The archive for this Training Event no longer exists. We apologize for any inconvenience.
For a list of all upcoming training see www.sans.org/training_events/.
This was an excellent class that lead us from manual disk operations all the way through some of the newest memory forensics. -Douglas Couch, Purdue University
This was an excellent class that lead us from manual disk operations all the way through some of the newest memory forensics.
Under Threat or Compromise - Every Detail Counts By Jake Williams
How the SANS Top 20 Critical Security Controls Can Be Used in Preventing Point of Sale (POS) CompromisesBy Wesley Whitteker
Beyond the cookie: Using network traffic characteristics to enhance confidence in user identityBy Courtney Imbert
Data Center Risk - tell us how you manage it. http://t.co/iP [...]August 20, 2014 - 12:44 PM
Insiders that can be compromised are prime targets for an ex [...]August 20, 2014 - 11:15 AM
.@PieterDanhieux is ready to lead you through Network Pen Te [...]August 20, 2014 - 6:00 AM
(301) 654-SANS (7267)
Mon-Fri 9am - 8pm EST/EDT
"SANS is a great place to enhance your technical and hands-on skills and tools. I thoroughly recommend it."- Aaron Waugh, Datacom NZ Ltd
"SANS is far more in-depth than other training I have attended."- Frank Rajnai, Sears Canada Inc
"Expertise of the trainer is impressive, real life situations explained, very good manuals. Best training ever!"- Jerry Robles de Medina, Godo CU