Major Update

SEC511: Cybersecurity Engineering: Advanced Threat Detection and Monitoring™

GIAC Continuous Monitoring Certification (GMON)
GIAC Continuous Monitoring Certification (GMON)
  • In Person (6 days)
  • Online
46 CPEs

In today's rapidly evolving threat landscape, traditional cybersecurity measures are no longer sufficient. This advanced training addresses the challenge by equipping practitioners with cutting-edge skills in cybersecurity engineering and advanced threat detection for cloud, network, and endpoint environments. Featuring 18 hands-on labs, a final capstone project, plus gamified bootcamp challenges, it immerses you in real-world scenarios. Master NDR, EDR, and MITRE ATT&CK to build a robust SOC with threat-informed defenses. Elevate your expertise and stay ahead of adversaries with this comprehensive course.

What You Will Learn

Monitor, Detect, Protect: Master Advanced Threat Detection for Cloud, Network, and Endpoints

Cloud (AWS/Azure/Microsoft 365/Serverless), DevOps, Hybrid, Zero Trust, XDR, Blockchain, AI + ML... The pace of technological change continues to increase. Defending your organization as you did five years ago is a recipe for failure. However, chasing the latest trend or shiny new tool rarely leads to successful protection. Successfully defending a modern enterprise requires nimble pragmatism.

Defending an enterprise has never been easy. SANS SEC511 equips defenders with the necessary knowledge, skills, and abilities to protect and monitor a modern hybrid enterprise successfully. Leveraging the cybersecurity engineering and threat detection techniques taught in this course will best position your organization or Security Operations Center (SOC) to analyze, detect, and respond to modern threats across cloud, network, and endpoint environments. Threat-informed defense of a modern enterprise requires accounting for multiple public cloud providers, continued on-premises infrastructure, AI-empowered adversaries, and possibly a substantial number of remote workers who are not behind a traditional security perimeter.

SEC511 features 18+ hands-on labs, a final capstone challenge, and immersive gamified bootcamp challenges, providing defenders a comprehensive, real-world training experience. The course explores cybersecurity engineering topics and techniques such as cloud monitoring, network detection and response (NDR), endpoint detection and response (EDR), security information and event management (SIEM), endpoint protection platform (EPP), secure access service edge (SASE), Zero Trust, generative artificial intelligence (GenAI), and large language model (LLM) application defense, and more to evolve organizations' threat detection and hunting capabilities. Achieving the accompanying GIAC GMON certification demonstrates your understanding and application of these modern defensive techniques.

Adversaries constantly evolve techniques to ensure their continued success; we must vigilantly adapt our defenses to this changing threat landscape.

"I would recommend this course. It hits many core aspects of secure design. Additionally, lack of cloud security architecture and strategy and insecure design have been highlighted as a top risk by organizations like Cloud Security Alliance and OWASP. Cloud security architecture topics need to have more attention and focus in general." - Greg Lewis, SAP

What Is Cybersecurity Engineering?

Cybersecurity engineering involves designing, implementing, and managing advanced defense mechanisms to protect modern enterprise environments, including cloud, network, and endpoint systems. It encompasses threat-informed defense frameworks, advanced threat detection techniques, and the application of tools such as NDR, EDR, and the MITRE ATT&CK framework to build a robust SOC. This discipline ensures comprehensive protection and monitoring against evolving cyber threats.

Business Takeaways

This course will help your organization:

  • Enable effective cloud, network, and endpoint protection and detection strategies
  • Engineer protection and threat detection capabilities
  • Leverage threat informed defense practices to ensure properly refined security countermeasures
  • Materially improve your organization's security operations capabilities
  • Identify protection and detection gaps across hybrid infrastructure
  • Defend GenAI and LLM applications to ensure trustworthy usage
  • Maximize the capabilities of current infrastructure and assets
  • Make sense of data to enable the detection of potential intrusions or unauthorized actions rapidly

