*Course contents may vary depending upon location, see specific event description for details.
Building a Home Network Configured to Collect Artifacts for Supporting Network Forensic Incident ResponseBy Gordon Fraser
Protect the Network from the Endpoint with the Critical Security ControlsBy G. W. Ray Davidson, PhD
Breach Control: Best Practices in Health Care Application SecurityBy Brian Quick
Last 25 Papers »
They Can Run, But They Can't Hide: Real-Time Threat Hunting [...]September 27, 2016 - 1:28 PM
Get the #training you need to make your organization #cyber [...]September 26, 2016 - 7:02 PM
At #SANSBaltimore, choose from 10 hands-on, immersion-style [...]September 26, 2016 - 4:03 PM
Mon-Fri 9am - 8pm EST/EDT
"It has really been an eye opener concerning the depth of security training and awareness that SANS has to offer."- Michael Hall, Drivesavers
"This has been a great way to get working knowledge that would have taken years of experience to learn."- Josh Carlson, Nelnet
"Because of the use of real-world examples it's easier to apply what you learn."- Danny Hill, Friedkin Companies, Inc.