A Forensic Analysis of the Encrypting File System
By Ramprasad Ramshankar
Unpacking the Hype: What You Can (and Can't) Do to Prevent/Detect Software Supply Chain Attacks
By Jake Williams
Host Based Intrusion Detection: An Overview of Tripwire and Intruder Alert
By Allison Hrivnak
In our next #STARWebcast, featuring @snarejen & @_whatsh [...]
February 28, 2021 - 5:40 PM
Join @KennethGHartman on March 2 at 1:00 PM EST for a #TechT [...]
February 28, 2021 - 1:40 PM
Our very own @lennyzeltser was interviewed by @idgconnect on [...]
February 28, 2021 - 10:35 AM
Mon-Fri: 9am-8pm ET (phone/email)
Sat-Sun: 9am-5pm ET (email only)
301-654-SANS(7267)
info@sans.org
"This has been a great way to get working knowledge that would have taken years of experience to learn."
- Josh Carlson, Nelnet
"Just amazing content and instruction, it's really a 'must do' for any info sec professional."
- Mark Austin, PHH Mortgage
"Expertise of the trainer is impressive, real life situations explained, very good manuals. Best training ever!"
- Jerry Robles de Medina, Godo CU