":\"Your Email\"},\"jobTitle\":{\"label\":\"Job Title\"},\"organization\":{\"label\":\"Organization\"},\"country\":{\"label\":\"Country\",\"placeholder\":\"Select country\"},\"industry\":{\"label\":\"Industry\",\"placeholder\":\"Select industry\"},\"state\":{\"label\":\"US State\",\"placeholder\":\"Select state\"},\"phoneNumber\":{\"label\":\"Phone number\",\"date\":\"Please enter a valid date\"}},\"submit\":\"Submit\"},\"courses\":{\"jobRolesTitle\":\"Relevant Job Roles\",\"related\":{\"title\":\"Related Courses\",\"description\":\"Short description of the section to provide users context and value of the content being featured in this carousel.\",\"viewAll\":\"View all courses\",\"cta\":\"/cyber-security-courses\"},\"lister\":{\"heroTitle\":\"Search courses\"},\"filters\":{\"focusArea\":\"Focus Area\",\"status\":\"Status\",\"filterCourses\":\"Filter courses\"},\"scheduleTable\":{\"instructedBy\":\"Instructed by\",\"enrollCtaLabel\":\"Start enrolling\",\"filterLabels\":{\"date\":\"Date\",\"allDates\":\"All dates\",\"next30days\":\"Next 30 days\",\"next60days\":\"Next 60 days\",\"next6months\":\"Next 6 months\",\"next12months\":\"Next 12 months\",\"location\":\"Location\",\"trainingFormat\":\"Format\",\"focusArea\":\"Focus Area\",\"status\":\"Status\"},\"tooltips\":{\"price\":\"Course price tooltip\"},\"labels\":{\"courseScheduleList\":\"Schedule {timezone}\",\"dateAndTime\":\"Date \u0026 Time\",\"enrollmentOptions\":\"Registration Options\",\"enrollmentOptionsCtaMobile\":\"Registration Options\",\"fetchingSchedule\":\"Fetching schedule..\",\"loadMore\":\"Load more\",\"showAll\":\"Show all\",\"locationAndInstructor\":\"Location \u0026 instructor\",\"price\":\"Course price\",\"InPerson\":\"In-Person\",\"SelfPaced\":\"Self-Paced\",\"Virtual\":\"Virtual\",\"viewEventDetails\":\"View event details\",\"soldout\":\"Sold Out {modality}\",\"registrationClosed\":\"Registration Closed\",\"waitlist\":\"Join {modality} Waitlist\",\"onDemandPrice\":\"OnDemand Bundle +{price}\",\"certificationPrice\":\"Certification +{price}\",\"contactUs\":\"\u003clink\u003eContact us\u003c/link\u003e for group pricing options\"},\"modality\":{\"dateAndTime\":{\"onDemand\":{\"subtitle\":\"Self-Paced, 4 months access\",\"4MonthsAccess\":\"4 months access\",\"title\":\"OnDemand (Anytime)\"},\"selfPaced\":{\"title\":\"Anytime\"}},\"Ondemand\":\"Virtual (OnDemand)\",\"virtual\":\"Virtual (live)\",\"selfPaced\":\"Virtual (Self-paced)\"},\"title\":\"Course schedule \u0026 pricing\"},\"syllabus\":{\"textBlock\":{\"columnTitles\":{\"labs\":\"Labs\",\"topics\":\"Topics covered\"}},\"splitFixScroll\":{\"ctaLetterLabel\":\"Download the letter\",\"ctaSyllabusLabel\":\"Download full syllabus\"}}},\"events\":{\"types\":{\"Summit\":\"Summit\",\"TrainingEvent\":\"Training Event\"},\"register\":{\"free\":\"Free\"},\"filters\":{\"trackName\":\"Track Name\",\"trackType\":\"Track Type\",\"eventFormat\":\"Event Type\"},\"options\":{\"InPerson\":\"In-Person\",\"InPerson\u0026Virtual\":\"In-Person \u0026 Virtual\",\"Keynote\":\"Keynote\",\"NetWars\":\"NetWars\",\"Reception\":\"Reception\",\"Virtual\":\"Virtual\",\"Social\":\"Social\",\"Community\":\"Community\",\"Workshop\":\"Workshop\",\"Talk\":\"Talk\"}},\"faq\":{\"resetSearch\":\"Reset search\",\"noResults\":\"We couldn’t find a match for \\\"{term}\\\". Try searching again using different search terms\",\"placeholderText\":\"Search keywords or questions\"},\"lister\":{\"filters\":{\"labels\":{\"whitepapers\":\"Filter Whitepapers\",\"filterBlogs\":\"Filter blogs\",\"generic\":\"Filter\",\"event_single\":\"Filter events\",\"archived\":\"Archived\",\"upcoming\":\"Upcoming\"},\"applyButton\":\"Apply filters\",\"backToFilters\":\"Back to filters\",\"buttonLabel\":\"Filter\",\"filterBy\":\"Filter by:\",\"filterDrawerTitle\":\"Filter by:\",\"filterCoursesDrawerTitle\":\"Filter courses\",\"reset\":\"Clear all filters\"},\"noResults\":{\"listerNothingFound\":\"No results found\",\"description\":\"Please try a different combination of filters and search again.\",\"title\":\"We couldn't find a match for your selection\"},\"quickFilters\":{\"title\":\"Recommended:\"},\"showing\":{\"of\":\"of\",\"prefix\":\"Showing\"},\"date\":{\"from\":\"From\",\"until\":\"Until\",\"today\":\"Today\"},\"sort\":{\"labels\":{\"relevance\":\"Relevance\",\"newestFirst\":\"Newest first\",\"oldestFirst\":\"Oldest first\",\"recency\":\"Recency\",\"role\":\"Role\",\"alphabeticalAZ\":\"Alphabetical A-Z\",\"alphabeticalZA\":\"Alphabetical Z-A\"},\"drawerTitle\":\"Sort and view by:\",\"mobileButtonLabel\":\"Sort and view\",\"show\":\"Show:\",\"sortBy\":\"Sort by:\",\"reset\":\"Reset\",\"submit\":\"Apply sorting\"},\"view\":{\"label\":\"View:\",\"grid\":\"Grid\",\"list\":\"List\"}},\"pagination\":{\"goTo\":\"Go to page {page}\",\"next\":\"Next\",\"previous\":\"Previous\"},\"heros\":{\"course\":{\"secondaryCta\":\"Course Preview\",\"primaryCta\":\"Register Now\",\"createdBy\":\"Course authored by:\"},\"download\":{\"c2MatrixEdition\":\"C2 Matrix Edition:\",\"communityEdition\":\"Community Edition:\",\"createdBy\":\"Created by:\",\"ctaLogIn\":\"Login to download\",\"ctaC2MatrixEdition\":\"Download C2 Matrix Edition\",\"ctaCommunityEdition\":\"Download Community Edition\",\"ctaGeneric\":\"Download\",\"lastUpdate\":\"Last updated\"},\"summitPresentation\":{\"downloadFile\":\"Download File\",\"presentedBy\":\"Presented by:\"},\"privacy\":{\"ctaDownloadFile\":\"Download PDF\",\"ctaDownloadDocument\":\"Download DOCX\",\"downloadFileLabel\":\"Download File:\",\"downloadDocumentLabel\":\"Download Document:\"},\"posters\":{\"downloadFile\":\"Download File\",\"publishedDate\":\"Published\"},\"whitepaper\":{\"downloadFile\":\"Download File\",\"sponsorsIntro\":\"This content is provided free of charge through collaboration between SANS and its sponsor(s). If you prefer not to share your contact details with the sponsor(s), you have the option of waiting approximately 30 days after the original publication date.  After 30 days, to download the content, you will be required to create a SANS account, but your information will not be shared with the sponsor(s).\",\"sponsorsConsent\":\" I consent to sharing my information with SANS and the sponsor(s) listed below for this paper. This information includes your name, title, organization, state, country, phone number and email address. Each organization will use your details in accordance with their respective privacy policies. You can review the SANS privacy policy below and the sponsors' privacy policies on their websites which are accessible by clicking on their logos below. By proceeding, you acknowledge and agree to these terms and the processing of your personal data by SANS as described in our Privacy Policy.\"},\"instructor\":{\"connectWith\":\"Connect with {name}\",\"specialities\":\"Specialities\",\"titleWithCompany\":\"{title} at {company}\"},\"podcast\":{\"features\":\"Features\",\"participants\":\"Participants\",\"published\":\"Published\",\"categories\":{\"cyberLeaders\":\"Cyber leaders\",\"waitJustAnInfoSec\":\"Wait just an Infosec\",\"cloudAce\":\"Cloud ace\",\"blueprint\":\"Blueprint\",\"trustMeIMCertified\":\"Trust me, I’m certified\",\"ouch_\":\"Ouch!\"}},\"webinar\":{\"login\":\"Login to register\",\"unavailable\":\"This webinar is currently unavailable. Please check back latter.\",\"join\":\"Join\",\"watch\":\"Watch\",\"testZoomConnection\":\"Registration Complete - Test Connection\",\"downloadPresentation\":\"Download Presentation\",\"addToCalendar\":\"Add to Calendar\",\"calendars\":{\"google\":\"Google\",\"outlook\":\"Outlook\",\"ical\":\"Ical\",\"yahoo\":\"Yahoo\"},\"type\":{\"technical-presentation\":\"Technical Presentation\",\"workshop\":\"Workshop\",\"solutions-forum\":\"Solutions Forum\",\"industry-research-presentation\":\"Industry Research Presentation\",\"panel-discussion\":\"Panel Discussion\",\"leadership-insights\":\"Leadership Insights\"}}},\"filterAndSort\":{\"mobileSortDrawerCtaLabel\":\"Sort and view\",\"mobileFilterDrawerCtaLabel\":\"Filter results\",\"sort\":{\"label\":\"Sort by:\",\"options\":{\"relevance\":\"Relevance\",\"recency\":\"Recency\"}},\"reset\":\"Clear all\",\"hitsPerPage\":{\"label\":\"Show:\"},\"filter\":{\"label\":\"Filter results\"}},\"navigation\":{\"breadcrumbs\":{\"label\":\"Breadcrumbs\",\"previousLevel\":\"Previous level\"},\"search\":{\"resultPage\":{\"title\":\"Search results\",\"nothingFoundForQuery\":\"No results found for “\u003cmark\u003e{query}\u003c/mark\u003e”, try again with a different search term.\"},\"results\":{\"heading\":\"Search results\"},\"globalSearch\":{\"suggested\":\"Suggested Searches\",\"quickLinks\":\"Suggested Links\",\"placeholder\":\"What are you looking for?\",\"resetSearch\":\"Clear all filters\",\"noFiltersAvailable\":\"No filters available\",\"noResultsFoundFor\":\"No results found for \\\"{query}\\\", try again with a different search term.\"},\"sortingTooltip\":\"Showing results for both Relevance and Recency: Newest to Oldest. Sort by Recency: Newest to Oldest only.\",\"error\":\"An error occurred while fetching search results, please try again later.\",\"closeSearchPanel\":\"Close search panel\",\"noResults\":\"No results found\",\"placeholderText\":\"Type to search..\",\"popularSearches\":\"Popular searches\",\"resetSearch\":\"Reset search\",\"searching\":\"searching..\",\"suggestedSearches\":\"Suggested Searches\",\"labels\":{\"course_landing_page\":\"Course\",\"course_listing_page\":\"Courses\",\"course_single_page\":\"Course\",\"default_page\":\"Page\",\"event_single\":\"Event\",\"focus_area_page\":\"Focus Area\",\"framework_single_page\":\"Framework\",\"homepage\":\"Homepage\",\"job_role_page\":\"Job Role\",\"learning_path_page\":\"Learning Path\",\"organization_landing_page\":\"Organization\",\"person\":\"Person\",\"job_roles_listing_page\":\"Job Roles\",\"podcast_single_page\":\"Podcast\",\"policy_single_page\":\"Policy\",\"poster_and_cheat_sheet_single\":\"Poster \u0026 Cheat Sheet\",\"resource_landing_page\":\"Resource\",\"summit_presentation_single\":\"Summit Presentation\",\"webinar_single\":\"Webinar\",\"white_paper_single\":\"Whitepaper\",\"webcast_single\":\"Webinar\",\"open_source_tools_single\":\"Open Source Tool\",\"open_source_tools_listing_page\":\"Open Source Tools\",\"blog_single_page\":\"Blog\",\"newsletter_ouch\":\"Newsletter OUCH\",\"newsletter_ouch_listing_page\":\"Newsletter OUCH\",\"newsletter_risk\":\"Newsletter RISK\",\"newsletter_risk_listing_page\":\"Newsletter RISK\",\"newsletter_newsbites\":\"Newsletter NewsBites\",\"newsletter_newsbites_listing_page\":\"Newsletter NewsBites\",\"podcast_listing_page\":\"Podcasts\",\"blog_listing_page\":\"Blogs\",\"webinar_listing_page\":\"Webinars\",\"posters_listing_page\":\"Posters \u0026 Cheat Sheets\",\"instructor_listing_page\":\"Instructors\",\"summit_presentation_listing_page\":\"Summit Presentations\",\"policy_listing_page\":\"Policies\",\"event_listing_page\":\"Events\",\"white_paper_listing_page\":\"Whitepapers\"}},\"header\":{\"mainNavigation\":\"Main tab navigation\",\"back\":\"Back\",\"tabpanelNavigation\":\"navigation for: \",\"viewAll\":\"View all\",\"close\":\"Close\",\"logo\":\"Go to homepage\",\"menu\":\"Menu\",\"search\":\"Search\",\"openSearch\":\"Open search\",\"closeSearch\":\"Close search\"},\"footer\":{\"legalNavigation\":\"Legal navigation\",\"logoNavigation\":\"Go to homepage\",\"socialNavigation\":\"Social Navigation\"},\"topbar\":{\"aria\":{\"dropdownNavigation\":\"Topbar dropdown navigation\",\"navigation\":\"Topbar navigation\"}},\"skipLinks\":{\"skipToMainContent\":\"Skip to main content\",\"skipToSearch\":\"Go to search\",\"skipToFooter\":\"Go to footer\"}},\"platformLinksAndDescription\":{\"apple\":\"Apple Podcasts\",\"listenOn\":\"Listen on\",\"readTranscript\":\"Read transcript\",\"spotify\":\"Spotify\",\"youtube\":\"YouTube\"},\"scheduleBlock\":{\"courses\":\"Courses\",\"coursesContactDescription\":\"Looking for group pricing?\",\"coursesContactLink\":\"Contact us!\",\"title\":\"Schedule\",\"register\":\"Register\",\"tabMobileLabel\":\"Select day:\",\"noResults\":{\"description\":\"Please try a different combination of filters and search again.\",\"title\":\"We couldn't find a match for your selection\"}},\"registrationOptions\":{\"includes\":\"Includes\",\"inPerson\":\"In person\",\"login\":\"Login to register\",\"online\":\"Live online\",\"priceFrom\":\"from\",\"register\":\"Register\",\"selectCourse\":\"Select course to Enroll\",\"soldOut\":\"Sold out\"},\"socials\":{\"share\":{\"facebook\":\"Share on facebook\",\"label\":\"Share\",\"link\":\"Copy link\",\"linkedin\":\"Share on linkedin\",\"x\":\"Share on X\"}},\"splitStandardTextBlock\":{\"aboutLabel\":\"About\",\"secondaryHeading\":\"Press \u0026 Media\"},\"stickyAnchorLinks\":{\"select\":\"Please select\",\"register\":\"Register\",\"jumpLabel\":\"Jump to:\",\"componentLabels\":{\"accordionSection\":\"FAQs\",\"contactCreditCard\":\"Credit Card Payment Support\",\"contactGenericContentBlock\":\"General Inquiries\",\"contactNavigationCards\":\"Helpful Resources\",\"contactPressAndMedia\":\"Press \u0026 Media Inquiries\",\"eventSingleCourses\":\"Quick Course Lister\",\"courseScheduleTable\":\"Schedule \u0026 Pricing\",\"courseSyllabus\":\"Syllabus\",\"courseSyllabusFaqs\":\"FAQs\",\"eventCarousel\":\"Upcoming Events\",\"profileWebinars\":\"Webcasts\",\"eventSplitContent\":\"Location\",\"featuredCardSection\":\"Event Highlights\",\"featuredCoursesWide\":\"Courses\",\"featuredFreeResources\":\"Resources\",\"focusAreaCourseCardCarousel\":\"Related Courses\",\"insightCardHolder\":\"Featured Content\",\"instructorsGrid\":\"Instructors\",\"jobRoleSkillCards\":\"Similar Roles\",\"profileSplitStandardTextBlock\":\"Profile\",\"promotionalContentBanner\":\"Promotional Content Banner\",\"readMoreSection\":\"Overview\",\"registerBlock\":\"Courses\",\"registerBlockCourses\":\"Courses2\",\"relatedCoursesCarousel\":\"Courses\",\"relatedEventsCarousel\":\"Upcoming Events\",\"scheduleBlock\":\"Schedule\",\"speakersGrid\":\"Speakers\",\"sponsors\":\"Sponsors\",\"studentReviews\":\"Student Reviews\",\"contactForm\":\"Connect with a Training Advisor\"}},\"price\":\"Excl. Tax\",\"newsletter\":{\"types\":{\"newsbites\":\"Newsbites\",\"ouch\":\"OUCH\",\"@risk\":\"@RISK\"},\"title\":\"Subscribe to SANS Newsletters\",\"newsletterSelectionError\":\"At least one newsletter must be selected\",\"email\":\"Your Email\",\"subscribedTo\":\"You subscribed to\",\"subscribedSuccess\":\"Thank you for subscribing to the SANS Newsletters!\",\"location\":\"Location\",\"selectCountry\":\"Select your country\",\"selectNewsletters\":\"Select newsletters\",\"serverError\":\"Unable to process your newsletter subscription. Please try again later.