None of the currently scheduled courses match your search criteria.
Didn't find what you're looking for? Schedule a Private Training class that meets your needs!
Hunting Threats Inside Packet CapturesBy Muhammad Elharmeel
The Hunter Strikes Back: The SANS 2017 Threat Hunting SurveyBy
Show Me the Money! From Finding to Fixed to FundedBy Robert J. Mavretich
Last 25 Papers »
#SANSWebcast: Don't Miss "Tackling Mobile Security with Cisc [...]April 26, 2017 - 7:50 PM
Internet Storm Center handlers from around the world head to [...]April 26, 2017 - 7:40 PM
Robert Leale will explain the RKE Replay Attack using Roll J [...]April 26, 2017 - 4:35 PM
Mon-Fri 9am - 8pm EST/EDT
"As a security professional, this info is foundational to do a competent job, let alone be successful."- Michael Foster, Providence Health and Security
"This has been a great way to get working knowledge that would have taken years of experience to learn."- Josh Carlson, Nelnet
"Because of the use of real-world examples it's easier to apply what you learn."- Danny Hill, Friedkin Companies, Inc.