*Course contents may vary depending upon location, see specific event description for details.
Building a Home Network Configured to Collect Artifacts for Supporting Network Forensic Incident ResponseBy Gordon Fraser
Protect the Network from the Endpoint with the Critical Security ControlsBy G. W. Ray Davidson, PhD
Breach Control: Best Practices in Health Care Application SecurityBy Brian Quick
Last 25 Papers »
They Can Run, But They Can't Hide: Real-Time Threat Hunting [...]September 27, 2016 - 1:28 PM
Get the #training you need to make your organization #cyber [...]September 26, 2016 - 7:02 PM
At #SANSBaltimore, choose from 10 hands-on, immersion-style [...]September 26, 2016 - 4:03 PM
Mon-Fri 9am - 8pm EST/EDT
"As a security professional, this info is foundational to do a competent job, let alone be successful."- Michael Foster, Providence Health and Security
"Because of the use of real-world examples it's easier to apply what you learn."- Danny Hill, Friedkin Companies, Inc.
"Just amazing content and instruction, it's really a 'must do' for any info sec professional."- Mark Austin, PHH Mortgage