\"},\"newsletters\":{\"ouch\":{\"editorial\":{\"translatorHeader\":\"OUCH! Translators\"},\"download_translations\":\"Download Translations\",\"downloadLanguageButton\":\"Download as PDF\",\"downloadLanguageButtonAria\":\"Download as PDF in {language}\",\"downloadNewsletter\":\"Download newsletter\",\"newsletterLanguage\":\"Newsletter language\",\"selectLanguage\":\"Select a language\",\"content\":\"Guest Editor\",\"learn_more\":\"Learn More\",\"read_more\":\"Read More\",\"downloadTranslations\":\"Download translations\"},\"newsletter\":\"Newsletter\",\"sponsors\":\"Sponsors\",\"issue\":\"ISSUE {issue}\",\"volume\":\"VOLUME {volume}\",\"sponsors_description\":\"Short description of the section to provide users context and value of the content being featured in this carousel.\",\"read_more_newsletter\":\"Read more newsletters\",\"risk\":{\"internet_storm_center_spotlight\":\"Internet Storm Center Spotlight\",\"recent_security_issues\":\"Internet Storm Center Entries\",\"security_news\":\"Recent CVEs\",\"sponsors\":\"Sponsors\",\"read_more\":\"Read More\"},\"newsbites\":{\"top_of_the_news\":\"Top of the News\",\"rest_of_the_news\":\"The Rest of the Week's News\",\"view_older_issues\":\"View Older Issues\",\"view_older_issues_content\":\"Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.\",\"read_more_newsletter\":\"Browse Archive\",\"editorsNotes\":\"Editor's Notes\",\"internet_storm_center_tech_corner\":\"Internet Storm Center Tech Corner\",\"readMoreIn\":\"Read more in\",\"sponsors\":\"Sponsors\",\"read_more\":\"Read More\"}},\"languages\":{\"english\":\"English\",\"arabic\":\"Arabic\",\"bahasa\":\"Bahasa\",\"bosnian\":\"Bosnian\",\"bulgarian\":\"Bulgarian\",\"chineseSimplified\":\"Chinese Simplified\",\"chineseTraditionalTaiwanese\":\"Chinese Traditional Taiwanese\",\"danish\":\"Danish\",\"dutch\":\"Dutch\",\"farsi\":\"Farsi\",\"finnish\":\"Finnish\",\"frenchCanadian\":\"French Canadian\",\"french\":\"French\",\"georgian\":\"Georgian\",\"german\":\"German\",\"hebrew\":\"Hebrew\",\"hindi\":\"Hindi\",\"hungarian\":\"Hungarian\",\"indonesian\":\"Indonesian\",\"italian\":\"Italian\",\"japanese\":\"Japanese\",\"korean\":\"Korean\",\"latvian\":\"Latvian\",\"lithuanian\":\"Lithuanian\",\"malaysian\":\"Malaysian\",\"norwegian\":\"Norwegian\",\"persian\":\"Persian\",\"polish\":\"Polish\",\"portuguese\":\"Portuguese\",\"romanian\":\"Romanian\",\"russian\":\"Russian\",\"serbian\":\"Serbian\",\"spanish\":\"Spanish\",\"swedish\":\"Swedish\",\"turkish\":\"Turkish\",\"urdu\":\"Urdu\"},\"contactForm\":{\"title\":\"Connect with a Training Advisor\",\"paragraph\":\"Speak with one of our representatives to learn how SANS can support you and your organization's cybersecurity training needs.\",\"interestedIn\":\"What are you interested in?\",\"selectInterestedIn\":\"Select a service\",\"interestedDetails\":\"Anything specific?\",\"selectInterestedDetails\":\"Select a specific service\",\"interestedInSelectionError\":\"Please select an interest\",\"interests\":{\"individualTraining\":\"Individual Training\",\"teamDevelopment\":\"Team Development\",\"workforceSecurityCompliance\":\"Workforce Security \u0026 Compliance\",\"sponsorshipsPartnerships\":\"Sponsorships \u0026 Partnerships\"},\"interestDetails\":{\"coursesAndCertifications\":\"Courses \u0026 Certifications\",\"handsOnSimulations\":\"Hands-On Simulations\",\"learningPaths\":\"Learning Paths\",\"groupPurchasing\":\"Group Purchasing\",\"skillsAssessments\":\"Skills Assessments\",\"privateAndCustomTraining\":\"Private \u0026 Custom Training\",\"securityAwarenessTraining\":\"Security Awareness Training\",\"complianceTraining\":\"Compliance Training\",\"riskManagement\":\"Risk Management\",\"services\":\"Services\",\"sponsorResearch\":\"Sponsor Research\",\"sponsorAnEvent\":\"Sponsor an Event\",\"partnerWithSans\":\"Partner with SANS\"},\"firstName\":\"First Name\",\"lastName\":\"Last Name\",\"email\":\"Email\",\"phoneNumber\":\"Phone number\",\"organizationName\":\"Organization Name\",\"jobTitle\":\"Job Title\",\"industry\":\"Industry\",\"selectIndustry\":\"Select industry\",\"country\":\"Country\",\"selectCountry\":\"Select your country\",\"state\":\"State\",\"selectState\":\"Select your state\",\"selectStateError\":\"Please select your state\",\"message\":\"Message\",\"successMessage\":\"Thank you for contacting SANS! One of our team members will be reaching out shortly to discuss in further detail.\",\"errorGeneric\":\"Unable to process your contact request. Please try again later.\",\"submitNotice\":\"By providing this information, you agree to the processing of your personal data by SANS as described in our \u003clink\u003ePrivacy Policy\u003c/link\u003e.\",\"serverError\":\"Unable to process your contact form. Please try again later.\"},\"error\":{\"notFoundPage\":{\"ctaLabel\":\"Back to homepage\",\"title\":\"Looks like you`re trying to access a page or resource that has gone undercover\"},\"courseSinglePage\":{\"missingUsps\":\"We're updating our course schedule - please check back later.\"}},\"urls\":{\"login\":\"/account/login\",\"events\":\"/cyber-security-training-events\"},\"resourceCards\":{\"title\":{\"newsletter\":\"Newsletter\",\"blog_single_page\":\"Blog\",\"podcast_single_page\":\"Podcast\",\"open_source_tools_single\":\"Open Source Tools\",\"white_paper_single\":\"Whitepaper\",\"poster_and_cheat_sheet_single\":\"Poster \u0026 Cheat Sheets\",\"summit_presentation_single\":\"Summit Presentation\",\"policy_single_page\":\"Policy template\",\"webinar_single\":\"Webinar\"},\"icon\":{\"label\":{\"season\":\"Season {season}\",\"newsletterIssue\":\"Issue #{number}\",\"newsletterVolume\":\"Volume #{number}\"}}},\"notice\":{\"discountDeadlineLabel\":\"Hotel Group Discount Deadline\",\"refundDeadlineLabel\":\"Refund Deadline\",\"title\":\"Important Dates\",\"earlyBirdTitle\":\"Early Bird Offer\",\"earlyBirdDescription\":\"Save {discount} {currencyType} using the code \\\"{couponCode}\\\" and pay for any 4-6 day course (excluding Beta Courses and 300 Level Courses) by {validUntilDate}.\"}},\"children\":\"$L1a\"}]\n"])</script><script>self.__next_f.push([1,"7:null\n1a:[\"$\",\"$L1b\",null,{\"defaultTheme\":\"system\",\"enableColorScheme\":false,\"children\":[[\"$\",\"$L1c\",null,{}],[\"$\",\"$L1d\",null,{}],\"$L1e\",[\"$\",\"main\",null,{\"id\":\"main\",\"children\":[\"$\",\"$L3\",null,{\"parallelRouterKey\":\"children\",\"error\":\"$1f\",\"errorStyles\":[],\"errorScripts\":[],\"template\":[\"$\",\"$L4\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":[\"$L20\",[]],\"forbidden\":\"$undefined\",\"unauthorized\":\"$undefined\"}]}],\"$L21\"]}]\n"])</script><script>self.__next_f.push([1,"20:[\"$\",\"div\",null,{\"className\":\"c-not-found-section\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-grid not-found-section__hero grid--has-container grid--columns-12\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-start-1 grid__item--col-start-tablet-2 grid__item--col-start-desktop-4 grid__item--col-end-13 grid__item--col-end-tablet-12 grid__item--col-end-desktop-10 not-found-section__details\",\"children\":[[\"$\",\"h1\",null,{\"className\":\"c-heading heading--is-h3 heading--is-h3-desktop not-found-section__title\",\"children\":\"Looks like the page you're looking for doesn't exist or has moved.\"}],[\"$\",\"$L22\",null,{\"asElement\":\"$23\",\"href\":\"/\",\"icon\":\"arrow-right-heavy\",\"variant\":\"primary\",\"children\":\"Redirect to homepage\"}],false]}],[\"$\",\"span\",null,{\"className\":\"not-found-section__code\",\"children\":\"404\"}]]}],false]}]\n"])</script><script>self.__next_f.push([1,"9:{\"metadata\":[[\"$\",\"title\",\"0\",{\"children\":\"Offensive Operations, Pen Testing and Red Teaming Training | SANS Institute\"}],[\"$\",\"meta\",\"1\",{\"name\":\"description\",\"content\":\"Training in penetration testing, red teaming, purple teaming, and exploit development, provides the skills needed to simulate real-world attacks, evade defenses, and enhance security through adversary emulation and improving defense strategies. \"}],[\"$\",\"meta\",\"2\",{\"name\":\"language\",\"content\":\"en\"}],[\"$\",\"link\",\"3\",{\"rel\":\"canonical\",\"href\":\"https://www.sans.org/cybersecurity-focus-areas/offensive-operations\"}],[\"$\",\"meta\",\"4\",{\"property\":\"og:title\",\"content\":\"Offensive Security Training, Courses \u0026 Certifications\"}],[\"$\",\"meta\",\"5\",{\"property\":\"og:description\",\"content\":\"Training in penetration testing, red teaming, purple teaming, and exploit development, provides the skills needed to simulate real-world attacks, evade defenses, and enhance security through adversary emulation and improving defense strategies. \"}],[\"$\",\"meta\",\"6\",{\"property\":\"og:url\",\"content\":\"https://www.sans.org/cybersecurity-focus-areas/offensive-operations\"}],[\"$\",\"meta\",\"7\",{\"property\":\"og:site_name\",\"content\":\"SANS Institute\"}],[\"$\",\"meta\",\"8\",{\"property\":\"og:type\",\"content\":\"website\"}],[\"$\",\"meta\",\"9\",{\"name\":\"twitter:card\",\"content\":\"summary\"}],[\"$\",\"meta\",\"10\",{\"name\":\"twitter:site\",\"content\":\"@SANSInstitute\"}],[\"$\",\"meta\",\"11\",{\"name\":\"twitter:title\",\"content\":\"Offensive Security Training, Courses \u0026 Certifications\"}],[\"$\",\"meta\",\"12\",{\"name\":\"twitter:description\",\"content\":\"Training in penetration testing, red teaming, purple teaming, and exploit development, provides the skills needed to simulate real-world attacks, evade defenses, and enhance security through adversary emulation and improving defense strategies. \"}],[\"$\",\"link\",\"13\",{\"rel\":\"icon\",\"href\":\"/favicon.ico\",\"type\":\"image/x-icon\",\"sizes\":\"48x48\"}],[\"$\",\"link\",\"14\",{\"rel\":\"icon\",\"href\":\"/icon1.png?2951f2f1b780f8ac\",\"type\":\"image/png\",\"sizes\":\"96x96\"}],[\"$\",\"$L24\",\"15\",{}]],\"error\":null,\"digest\":\"$undefined\"}\n"])</script><script>self.__next_f.push([1,"e:\"$9:metadata\"\n"])</script><script>self.__next_f.push([1,"21:[\"$\",\"footer\",null,{\"className\":\"c-footer\",\"id\":\"footer\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-container\",\"children\":[\"$L25\",[\"$\",\"$L26\",null,{\"navigation\":[{\"items\":[{\"href\":\"/about\",\"isExternalLink\":false,\"label\":\"About\",\"target\":\"$undefined\"},{\"href\":\"/instructors\",\"isExternalLink\":false,\"label\":\"Instructors\",\"target\":\"$undefined\"},{\"href\":\"/mlp/careers\",\"isExternalLink\":false,\"label\":\"Careers\",\"target\":\"$undefined\"},{\"href\":\"/press\",\"isExternalLink\":false,\"label\":\"Press\",\"target\":\"$undefined\"}],\"label\":\"Company\"},{\"items\":[{\"href\":\"/about/contact\",\"isExternalLink\":false,\"label\":\"Contact\",\"target\":\"_self\"},{\"href\":\"/frequently-asked-questions\",\"isExternalLink\":false,\"label\":\"FAQs\",\"target\":\"_self\"},{\"href\":\"https://partnerportal.sans.org/?_gl=1*leto7p*_gcl_aw*R0NMLjE3NDQ3OTUxNjYuQ2owS0NRandxdjJfQmhDMEFSSXNBRmI1QWM4TW5jZzYyX2tYRWxBNTJTV2c5TmZHRlF5RTNGaG96X09rM2laRXJ2RDd0NHR0UXdsLVBBVWFBdXN6RUFMd193Y0I.*_ga*MTEwOTM1MTUzLjE3MzYxODIwNzQ.*_ga_18EC69JQ0P*MTc0NTU5MTYxOC4yNzAuMS4xNzQ1NTk3MDgyLjQzLjAuMA..\",\"isExternalLink\":true,\"label\":\"Partner Portal\",\"target\":\"_self\"},{\"href\":\"/legal\",\"isExternalLink\":false,\"label\":\"Legal\",\"target\":\"_self\"}],\"label\":\"Help \u0026 Support\"},{\"items\":[{\"href\":\"/work-study-program\",\"isExternalLink\":false,\"label\":\"Work Study Program\",\"target\":\"$undefined\"},{\"href\":\"/mlp/cyber-academies\",\"isExternalLink\":false,\"label\":\"Academies \u0026 Programs\",\"target\":\"$undefined\"},{\"href\":\"/partnerships\",\"isExternalLink\":false,\"label\":\"Workforce Development Partnerships\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/public-sector/state-local-le-program\",\"isExternalLink\":false,\"label\":\"Law Enforcement\",\"target\":\"$undefined\"},{\"href\":\"/mlp/skillsfuture-singapore\",\"isExternalLink\":false,\"label\":\"SkillsFuture Singapore\",\"target\":\"$undefined\"},{\"href\":\"https://www.sans.edu/\",\"isExternalLink\":true,\"label\":\"Degree Programs\",\"target\":\"$undefined\"}],\"label\":\"Training Programs\"},{\"items\":[{\"href\":\"/member-benefits\",\"isExternalLink\":false,\"label\":\"Become a SANS Member\",\"target\":\"$undefined\"},{\"href\":\"/teach\",\"isExternalLink\":false,\"label\":\"Become an Instructor\",\"target\":\"$undefined\"},{\"href\":\"/sponsorship\",\"isExternalLink\":false,\"label\":\"Become a Sponsor\",\"target\":\"$undefined\"},{\"href\":\"/cyber-security-summit/speak-at-a-summit\",\"isExternalLink\":false,\"label\":\"Speak at a Summit\",\"target\":\"$undefined\"},{\"href\":\"/about/awards\",\"isExternalLink\":false,\"label\":\"Award Programs\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/cyber-leaders-network\",\"isExternalLink\":false,\"label\":\"Join the Cyber Leaders Network\",\"target\":\"$undefined\"}],\"label\":\"Get Involved\"}],\"title\":\"The Highest Standard in Cybersecurity Education Since 1989\"}],\"$L27\"]}]}]\n"])</script><script>self.__next_f.push([1,"28:T5f7,"])</script><script>self.__next_f.push([1,"M7.53 13.095C4.945 9.15 2.576 6.678 2.576 3.947c0-1.994 1.008-3.22 2.588-3.22 2.323 0 4.252 3.514 4.778 9.744h.734V.433H9.94l-.965 1.91C7.926.91 6.521 0 5.163 0 2.488.001.339 2.624.339 7.263c0 4.9 2.149 8.205 4.691 12.021 2.763 4.117 4.385 7.18 4.385 9.652 0 1.95-1.184 3.048-2.762 3.048-2.893 0-5.48-3.86-5.744-11.302H0v12.114h.91l1.183-2.306C3.583 32.224 4.986 33 6.828 33c3.157 0 5.394-3.124 5.394-8.196 0-4.076-1.886-7.503-4.691-11.709m51.9 19.038c-2.544 0-4.852-3.143-5.55-8.682h6.514c1.16 2.078 1.8 3.926 1.8 5.477 0 1.951-1.184 3.206-2.764 3.206m-23.353-9.72V5.898l7.23 16.514h-7.23zm-1.225 4.6c0 3.076-.014 4.572-2.208 4.572h-1.388l-1.43-8.133h5.026zm-15.504-4.6 2.744-16.062 2.656 16.062zm40.96-9.318c-2.586-3.945-4.953-6.417-4.953-9.148 0-1.994 1.007-3.22 2.585-3.22 2.325 0 4.254 3.514 4.78 9.744h.659V.433h-.66l-.964 1.91C60.703.91 59.3 0 57.94 0c-2.674 0-4.822 2.623-4.822 7.262 0 4.899 2.148 8.3 4.691 12.117.708 1.055 1.341 2.167 1.89 3.033h-5.94c-.033-.692-.056-.866-.071-1.731h-.984v1.73h-4.201V5.032c0-2.731.175-3.73 2.45-3.685V.433h-6.825v.913c2.1 0 2.976 1.258 2.976 4.119v14.352L39.308.433h-6.382V1.3h1.924v21.113h-5.238L25.773.433h-3.859L16.57 27.12c-.527 2.687-.442 4.054-3.068 4.445v.886h7.175v-.886c-1.924-.044-2.448-.565-2.448-1.952 0-.607.047-1.13.09-1.519l.793-4.643h5.875l1.316 8.134h-2.475v.866h15.926v-.886c-2.45-.174-3.676-1.562-3.676-4.813V23.45h7.736l3.784 9h.906v-9h4.201v9.345h.984l1.184-2.307C56.362 32.225 57.765 33 59.607 33 62.763 33 65 29.876 65 24.804c0-4.076-1.886-7.503-4.691-11.709z"])</script><script>self.