Skills Learned

  • Conduct comprehensive current state assessments to engineer and prioritize modern defenses.
  • Apply threat-informed defense frameworks such as MITRE ATT&CK and Zero Trust.
  • Perform threat hunting using advanced techniques and tools.
  • Engineer visibility across modern, hybrid, decentralized infrastructure.
  • Navigate modern domain name system (DNS) and transport layer security (TLS) encryption landscape to balance protection, detection, and privacy considerations.
  • Understand the cloud security stack and tools like cloud-native application protection platform (CNAPP), cloud security posture management (CSPM), cloud infrastructure entitlement management (CIEM), and cloud workload protection platform (CWPP) for robust cloud protection.
  • Leverage NDR tools and techniques to enhance network visibility and detect threats.
  • Conduct effective network threat hunting to identify post-exploitation communications, like command and control (C2) traffic.
  • Analyze network data using tools like Suricata, Zeek, Tshark, and Wireshark for threat detection.
  • Deploy and manage EDR solutions like Microsoft Defender.
  • Implement application control and EPP for endpoint security.
  • Monitor and defend identity and access through advanced authentication and user and entity behavior analytics (UEBA).
  • Defend AI/LLM applications and secure the AI/software supply chain.
  • Perform threat hunting and adversary emulation to assess and evolve detection capabilities.
  • Automate security operations and enhance SOC capabilities with security orchestration, automation, and response (SOAR).

Shall We Play A Game?

NetWars gamification now permeates every single section of the course! Since the launch of SEC511, students have consistently found the NetWars-based Capstone to be great fun. Who would have guessed that a game would be fun, right? Students' praise extended beyond just "fun," they also found the game to be a tremendously effective way to further their learning. Inspired by this feedback, we have now incorporated a game-style environment into every section, not just section six.

Hands-On Threat Detection Training

SEC511 employs several different hands-on tactics that go well beyond simple lecture and instructor-led discussions. Here is a sample:

  • Intrusion Analysis with Elastic Stack and Security Onion
  • TLS Inspection and Monitoring
  • Detecting Windows Post-Exploitation Techniques (e.g. PowerShell, Impacket, Windows Management Infrastructure (WMI), Silver)
  • DNS over HTTPS (DoH) Analysis
  • Entropy and NLP Analysis with freq.py
  • Payload Carving with Zeek
  • Suspicious TLS Analysis with Suricata
  • Sysmon for Intrusion and C2 Analysis
  • Intrusion Detection Honeypots for Breach Detection
  • Application Control for Protection and Detection
  • Cobalt Strike Detection and Analysis
  • Windows Event Log Threat Hunting
  • Gamified Bootcamps: Immersive Cyber Challenges
  • NetWars Final Capstone: Design, Detect, Defend

The meticulously crafted SEC511 Electronic Workbook serves as the starting point for hands-on elements in the course. It includes Security Onion 2, the Elastic Stack, and a lot more. The workbook-driven labs include multiple paths to complete each exercise. This multifaceted approach allows the labs to better accommodate diverse student backgrounds and technical exposure.

"I've done a lot of labs over the years, These are likely one of the best ways to present them I've ever used." - Daniel Russell, BCBSLA

"The labs and exercises were excellent and provided additional supplementary, hands-on learning that helped solidify the course content." - Tyler Piller, British Columbia Lottery Corporation

"All three of today's labs were helpful in cementing the concepts. The "See It In Action" portions were particularly useful." - Oritse Uku

"I really liked that architecture diagrams were incorporated in each." - Greg Lewis, SAP

Syllabus Summary

  • Section 1: Threat Informed Defense Principles
  • Section 2: Cloud, Edge, and Network Visibility and Protection
  • Section 3: NDR and Network Threat Hunting
  • Section 4: User and Endpoint Protection and Detection
  • Section 5: SOC, Automation, Emulation, and GenAI Defense
  • Section 6: NetWars Final Capstone: Design, Detect, Defend

Additional Free Resources

Videos/Webcasts

Tools

What You Will Receive

  • Access to custom cloud-hosted challenges to further understanding
  • MP3 audio files of the complete course lecture
  • Licensed Windows 10 virtual machine (VM)
  • A Linux VM loaded with tons of extra logs, pcap files, and other resources
  • A Digital Download Package that includes the above and more

What Comes Next?

Syllabus (46 CPEs)

Download PDF
  • Overview

    The traditional security model, focused primarily on prevention, has proven insufficient against the sophisticated and persistent threats faced by organizations today. Given the frequency and extent of significant intrusions, this should not come as a surprise.

