Build cyber prowess with training from renowned experts
Hands-on learning exercises keep you at the top of your cyber game
Demonstrate cybersecurity expertise with GIAC certifications
Multiple training options to best fit your schedule and preferred learning style
Expert-led training at locations around the world
Upcoming workshops, webinars and local events
Harden enterprise security with end-user and role-based training
Chart your path to job-specific training courses
Navigate cybersecurity training through NICE framework roles
US DoD 8140 Directive Frameworks
Align your enterprise cyber skills with ECSF profiles
Find the right training path based on critical skills
Give your cybersecurity career the right foundation for success
Training designed to help security leaders reduce organizational risk
Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.
Connect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
Windowsのログには多くの情報が記録されていますが、それに加えてフォレンジックに活用できる様々なアーティファクトから情報を読み取ることができます。この講演では、ユーザーの知らない間に、単なるメタデータとは言い切れないような情報を記録しているアーティファクトをいくつかご紹介します。この講演を聞いたあと、あなたはキャッシュを無効にしますか?キャッシュの面白さを感じてもらえたら嬉しいです。