Jump to content

Search the Community

Showing results for tags 'SANS'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 18 results

  1. ALL SANS PDF SANS Live Online training offers live-streamed training with the same instruction, content, and learning results you would receive in-person. Training on the cutting edge: All courses are designed to align with dominant security team roles, duties, and disciplines. Explore the Training Roadmap to find the right courses for your immediate cyber security skill development. Learn from the best: SANS instructors are active security practitioners who bring their extensive knowledge and real-world experiences to the classroom. Virtual Bonus Sessions: Content-loaded bonus sessions presented by industry experts, plus virtual NetWars! GIAC Certification: Several certifications align with these training courses, validating student mastery for professional use in critical, specialized InfoSec domains, and job-specific roles. The SANS Promise: You will be able to apply the skills and techniques you’ve learned as soon as you return to work. [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  2. Hello! This is a sync share that contains only SANS text and video materials. All I could find across the universe. PDF: ICS410 - ICS/SCADA Security Essentials 2016 [*]AUD507 - Auditing & Monitoring Networks, Perimeters & Systems 2016 [*]DEV540 - Secure DevOps and Cloud Application Security 2017 [*]FOR500 - Windows Forensic Analysis 2017 [*]FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting 2019 [*]FOR518 - Mac and iOS Forensic Analysis and Incident Response 2015 [*]FOR526 - Memory Forensics In-Depth 2015 [*]FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response 2017 [*]FOR585 - Advanced Smartphone Forensics 2017 [*]FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques 2017 [*]MGT512 - SANS Security Leadership Essentials For Managers with Knowledge Compression 2011 [*]MGT514 - Security Strategic Planning, Policy, and Leadership 2016 [*]MGT517 - Managing Security Operations Detection, Response, and Intelligence 2018 [*]SEC201 - Computing & Technology Essentials 2017 [*]SEC401 - Security Essentials Bootcamp Style 2017 [*]SEC460 - Enterprise Threat and Vulnerability Assessment 2018 [*]SEC487 - Open-Source Intelligence (OSINT) Gathering and Analysis 2018 [*]SEC501 - Advanced Security Essentials - Enterprise Defender 2016 [*]SEC503 - Intrusion Detection In-Depth 2015 [*]SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling 2016 [*]SEC505 - Securing Windows and PowerShell Automation 2017 [*]SEC506 - Securing Linux-Unix 2017 [*]SEC511 - Continuous Monitoring and Security Operations 2016 [*]SEC524 - Cloud Security Fundamentals 2012 [*]SEC542 - Web App Penetration Testing and Ethical Hacking 2016 [*]SEC545 - Cloud Security Architecture and Operations 2017 [*]SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception 2016 [*]SEC555 - SIEM with Tactical Analytics 2017 [*]SEC560 - Network Penetration Testing and Ethical Hacking 2018 [*]SEC561 - Immersive Hands-On Hacking Techniques 2015 [*]SEC564 - Red Team Operations and Threat Emulation 2017 [*]SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth 2016 [*]SEC573 - Automating Information Security with Python 2017 [*]SEC579 - Virtualization and Software-Defined Security 2016 [*]SEC580 - Metasploit Kung Fu for Enterprise Pen Testing 2016 [*]SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses 2019 [*]SEC617 - Wireless Penetration Testing and Ethical Hacking 2019 [*]SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques 2017 [*]SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking 2019 [*]SEC760 - Advanced Exploit Development for Penetration Testers 2016 Video: AUD507 - Auditing & Monitoring Networks, Perimeters & Systems 2008 [*]FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting 2015 [*]FOR610 - Reverse-Engineering Malware: Malware Analysis Tools and Techniques 2015 [*]SEC401 - Security Essentials Bootcamp Style 2017 [*]SEC503 - Network Intrusion Detection 2018 [*]SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling 2017 [*]SEC505 - Securing Windows and PowerShell Automation 2017 [*]SEC506 - Securing Linux-Unix 2011 [*]SEC542 - Web App Penetration Testing and Ethical Hacking 2018 [*]SEC560 - Network Penetration Testing and Ethical Hacking 2018 [*]SEC564 - Red Team Exercises and Adversary Emulation 2020 [*]SEC575 - Mobile Device Security and Ethical Hacking 2017 [*]SEC580 - Metasploit Kung Fu for Enterprise Pen Testing 2011 [*]SEC617 - Wireless Penetration Testing and Ethical Hacking 2019 [*]SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques 2015 [*]SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking 2019 [Hidden Content] If you have any new stuff, just PM me. I will add it to the share. Stay synchronised and seed. There will be updates! Kudos to @LFNTHNTR for the baseline.
  3. Does anyone have this course? Then please share [Hidden Content]
