A Forensic Analysis of the Encrypting File System
By Ramprasad Ramshankar
Unpacking the Hype: What You Can (and Can't) Do to Prevent/Detect Software Supply Chain Attacks
By Jake Williams
Host Based Intrusion Detection: An Overview of Tripwire and Intruder Alert
By Allison Hrivnak
Did you take the 2021 #endpoint monitoring survey? If you a [...]
March 2, 2021 - 3:02 PM
Increased regulation mixed w/a dynamic threat landscape requ [...]
March 2, 2021 - 1:25 PM
Learn directly from real-world practitioners, and develop in [...]
March 1, 2021 - 9:45 PM
Mon-Fri: 9am-8pm ET (phone/email)
Sat-Sun: 9am-5pm ET (email only)
301-654-SANS(7267)
info@sans.org
"The perfect balance of theory and hands-on experience."
- James D. Perry II, University of Tennessee
"Just amazing content and instruction, it's really a 'must do' for any info sec professional."
- Mark Austin, PHH Mortgage
"Expertise of the trainer is impressive, real life situations explained, very good manuals. Best training ever!"
- Jerry Robles de Medina, Godo CU