Build cyber prowess with training from renowned experts
Hands-on learning exercises keep you at the top of your cyber game
Demonstrate cybersecurity expertise with GIAC certifications
Multiple training options to best fit your schedule and preferred learning style
Expert-led training at locations around the world
Upcoming workshops, webinars and local events
Harden enterprise security with end-user and role-based training
Chart your path to job-specific training courses
Navigate cybersecurity training through NICE framework roles
US DoD 8140 Directive Frameworks
Align your enterprise cyber skills with ECSF profiles
Find the right training path based on critical skills
Give your cybersecurity career the right foundation for success
Training designed to help security leaders reduce organizational risk
Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.
Connect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
サイバー攻撃の最初の目的はターゲット環境への侵入に成功することです。最初の攻撃ペイロードは境界防御を突破し、ターゲットユーザーの操作を促し、感染させるものが多いでしょう。攻撃者が悪用するテクニックは時代とともに変化してきていますが、この分野では特に顕著なトレンドが見られます。このWebcastでは近年のマルウェアが悪用しているテクニックのトレンドを紹介します。