__next_f.push([1,"27:[\"$\",\"div\",null,{\"className\":\"footer__copy\",\"children\":[[\"$\",\"$L23\",null,{\"aria-label\":\"Go to homepage\",\"className\":\"footer__copy-logo-link\",\"href\":\"/\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__copy-logo\",\"height\":\"$undefined\",\"width\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 65 33\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"$28\"}]}]}],[\"$\",\"nav\",null,{\"aria-label\":\"Social Navigation\",\"className\":\"footer__socials\",\"children\":[[\"$\",\"$L23\",\"0\",{\"aria-label\":\"LinkedIn\",\"className\":\"footer__socials-link\",\"href\":\"https://www.linkedin.com/company/sans-institute\",\"title\":\"LinkedIn\",\"target\":\"_blank\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"M26.154 4H5.846A1.846 1.846 0 0 0 4 5.846v20.308A1.846 1.846 0 0 0 5.846 28h20.308A1.846 1.846 0 0 0 28 26.154V5.846A1.846 1.846 0 0 0 26.154 4m0 22.154H5.846V5.846h20.308zm-13.846-12v7.384a.923.923 0 0 1-1.847 0v-7.384a.923.923 0 0 1 1.847 0m10.154 3.23v4.154a.923.923 0 1 1-1.847 0v-4.153a2.308 2.308 0 1 0-4.615 0v4.153a.923.923 0 0 1-1.846 0v-7.384a.923.923 0 0 1 1.822-.206 4.153 4.153 0 0 1 6.486 3.437m-9.693-6.46a1.385 1.385 0 1 1-2.77-.001 1.385 1.385 0 0 1 2.77 0\"}]}]}],[\"$\",\"$L23\",\"1\",{\"aria-label\":\"X\",\"className\":\"footer__socials-link\",\"href\":\"https://x.com/SANSInstitute\",\"title\":\"X\",\"target\":\"_blank\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"m26.838 26.45-7.82-12.29 7.716-8.489a1 1 0 0 0-1.479-1.344l-7.35 8.085-5.058-7.949A1 1 0 0 0 12.004 4H6.007a1 1 0 0 0-.843 1.537l7.82 12.288-7.716 8.495a.999.999 0 1 0 1.479 1.344l7.35-8.085 5.058 7.949a1 1 0 0 0 .844.457h5.996a1 1 0 0 0 .843-1.535m-6.291-.464L7.827 6h3.623l12.725 19.987z\"}]}]}],[\"$\",\"$L23\",\"2\",{\"aria-label\":\"YouTube\",\"className\":\"footer__socials-link\",\"href\":\"https://www.youtube.com/@SANSInstitute\",\"title\":\"YouTube\",\"target\":\"_blank\",\"children\":\"$L29\"}],\"$L2a\",\"$L2b\"]}],\"$L2c\"]}]\n"])</script><script>self.__next_f.push([1,"29:[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"m20.555 15.168-6-4A1 1 0 0 0 13 12v8a1 1 0 0 0 1.555.832l6-4a1 1 0 0 0 0-1.665M15 18.13v-4.256L18.198 16zM29.291 8.69a3 3 0 0 0-1.811-2.05C23.195 4.985 16.375 5 16 5S8.805 4.985 4.52 6.64a3 3 0 0 0-1.811 2.05C2.385 9.938 2 12.218 2 16s.385 6.063.709 7.31a3 3 0 0 0 1.811 2.051C8.625 26.945 15.05 27 15.918 27h.165c.867 0 7.296-.055 11.397-1.639a3 3 0 0 0 1.811-2.051c.324-1.25.709-3.527.709-7.31s-.385-6.062-.709-7.31m-1.936 14.125a1 1 0 0 1-.596.686c-3.957 1.528-10.685 1.5-10.75 1.5H16c-.068 0-6.791.025-10.75-1.5a1 1 0 0 1-.596-.686C4.35 21.674 4 19.571 4 16s.35-5.674.645-6.809a1 1 0 0 1 .596-.691C9.056 7.026 15.45 7 15.973 7h.033c.068 0 6.798-.022 10.75 1.5a1 1 0 0 1 .596.686C27.65 10.326 28 12.43 28 16s-.35 5.674-.645 6.809z\"}]}]\n"])</script><script>self.__next_f.push([1,"2a:[\"$\",\"$L23\",\"3\",{\"aria-label\":\"Facebook\",\"className\":\"footer__socials-link\",\"href\":\"https://www.facebook.com/sansinstitute/\",\"title\":\"Facebook\",\"target\":\"_blank\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"M16 4a12 12 0 1 0 12 12A12.013 12.013 0 0 0 16 4m.923 22.111V18.77h2.77a.923.923 0 1 0 0-1.846h-2.77v-2.77a1.846 1.846 0 0 1 1.846-1.845h1.846a.923.923 0 0 0 0-1.847H18.77a3.69 3.69 0 0 0-3.692 3.693v2.77h-2.77a.923.923 0 1 0 0 1.845h2.77v7.342a10.154 10.154 0 1 1 1.846 0\"}]}]}]\n"])</script><script>self.__next_f.push([1,"2b:[\"$\",\"$L23\",\"4\",{\"aria-label\":\"Tik Tok\",\"className\":\"footer__socials-link\",\"href\":\"https://www.tiktok.com/@sansinstituteofficial\",\"title\":\"Tik Tok\",\"target\":\"_blank\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"M28,9c-3.3,0-6-2.7-6-6,0-.6-.4-1-1-1h-5c-.6,0-1,.4-1,1v16.5c0,1.4-1.1,2.5-2.5,2.5s-2.5-1.1-2.5-2.5c0-1,.6-1.8,1.4-2.3.3-.2.6-.5.6-.9v-5.3c0-.6-.4-1-1-1,0,0-.1,0-.2,0-4.5.8-7.8,4.9-7.8,9.5s4.3,9.5,9.5,9.5,9.5-4.3,9.5-9.5v-5c1.9,1,3.9,1.5,6,1.5.6,0,1-.4,1-1v-5c0-.6-.4-1-1-1ZM27,14c-2-.2-3.8-.9-5.4-2-.4-.3-1.1-.2-1.4.2-.1.2-.2.4-.2.6v6.8c0,4.1-3.4,7.5-7.5,7.5s-7.5-3.4-7.5-7.5,2.1-6.1,5-7.2v3.5c-2.1,1.4-2.6,4.2-1.2,6.2,1.4,2.1,4.2,2.6,6.2,1.2,1.2-.8,2-2.2,2-3.7V4h3.1c.5,3.6,3.3,6.5,6.9,6.9v3Z\"}]}]}]\n"])</script><script>self.__next_f.push([1,"2c:[\"$\",\"small\",null,{\"className\":\"footer__copy-nav\",\"children\":[[\"$\",\"div\",null,{\"className\":\"footer__copyright\",\"children\":[\"$\",\"nav\",null,{\"aria-label\":\"Legal navigation\",\"className\":\"footer__copy-nav-list\",\"children\":[[\"$\",\"$L23\",\"0\",{\"className\":\"footer__copy-nav-list-link\",\"href\":\"/legal/privacy\",\"target\":\"_blank\",\"children\":\"Privacy Policy\"}],[\"$\",\"$L23\",\"1\",{\"className\":\"footer__copy-nav-list-link\",\"href\":\"/legal/terms-conditions\",\"target\":\"$undefined\",\"children\":\"Terms and Conditions\"}],[\"$\",\"$L23\",\"2\",{\"className\":\"footer__copy-nav-list-link\",\"href\":\"/legal/do-not-share-sell\",\"target\":\"_blank\",\"children\":\"Do Not Sell/Share My Personal Information\"}],[\"$\",\"$L23\",\"3\",{\"className\":\"footer__copy-nav-list-link\",\"href\":\"/legal/cookie-notice\",\"target\":\"$undefined\",\"children\":\"Cookie Notice\"}]]}]}],[\"$\",\"div\",null,{\"className\":\"footer__trademark\",\"children\":[[\"$\",\"span\",null,{\"className\":\"c-text footer__copy-nav-trademark\",\"children\":[\"© \",2026,\" \",\"The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute.\"]}],[\"$\",\"span\",null,{\"className\":\"c-text footer__copy-nav-trademark\",\"children\":[\"Our \",[\"$\",\"$L23\",null,{\"href\":\"/legal/terms-conditions\",\"children\":\"Terms and Conditions\"}],\" detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.\"]}]]}]]}]\n"])</script><script>self.__next_f.push([1,"1e:[\"$\",\"$L2d\",null,{\"children\":[false,false,[\"$\",\"$L2e\",null,{\"headerData\":{\"headerCta\":{\"href\":\"/about/contact#connect-with-a-training-advisor\",\"label\":\"Contact Sales\",\"size\":\"regular\",\"target\":\"_top\",\"variant\":\"primary\"},\"logo\":\"logo\",\"menuItems\":[{\"bottomBar\":{\"cta\":{\"href\":\"/course-preview\",\"isExternalLink\":false,\"label\":\"Learn More\",\"target\":\"$undefined\"},\"description\":\"Experience SANS training through course previews.\",\"title\":\"Get a Free Hour of SANS Training\"},\"featuredItemCard\":{\"title\":\"Featured Course\",\"courseCard\":{\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/applied-data-science-machine-learning#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/applied-data-science-machine-learning\"}},\"image\":{\"alt\":\"SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC595\",\"focusArea\":\"Cyber Defense, Artificial Intelligence\"},\"title\":\"SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals\"},\"cta\":{\"href\":\"/cyber-security-courses\",\"label\":\"View All Courses\",\"size\":\"$undefined\",\"target\":\"$undefined\",\"variant\":\"$undefined\"}},\"href\":\"/cyber-security-training-overview\",\"itemsSingle\":[{\"description\":\"Build cyber prowess with training from renowned experts\",\"href\":\"/cybersecurity-courses\",\"icon\":\"courses-cards-three\",\"label\":\"Courses\",\"target\":\"$undefined\"},{\"description\":\"Multiple training options to best fit your schedule and preferred learning style\",\"href\":\"/cyber-security-training-formats\",\"icon\":\"training\",\"label\":\"Ways to Train\",\"target\":\"$undefined\"},{\"description\":\"Hands-on training to keep you at the top of your game\",\"href\":\"/cyber-ranges\",\"icon\":\"hands-on-solutions\",\"label\":\"Cyber Ranges\",\"target\":\"$undefined\"},{\"description\":\"Expert-led training at locations around the world\",\"href\":\"/cyber-security-training-events\",\"icon\":\"location\",\"label\":\"Training Events \u0026 Summits\",\"target\":\"_self\"},{\"description\":\"Demonstrate cybersecurity expertise with GIAC certifications\",\"href\":\"/cyber-security-certifications\",\"icon\":\"sealcheck-certification\",\"label\":\"Certifications\",\"target\":\"$undefined\"},{\"description\":\"Upcoming workshops, webinars and local events\\n\",\"href\":\"/free-cybersecurity-events\",\"icon\":\"calendar-check\",\"label\":\"Free Training Events\",\"target\":\"$undefined\"},{\"description\":\"Harden enterprise security with end-user and role-based training\",\"href\":\"/for-organizations/workforce\",\"icon\":\"shield-workforce\",\"label\":\"Workforce Security and Risk Training \",\"target\":\"$undefined\"},{\"description\":\"Train with world-class cybersecurity experts who bring real-world expertise to class.\",\"href\":\"/instructors\",\"icon\":\"user-private-training\",\"label\":\"Meet Our Instructors\",\"target\":\"$undefined\"}],\"label\":\"Training\"},{\"bottomBar\":{\"cta\":{\"href\":\"/about/contact\",\"isExternalLink\":false,\"label\":\"Contact us\",\"target\":\"$undefined\"},\"description\":\"Let us help.\",\"title\":\"Can't find what you are looking for?\"},\"featuredItemCard\":{\"title\":\"Featured\",\"learningPathsCard\":{\"cta\":{\"href\":\"/cybersecurity-focus-areas/ai\",\"label\":\"Learn more\"},\"description\":\"Artificial Intelligence (AI) Cyber Security Training and Resources Ensure professionals at every level are prepared to navigate the complexities of an AI-driven future, equipping them with critical understanding of AI-powered threats and the skills to leverage AI to enhance security operations.\",\"focusArea\":\"ai\",\"icon\":\"related\",\"title\":\"NEW - AI Security Training\"},\"cta\":{\"href\":\"/cybersecurity-focus-areas\",\"label\":\"View all Focus Areas\",\"size\":\"$undefined\",\"target\":\"$undefined\",\"variant\":\"$undefined\"}},\"href\":\"/learning-paths\",\"itemsSingle\":[{\"description\":\"Chart your path to job-specific training courses\",\"href\":\"/cybersecurity-focus-areas\",\"icon\":\"focus\",\"label\":\"By Focus Area\",\"target\":\"$undefined\"},{\"description\":\"Give your cybersecurity career the right foundation for success\",\"href\":\"/mlp/new-to-cyber\",\"icon\":\"new\",\"label\":\"New to Cyber\",\"target\":\"$undefined\"},{\"description\":\"Find the courses and certifications that align with our current or desired role\",\"href\":\"/job-roles\",\"icon\":\"briefcase-management\",\"label\":\"By Job Role\",\"target\":\"$undefined\"},{\"description\":\"Training designed to help security leaders reduce organizational risk\",\"href\":\"/cybersecurity-focus-areas/leadership\",\"icon\":\"ranking\",\"label\":\"Leadership\",\"target\":\"$undefined\"},{\"description\":\"Explore how SANS courses align with leading cybersecurity skills frameworks including NICE, ECSF and DoD 8140\",\"href\":\"/frameworks-and-directives\",\"icon\":\"atom\",\"label\":\"By Skills Framework or Directive\",\"target\":\"$undefined\"},{\"description\":\"Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.\",\"href\":\"https://www.sans.edu/\",\"icon\":\"degree\",\"label\":\"Degree and Certificate Programs\",\"target\":\"$undefined\"},{\"description\":\"Find the right training path based on critical skills\",\"href\":\"/cyber-security-skills-roadmap\",\"icon\":\"learning-paths\",\"label\":\"By Skills Roadmap\",\"target\":\"$undefined\"}],\"label\":\"Learning Paths\"},{\"bottomBar\":{\"cta\":{\"href\":\"/member-benefits\",\"isExternalLink\":false,\"label\":\"Sign Up\",\"target\":\"$undefined\"},\"description\":\"Become a member for instant access to our free resources.\",\"title\":\"Join the SANS Community\"},\"featuredItems\":[{\"description\":\"Connect, learn, and share with other cybersecurity professionals\",\"icon\":\"new\",\"href\":\"/member-benefits\",\"isExternalLink\":false,\"label\":\"SANS Community Benefits\",\"target\":\"$undefined\"},{\"description\":\"Discover how organizations and individual cyber practitioners use SANS training and GIAC certifications\",\"icon\":\"people-3\",\"href\":\"/customer-reviews\",\"isExternalLink\":false,\"label\":\"Customer Case Studies\",\"target\":\"$undefined\"},{\"description\":\"Explore expert-driven guidance, training, and tools to help defend against AI-powered threats and adopt AI securely\",\"icon\":\"head\",\"href\":\"/artificial-intelligence\",\"isExternalLink\":false,\"label\":\"AI Risk \u0026 Readiness\",\"target\":\"$undefined\"}],\"href\":\"/security-resources\",\"itemsMultiple\":[{\"cta\":{\"href\":\"/security-resources/watch-and-listen\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Watch \u0026 Listen\",\"navigation\":[{\"href\":\"/webcasts\",\"isExternalLink\":false,\"label\":\"Webinars\",\"target\":\"$undefined\"},{\"href\":\"/presentations\",\"isExternalLink\":false,\"label\":\"Summit Presentations\",\"target\":\"$undefined\"},{\"href\":\"/podcasts\",\"isExternalLink\":false,\"label\":\"Podcasts \u0026 Live Streams\",\"target\":\"$undefined\"}]},{\"cta\":{\"href\":\"/security-resources/read\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Read\",\"navigation\":[{\"href\":\"/blog\",\"isExternalLink\":false,\"label\":\"Blog\",\"target\":\"$undefined\"},{\"href\":\"/newsletters\",\"isExternalLink\":false,\"label\":\"Newsletters\",\"target\":\"$undefined\"},{\"href\":\"https://isc.sans.edu/\",\"isExternalLink\":true,\"label\":\"Internet Storm Center\",\"target\":\"_blank\"}]},{\"cta\":{\"href\":\"/security-resources/download\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Download\",\"navigation\":[{\"href\":\"/tools\",\"isExternalLink\":false,\"label\":\"Open Source Tools\",\"target\":\"$undefined\"},{\"href\":\"/posters\",\"isExternalLink\":false,\"label\":\"Posters \u0026 Cheat Sheets\",\"target\":\"$undefined\"},{\"href\":\"/information-security-policy\",\"isExternalLink\":false,\"label\":\"Policy Templates\",\"target\":\"$undefined\"},{\"href\":\"/white-papers\",\"isExternalLink\":false,\"label\":\"White Papers\",\"target\":\"$undefined\"}]}],\"label\":\"Free Resources\"},{\"bottomBar\":{\"cta\":{\"href\":\"/about/contact\",\"isExternalLink\":false,\"label\":\"Contact Us\",\"target\":\"$undefined\"},\"description\":\"We're here to help.\",\"title\":\"Interested in developing a training plan to fit your organization’s needs?