    In this section of the course, students explore the foundational concepts and methodologies that shape modern cybersecurity strategies. Beginning with a current state assessment, they review traditional and modern attack techniques, understanding how these have evolved and the implications for modern post-exploitation scenarios. The section then delves into advanced cyber defense principles, emphasizing the shift from reactive to proactive measures in threat detection and response. Key techniques, models, and frameworks such as MITRE ATT&CK, CIS Controls, OWASP LLM Top 10, Zero Trust, and Long Tail Analysis are introduced, providing a conceptual toolkit to better understand and mitigate threats. Students learn how to utilize frameworks to better align their defenses with known adversary tactics and techniques.

    Threat-informed defensive strategies and threat hunting are central to modernized cyber defense. Learners explore how to apply MITRE ATT&CK in practical scenarios, enhancing their ability to anticipate and respond to threats.

    Foundational understanding of GenAI and LLMs equips students to both leverage and defend against emerging AI technologies. Frameworks such as MITRE ATLAS and OWASP LLM Top 10 will be highlighted to structure understanding of this evolving area of cyber defense. Hands-on labs focus on detecting traditional and modern attack techniques, including practical exercises with Security Onion and Apache ActiveMQ analysis, culminating in an immersive NetWars Bootcamp to test skills in real-world scenarios.

    Exercises
    • Detecting Traditional Attack Techniques with Security Onion and CyberChef
    • Detecting Modern Attack Techniques with Security Onion
    • Complex Intrusion Analysis: Apache ActiveMQ
    • NetWars Bootcamp: Immersive Cyber Challenges
    Topics
    • Adversary Tactics and Cyber Defense Principles
      • Current State Assessment
      • Traditional Attack/Cyber Defense
      • Modern Attack & Post-Exploitation
      • Advanced Cyber Defense
    • Introducing Security Onion 2.X
      • Alerts Menu
      • Pivoting to the Hunt Menu
      • The Pcap Menu
    • Frameworks/Mental Models
      • Zero Trust
      • Long Tail Analysis
      • ASD Essential Eight
      • CIS Controls + Continuous Diagnostics and Mitigation (CDM)
      • Threat Informed Defense
      • MITRE ATT&CK
    • Threat Informed Defense and Hunting
      • Threat Informed Defense
      • Working with MITRE ATT&CK
    • GenAI/LLM Fundamentals
      • MITRE ATLAS
      • OWASP LLM Top 10
  • Overview

    This section covers the critical aspects of security visibility and protection across cloud, edge, and network environments. It begins with an exploration of network intrusion detection and prevention systems, including malware sandboxes and honeypots, highlighting their roles in identifying and mitigating threats. The impact and importance of encryption, particularly TLS inspection and DNS query encryption, is discussed in detail, providing students with insights into balancing protection of data in transit without compromising visibility. The module also introduces various cloud protection mechanisms, such as CSPM, CIEM, CWPP, and CNAPP, alongside the MITRE ATT&CK Cloud Security Mappings, focusing on securing cloud infrastructures and services like AWS.

    Edge security is another key focus, where students learn about services such as cloud access security broker (CASB), SASE, secure web gateway (SWG), and firewall-as-a-service (FWaaS). These are vital for protecting data and applications in a modern hybrid enterprise where data, applications, and users are no longer found exclusively on-premises. This section also covers boundary protection and detection strategies, including next-generation firewalls (NGFWs) and web application firewalls (WAFs), emphasizing their role in a layered security approach. Hands-on labs provide practical experience with tools like ModSecurity, Wireshark, and intrusion detection honeypots, reinforcing the theoretical knowledge through real-world applications. The NetWars Bootcamp offers an additional immersive experience, challenging students to apply their skills in a controlled, competitive environment.

    Exercises
    • Web Application Firewalls: ModSecurity
    • Decrypting TLS with Wireshark
    • Detecting Adversaries with Protocol Inspection
    • Intrusion Detection Honeypots: HoneyTokens for Leak Detection
    • NetWars Bootcamp: Immersive Cyber Challenges
    Topics
    • Security Visibility
      • Network Intrusion Detection Prevention Systems
      • Malware Sandboxes
      • Intrusion Detection Honeypots
    • Encryption
      • Encryption and TLS Inspection
      • DNS Architecture and Encryption
    • Cloud Protection and Detection
      • Cloud Security Stack
      • CSPM, CIEM, CWPP, CNAPP
      • MITRE ATT&CK Cloud Security Mappings
      • AWS Security Stack
    • Edge Security
      • Edge Security Services
      • CASB, SASE, SWG, FWaaS
      • Boundary Protection and Detection
      • L7 and Next-Generation Firewalls
      • Web Application Firewalls
  • Overview

