Build cyber prowess with training from renowned experts
Hands-on learning exercises keep you at the top of your cyber game
Demonstrate cybersecurity expertise with GIAC certifications
Multiple training options to best fit your schedule and preferred learning style
Expert-led training at locations around the world
Upcoming workshops, webinars and local events
Harden enterprise security with end-user and role-based training
Chart your path to job-specific training courses
Navigate cybersecurity training through NICE framework roles
US DoD 8140 Directive Frameworks
Align your enterprise cyber skills with ECSF profiles
Find the right training path based on critical skills
Give your cybersecurity career the right foundation for success
Training designed to help security leaders reduce organizational risk
Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.
Connect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
この講演では、攻撃者が攻撃対象のLinuxシステム上で永続性を確立するための様々な方法について説明します。Windowsシステムにおいて永続性を確立する方法として、Run/RunOnceレジストリキーやタスクスケジューラなどを悪用する手法が広く知られていますが、Linux上で攻撃者がどこに隠れているかをご存知ですか?