\"},\"featuredItems\":[{\"description\":\"Mission-focused cybersecurity training for government, defense, and education\",\"icon\":\"building-office-enterprise\",\"href\":\"/for-organizations/public-sector\",\"isExternalLink\":false,\"label\":\"Public Sector\",\"target\":\"$undefined\"},{\"description\":\"Explore industry-specific programming and customized training solutions\",\"icon\":\"people-2\",\"href\":\"/partnerships\",\"isExternalLink\":false,\"label\":\"Partnerships\",\"target\":\"$undefined\"},{\"description\":\"Sponsor a SANS event or research paper\",\"icon\":\"info\",\"href\":\"/sponsorship\",\"isExternalLink\":false,\"label\":\"Sponsorship Opportunities\",\"target\":\"$undefined\"}],\"href\":\"/for-organizations\",\"itemsMultiple\":[{\"cta\":{\"href\":\"/for-organizations/team-development\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Team Development\",\"navigation\":[{\"href\":\"/for-organizations/team-development/why-partner-with-sans\",\"isExternalLink\":false,\"label\":\"Why Partner with SANS\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/team-development/group-purchasing\",\"isExternalLink\":false,\"label\":\"Group Purchases\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/team-development/cybersecurity-assessments\",\"isExternalLink\":false,\"label\":\"Skills \u0026 Talent Assessments\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/team-development/private-training\",\"isExternalLink\":false,\"label\":\"Private \u0026 Custom Training Programs\",\"target\":\"$undefined\"}]},{\"cta\":{\"href\":\"/cybersecurity-focus-areas/leadership\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Leadership Development\",\"navigation\":[{\"href\":\"/cyber-security-courses?refinementList%5Bfacets.focusArea%5D%5B0%5D=Cybersecurity%20Leadership\",\"isExternalLink\":true,\"label\":\"Management Courses \u0026 Accreditation\",\"target\":\"$undefined\"},{\"href\":\"/cyber-ranges/cyber-crisis-exercises\",\"isExternalLink\":false,\"label\":\"Cyber Crisis Exercises\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/cyber-leaders-network\",\"isExternalLink\":false,\"label\":\"SANS Cyber Leaders Network\",\"target\":\"$undefined\"}]},{\"cta\":{\"href\":\"/for-organizations/workforce\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Workforce Security \u0026 Risk\",\"navigation\":[{\"href\":\"/for-organizations/workforce/security-awareness-training\",\"isExternalLink\":false,\"label\":\"Security Awareness Training\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/workforce/compliance-training\",\"isExternalLink\":false,\"label\":\"Compliance Training\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/workforce/risk-management\",\"isExternalLink\":false,\"label\":\"Risk Management\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/workforce/services\",\"isExternalLink\":false,\"label\":\"Services\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/workforce/resources\",\"isExternalLink\":false,\"label\":\"Resources\",\"target\":\"$undefined\"}]}],\"label\":\"For Organizations\"}],\"topbar\":{\"navigation\":[{\"href\":\"/account/login\",\"isExternalLink\":true,\"label\":\"Log In\",\"target\":\"_self\",\"icon\":\"login\",\"dropdownNavigation\":[]},{\"href\":\"/account/create\",\"isExternalLink\":true,\"label\":\"Join - It's Free\",\"target\":\"$undefined\",\"icon\":\"new\",\"dropdownNavigation\":[]}]}},\"algoliaGlobalSearch\":{\"apiKey\":\"efc23343b7c48a65f7ddba6f07e3c086\",\"appId\":\"M2CVJC95IX\",\"url\":\"m2cvjc95ix-dsn.algolia.net\"}}]]}]\n"])</script><script>self.__next_f.push([1,"2f:I[53983,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"AnimateInWrapper\"]\n"])</script><script>self.__next_f.push([1,"30:I[48253,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1044\",\"static/chunks/1044-687250a180f48329.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1049\",\"static/chunks/1049-097a54a192c2924a.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"9633\",\"static/chunks/9633-b2d87d5d19bd0ffd.js\",\"8861\",\"static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js\"],\"Breadcrumbs\"]\n"])</script><script>self.__next_f.push([1,"31:I[31299,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"Image\"]\n"])</script><script>self.__next_f.push([1,"32:I[54067,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1044\",\"static/chunks/1044-687250a180f48329.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1049\",\"static/chunks/1049-097a54a192c2924a.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"9633\",\"static/chunks/9633-b2d87d5d19bd0ffd.js\",\"8861\",\"static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js\"],\"default\"]\n"])</script><script>self.__next_f.push([1,"34:I[74889,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"default\"]\n"])</script><script>self.__next_f.push([1,"11:[[\"$\",\"div\",null,{\"className\":\"secondary-hero secondary-hero--has-sticky-links secondary-hero--has-image\",\"children\":[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-grid grid--has-container grid--columns-6 grid--columns-tablet-8 grid--columns-desktop-12\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-6 grid__item--col-span-tablet-4 grid__item--col-span-desktop-6 secondary-hero__text-grid-item\",\"children\":[\"$\",\"$L2f\",null,{\"className\":\"secondary-hero__animate-in-content\",\"children\":[[\"$\",\"$L30\",null,{\"className\":\"secondary-hero__breadcrumbs\",\"data\":[{\"href\":\"/cybersecurity-focus-areas\",\"title\":\"Cybersecurity Focus Areas\"},{\"href\":\"/cybersecurity-focus-areas/offensive-operations\",\"title\":\"Offensive Operations, Pen Testing and Red Teaming Training\"}]}],[\"$\",\"div\",null,{\"className\":\"secondary-hero__content-wrappper\",\"children\":[[\"$\",\"div\",null,{\"className\":\"secondary-hero__body\",\"children\":[[\"$\",\"h1\",null,{\"className\":\"c-heading secondary-hero__title\",\"children\":\"Offensive Operations, Pen Testing and Red Teaming Training\"}],\"\",\"\"]}],\"$undefined\",\"$undefined\"]}]]}]}],[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-start-1 grid__item--col-start-tablet-7 grid__item--col-start-desktop-9 grid__item--col-end-7 grid__item--col-end-tablet-13 grid__item--col-end-desktop-13 secondary-hero__image-grid-item\",\"children\":[\"$\",\"div\",null,{\"className\":\"secondary-hero__image-container\",\"children\":[[\"$\",\"div\",null,{\"className\":\"c-background-rings\",\"style\":{\"--ring-color\":\"var(--color-focusarea-offensive-operations)\"},\"children\":[[\"$\",\"div\",\"ring-default-0\",{\"className\":\"background-rings__ring background-rings__ring--default\"}],[\"$\",\"div\",\"ring-default-1\",{\"className\":\"background-rings__ring background-rings__ring--default\"}],[\"$\",\"div\",\"ring-default-2\",{\"className\":\"background-rings__ring background-rings__ring--default\"}]]}],[\"$\",\"div\",null,{\"className\":\"secondary-hero__image-holder\",\"children\":[[\"$\",\"$L31\",null,{\"fill\":true,\"priority\":true,\"alt\":\"Offensive Operations, Pen Testing and Red Teaming Training\",\"className\":\"secondary-hero__image\",\"sizes\":\"300px, (min-width: 768px) 445px\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta4a25012372634f9/681a1e0ca6dd347dde228136/Offensive_Operations_Landing_Page_890x890.png\"}],\"$undefined\"]}],\"$undefined\"]}]}]]}]}],[\"$\",\"$L32\",null,{\"ctaOne\":\"$undefined\",\"ctaTwo\":\"$undefined\",\"jumpLabel\":\"\",\"links\":[{\"label\":\"Related Courses\",\"tag\":\"#related-courses\"},{\"label\":\"Instructors\",\"tag\":\"#instructors\"},{\"label\":\"Featured Content\",\"tag\":\"#featured-content\"},{\"label\":\"FAQs\",\"tag\":\"#faqs\"}]}],[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-stacked-wrapper stacked-wrapper--has-spacing-top u-bg-color-surface-primary\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-stacked-wrapper u-bg-color-surface-primary c-dynamic-content-wrapper\",\"children\":[\"$@33\"]}],[\"$\",\"$L2f\",null,{\"children\":[\"$\",\"section\",null,{\"className\":\"c-container c-promotional-icon-block\",\"id\":\"$undefined\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-grid c-headline promotional-icon-block__headline grid--columns-6 grid--columns-tablet-12\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-6 grid__item--col-span-tablet-9 headline__content\",\"children\":[[\"$\",\"div\",null,{\"className\":\"headline__title-wrapper\",\"children\":[\"$undefined\",[\"$\",\"h2\",null,{\"className\":\"c-heading heading--is-h3 heading--is-h3-desktop headline__title\",\"children\":\"What You'll Learn\"}]]}],\"\"]}],false]}],[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-grid promotional-icon-block__grid grid--columns-12\",\"children\":[[\"$\",\"div\",\"0\",{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-12 grid__item--col-span-tablet-4 promotional-icon-block__item\",\"children\":[[\"$\",\"h3\",null,{\"className\":\"promotional-icon-block__item-title\",\"children\":\"Penetration Testing\"}],[\"$\",\"p\",null,{\"className\":\"promotional-icon-block__item-description\",\"children\":\"Use real-world tactics, tools and methodologies to identify, exploit, and remediate security vulnerabilities.\"}],\"$undefined\",[\"$\",\"$L34\",null,{\"className\":\"promotional-icon-block__item-icon\",\"name\":\"crosshair\",\"size\":24}]]}],\"$L35\",\"$L36\"]}],\"$undefined\"]}]}],\"$L37\",\"$L38\",\"$L39\",\"$L3a\",\"$undefined\",\"$L3b\",\"$L3c\",\"$undefined\",\"$undefined\",\"$L3d\"]}]]\n"])</script><script>self.__next_f.push([1,"3e:I[62963,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"CarouselWithLabels\"]\n3f:I[17787,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"CourseCardCarousel\"]\n40:I[92379,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"CardGrid\"]\n"])</script><script>self.__next_f.push([1,"49:I[51188,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1044\",\"static/chunks/1044-687250a180f48329.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1049\",\"static/chunks/1049-097a54a192c2924a.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"9633\",\"static/chunks/9633-b2d87d5d19bd0ffd.js\",\"8861\",\"static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js\"],\"SkillsCard\"]\n"])</script><script>self.__next_f.push([1,"4a:I[8958,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"WebinarCardCarousel\"]\n4b:I[53933,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"InsightsCardHolder\"]\n35:[\"$\",\"div\",\"1\",{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-12 grid__item--col-span-tablet-4 promotional-icon-block__item\",\"children\":[[\"$\",\"h3\",null,{\"className\":\"promotional-icon-block__item-title\",\"children\":\"Red Teaming\"}],[\"$\",\"p\",null,{\"className\":\"promotional-icon-block__item-description\",\"children\":\"Learn adversary emulation, stealth, and evasion techniques to test and improve an organization's security posture against persistent threats.\"}],\"$undefined\",[\"$\",\"$L34\",null,{\"className\":\"promotional-icon-block__item-icon\",\"name\":\"workshops\",\"size\":24}]]}]\n36:[\"$\",\"div\",\"2\",{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-12 grid__item--col-span-tablet-4 promotional-icon-block__item\",\"children\":[[\"$\",\"h3\",null,{\"className\":\"promotional-icon-block__item-title\",\"children\":\"Purple Teaming\"}],[\"$\",\"p\",null,{\"className\":\"promotional-icon-block__item-description\",\"children\":\"Bridge the gap between offense and defense, to foster collaboration between red and"])</script><script>self.__next_f.push([1," blue teams and strengthen detection, response, and overall security resilience.\"}],\"$undefined\",[\"$\",\"$L34\",null,{\"className\":\"promotional-icon-block__item-icon\",\"name\":\"detective-experts\",\"size\":24}]]}]\n"])</script><script>self.__next_f.push([1,"37:[\"$\",\"$L2f\",null,{\"className\":\"quote-card-carousel__wrapper\",\"children\":[\"$\",\"$L3e\",null,{\"withAutoHeight\":true,\"anchorTag\":\"$undefined\",\"disableContainer\":\"$undefined\",\"heading\":{\"size\":\"h3\"},\"headline\":{\"title\":\"Student Insights\"},\"hideTitle\":true,\"size\":\"default\",\"children\":[[\"$\",\"article\",\"0\",{\"className\":\"c-quote-card c-wide-card wide-card--default wide-card--surface-secondary\",\"children\":[[\"$\",\"div\",null,{\"className\":\"c-background-rings wide-card__background-rings\",\"style\":\"$undefined\",\"children\":[[\"$\",\"div\",\"ring-default-0\",{\"className\":\"background-rings__ring background-rings__ring--default\"}],[\"$\",\"div\",\"ring-default-1\",{\"className\":\"background-rings__ring background-rings__ring--default\"}],[\"$\",\"div\",\"ring-default-2\",{\"className\":\"background-rings__ring background-rings__ring--default\"}],[\"$\",\"div\",\"ring-default-3\",{\"className\":\"background-rings__ring background-rings__ring--default\"}]]}],[\"$\",\"div\",null,{\"className\":\"wide-card__body\",\"children\":[\"$\",\"blockquote\",null,{\"children\":[[\"$\",\"div\",null,{\"className\":\"quote-card__quote\",\"children\":[\"In one week, my instructor built a bridge from typical vulnerability scanning to the true art of penetration testing. Thank you, SANS, for making myself and my company much more capable in information security.\",\"$undefined\"]}],[\"$\",\"footer\",null,{\"className\":\"quote-card__author\",\"children\":[[\"$\",\"span\",null,{\"children\":\"Mike Dozier\"}],[\"$\",\"cite\",null,{\"className\":\"quote-card__author-title\",\"children\":\"Savannah River Nuclear Solutions\"}]]}]]}]}]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"38:[\"$\",\"$L3f\",null,{\"headline\":{\"text\":\"\",\"title\":\"Featured Courses\",\"titleIcon\":null},\"id\":\"related-courses\",\"items\":[{\"additionalPills\":[\"AISkills\"],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/hacker-techniques-incident-handling#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/hacker-techniques-incident-handling\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"38 CPEs / 38 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 44 Hands-On Labs\"}]},\"image\":{\"alt\":\"SEC504: Hacker Tools, Techniques, and Incident Handling\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaaf30504c4a3f451/67efb8e60ffb5bac39121508/course_social_SEC504_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC504\",\"focusArea\":\"Offensive Operations\"},\"primaryFocusArea\":\"offensive_operations\",\"skillLevel\":\"Essentials\",\"tag\":{\"label\":\"MAJOR UPDATES\",\"type\":\"major_updates\"},\"title\":\"SEC504: Hacker Tools, Techniques, and Incident Handling\"},{\"additionalPills\":[\"AIFocused\"],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/offensive-ai-attack-tools-techniques#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/offensive-ai-attack-tools-techniques\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"3 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"18 CPEs / 18 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 14 Hands-On Labs\"}]},\"image\":{\"alt\":\"SEC535: Offensive AI - Attack Tools and Techniques\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1ffb095261c6cb94/67fd01fb259f5b1751ae6bc9/course_social_SEC535_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC535\",\"focusArea\":\"Offensive Operations, Artificial Intelligence\"},\"primaryFocusArea\":\"offensive_operations\",\"skillLevel\":\"Intermediate\",\"tag\":{\"label\":\"NEW\",\"type\":\"new\"},\"title\":\"SEC535: Offensive AI - Attack Tools and Techniques\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/enterprise-penetration-testing#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/enterprise-penetration-testing\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 