This webcast is no longer available. Webcasts prior to 2013 are no longer offered.
Click here to go back to the webcasts home page.
Hunting Threats Inside Packet CapturesBy Muhammad Elharmeel
The Hunter Strikes Back: The SANS 2017 Threat Hunting SurveyBy
Show Me the Money! From Finding to Fixed to FundedBy Robert J. Mavretich
Last 25 Papers »
#SANSWebcast: Don't Miss "Tackling Mobile Security with Cisc [...]April 26, 2017 - 7:50 PM
Internet Storm Center handlers from around the world head to [...]April 26, 2017 - 7:40 PM
Robert Leale will explain the RKE Replay Attack using Roll J [...]April 26, 2017 - 4:35 PM
Mon-Fri 9am - 8pm EST/EDT
"As a security professional, this info is foundational to do a competent job, let alone be successful."- Michael Foster, Providence Health and Security
"Because of the use of real-world examples it's easier to apply what you learn."- Danny Hill, Friedkin Companies, Inc.
"The perfect balance of theory and hands-on experience."- James D. Perry II, University of Tennessee