*Course contents may vary depending upon location, see specific event description for details.
Building a Home Network Configured to Collect Artifacts for Supporting Network Forensic Incident ResponseBy Gordon Fraser
Protect the Network from the Endpoint with the Critical Security ControlsBy G. W. Ray Davidson, PhD
Breach Control: Best Practices in Health Care Application SecurityBy Brian Quick
Last 25 Papers »
Gary McAlum of USAA discussing common themes to every succes [...]September 27, 2016 - 7:58 PM
Enhance your skills and combat #cyberattacks. Learn from ind [...]September 27, 2016 - 7:31 PM
New Advanced Smartphone Forensics certification (GASF) avail [...]September 27, 2016 - 5:03 PM
Mon-Fri 9am - 8pm EST/EDT
"This has been a great way to get working knowledge that would have taken years of experience to learn."- Josh Carlson, Nelnet
"Because of the use of real-world examples it's easier to apply what you learn."- Danny Hill, Friedkin Companies, Inc.
"The perfect balance of theory and hands-on experience."- James D. Perry II, University of Tennessee