30 Hands-On Labs\"}]},\"image\":{\"alt\":\"SEC560: Enterprise Penetration Testing\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta08167b4d563963d/67e54e2a23211a53ff7fb897/course_social_SEC560_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC560\",\"focusArea\":\"Offensive Operations\"},\"primaryFocusArea\":\"offensive_operations\",\"skillLevel\":\"Intermediate\",\"tag\":{\"label\":\"UPDATED\",\"type\":\"updated\"},\"title\":\"SEC560: Enterprise Penetration Testing\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/web-app-penetration-testing-ethical-hacking#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/web-app-penetration-testing-ethical-hacking\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 35 Hands-On Labs\"}]},\"image\":{\"alt\":\"SEC542: Web App Penetration Testing and Ethical Hacking\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3873ac7df18461ca/67e5735c6a6ba66996e70faa/course_social_SEC542_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC542\",\"focusArea\":\"Offensive Operations\"},\"primaryFocusArea\":\"offensive_operations\",\"skillLevel\":\"Intermediate\",\"tag\":{\"label\":\"MAJOR UPDATES\",\"type\":\"major_updates\"},\"title\":\"SEC542: Web App Penetration Testing and Ethical Hacking\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/red-team-operations-adversary-emulation#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/red-team-operations-adversary-emulation\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 28 Hands-On Labs\"}]},\"image\":{\"alt\":\"SEC565: Red Team Operations and Adversary Emulation\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltadb8bb807dd43bfc/67fd01fc92c489f542cfa4a0/course_social_SEC565_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC565\",\"focusArea\":\"Offensive Operations\"},\"primaryFocusArea\":\"offensive_operations\",\"skillLevel\":\"Intermediate\",\"tag\":{\"label\":\"UPDATED\",\"type\":\"updated\"},\"title\":\"SEC565: Red Team Operations and Adversary Emulation\"},{\"additionalPills\":[\"AIFocused\"],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/ai-security-automation#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/ai-security-automation\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 25 Hands-On Labs\"}]},\"image\":{\"alt\":\"SEC598: AI and Security Automation for Red, Blue, and Purple Teams\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0fec8a865cfbcd45/67fd0204259f5b89e0ae6bcf/course_social_SEC598_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC598\",\"focusArea\":\"Offensive Operations, Artificial Intelligence\"},\"primaryFocusArea\":\"offensive_operations\",\"skillLevel\":\"Intermediate\",\"tag\":\"$undefined\",\"title\":\"SEC598: AI and Security Automation for Red, Blue, and Purple Teams\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/advanced-penetration-testing-exploits-ethical-hacking#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/advanced-penetration-testing-exploits-ethical-hacking\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"46 CPEs / 46 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 30 Hands-On Labs\"}]},\"image\":{\"alt\":\"SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt44cfd9ee227a32a1/67e54ab5a3b7857151f788eb/course_social_SEC660_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC660\",\"focusArea\":\"Offensive Operations\"},\"primaryFocusArea\":\"offensive_operations\",\"skillLevel\":\"Advanced\",\"tag\":\"$undefined\",\"title\":\"SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/cloud-penetration-testing#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/cloud-penetration-testing\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 24 Hands-On Labs\"}]},\"image\":{\"alt\":\"SEC588: Cloud Penetration Testing\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4f84f2bdd8b06775/6895d9adf5108c858690c90a/course-cards_offensive-operations_SEC588_1514x792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC588\",\"focusArea\":\"Offensive Operations\"},\"primaryFocusArea\":\"offensive_operations\",\"skillLevel\":\"Intermediate\",\"tag\":{\"label\":\"MAJOR UPDATES\",\"type\":\"major_updates\"},\"title\":\"SEC588: Cloud Penetration Testing\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/defeating-advanced-adversaries-kill-chain-defenses#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/defeating-advanced-adversaries-kill-chain-defenses\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 25 Hands-On Labs\"}]},\"image\":{\"alt\":\"SEC599: Defeating Advanced Adversaries - Purple Team Tactics \u0026 Kill Chain Defenses\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt46ac50a79424adba/67fd02052b143528fbcf7cc6/course_social_SEC599_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC599\",\"focusArea\":\"Offensive Operations\"},\"primaryFocusArea\":\"offensive_operations\",\"skillLevel\":\"Intermediate\",\"tag\":\"$undefined\",\"title\":\"SEC599: Defeating Advanced Adversaries - Purple Team Tactics \u0026 Kill Chain Defenses\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/wireless-penetration-testing-ethical-hacking#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/wireless-penetration-testing-ethical-hacking\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 20 Hands-On Labs\"}]},\"image\":{\"alt\":\"SEC617: Wireless Penetration Testing and Ethical Hacking\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt203e71c7573b99d9/67fd0205b9c175ef01659dd7/course_social_SEC617_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC617\",\"focusArea\":\"Offensive Operations\"},\"primaryFocusArea\":\"offensive_operations\",\"skillLevel\":\"Advanced\",\"tag\":\"$undefined\",\"title\":\"SEC617: Wireless Penetration Testing and Ethical Hacking\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/ios-android-application-security-analysis-penetration-testing#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/ios-android-application-security-analysis-penetration-testing\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 20 Hands-On Labs\"}]},\"image\":{\"alt\":\"SEC575: iOS and Android Application Security Analysis and Penetration Testing\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltbc6bef44126039d5/67fd01fc4eec1310f795dbd5/course_social_SEC575_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC575\",\"focusArea\":\"Offensive Operations\"},\"primaryFocusArea\":\"offensive_operations\",\"skillLevel\":\"Intermediate\",\"tag\":\"$undefined\",\"title\":\"SEC575: iOS and Android Application Security Analysis and Penetration Testing\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/red-team-operations-developing-custom-tools-windows#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/red-team-operations-developing-custom-tools-windows\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"46 CPEs / 46 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 27 Hands-On Labs\"}]},\"image\":{\"alt\":\"SEC670: Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt4da5f1628ee7af4e/67fd0205f006085b77921d57/course_social_SEC670_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC670\",\"focusArea\":\"Offensive Operations\"},\"primaryFocusArea\":\"offensive_operations\",\"skillLevel\":\"Advanced\",\"tag\":\"$undefined\",\"title\":\"SEC670: Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control\"}],\"link\":{\"href\":\"https://www.sans.org/cyber-security-courses?refinementList%5Bfacets.focusArea%5D%5B0%5D=Offensive%20Operations\",\"isExternalLink\":true,\"label\":\"View All Courses\",\"target\":\"$undefined\"}}]\n"])</script><script>self.__next_f.push([1,"39:[\"$\",\"$L2f\",null,{\"children\":[\"$\",\"$L40\",null,{\"equalHeightRows\":true,\"loadMore\":true,\"className\":\"c-person-grid\",\"headline\":{\"anchorTag\":\"speakers\",\"title\":\"Meet Your Experts\"},\"id\":\"instructors\",\"variant\":\"3-columns\",\"children\":[[\"$\",\"div\",\"0\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L31\",null,{\"alt\":\"Erik Van Buggenhout\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltecd6fcc0742a5838/67c5d6c56f443b2c070107ba/370x370_Erik-Van-Buggenhout.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L31\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltecd6fcc0742a5838/67c5d6c56f443b2c070107ba/370x370_Erik-Van-Buggenhout.jpg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Erik Van Buggenhout\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Co-Founder \u0026 Partner\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"NVISO co-founder and SANS Senior Instructor, leading cybersecurity education in advanced adversary tactics. Experienced in offensive security with extensive background in penetration testing and ethical hacking across Europe.\"}],[[\"$\",\"$L22\",\"/profiles/erik-van-buggenhout\",{\"asElement\":\"$23\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/erik-van-buggenhout\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Co-Founder \u0026 Partner | Speaker: Erik Van Buggenhout\"},\"children\":\"Learn more\"}]]]}]]}]}],[\"$\",\"div\",\"1\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L31\",null,{\"alt\":\"Chris Elgee\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt307886f079b69b56/67e566b2697ba11a975fdbc1/Christopher_Elgee_370x370.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L31\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt307886f079b69b56/67e566b2697ba11a975fdbc1/Christopher_Elgee_370x370.jpg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Chris Elgee\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Builder and Breaker\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Chris is a senior security analyst for Counter Hack and Cyber Range Lead (S-6) for the Army National Guard's 91st Cyber Brigade. Through his work, he shares his unique insights into cyber security threats to prepare and inspire students.\"}],[[\"$\",\"$L22\",\"/profiles/chris-elgee\",{\"asElement\":\"$23\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/chris-elgee\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Builder and Breaker | Speaker: Chris Elgee\"},\"children\":\"Learn more\"}]]]}]]}]}],[\"$\",\"div\",\"2\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[\"$L41\",\"$undefined\"]}],\"$L42\"]}]}],\"$L43\",\"$L44\",\"$L45\",\"$L46\",\"$L47\",\"$L48\"]}]}]\n"])</script><script>self.__next_f.push([1,"3a:[\"$\",\"$L40\",null,{\"variantComponent\":\"skill-cards\",\"children\":[[\"$\",\"$L49\",\"0\",{\"category\":\"Offensive Operations\",\"cta\":{\"href\":\"/job-roles/red-teamer\",\"label\":\"Explore learning path\"},\"hasFixedFocusAreaHeight\":true,\"title\":\"Red Teamer\"}],[\"$\",\"$L49\",\"1\",{\"category\":\"Offensive Operations\",\"cta\":{\"href\":\"/job-roles/purple-teamer\",\"label\":\"Explore learning path\"},\"hasFixedFocusAreaHeight\":true,\"title\":\"Purple Teamer\"}],[\"$\",\"$L49\",\"2\",{\"category\":\"Offensive Operations\",\"cta\":{\"href\":\"/job-roles/application-pen-tester\",\"label\":\"Explore learning path\"},\"hasFixedFocusAreaHeight\":true,\"title\":\"Application Pen Tester\"}],[\"$\",\"$L49\",\"3\",{\"category\":\"Offensive Operations\",\"cta\":{\"href\":\"/job-roles/vulnerability-researcher-exploit-developer\",\"label\":\"Explore learning path\"},\"hasFixedFocusAreaHeight\":true,\"title\":\"Vulnerability Researcher \u0026 Exploit Developer\"}]],\"headline\":{\"center\":true,\"title\":\"Explore Careers Within Offensive Operations\"},\"loadMore\":true,\"variant\":\"4-columns\"}]\n"])</script><script>self.__next_f.push([1,"3b:[\"$\",\"$L4a\",null,{\"headline\":{\"text\":\"\",\"title\":\"Upcoming Events\",\"titleIcon\":\"$undefined\"},\"items\":[{\"cta\":{\"href\":\"/webcasts/defending-speed-of-ai-outpacing-tomorrows-attackers\",\"label\":\"View details\",\"variant\":\"secondary\"},\"description\":\"This talk explores the emerging landscape of AI-driven cyber threats and argues that organizations must defend at the speed of AI to survive. \",\"details\":[{\"icon\":\"calendar\",\"text\":\"14 Apr 2026\"},{\"icon\":\"time\",\"text\":\"14:00 PHST\"},{\"icon\":\"instructors\",\"text\":\"Bryce Galbraith\"}],\"image\":{\"alt\":\"Webcast Abstract Image\",\"height\":510,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt664e9c51c099870a/684bda917eeacd560d816105/assets_2-column_WebcastAbstract4_600x510.png\",\"width\":600,\"priority\":false},\"name\":\"Offensive Operations\",\"title\":\"Defending at the Speed of AI: Outpacing Tomorrow's Attackers\",\"type\":\"Webinar\"},{\"cta\":{\"href\":\"/webcasts/hackventures-josh-better-password-attacks-ai\",\"label\":\"View details\",\"variant\":\"secondary\"},\"description\":\"The Verizon DBIR says stolen credentials cause more breaches than phishing and exploits combined. Now, AI is making these attacks even more effective. Join SANS Fellow Joshua Wright to learn what you can do to protect your environment.\",\"details\":[{\"icon\":\"calendar\",\"text\":\"15 Apr 2026\"},{\"icon\":\"time\",\"text\":\"13:00 EDT\"},{\"icon\":\"instructors\",\"text\":\"Joshua Wright\"}],\"image\":{\"alt\":\"Webcast Abstract Image\",\"height\":510,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png\",\"width\":600,\"priority\":false},\"name\":\"Offensive Operations\",\"title\":\"Hackventures with Josh: Better Password Attacks with AI\",\"type\":\"Webinar\"},{\"cta\":{\"href\":\"/webcasts/vibe-coding-evasion-framework-ai-assisted-red-team-tool-development\",\"label\":\"View details\",\"variant\":\"secondary\"},\"description\":\"AI can accelerate red team tool development, but only with the right approach. This hands-on workshop explores “vibe coding,” showing how to use LLMs to design, validate, and build evasion tooling step by step, resulting in a functional, AI-assisted red team framework.\",\"details\":[{\"icon\":\"calendar\",\"text\":\"16 Apr 2026\"},{\"icon\":\"time\",\"text\":\"10:00 EDT\"},{\"icon\":\"instructors\",\"text\":\"Jean-François Maes\"}],\"image\":{\"alt\":\"Man presenting webcast to screen\",\"height\":336,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png\",\"width\":363,\"priority\":false},\"name\":\"Offensive Operations\",\"title\":\"Vibe Coding Your Own Evasion Framework: AI-Assisted Red Team Tool Development\",\"type\":\"Webinar\"},{\"cta\":{\"href\":\"/webcasts/network-security-2026-how-ai-reshaping-threat-landscape\",\"label\":\"View details\",\"variant\":\"secondary\"},\"description\":\"The session will demonstrate how AI can be applied as both a SAST and DAST capability for discovering and exploiting zero-day vulnerabilities in web applications, as well as its growing role in binary exploitation. \",\"details\":[{\"icon\":\"calendar\",\"text\":\"22 Sep 2026\"},{\"icon\":\"time\",\"text\":\"18:00 PDT\"},{\"icon\":\"instructors\",\"text\":\"Stephen Sims\"}],\"image\":{\"alt\":\"Woman presenting webcast\",\"height\":510,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt815aa3e11b971b71/684bdbdb6ffa4e370b4f54b3/assets_2-column_Webcast6_600x510.png\",\"width\":600,\"priority\":false},\"name\":\"Offensive Operations\",\"title\":\"SANS Network Security 2026 - Featured Keynote: Offense at Machine Speed: How AI Is Reshaping the Threat Landscape\",\"type\":\"Webinar\"},{\"cta\":{\"href\":\"/webcasts/sans-2026-threat-hunting-survey\",\"label\":\"View details\",\"variant\":\"secondary\"},\"description\":\"Threat hunting is no longer just a niche skill—it’s a critical pillar of modern defense.