*Course contents may vary depending upon location, see specific event description for details.
Insider Threats and the Need for Fast and Directed ResponseBy Dr. Eric Cole
Node Router Sensors: What just happened?By Kim Cary
A Checklist for Audit of Docker ContainersBy Alyssa Robinson
Last 25 Papers »
SANS Webcast Using Active Defense & Cyber Deception tact [...]December 5, 2016 - 3:10 PM
Last week to take the SANS 2017 Endpoint Protection Survey & [...]December 5, 2016 - 3:03 PM
Dive deep into ICS Security! Attend the #ICSSummit and take [...]December 4, 2016 - 9:15 PM
Mon-Fri 9am - 8pm EST/EDT
"As a security professional, this info is foundational to do a competent job, let alone be successful."- Michael Foster, Providence Health and Security
"Because of the use of real-world examples it's easier to apply what you learn."- Danny Hill, Friedkin Companies, Inc.
"Expertise of the trainer is impressive, real life situations explained, very good manuals. Best training ever!"- Jerry Robles de Medina, Godo CU