    In this section, students delve into the specialized field of NDR, exploring its role within the broader context of Network Security Monitoring (NSM) and SIEM. The content covers the essential components and tools of an NDR/NSM setup, emphasizing the importance and efficacy of various data sources, including cloud-specific considerations. These elements must be designed to provide comprehensive coverage and analytical capabilities, allowing security teams to detect and respond to threats swiftly. By leveraging advanced NDR tools and methodologies, students learn to identify and interpret suspicious activities, even within encrypted communications. Equipping students with the skills needed to identify anomalies and potential threats in network traffic requires exploration of various analytic approaches and techniques.

    The focus then shifts to the hands-on practice of network threat hunting, where students learn to track implants, detect C2 traffic, and analyze both decrypted and encrypted network traffic. Techniques for identifying malicious traffic via beacon discovery, entropy analysis, and behavior anomaly detection are covered in detail, with specific reference to modern adversary tactics and tooling. The practical labs in this section include pcap payload carving and analysis with Zeek, intrusion analysis with Security Onion, and TLS anomaly detection. Hands-on labs and this sections NetWars Bootcamp provide students with the opportunity to apply these techniques and further solidify NDR skills through challenging, real-world scenarios.

    Exercises
    • Pcap Analysis and Carving with Zeek
    • Security Onion Service-Side Attack Analysis
    • Wireshark Merlin Analysis
    • Detecting TLS Certificate and User-Agent Anomalies
    • NetWars Bootcamp: Immersive Cyber Challenges
    Topics
    • Network Detection Response (NDR)
      • NDR, NSM, and SIEM
      • NDR/NSM Toolbox
      • NDR Data Sources
      • Cloud NDR: Network Visibility
      • NIDS Design
      • Practical NDR/NSM Issues
      • Security Information and Event Management (SIEM)
      • SIEM + Elastic Stack
      • Entropy and freq.py
    • Network Threat Hunting
      • Tracking Implants and .EXEs
      • Identifying Command and Control Traffic
      • Tracking User Agents
      • C2 via HTTPS
      • TLS Certificates and Handshakes
      • TLS Fingerprinting
      • Cobalt Strike
  • Overview

    This section focuses on the critical aspects of endpoint and user security within hybrid enterprise environments. Students begin with EDR technologies, exploring tools like Microsoft Defender for Cloud and Endpoint, and learn about the importance of comprehensive endpoint monitoring using solutions like Sysmon. The section also covers EPPs, with a particular emphasis on application control and Microsoft's Defender for Servers, highlighting the integration and management of security measures across various endpoints.

    User and identity monitoring is another vital component explored in this section. Students examine advanced techniques for defending identity and access, including privilege management, monitoring, and reduction. The content also addresses persistent challenges of legacy authentication and explores modern authentication methods including elements of multifactor authentication (MFA), passwordless, Windows Hello, and Azure AD/Entra ID. Coverage also includes protection and detection of evolving attacks against authentication systems. The concepts undergirding UEBA provide deeper insights into user activities and identification of potential security risks. Practical labs, such as investigations using Sysmon and AppLocker configurations, offer hands-on experience in managing and responding to endpoint and user-related threats. The NetWars Bootcamp provides an immersive platform for students to practice and refine their skills in a competitive environment.

    Exercises
    • Sysmon
    • CFO Compromise Investigation: Autoruns and Sysmon
    • Application Control with AppLocker
    • Merlin Sysmon Analysis
    • NetWars Bootcamp: Immersive Cyber Challenges
    Topics
    • Endpoint Detection Response (EDR)
      • Microsoft Defender for Cloud
      • Microsoft Defender for Endpoint (EDR)
      • Endpoint Monitoring and Sysmon
    • Endpoint Protection Platform (EPP)
      • Microsoft Defender for Servers
      • Endpoint Protection Platforms (EPPs)
      • Application Control
    • Identity/User/Authentication Monitoring
      • Defending Identity and Access
      • Privilege Reduction
      • Legacy Authentication
      • AuthN, Windows Hello, Passwordless, and Azure AD
      • Advanced Authentication Attacks
      • User and Entity Behavior Analysis (UEBA)
      • Privilege Monitoring
  • Overview

    In the final content-driven section, students explore the emerging field of defending applications built on GenAI and LLMs. The courseware addresses the unique attack surfaces associated with AI technologies, focusing on the specific security challenges and defensive strategies for these applications. Topics such as AI and software supply chain security are covered, with a focus on asset and attack surface discovery, secure baseline configuration, and cloud-based configuration and change management. This section prepares students to tackle the complex issues surrounding the protection of traditional and AI-driven systems and associated data.

