*Course contents may vary depending upon location, see specific event description for details.
Insider Threats and the Need for Fast and Directed ResponseBy Dr. Eric Cole
Node Router Sensors: What just happened?By Kim Cary
A Checklist for Audit of Docker ContainersBy Alyssa Robinson
Last 25 Papers »
SANS Webcast Using Active Defense & Cyber Deception tac [...]December 3, 2016 - 12:05 AM
Newly released #SANSNewsBites: VolXVIII Issue 95. #Cyber thr [...]December 2, 2016 - 9:25 PM
#ThreatHuntingSummit - 2 days of in-depth talks, 7 SANS cour [...]December 2, 2016 - 9:20 PM
Mon-Fri 9am - 8pm EST/EDT
"As a security professional, this info is foundational to do a competent job, let alone be successful."- Michael Foster, Providence Health and Security
"Because of the use of real-world examples it's easier to apply what you learn."- Danny Hill, Friedkin Companies, Inc.
"Expertise of the trainer is impressive, real life situations explained, very good manuals. Best training ever!"- Jerry Robles de Medina, Godo CU