\",\"details\":[{\"icon\":\"calendar\",\"text\":\"23 Sep 2026\"},{\"icon\":\"time\",\"text\":\"10:30 EDT\"},{\"icon\":\"instructors\",\"text\":\"Josh Lemon\"}],\"image\":{\"alt\":\"Webcast Abstract Image\",\"height\":510,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltad9456150ee87c5b/684bda916a67a9b2405a37be/assets_2-column_WebcastAbstract3_600x510.png\",\"width\":600,\"priority\":false},\"name\":\"Offensive Operations\",\"title\":\"SANS 2026 Threat Hunting Survey: The Evolution of Threat Hunting\",\"type\":\"Webinar\"}],\"link\":\"$undefined\"}]\n"])</script><script>self.__next_f.push([1,"3c:[\"$\",\"$L4b\",null,{\"authorImages\":[{\"alt\":\"James Shewmaker\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf2a60ec79e83c031/67c5d6d4accfe0fe6095613e/370x370_James-Shewmaker.jpg\",\"width\":370},{\"alt\":\"SANS Institute\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt12dfb7ac1329de96/69bd2121daccab04d60ba5e1/SANS_Profile_Image_2.jpg\",\"width\":370},{\"alt\":\"Joshua Wright\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3fa43bed83b3b520/67c5d772d1b1de8bfeca796d/Josh_Wright_-_Headshot_-_370x370_2025.jpg\",\"width\":370}],\"cta\":{\"href\":\"/security-resources\",\"isExternalLink\":false,\"label\":\"More Insights\",\"target\":\"_self\"},\"featuredInsight\":{\"authors\":[{\"href\":\"/profiles/james-shewmaker\",\"image\":\"$3c:props:authorImages:0\",\"name\":\"James Shewmaker\"}],\"authorsLabel\":{\"label\":\"Features\"},\"description\":\"With the proliferation of multi-factor authentication, penetration testers need to apply existing tooling to manipulate even internal applications. Building attack infrastructure internally during a penetration test is resource exhausting, but modern tools like evilginx can do most of the heavy lifting for us.\",\"href\":\"/webcasts/modern-multi-factor-authentication-bypass-techniques-a-taste-of-sans-sec660\",\"image\":{\"alt\":\"Man presenting webcast\",\"height\":510,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2e5aa171a1a622b6/684bdbdb0ee3b728de43e3b4/assets_2-column_Webcast5_600x510.png\",\"width\":600},\"title\":\"Modern Multi-Factor Authentication Bypass Techniques: A Taste of SANS SEC660\",\"type\":\"Webinar\"},\"insights\":[{\"authors\":[{\"href\":\"/profiles/sans-institute\",\"image\":\"$3c:props:authorImages:1\",\"name\":\"SANS Institute\"}],\"authorsLabel\":{\"label\":\"Written By\"},\"description\":\"This research explores how offensive security practitioners can incorporate crash dump analysis into their workflows to extract sensitive data such as plaintext credentials, encryption keys, and files from memory.\",\"href\":\"/white-papers/from-crash-compromise-unlocking-potential-windows-crash-dumps-offensive-security\",\"image\":{\"alt\":\"Woman Smiling with Laptop\",\"height\":510,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2d09baf4ffa836f8/684883c6dc186dbc43081537/assets_2-column_Blog4_600x510.png\",\"width\":600},\"title\":\"From Crash to Compromise: Unlocking the Potential of Windows Crash Dumps in Offensive Security\",\"type\":\"Whitepaper\"},{\"authors\":[{\"href\":\"/profiles/joshua-wright\",\"image\":\"$3c:props:authorImages:2\",\"name\":\"Joshua Wright\"}],\"authorsLabel\":{\"label\":\"Written By\"},\"description\":\"One thing that will dramatically improve the value of cybersecurity assessments is the adoption of continuous penetration testing.\",\"href\":\"/blog/continuous-penetration-testing-a-consultants-perspective\",\"image\":{\"alt\":\"Man Smiling at Computer\",\"height\":510,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltb8e6cbae00448be0/684023b3116bcff39322002d/assets_2-column_Blog3_600x510.png\",\"width\":600},\"title\":\"Continuous Penetration Testing - A Consultant’s Perspective\",\"type\":\"Blog\"}],\"title\":\"Offensive Operations Insights From The Experts\"}]\n"])</script><script>self.__next_f.push([1,"4c:Tf67,"])</script><script>self.__next_f.push([1,"{\"@context\":\"https://schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"These courses are ideal for blue teamers, red teamers, SOC analysts, incident responders, and security engineers looking to deepen their offensive cybersecurity expertise, as well as penetration testers and vulnerability researchers who require specialized training in their respective areas. \"},\"name\":\"Who Should Take Offensive Operations Courses?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The curriculum covers penetration testing, red teaming, purple teaming, exploit development, adversary emulation, security automation, mobile security, wireless security, and more. Each course is designed to provide deep technical knowledge and practical experience that you can apply the day you return to work. \"},\"name\":\"What Topics Are Covered In SANS Offensive Operations Training?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Yes, all Offensive Operations courses require at least basic familiarity with computer operations and some languages, and some require prior cybersecurity knowledge or experience with command-line tools, scripting, or networking. Please review the syllabus and prerequisites on our course pages for further information. \"},\"name\":\"Are There Any Prerequisites For Taking These Courses?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"No, our courses go far beyond just attacker techniques. They provide a comprehensive approach to offensive cybersecurity, covering adversary tactics, security testing methodologies, evasion techniques, and strategic measures and process for improving defenses. Our courses help students understand not only how to conduct attacks but also how to analyze, adapt, and defend against them in real-world environments. \"},\"name\":\"Are Offensive Operations Courses Only Focused On Hacking?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Each course page provides a detailed syllabus outlining your overall course journey as well as specifically listing topics and exercises for each module of your training. If you're unsure, the SANS team can help guide you based on your background, career goals, and technical expertise. \"},\"name\":\"How Do I Know Which Offensive Operations Course Is Right For Me?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"A wide range of cybersecurity roles are available to professionals with skills from SANS Offensive Operations, including penetration tester, red team operator, exploit developer, adversary emulation specialist, vulnerability researcher, purple team engineer, and application security tester. These roles are critical to organizations seeking to proactively assess and improve their security posture, and they often lead to senior technical or strategic positions in security consulting, threat simulation, or security architecture. \"},\"name\":\"What Career Paths Are There In Offensive Operations?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Yes. Most SANS Offensive Operations courses align with GIAC certifications, which validate hands-on skills and technical mastery in specific offensive disciplines. Certifications like GPEN (Penetration Tester), GXPN (Exploit Researcher and Advanced Pen Tester), GCPN (Cloud Penetration Tester), and GCIH (Certified Incident Handler) are globally recognized and can significantly boost your credibility, marketability, and career progression. \"},\"name\":\"Are There Certification Opportunities Available With SANS Offensive Operations Courses?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Yes. We have a wealth of resources including webcasts, workshops, blogs, and reference materials in our Community Resources that is filterable by Offensive Operations. \"},\"name\":\"Does SANS Offer Any Resources Or Hands-On Exercises Beyond The Courses? \"}]}"])</script><script>self.__next_f.push([1,"3d:[[\"$\",\"script\",null,{\"dangerouslySetInnerHTML\":{\"__html\":\"$4c\"},\"type\":\"application/ld+json\"}],\"$L4d\"]\n"])</script><script>self.__next_f.push([1,"33:[\"$\",\"$L2f\",\"0\",{\"className\":\"generic-content-block__wrapper\",\"id\":\"\",\"children\":[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-grid c-generic-content-block grid--has-container grid--columns-12\",\"children\":[\"$\",\"div\",null,{\"className\":\"generic-content-block__grid-item generic-content-block__grid-item--is-aligned-left\",\"children\":[\"\",[\"$\",\"div\",null,{\"className\":\"c-rich-text generic-content-block__rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"h2\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"Outsmart Hackers with Real-World Offensive Security Training\"}]]}]}],[\"$\",\"$1\",\"1\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"As cyberthreats grow more sophisticated, it is critical to proactively identify and address vulnerabilities before adversaries exploit them. SANS Offensive Operations delivers expert-led training across the entire attack surface, covering everything from penetration testing and red teaming to exploit development and hardware hacking. Through hands-on labs and industry-recognized certifications, we equip professionals to master real-world offensive techniques and adversarial tactics.\"}]]}]}]]}],\"\"]}]}]}]\n"])</script><script>self.__next_f.push([1,"4e:I[11431,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1044\",\"static/chunks/1044-687250a180f48329.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1049\",\"static/chunks/1049-097a54a192c2924a.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"9633\",\"static/chunks/9633-b2d87d5d19bd0ffd.js\",\"8861\",\"static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js\"],\"AccordionGroup\"]\n"])</script><script>self.__next_f.push([1,"4f:I[11431,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1044\",\"static/chunks/1044-687250a180f48329.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1049\",\"static/chunks/1049-097a54a192c2924a.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"9633\",\"static/chunks/9633-b2d87d5d19bd0ffd.js\",\"8861\",\"static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js\"],\"AccordionItem\"]\n"])</script><script>self.__next_f.push([1,"41:[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L31\",null,{\"alt\":\"Moses Frost\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt145e40fc0ce3a381/67c5d712938bf57815f9db61/370x370_Moses-Frost.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L31\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt145e40fc0ce3a381/67c5d712938bf57815f9db61/370x370_Moses-Frost.jpg\"}]]\n"])</script><script>self.__next_f.push([1,"42:[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Moses Frost\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Solutions Consultant\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Moses has built an impressive career as a Network Architect, DevOps Engineer, and Information Security professional. Today, he works in the Offensive Operations space as a Red Team Operator and serves as the course author for SEC588.\"}],[[\"$\",\"$L22\",\"/profiles/moses-frost\",{\"asElement\":\"$23\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/moses-frost\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Solutions Consultant | Speaker: Moses Frost\"},\"children\":\"Learn more\"}]]]}]\n"])</script><script>self.__next_f.push([1,"43:[\"$\",\"div\",\"3\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L31\",null,{\"alt\":\"Jean-François Maes\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt209cf83fb5ac9952/67c5d6e0cdb05a3ceb5e275a/370x370_Jean-Francois-Maes.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L31\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt209cf83fb5ac9952/67c5d6e0cdb05a3ceb5e275a/370x370_Jean-Francois-Maes.jpg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Jean-François Maes\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"CEO\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Jean-François is based in Portugal, where he is the CEO of Offensive Guardian, a boutique red and purple teaming shop providing freelance services to various organizations. He has worked for other noteworthy firms, including, but not limited to: Neuvik, TrustedSec, Fortra's Cobalt-Strike team, and NVISO.\"}],[[\"$\",\"$L22\",\"/profiles/jeanfrancois-maes\",{\"asElement\":\"$23\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/jeanfrancois-maes\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: CEO | Speaker: Jean-François Maes\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"44:[\"$\",\"div\",\"4\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L31\",null,{\"alt\":\"Jeff McJunkin\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt17697ef43272b87e/67c5d6e08c6f4e14abb7ffc5/370x370_Jeff-McJunkin.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L31\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt17697ef43272b87e/67c5d6e08c6f4e14abb7ffc5/370x370_Jeff-McJunkin.jpg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Jeff McJunkin\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"CEO\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Jeff McJunkin, Rogue Valley InfoSec founder, has led Fortune 100 pen tests and shaped Core NetWars. His key role in SANS Holiday Hack Challenge and hands-on security innovations continue to elevate the industry, advancing defenses worldwide.\"}],[[\"$\",\"$L22\",\"/profiles/jeff-mcjunkin\",{\"asElement\":\"$23\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/jeff-mcjunkin\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: CEO | Speaker: Jeff McJunkin\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"45:[\"$\",\"div\",\"5\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L31\",null,{\"alt\":\"Larry Pesce\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2fe03a27312522aa/67c5d77ef4b0b1ec5c98a5cf/Larry_Pesce.png\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L31\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2fe03a27312522aa/67c5d77ef4b0b1ec5c98a5cf/Larry_Pesce.png\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Larry Pesce\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Vice President of Services\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Larry has revolutionized embedded device security with decades of hands-on offensive research, co-authoring SANS's flagship wireless and IoT penetration testing courses, and pioneering SBOM exploitation techniques for supply chain defense strategies.