    The module also emphasizes the importance of automation and orchestration in modern SOCs. Students learn about the implementation of SOAR solutions to enhance SOC efficiency and effectiveness. Key topics include DNS threat hunting, adversary emulation, and the detection of lateral movement within networks. The practical labs, such as investigating ransomware incidents and analyzing Windows Event Logs, provide hands-on experience with the tools and techniques discussed. This section concludes with another challenging round of the NetWars Bootcamp, where students apply their knowledge in a series of advanced, real-world scenarios, solidifying their skills in defending against sophisticated cyber threats.

    Exercises
    • Ransomware Investigation
    • Windows Event Logs
    • DNS over HTTPS (DoH)
    • NetWars Bootcamp: Immersive Cyber Challenges
    Topics
    • Defending AI/LLM Applications
      • Defending GenAI/LLM Applications
      • AI/LLM Attack Surface
    • AI/Software Supply Chain
      • Software/AI Supply Chain Security
      • Asset/Attack Surface Discovery
      • Secure Baseline Configuration
      • Cloud Configuration Management
    • Service and Event Log Monitoring
      • DNS Threat Hunting
      • Adversary Emulation
      • Detection Engineering
      • Detecting Lateral Movement
    • Automation/SOAR/SOC
      • Automation
      • SOC
  • Overview

    The course culminates in a team-based design, detect, and defend the flag competition. Powered by NetWars, section six provides a full day's worth of hands-on challenges applying the principles taught throughout the week. Your team will progress through multiple levels and missions designed to ensure mastery of the modern cyber defense techniques promoted throughout the course.

    Topics
    • Modern Cyber Defense: Protection, Detection, and Monitoring
    • Applied NDR, NSM, and EDR
    • Network, Endpoint, and Cloud-Oriented Threat Hunting
    • Analyzing Malicious Traffic with Security Onion, Wireshark, and CyberChef
    • Analyzing Malicious Windows Event Logs
    • Packet Analysis
    • Log Analysis
    • C2 Detection

GIAC Continuous Monitoring Certification

The GIAC Continuous Monitoring (GMON) certification validates a practitioner's ability to deter intrusions and quickly detect anomalous activity. GMON certification holders have demonstrated knowledge of defensible security architecture, network security monitoring, continuous diagnostics and mitigation, and continuous security monitoring.

  • Security architecture and security operations centers (SOCs)
  • Network security architecture and monitoring
  • Endpoint security architecture, automation, and continuous monitoring
More Certification Details

Prerequisites

  • Basic understanding of network protocols and devices
  • Experience with Linux and Windows from the command line

Laptop Requirements

Important! Bring your own system configured according to these instructions.

A properly configured system is required to fully participate in this course. If you do not carefully read and follow these instructions, you will not be able to fully participate in hands-on exercises in your course. Therefore, please arrive with a system meeting all of the specified requirements.

Back up your system before class. Better yet, use a system without any sensitive/critical data. SANS is not responsible for your system or data.

