A Forensic Analysis of the Encrypting File System
By Ramprasad Ramshankar
Unpacking the Hype: What You Can (and Can't) Do to Prevent/Detect Software Supply Chain Attacks
By Jake Williams
Host Based Intrusion Detection: An Overview of Tripwire and Intruder Alert
By Allison Hrivnak
In their #SANSCyberCamp talk, @kiran_oliver shared some chal [...]
February 26, 2021 - 7:20 PM
Our very own @lennyzeltser was interviewed by @idgconnect on [...]
February 26, 2021 - 6:20 PM
Our next #STARWebcast comes to us from @snarejen & @_wha [...]
February 26, 2021 - 4:15 PM
Mon-Fri: 9am-8pm ET (phone/email)
Sat-Sun: 9am-5pm ET (email only)
301-654-SANS(7267)
info@sans.org
"The perfect balance of theory and hands-on experience."
- James D. Perry II, University of Tennessee
"Just amazing content and instruction, it's really a 'must do' for any info sec professional."
- Mark Austin, PHH Mortgage
"Expertise of the trainer is impressive, real life situations explained, very good manuals. Best training ever!"
- Jerry Robles de Medina, Godo CU