A Forensic Analysis of the Encrypting File System
By Ramprasad Ramshankar
Unpacking the Hype: What You Can (and Can't) Do to Prevent/Detect Software Supply Chain Attacks
By Jake Williams
Host Based Intrusion Detection: An Overview of Tripwire and Intruder Alert
By Allison Hrivnak
Did you take the 2021 #endpoint monitoring survey? If you a [...]
March 2, 2021 - 3:02 PM
Increased regulation mixed w/a dynamic threat landscape requ [...]
March 2, 2021 - 1:25 PM
Learn directly from real-world practitioners, and develop in [...]
March 1, 2021 - 9:45 PM
Mon-Fri: 9am-8pm ET (phone/email)
Sat-Sun: 9am-5pm ET (email only)
301-654-SANS(7267)
info@sans.org
"As a security professional, this info is foundational to do a competent job, let alone be successful."
- Michael Foster, Providence Health and Security
"This has been a great way to get working knowledge that would have taken years of experience to learn."
- Josh Carlson, Nelnet
"Because of the use of real-world examples it's easier to apply what you learn."
- Danny Hill, Friedkin Companies, Inc.