MANDATORY SEC511 SYSTEM HARDWARE REQUIREMENTS
  • CPU: 64-bit Intel i5/i7 (8th generation or newer), or AMD equivalent. A x64 bit, 2.0+ GHz or newer processor is mandatory for this class.
  • CRITICAL: Apple Silicon devices cannot perform the necessary virtualization and therefore cannot in any way be used for this course.
  • BIOS settings must be set to enable virtualization technology, such as "Intel-VTx" or "AMD-V" extensions. Be absolutely certain you can access your BIOS if it is password protected, in case changes are necessary.
  • 16GB of RAM or more is required.
  • 100GB of free storage space or more is required.
  • At least one available USB 3.0 Type-A port. A Type-C to Type-A adapter may be necessary for newer laptops. Some endpoint protection software prevents the use of USB devices, so test your system with a USB drive before class.
  • Wireless networking (802.11 standard) is required. There is no wired Internet access in the classroom.
MANDATORY SEC511 HOST CONFIGURATION AND SOFTWARE REQUIREMENTS
  • Your host operating system must be the latest version of Windows 10, Windows 11, or macOS 10.15.x or newer.
  • Fully update your host operating system prior to the class to ensure you have the right drivers and patches installed.
  • Linux hosts are not supported in the classroom due to their numerous variations. If you choose to use Linux as your host, you are solely responsible for configuring it to work with the course materials and/or VMs.
  • Local Administrator Access is required. (Yes, this is absolutely required. Don't let your IT team tell you otherwise.) If your company will not permit this access for the duration of the course, then you should make arrangements to bring a different laptop.
  • You should ensure that antivirus or endpoint protection software is disabled, fully removed, or that you have the administrative privileges to do so. Many of our courses require full administrative access to the operating system and these products can prevent you from accomplishing the labs.
  • Any filtering of egress traffic may prevent accomplishing the labs in your course. Firewalls should be disabled or you must have the administrative privileges to disable it.
  • Download and install VMware Workstation Pro 16.2.X+ or VMware Player 16.2.X+ (for Windows 10 hosts), VMware Workstation Pro 17.0.0+ or VMware Player 17.0.0+ (for Windows 11 hosts), or VMWare Fusion Pro 12.2+ or VMware Fusion Player 11.5+ (for macOS hosts) prior to class beginning. If you do not own a licensed copy of VMware Workstation Pro or VMware Fusion Pro, you can download a free 30-day trial copy from VMware. VMware will send you a time-limited serial number if you register for the trial at their website. Also note that VMware Workstation Player offers fewer features than VMware Workstation Pro. For those with Windows host systems, Workstation Pro is recommended for a more seamless student experience.
  • On Windows hosts, VMware products might not coexist with the Hyper-V hypervisor. For the best experience, ensure VMware can boot a virtual machine. This may require disabling Hyper-V. Instructions for disabling Hyper-V, Device Guard, and Credential Guard are contained in the setup documentation that accompanies your course materials.
  • Download and install 7-Zip (for Windows Hosts) or Keka (for macOS hosts). These tools are also included in your downloaded course materials.

Your course media is delivered via download. The media files for class can be large. Many are in the 40-50GB range, with some over 100GB. You need to allow plenty of time for the download to complete. Internet connections and speed vary greatly and are dependent on many different factors. Therefore, it is not possible to give an estimate of the length of time it will take to download your materials. Please start your course media downloads as soon as you get the link. You will need your course media immediately on the first day of class. Do not wait until the night before class to start downloading these files.

Your course materials include a "Setup Instructions" document that details important steps you must take before you travel to a live class event or start an online class. It may take 30 minutes or more to complete these instructions.

Your class uses an electronic workbook for its lab instructions. In this new environment, a second monitor and/or a tablet device can be useful for keeping class materials visible while you are working on your course's labs.

If you have additional questions about the laptop specifications, please contact customer service.

Author Statement

"We are just beginning to accept that every organization can and will be breached. Perimeter-focused preventive security controls have failed. Attackers simply have to find one way into most organizations; the lack of internal security controls then allows them to take their time to achieve their goal.

"This course assesses the current state of security architecture and continuous monitoring, and provides a new approach to security architecture that can be easily understood and defended. What we love most about this course is that when students walk out, they have a list of action items in hand to make their organization one of the most effective vehicles for frustrating adversaries. Students can assess deficiencies in their own organizations' security architectures and affect meaningful changes that are continuously monitored for deviations from their expected security posture."

- Eric Conrad and Seth Misenar

"SEC511 has not only focused on specific things to learn but has also helped to facilitate a way of thinking analytically." - Calvin Harris, Exelon

Reviews

The practical applications taught in SEC511 were directly relevant to my day-to-day responsibilities at work
Kevin J
SEC511 alumni
The comprehensive training in SEC511 has opened up numerous job opportunities for me in the cybersecurity sector
Kevin J
SEC511's lab sessions provided critical practical experience that helped solidify the theoretical concepts.
Olivia M
BAH
I run SOCs and this course will and does provide a gut check against what we are doing today.
Tim Housman
General Dynamics Information Technology

    Register for SEC511

    Learn about Group Pricing

    Prices below exclude applicable taxes and shipping costs. If applicable, these will be shown on the last page of checkout.

    Loading...