\"}],[[\"$\",\"$L22\",\"/profiles/larry-pesce\",{\"asElement\":\"$23\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/larry-pesce\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Vice President of Services | Speaker: Larry Pesce\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"46:[\"$\",\"div\",\"6\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L31\",null,{\"alt\":\"Jonathan Reiter\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltba15daecd6a42aa1/67c5d6f4cdb05ad5db5e275f/370x370_jonathan-reiter.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L31\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltba15daecd6a42aa1/67c5d6f4cdb05ad5db5e275f/370x370_jonathan-reiter.jpg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Jonathan Reiter\"}],\"\"]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Jonathan is an officer in the Maryland Air National Guard serving as a cyberspace capabilities developer. With expertise in Windows implant development and kernel research, he brings practical defensive and offensive cybersecurity experience to SANS. Jonathan is the author of SEC665: Advanced Red Team Operations.\"}],[[\"$\",\"$L22\",\"/profiles/jonathan-reiter\",{\"asElement\":\"$23\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/jonathan-reiter\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Person Card | Speaker: Jonathan Reiter\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"47:[\"$\",\"div\",\"7\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L31\",null,{\"alt\":\"Stephen Sims\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5b36cce509455349/67c5d732accfe01662956153/370x370_Stephen-Sims.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L31\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5b36cce509455349/67c5d732accfe01662956153/370x370_Stephen-Sims.jpg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Stephen Sims\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Research Fellow\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Stephen Sims, an esteemed vulnerability researcher and exploit developer, has significantly advanced cybersecurity by authoring SANS's most advanced courses and co-authoring the \\\"Gray Hat Hacking\\\" series.\"}],[[\"$\",\"$L22\",\"/profiles/stephen-sims\",{\"asElement\":\"$23\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/stephen-sims\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Research Fellow | Speaker: Stephen Sims\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"48:[\"$\",\"div\",\"8\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L31\",null,{\"alt\":\"Joshua Wright\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3fa43bed83b3b520/67c5d772d1b1de8bfeca796d/Josh_Wright_-_Headshot_-_370x370_2025.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L31\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3fa43bed83b3b520/67c5d772d1b1de8bfeca796d/Josh_Wright_-_Headshot_-_370x370_2025.jpg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Joshua Wright\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Director and Senior Security Analyst\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Joshua Wright, Senior Technical Director at Counter Hack Challenges and author of SEC504, has spent over two decades teaching and building tools that help defenders identify and counter real-world cyber threats through practical, hands-on learning.\"}],[[\"$\",\"$L22\",\"/profiles/joshua-wright\",{\"asElement\":\"$23\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/joshua-wright\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Director and Senior Security Analyst | Speaker: Joshua Wright\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"4d:[\"$\",\"div\",null,{\"id\":\"faqs\",\"className\":\"c-grid c-accordion-section accordion-section--transparent grid--has-container grid--columns-1 grid--columns-tablet-3\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-1\",\"children\":[\"$\",\"$L2f\",null,{\"children\":[\"$\",\"h2\",null,{\"className\":\"c-heading heading--is-h3 heading--is-h3-desktop\",\"children\":\"Frequently Asked Questions\"}]}]}],[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-1 grid__item--col-span-tablet-2\",\"children\":[\"$\",\"$L2f\",null,{\"animation\":\"none\",\"children\":[[\"$\",\"$L4e\",null,{\"type\":\"multiple\",\"children\":[[\"$\",\"$L4f\",\"0\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"0ms\"},\"summary\":\"Who Should Take Offensive Operations Courses?\",\"value\":\"0\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"These courses are ideal for blue teamers, red teamers, SOC analysts, incident responders, and security engineers looking to deepen their offensive cybersecurity expertise, as well as penetration testers and vulnerability researchers who require specialized training in their respective areas. \"}]]}]}]]}]}],[\"$\",\"$L4f\",\"1\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"100ms\"},\"summary\":\"What Topics Are Covered In SANS Offensive Operations Training?\",\"value\":\"1\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"The curriculum covers penetration testing, red teaming, purple teaming, exploit development, adversary emulation, security automation, mobile security, wireless security, and more. Each course is designed to provide deep technical knowledge and practical experience that you can apply the day you return to work. \"}]]}]}]]}]}],[\"$\",\"$L4f\",\"2\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"200ms\"},\"summary\":\"Are There Any Prerequisites For Taking These Courses?\",\"value\":\"2\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"Yes, all Offensive Operations courses require at least basic familiarity with computer operations and some languages, and some require prior cybersecurity knowledge or experience with command-line tools, scripting, or networking. Please review the syllabus and prerequisites on our course pages for further information. \"}]]}]}]]}]}],[\"$\",\"$L4f\",\"3\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"300ms\"},\"summary\":\"Are Offensive Operations Courses Only Focused On Hacking?\",\"value\":\"3\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"No, our courses go far beyond just attacker techniques. They provide a comprehensive approach to offensive cybersecurity, covering adversary tactics, security testing methodologies, evasion techniques, and strategic measures and process for improving defenses. Our courses help students understand not only how to conduct attacks but also how to analyze, adapt, and defend against them in real-world environments. \"}]]}]}]]}]}],[\"$\",\"$L4f\",\"4\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"400ms\"},\"summary\":\"How Do I Know Which Offensive Operations Course Is Right For Me?\",\"value\":\"4\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"Each course page provides a detailed syllabus outlining your overall course journey as well as specifically listing topics and exercises for each module of your training. If you're unsure, the SANS team can help guide you based on your background, career goals, and technical expertise. \"}]]}]}]]}]}],[\"$\",\"$L4f\",\"5\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"500ms\"},\"summary\":\"What Career Paths Are There In Offensive Operations?\",\"value\":\"5\",\"children\":\"$L50\"}],\"$L51\",\"$L52\"]}],\"$undefined\"]}]}]]}]\n"])</script><script>self.__next_f.push([1,"50:[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"A wide range of cybersecurity roles are available to professionals with skills from SANS Offensive Operations, including penetration tester, red team operator, exploit developer, adversary emulation specialist, vulnerability researcher, purple team engineer, and application security tester. These roles are critical to organizations seeking to proactively assess and improve their security posture, and they often lead to senior technical or strategic positions in security consulting, threat simulation, or security architecture. \"}]]}]}]]}]\n"])</script><script>self.__next_f.push([1,"51:[\"$\",\"$L4f\",\"6\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"600ms\"},\"summary\":\"Are There Certification Opportunities Available With SANS Offensive Operations Courses?\",\"value\":\"6\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"Yes. Most SANS Offensive Operations courses align with GIAC certifications, which validate hands-on skills and technical mastery in specific offensive disciplines. Certifications like GPEN (Penetration Tester), GXPN (Exploit Researcher and Advanced Pen Tester), GCPN (Cloud Penetration Tester), and GCIH (Certified Incident Handler) are globally recognized and can significantly boost your credibility, marketability, and career progression. \"}]]}]}]]}]}]\n"])</script><script>self.__next_f.push([1,"52:[\"$\",\"$L4f\",\"7\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"700ms\"},\"summary\":\"Does SANS Offer Any Resources Or Hands-On Exercises Beyond The Courses? \",\"value\":\"7\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"Yes. We have a wealth of resources including webcasts, workshops, blogs, and reference materials in our Community Resources that is filterable by Offensive Operations. \"}]]}]}]]}]}]\n"])</script><script>self.__next_f.push([1,"53:I[18131,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"FooterNewsletterWrapper\"]\n"])</script><script>self.__next_f.push([1,"25:[\"$\",\"div\",null,{\"className\":\"footer__newsletter\",\"children\":[[\"$\",\"h2\",null,{\"className\":\"c-heading footer__newsletter-title\",\"children\":\"Get Curated News, Vulnerabilities, and Essential Security Awareness Tips\"}],[\"$\",\"$L53\",null,{\"buttonLabel\":\"Subscribe to Newsletter \",\"countryListOptions\":[{\"id\":261,\"abbreviation\":\"US\",\"text\":\"United States\",\"is_gdpr\":false},{\"id\":76,\"abbreviation\":\"CA\",\"text\":\"Canada\",\"is_gdpr\":true},{\"id\":260,\"abbreviation\":\"GB\",\"text\":\"United Kingdom\",\"is_gdpr\":true},{\"id\":233,\"abbreviation\":\"ES\",\"text\":\"Spain\",\"is_gdpr\":true},{\"id\":59,\"abbreviation\":\"BE\",\"text\":\"Belgium\",\"is_gdpr\":true},{\"id\":95,\"abbreviation\":\"DK\",\"text\":\"Denmark\",\"is_gdpr\":true},{\"id\":199,\"abbreviation\":\"NO\",\"text\":\"Norway\",\"is_gdpr\":true},{\"id\":189,\"abbreviation\":\"NL\",\"text\":\"Netherlands\",\"is_gdpr\":true},{\"id\":51,\"abbreviation\":\"AU\",\"text\":\"Australia\",\"is_gdpr\":false},{\"id\":138,\"abbreviation\":\"IN\",\"text\":\"India\",\"is_gdpr\":false},{\"id\":146,\"abbreviation\":\"JP\",\"text\":\"Japan\",\"is_gdpr\":false},{\"id\":227,\"abbreviation\":\"SG\",\"text\":\"Singapore\",\"is_gdpr\":false},{\"id\":39,\"abbreviation\":\"AF\",\"text\":\"Afghanistan\",\"is_gdpr\":false},{\"id\":1188,\"abbreviation\":\"AX\",\"text\":\"Aland Islands\",\"is_gdpr\":true},{\"id\":40,\"abbreviation\":\"AL\",\"text\":\"Albania\",\"is_gdpr\":false},{\"id\":41,\"abbreviation\":\"DZ\",\"text\":\"Algeria\",\"is_gdpr\":false},{\"id\":42,\"abbreviation\":\"AS\",\"text\":\"American Samoa\",\"is_gdpr\":false},{\"id\":43,\"abbreviation\":\"AD\",\"text\":\"Andorra\",\"is_gdpr\":false},{\"id\":44,\"abbreviation\":\"AO\",\"text\":\"Angola\",\"is_gdpr\":false},{\"id\":45,\"abbreviation\":\"AI\",\"text\":\"Anguilla\",\"is_gdpr\":true},{\"id\":46,\"abbreviation\":\"AQ\",\"text\":\"Antarctica\",\"is_gdpr\":false},{\"id\":47,\"abbreviation\":\"AG\",\"text\":\"Antigua and Barbuda\",\"is_gdpr\":false},{\"id\":48,\"abbreviation\":\"AR\",\"text\":\"Argentina\",\"is_gdpr\":false},{\"id\":49,\"abbreviation\":\"AM\",\"text\":\"Armenia\",\"is_gdpr\":false},{\"id\":50,\"abbreviation\":\"AW\",\"text\":\"Aruba\",\"is_gdpr\":true},{\"id\":52,\"abbreviation\":\"AT\",\"text\":\"Austria\",\"is_gdpr\":true},{\"id\":53,\"abbreviation\":\"AZ\",\"text\":\"Azerbaijan\",\"is_gdpr\":false},{\"id\":54,\"abbreviation\":\"BS\",\"text\":\"Bahamas\",\"is_gdpr\":false},{\"id\":55,\"abbreviation\":\"BH\",\"text\":\"Bahrain\",\"is_gdpr\":false},{\"id\":56,\"abbreviation\":\"BD\",\"text\":\"Bangladesh\",\"is_gdpr\":false},{\"id\":57,\"abbreviation\":\"BB\",\"text\":\"Barbados\",\"is_gdpr\":false},{\"id\":58,\"abbreviation\":\"BY\",\"text\":\"Belarus\",\"is_gdpr\":false},{\"id\":60,\"abbreviation\":\"BZ\",\"text\":\"Belize\",\"is_gdpr\":false},{\"id\":61,\"abbreviation\":\"BJ\",\"text\":\"Benin\",\"is_gdpr\":false},{\"id\":62,\"abbreviation\":\"BM\",\"text\":\"Bermuda\",\"is_gdpr\":true},{\"id\":63,\"abbreviation\":\"BT\",\"text\":\"Bhutan\",\"is_gdpr\":false},{\"id\":64,\"abbreviation\":\"BO\",\"text\":\"Bolivia\",\"is_gdpr\":false},{\"id\":1189,\"abbreviation\":\"BQ\",\"text\":\"Bonaire, Sint Eustatius, and Saba\",\"is_gdpr\":true},{\"id\":65,\"abbreviation\":\"BA\",\"text\":\"Bosnia And Herzegovina\",\"is_gdpr\":false},{\"id\":66,\"abbreviation\":\"BW\",\"text\":\"Botswana\",\"is_gdpr\":false},{\"id\":67,\"abbreviation\":\"BV\",\"text\":\"Bouvet Island\",\"is_gdpr\":false},{\"id\":68,\"abbreviation\":\"BR\",\"text\":\"Brazil\",\"is_gdpr\":false},{\"id\":69,\"abbreviation\":\"IO\",\"text\":\"British Indian Ocean Territory\",\"is_gdpr\":false},{\"id\":70,\"abbreviation\":\"BN\",\"text\":\"Brunei Darussalam\",\"is_gdpr\":false},{\"id\":71,\"abbreviation\":\"BG\",\"text\":\"Bulgaria\",\"is_gdpr\":true},{\"id\":72,\"abbreviation\":\"BF\",\"text\":\"Burkina Faso\",\"is_gdpr\":false},{\"id\":73,\"abbreviation\":\"BI\",\"text\":\"Burundi\",\"is_gdpr\":false},{\"id\":74,\"abbreviation\":\"KH\",\"text\":\"Cambodia\",\"is_gdpr\":false},{\"id\":75,\"abbreviation\":\"CM\",\"text\":\"Cameroon\",\"is_gdpr\":false},{\"id\":77,\"abbreviation\":\"CV\",\"text\":\"Cape Verde\",\"is_gdpr\":false},{\"id\":78,\"abbreviation\":\"KY\",\"text\":\"Cayman Islands\",\"is_gdpr\":true},{\"id\":79,\"abbreviation\":\"CF\",\"text\":\"Central African Republic\",\"is_gdpr\":false},{\"id\":80,\"abbreviation\":\"TD\",\"text\":\"Chad\",\"is_gdpr\":false},{\"id\":81,\"abbreviation\":\"CL\",\"text\":\"Chile\",\"is_gdpr\":false},{\"id\":82,\"abbreviation\":\"CN\",\"text\":\"China\",\"is_gdpr\":false},{\"id\":83,\"abbreviation\":\"CX\",\"text\":\"Christmas Island\",\"is_gdpr\":false},{\"id\":84,\"abbreviation\":\"CC\",\"text\":\"Cocos (Keeling) Islands\",\"is_gdpr\":false},{\"id\":85,\"abbreviation\":\"CO\",\"text\":\"Colombia\",\"is_gdpr\":false},{\"id\":86,\"abbreviation\":\"KM\",\"text\":\"Comoros\",\"is_gdpr\":false},{\"id\":88,\"abbreviation\":\"CK\",\"text\":\"Cook Islands\",\"is_gdpr\":false},{\"id\":89,\"abbreviation\":\"CR\",\"text\":\"Costa Rica\",\"is_gdpr\":false},{\"id\":90,\"abbreviation\":\"CI\",\"text\":\"Cote D'ivoire\",\"is_gdpr\":false},{\"id\":91,\"abbreviation\":\"HR\",\"text\":\"Croatia (Local Name: Hrvatska)\",\"is_gdpr\":true},{\"id\":1192,\"abbreviation\":\"CW\",\"text\":\"Curacao\",\"is_gdpr\":true},{\"id\":93,\"abbreviation\":\"CY\",\"text\":\"Cyprus\",\"is_gdpr\":true},{\"id\":94,\"abbreviation\":\"CZ\",\"text\":\"Czech Republic\",\"is_gdpr\":true},{\"id\":1190,\"abbreviation\":\"CD\",\"text\":\"Democratic Republic of the Congo\",\"is_gdpr\":false},{\"id\":96,\"abbreviation\":\"DJ\",\"text\":\"Djibouti\",\"is_gdpr\":false},{\"id\":97,\"abbreviation\":\"DM\",\"text\":\"Dominica\",\"is_gdpr\":false},{\"id\":98,\"abbreviation\":\"DO\",\"text\":\"Dominican Republic\",\"is_gdpr\":false},{\"id\":1198,\"abbreviation\":\"TL\",\"text\":\"East Timor\",\"is_gdpr\":false},{\"id\":100,\"abbreviation\":\"EC\",\"text\":\"Ecuador\",\"is_gdpr\":false},{\"id\":101,\"abbreviation\":\"EG\",\"text\":\"Egypt\",\"is_gdpr\":false},{\"id\":102,\"abbreviation\":\"SV\",\"text\":\"El Salvador\",\"is_gdpr\":false},{\"id\":103,\"abbreviation\":\"GQ\",\"text\":\"Equatorial Guinea\",\"is_gdpr\":false},{\"id\":104,\"abbreviation\":\"ER\",\"text\":\"Eritrea\",\"is_gdpr\":false},{\"id\":105,\"abbreviation\":\"EE\",\"text\":\"Estonia\",\"is_gdpr\":true},{\"id\":240,\"abbreviation\":\"SZ\",\"text\":\"Eswatini\",\"is_gdpr\":false},{\"id\":106,\"abbreviation\":\"ET\",\"text\":\"Ethiopia\",\"is_gdpr\":false},{\"id\":108,\"abbreviation\":\"FK\",\"text\":\"Falkland Islands (Malvinas)\",\"is_gdpr\":true},{\"id\":109,\"abbreviation\":\"FO\",\"text\":\"Faroe Islands\",\"is_gdpr\":true},{\"id\":110,\"abbreviation\":\"FJ\",\"text\":\"Fiji\",\"is_gdpr\":false},{\"id\":111,\"abbreviation\":\"FI\",\"text\":\"Finland\",\"is_gdpr\":true},{\"id\":112,\"abbreviation\":\"FR\",\"text\":\"France\",\"is_gdpr\":true},{\"id\":114,\"abbreviation\":\"GF\",\"text\":\"French Guiana\",\"is_gdpr\":true},{\"id\":115,\"abbreviation\":\"PF\",\"text\":\"French Polynesia\",\"is_gdpr\":true},{\"id\":116,\"abbreviation\":\"TF\",\"text\":\"French Southern Territories\",\"is_gdpr\":true},{\"id\":117,\"abbreviation\":\"GA\",\"text\":\"Gabon\",\"is_gdpr\":false},{\"id\":118,\"abbreviation\":\"GM\",\"text\":\"Gambia\",\"is_gdpr\":false},{\"id\":119,\"abbreviation\":\"GE\",\"text\":\"Georgia\",\"is_gdpr\":false},{\"id\":120,\"abbreviation\":\"DE\",\"text\":\"Germany\",\"is_gdpr\":true},{\"id\":121,\"abbreviation\":\"GH\",\"text\":\"Ghana\",\"is_gdpr\":false},{\"id\":122,\"abbreviation\":\"GI\",\"text\":\"Gibraltar\",\"is_gdpr\":true},{\"id\":123,\"abbreviation\":\"GR\",\"text\":\"Greece\",\"is_gdpr\":true},{\"id\":124,\"abbreviation\":\"GL\",\"text\":\"Greenland\",\"is_gdpr\":true},{\"id\":125,\"abbreviation\":\"GD\",\"text\":\"Grenada\",\"is_gdpr\":false},{\"id\":126,\"abbreviation\":\"GP\",\"text\":\"Guadeloupe\",\"is_gdpr\":true},{\"id\":127,\"abbreviation\":\"GU\",\"text\":\"Guam\",\"is_gdpr\":false},{\"id\":128,\"abbreviation\":\"GT\",\"text\":\"Guatemala\",\"is_gdpr\":false},{\"id\":1077,\"abbreviation\":\"GG\",\"text\":\"Guernsey\",\"is_gdpr\":false},{\"id\":129,\"abbreviation\":\"GN\",\"text\":\"Guinea\",\"is_gdpr\":false},{\"id\":130,\"abbreviation\":\"GW\",\"text\":\"Guinea-Bissau\",\"is_gdpr\":false},{\"id\":131,\"abbreviation\":\"GY\",\"text\":\"Guyana\",\"is_gdpr\":false},{\"id\":132,\"abbreviation\":\"HT\",\"text\":\"Haiti\",\"is_gdpr\":false},{\"id\":133,\"abbreviation\":\"HM\",\"text\":\"Heard And McDonald Islands\",\"is_gdpr\":false},{\"id\":134,\"abbreviation\":\"HN\",\"text\":\"Honduras\",\"is_gdpr\":false},{\"id\":135,\"abbreviation\":\"HK\",\"text\":\"Hong Kong\",\"is_gdpr\":false},{\"id\":136,\"abbreviation\":\"HU\",\"text\":\"Hungary\",\"is_gdpr\":true},{\"id\":137,\"abbreviation\":\"IS\",\"text\":\"Iceland\",\"is_gdpr\":true},{\"id\":139,\"abbreviation\":\"ID\",\"text\":\"Indonesia\",\"is_gdpr\":false},{\"id\":141,\"abbreviation\":\"IQ\",\"text\":\"Iraq\",\"is_gdpr\":false},{\"id\":142,\"abbreviation\":\"IE\",\"text\":\"Ireland\",\"is_gdpr\":true},{\"id\":1079,\"abbreviation\":\"IM\",\"text\":\"Isle of Man\",\"is_gdpr\":false},{\"id\":143,\"abbreviation\":\"IL\",\"text\":\"Israel\",\"is_gdpr\":false},{\"id\":144,\"abbreviation\":\"IT\",\"text\":\"Italy\",\"is_gdpr\":true},{\"id\":145,\"abbreviation\":\"JM\",\"text\":\"Jamaica\",\"is_gdpr\":false},{\"id\":1076,\"abbreviation\":\"JE\",\"text\":\"Jersey\",\"is_gdpr\":false},{\"id\":147,\"abbreviation\":\"JO\",\"text\":\"Jordan\",\"is_gdpr\":false},{\"id\":148,\"abbreviation\":\"KZ\",\"text\":\"Kazakhstan\",\"is_gdpr\":false},{\"id\":149,\"abbreviation\":\"KE\",\"text\":\"Kenya\",\"is_gdpr\":false},{\"id\":150,\"abbreviation\":\"KI\",\"text\":\"Kiribati\",\"is_gdpr\":false},{\"id\":152,\"abbreviation\":\"KR\",\"text\":\"Korea, Republic Of\",\"is_gdpr\":false},{\"id\":1199,\"abbreviation\":\"XK\",\"text\":\"Kosovo\",\"is_gdpr\":true},{\"id\":153,\"abbreviation\":\"KW\",\"text\":\"Kuwait\",\"is_gdpr\":false},{\"id\":154,\"abbreviation\":\"KG\",\"text\":\"Kyrgyzstan\",\"is_gdpr\":false},{\"id\":155,\"abbreviation\":\"LA\",\"text\":\"Lao People's Democratic Republic\",\"is_gdpr\":false},{\"id\":156,\"abbreviation\":\"LV\",\"text\":\"Latvia\",\"is_gdpr\":true},{\"id\":157,\"abbreviation\":\"LB\",\"text\":\"Lebanon\",\"is_gdpr\":false},{\"id\":158,\"abbreviation\":\"LS\",\"text\":\"Lesotho\",\"is_gdpr\":false},{\"id\":159,\"abbreviation\":\"LR\",\"text\":\"Liberia\",\"is_gdpr\":false},{\"id\":161,\"abbreviation\":\"LI\",\"text\":\"Liechtenstein\",\"is_gdpr\":true},{\"id\":162,\"abbreviation\":\"LT\",\"text\":\"Lithuania\",\"is_gdpr\":true},{\"id\":163,\"abbreviation\":\"LU\",\"text\":\"Luxembourg\",\"is_gdpr\":true},{\"id\":164,\"abbreviation\":\"MO\",\"text\":\"Macau\",\"is_gdpr\":false},{\"id\":166,\"abbreviation\":\"MG\",\"text\":\"Madagascar\",\"is_gdpr\":false},{\"id\":167,\"abbreviation\":\"MW\",\"text\":\"Malawi\",\"is_gdpr\":false},{\"id\":168,\"abbreviation\":\"MY\",\"text\":\"Malaysia\",\"is_gdpr\":false},{\"id\":169,\"abbreviation\":\"MV\",\"text\":\"Maldives\",\"is_gdpr\":false},{\"id\":170,\"abbreviation\":\"ML\",\"text\":\"Mali\",\"is_gdpr\":false},{\"id\":171,\"abbreviation\":\"MT\",\"text\":\"Malta\",\"is_gdpr\":true},{\"id\":172,\"abbreviation\":\"MH\",\"text\":\"Marshall Islands\",\"is_gdpr\":false},{\"id\":173,\"abbreviation\":\"MQ\",\"text\":\"Martinique\",\"is_gdpr\":true},{\"id\":174,\"abbreviation\":\"MR\",\"text\":\"Mauritania\",\"is_gdpr\":false},{\"id\":175,\"abbreviation\":\"MU\",\"text\":\"Mauritius\",\"is_gdpr\":false},{\"id\":176,\"abbreviation\":\"YT\",\"text\":\"Mayotte\",\"is_gdpr\":true},{\"id\":177,\"abbreviation\":\"MX\",\"text\":\"Mexico\",\"is_gdpr\":false},{\"id\":178,\"abbreviation\":\"FM\",\"text\":\"Micronesia, Federated States Of\",\"is_gdpr\":false},{\"id\":179,\"abbreviation\":\"MD\",\"text\":\"Moldova, Republic Of\",\"is_gdpr\":false},{\"id\":180,\"abbreviation\":\"MC\",\"text\":\"Monaco\",\"is_gdpr\":false},{\"id\":181,\"abbreviation\":\"MN\",\"text\":\"Mongolia\",\"is_gdpr\":false},{\"id\":1089,\"abbreviation\":\"ME\",\"text\":\"Montenegro\",\"is_gdpr\":false},{\"id\":182,\"abbreviation\":\"MS\",\"text\":\"Montserrat\",\"is_gdpr\":true},{\"id\":183,\"abbreviation\":\"MA\",\"text\":\"Morocco\",\"is_gdpr\":false},{\"id\":184,\"abbreviation\":\"MZ\",\"text\":\"Mozambique\",\"is_gdpr\":false},{\"id\":185,\"abbreviation\":\"MM\",\"text\":\"Myanmar\",\"is_gdpr\":false},{\"id\":186,\"abbreviation\":\"NA\",\"text\":\"Namibia\",\"is_gdpr\":false},{\"id\":187,\"abbreviation\":\"NR\",\"text\":\"Nauru\",\"is_gdpr\":false},{\"id\":188,\"abbreviation\":\"NP\",\"text\":\"Nepal\",\"is_gdpr\":false},{\"id\":190,\"abbreviation\":\"AN\",\"text\":\"Netherlands Antilles\",\"is_gdpr\":false},{\"id\":191,\"abbreviation\":\"NC\",\"text\":\"New Caledonia\",\"is_gdpr\":true},{\"id\":192,\"abbreviation\":\"NZ\",\"text\":\"New Zealand\",\"is_gdpr\":false},{\"id\":193,\"abbreviation\":\"NI\",\"text\":\"Nicaragua\",\"is_gdpr\":false},{\"id\":194,\"abbreviation\":\"NE\",\"text\":\"Niger\",\"is_gdpr\":false},{\"id\":195,\"abbreviation\":\"NG\",\"text\":\"Nigeria\",\"is_gdpr\":false},{\"id\":196,\"abbreviation\":\"NU\",\"text\":\"Niue\",\"is_gdpr\":false},{\"id\":197,\"abbreviation\":\"NF\",\"text\":\"Norfolk Island\",\"is_gdpr\":false},{\"id\":165,\"abbreviation\":\"MK\",\"text\":\"North Macedonia\",\"is_gdpr\":false},{\"id\":198,\"abbreviation\":\"MP\",\"text\":\"Northern Mariana Islands\",\"is_gdpr\":false},{\"id\":200,\"abbreviation\":\"OM\",\"text\":\"Oman\",\"is_gdpr\":false},{\"id\":201,\"abbreviation\":\"PK\",\"text\":\"Pakistan\",\"is_gdpr\":false},{\"id\":202,\"abbreviation\":\"PW\",\"text\":\"Palau\",\"is_gdpr\":false},{\"id\":1045,\"abbreviation\":\"PS\",\"text\":\"Palestine\",\"is_gdpr\":false},{\"id\":203,\"abbreviation\":\"PA\",\"text\":\"Panama\",\"is_gdpr\":false},{\"id\":204,\"abbreviation\":\"PG\",\"text\":\"Papua New Guinea\",\"is_gdpr\":false},{\"id\":205,\"abbreviation\":\"PY\",\"text\":\"Paraguay\",\"is_gdpr\":false},{\"id\":206,\"abbreviation\":\"PE\",\"text\":\"Peru\",\"is_gdpr\":false},{\"id\":207,\"abbreviation\":\"PH\",\"text\":\"Philippines\",\"is_gdpr\":false},{\"id\":208,\"abbreviation\":\"PN\",\"text\":\"Pitcairn\",\"is_gdpr\":true},{\"id\":209,\"abbreviation\":\"PL\",\"text\":\"Poland\",\"is_gdpr\":true},{\"id\":210,\"abbreviation\":\"PT\",\"text\":\"Portugal\",\"is_gdpr\":true},{\"id\":211,\"abbreviation\":\"PR\",\"text\":\"Puerto Rico\",\"is_gdpr\":false},{\"id\":212,\"abbreviation\":\"QA\",\"text\":\"Qatar\",\"is_gdpr\":false},{\"id\":213,\"abbreviation\":\"RE\",\"text\":\"Reunion\",\"is_gdpr\":true},{\"id\":214,\"abbreviation\":\"RO\",\"text\":\"Romania\",\"is_gdpr\":true},{\"id\":215,\"abbreviation\":\"RU\",\"text\":\"Russian Federation\",\"is_gdpr\":false},{\"id\":216,\"abbreviation\":\"RW\",\"text\":\"Rwanda\",\"is_gdpr\":false},{\"id\":1088,\"abbreviation\":\"BL\",\"text\":\"Saint Bartholemy\",\"is_gdpr\":true},{\"id\":217,\"abbreviation\":\"KN\",\"text\":\"Saint Kitts And Nevis\",\"is_gdpr\":false},{\"id\":218,\"abbreviation\":\"LC\",\"text\":\"Saint Lucia\",\"is_gdpr\":false},{\"id\":1195,\"abbreviation\":\"MF\",\"text\":\"Saint Martin\",\"is_gdpr\":true},{\"id\":219,\"abbreviation\":\"VC\",\"text\":\"Saint Vincent And The Grenadines\",\"is_gdpr\":false},{\"id\":220,\"abbreviation\":\"WS\",\"text\":\"Samoa\",\"is_gdpr\":false},{\"id\":221,\"abbreviation\":\"SM\",\"text\":\"San Marino\",\"is_gdpr\":false},{\"id\":222,\"abbreviation\":\"ST\",\"text\":\"Sao Tome And Principe\",\"is_gdpr\":false},{\"id\":223,\"abbreviation\":\"SA\",\"text\":\"Saudi Arabia\",\"is_gdpr\":false},{\"id\":224,\"abbreviation\":\"SN\",\"text\":\"Senegal\",\"is_gdpr\":false},{\"id\":993,\"abbreviation\":\"RS\",\"text\":\"Serbia\",\"is_gdpr\":false},{\"id\":225,\"abbreviation\":\"SC\",\"text\":\"Seychelles\",\"is_gdpr\":false},{\"id\":226,\"abbreviation\":\"SL\",\"text\":\"Sierra Leone\",\"is_gdpr\":false},{\"id\":1197,\"abbreviation\":\"SX\",\"text\":\"Sint Maarten\",\"is_gdpr\":true},{\"id\":228,\"abbreviation\":\"SK\",\"text\":\"Slovakia\",\"is_gdpr\":true},{\"id\":229,\"abbreviation\":\"SI\",\"text\":\"Slovenia\",\"is_gdpr\":true},{\"id\":230,\"abbreviation\":\"SB\",\"text\":\"Solomon Islands\",\"is_gdpr\":false},{\"id\":232,\"abbreviation\":\"ZA\",\"text\":\"South Africa\",\"is_gdpr\":false},{\"id\":1193,\"abbreviation\":\"GS\",\"text\":\"South Georgia and the South Sandwich Islands\",\"is_gdpr\":false},{\"id\":1196,\"abbreviation\":\"SS\",\"text\":\"South Sudan\",\"is_gdpr\":false},{\"id\":234,\"abbreviation\":\"LK\",\"text\":\"Sri Lanka\",\"is_gdpr\":false},{\"id\":235,\"abbreviation\":\"SH\",\"text\":\"St. Helena\",\"is_gdpr\":true},{\"id\":236,\"abbreviation\":\"PM\",\"text\":\"St. Pierre And Miquelon\",\"is_gdpr\":true},{\"id\":238,\"abbreviation\":\"SR\",\"text\":\"Suriname\",\"is_gdpr\":false},{\"id\":239,\"abbreviation\":\"SJ\",\"text\":\"Svalbard And Jan Mayen Islands\",\"is_gdpr\":false},{\"id\":241,\"abbreviation\":\"SE\",\"text\":\"Sweden\",\"is_gdpr\":true},{\"id\":242,\"abbreviation\":\"CH\",\"text\":\"Switzerland\",\"is_gdpr\":true},{\"id\":244,\"abbreviation\":\"TW\",\"text\":\"Taiwan\",\"is_gdpr\":false},{\"id\":245,\"abbreviation\":\"TJ\",\"text\":\"Tajikistan\",\"is_gdpr\":false},{\"id\":246,\"abbreviation\":\"TZ\",\"text\":\"Tanzania, United Republic Of\",\"is_gdpr\":false},{\"id\":247,\"abbreviation\":\"TH\",\"text\":\"Thailand\",\"is_gdpr\":false},{\"id\":248,\"abbreviation\":\"TG\",\"text\":\"Togo\",\"is_gdpr\":false},{\"id\":249,\"abbreviation\":\"TK\",\"text\":\"Tokelau\",\"is_gdpr\":false},{\"id\":250,\"abbreviation\":\"TO\",\"text\":\"Tonga\",\"is_gdpr\":false},{\"id\":251,\"abbreviation\":\"TT\",\"text\":\"Trinidad And Tobago\",\"is_gdpr\":false},{\"id\":252,\"abbreviation\":\"TN\",\"text\":\"Tunisia\",\"is_gdpr\":false},{\"id\":253,\"abbreviation\":\"TR\",\"text\":\"Turkey\",\"is_gdpr\":false},{\"id\":254,\"abbreviation\":\"TM\",\"text\":\"Turkmenistan\",\"is_gdpr\":false},{\"id\":255,\"abbreviation\":\"TC\",\"text\":\"Turks And Caicos Islands\",\"is_gdpr\":true},{\"id\":256,\"abbreviation\":\"TV\",\"text\":\"Tuvalu\",\"is_gdpr\":false},{\"id\":257,\"abbreviation\":\"UG\",\"text\":\"Uganda\",\"is_gdpr\":false},{\"id\":258,\"abbreviation\":\"UA\",\"text\":\"Ukraine\",\"is_gdpr\":false},{\"id\":259,\"abbreviation\":\"AE\",\"text\":\"United Arab Emirates\",\"is_gdpr\":false},{\"id\":262,\"abbreviation\":\"UM\",\"text\":\"United States Minor Outlying Islands\",\"is_gdpr\":false},{\"id\":263,\"abbreviation\":\"UY\",\"text\":\"Uruguay\",\"is_gdpr\":false},{\"id\":264,\"abbreviation\":\"UZ\",\"text\":\"Uzbekistan\",\"is_gdpr\":false},{\"id\":265,\"abbreviation\":\"VU\",\"text\":\"Vanuatu\",\"is_gdpr\":false},{\"id\":266,\"abbreviation\":\"VA\",\"text\":\"Vatican City State\",\"is_gdpr\":false},{\"id\":267,\"abbreviation\":\"VE\",\"text\":\"Venezuela\",\"is_gdpr\":false},{\"id\":268,\"abbreviation\":\"VN\",\"text\":\"Vietnam\",\"is_gdpr\":false},{\"id\":269,\"abbreviation\":\"VG\",\"text\":\"Virgin Islands (British)\",\"is_gdpr\":true},{\"id\":270,\"abbreviation\":\"VI\",\"text\":\"Virgin Islands (U.S.)\",\"is_gdpr\":false},{\"id\":271,\"abbreviation\":\"WF\",\"text\":\"Wallis And Futuna Islands\",\"is_gdpr\":true},{\"id\":272,\"abbreviation\":\"EH\",\"text\":\"Western Sahara\",\"is_gdpr\":false},{\"id\":273,\"abbreviation\":\"YE\",\"text\":\"Yemen\",\"is_gdpr\":false},{\"id\":276,\"abbreviation\":\"ZM\",\"text\":\"Zambia\",\"is_gdpr\":false},{\"id\":277,\"abbreviation\":\"ZW\",\"text\":\"Zimbabwe\",\"is_gdpr\":false}]}]]}]\n"])</script></body></html>