*Course contents may vary depending upon location, see specific event description for details.
Building a Home Network Configured to Collect Artifacts for Supporting Network Forensic Incident ResponseBy Gordon Fraser
Protect the Network from the Endpoint with the Critical Security ControlsBy G. W. Ray Davidson, PhD
Breach Control: Best Practices in Health Care Application SecurityBy Brian Quick
Last 25 Papers »
They Can Run, But They Can't Hide: Real-Time Threat Hunting [...]September 27, 2016 - 1:28 PM
Get the #training you need to make your organization #cyber [...]September 26, 2016 - 7:02 PM
At #SANSBaltimore, choose from 10 hands-on, immersion-style [...]September 26, 2016 - 4:03 PM
Mon-Fri 9am - 8pm EST/EDT
"It was a great learning experience that helped open my eyes wider. The instructor's knowledge was fantastic."- Manuja Wikesekera, Melbourne Cricket Club
"Because of the use of real-world examples it's easier to apply what you learn."- Danny Hill, Friedkin Companies, Inc.
"SANS is far more in-depth than other training I have attended."- Frank Rajnai, Sears Canada Inc