A Visual Summary of SANS Blue Team Summit 2022
SANS Cybersecurity Blog pertaining to a summary of the SANS Blue Team Summit 2022 Continue reading A Visual Summary of SANS Blue Team Summit 2022
Collaborate Disseminate
SANS Cybersecurity Blog pertaining to a summary of the SANS Blue Team Summit 2022 Continue reading A Visual Summary of SANS Blue Team Summit 2022
If you are troubleshooting custom shellcode, you need to work through the instructions patiently and deliberately. This article looks at how to emulate 32-bit ARM shellcode on an x86_64 Ubuntu system. Continue reading Emulate Shellcode with Radare2
Through immersive, hands-on labs, learn Python advanced coding techniques to build cybersecurity projects and automate information security tasks and security operations. Continue reading New SANS Python Course | SEC673: Advanced Information Security Automation with Python
FOR548: eDiscovery: Tactics for Conquering the Data Minefield course will teach students the controls put in place to govern the eDiscovery process, where and how the data is stored and how best to satisfy the collection requirements imposed upon them … Continue reading NEW DFIR COURSE IN DEVELOPMENT | FOR548: eDiscovery: Tactics for Conquering the Data Minefield
The launch of the new SANS OnDemand platform brings new features, improves usability, and boosts accessibility. Learn more, and take it for a test drive with a free course demo. Continue reading The World’s Best Cyber Security Training Just Got Even Better
Linux powers a vast range of business-critical systems across the globe. From webservers to database platforms, to network hardware to security appliances, Linux can often be found “under the hood” making sure the system just keeps working. FOR577: Lin… Continue reading NEW SANS DFIR COURSE | FOR577: LINUX Incident Response & Analysis
The cyber security solutions are the draw, but there’s so much more to the event of which you’ll want to take advantage. Continue reading Top 5 Reasons to Attend Cyber Solutions Fest 2022
Jason D. Christopher shares lessons learned through continually helping ICS security teams and their leaders better understand their security posture through measurement. Continue reading Mature ICS Security with Metrics
The increased targeting of control systems through impactful cyber-attacks has resulted in an attack surface more widely available and vulnerable to cyber-attacks. These attacks are created and deployed by adversaries-for-hire and rogue nation-states w… Continue reading ICS Security Management VS. ICS Attack Targeting
Determine which SANS cybersecurity course is right for you to help you build foundational cybersecurity skills. Continue reading Cyber Security Expertise – Where Should You Begin?