A Forensic Analysis of the Encrypting File System
By Ramprasad Ramshankar
Unpacking the Hype: What You Can (and Can't) Do to Prevent/Detect Software Supply Chain Attacks
By Jake Williams
Host Based Intrusion Detection: An Overview of Tripwire and Intruder Alert
By Allison Hrivnak
In their #SANSCyberCamp talk, @kiran_oliver shared some chal [...]
February 26, 2021 - 7:20 PM
Our very own @lennyzeltser was interviewed by @idgconnect on [...]
February 26, 2021 - 6:20 PM
Our next #STARWebcast comes to us from @snarejen & @_wha [...]
February 26, 2021 - 4:15 PM
Mon-Fri: 9am-8pm ET (phone/email)
Sat-Sun: 9am-5pm ET (email only)
301-654-SANS(7267)
info@sans.org
"As a security professional, this info is foundational to do a competent job, let alone be successful."
- Michael Foster, Providence Health and Security
"This has been a great way to get working knowledge that would have taken years of experience to learn."
- Josh Carlson, Nelnet
"Expertise of the trainer is impressive, real life situations explained, very good manuals. Best training ever!"
- Jerry Robles de Medina, Godo CU