A Forensic Analysis of the Encrypting File System
By Ramprasad Ramshankar
Unpacking the Hype: What You Can (and Can't) Do to Prevent/Detect Software Supply Chain Attacks
By Jake Williams
Host Based Intrusion Detection: An Overview of Tripwire and Intruder Alert
By Allison Hrivnak
In our next #STARWebcast, featuring @snarejen & @_whatsh [...]
February 24, 2021 - 11:15 PM
Learn to balance the implementation of various security cont [...]
February 24, 2021 - 9:05 PM
Our #TechTuesdayWorkshops are two-hour, hands-on virtual env [...]
February 24, 2021 - 6:45 PM
Mon-Fri: 9am-8pm ET (phone/email)
Sat-Sun: 9am-5pm ET (email only)
301-654-SANS(7267)
info@sans.org
"It was a great learning experience that helped open my eyes wider. The instructor's knowledge was fantastic."
- Manuja Wikesekera, Melbourne Cricket Club
"This has been a great way to get working knowledge that would have taken years of experience to learn."
- Josh Carlson, Nelnet
"Because of the use of real-world examples it's easier to apply what you learn."
- Danny Hill, Friedkin Companies, Inc.