  4. SANS FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics 2019 (PDF) ADVANCED THREATS ARE IN YOUR NETWORK – IT’S TIME TO GO HUNTING! FOR508: Advanced Incident Response and Threat Hunting Course will help you to: Detect how and when a breach occurred Identify compromised and affected systems Perform damage assessments and determine what was stolen or changed Contain and remediate incidents Develop key sources of threat intelligence Hunt down additional breaches using knowledge of the adversary DAY 0: A 3-letter government agency contacts you to say an advanced threat group is targeting organizations like yours, and that your organization is likely a target. They won’t tell how they know, but they suspect that there are already several breached systems within your enterprise. An advanced persistent threat, aka an APT, is likely involved. This is the most sophisticated threat that you are likely to face in your efforts to defend your systems and data, and these adversaries may have been actively rummaging through your network undetected for months or even years. This is a hypothetical situation, but the chances are very high that hidden threats already exist inside your organization’s networks. Organizations can’t afford to believe that their security measures are perfect and impenetrable, no matter how thorough their security precautions might be. Prevention systems alone are insufficient to counter focused human adversaries who know how to get around most security and monitoring tools. The key is to constantly look for attacks that get past security systems, and to catch intrusions in progress, rather than after attackers have completed their objectives and done significant damage to the organization. For the incident responder, this process is known as “threat hunting”. Threat hunting uses known adversary behaviors to proactively examine the network and endpoints in order to identify new data breaches. Threat hunting and Incident response tactics and procedures have evolved rapidly over the past several years. Your team can no longer afford to use antiquated incident response and threat hunting techniques that fail to properly identify compromised systems, provide ineffective containment of the breach, and ultimately fail to rapidly remediate the incident. Incident response and threat hunting teams are the keys to identifying and observing malware indicators and patterns of activity in order to generate accurate threat intelligence that can be used to detect current and future intrusions. PDF [hide][Hidden Content]] [hide][Hidden Content]]
  5. I've opened this thread to know how efficiently one can use the obtained SANS Lab materials like VM's and Workbooks locally? Suggestions are much appreciated.
  6. Does anyone have 2018 pdf for SANS sec401
  7. Anyone have the PDFs for SANS 572 Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response? Thanks.
  8. SANS Cyber Aces Online Tutorials For anyone with an interest in learning more about making online information more secure, this course teaches the core concepts needed to understand, assess, and protect information security systems. [Hidden Content] Warning! -> DO NOT hide public access links. Hide tags are ONLY meant to hide Download links.
  9. Hi guys, I'm just wondering if any of you had attended the proctored exam from SANS? I used to take my sans cert all the way back in 2000 and it wasn't a proctored exam back then. Do they allow you to bring only the SANS book in? I plan to do a challenge for a GIAC pentest cert and I'm wondering if the mock up tests that they give you are similar to what you may see in real exams or not. Thanks guys. -sodown
  10. Hello, I wanted to start my training in computer security and wanted to study certifications SANS / GIAC, as I said they are the best. Does anyone have any books or materials to prepare? A greeting.
  11. Hi All, Found the SANS MGT 512 mp3 from here ([Hidden Content]). Was looking for pdfs. Request you to provide pdfs. BR
  12. Hello everyone, I was wondering if anyone could tell me how are SANS security courses because when I took demo on their site I was only fed with slides and voice......... And I was also wondering do they have videos or not.....
  13. I am so much enthusiastic to read/listen/watch SANS MGT525: IT Project Managment, Effective Communication, and PMP Exam Prep material. I would love to get the stuff please.
  14. Hi Friends, I have heard that now SANS Proctor also checks if you have the printed SANS material, and confirms if you have the legal copy or illegal copy? Anybody had any experience with it?
  15. Which 3 certifications from SANS, do you think will lead the way in coming years? a) GCIH GPEN c) GWAPT d) GCFW
  16. Anyone have a SANS practice test they would like to swap for a the GCWN - SEC505 - Securing Windows practice test?
  17. Hi. Just wanted to know if the GSEC 401 and the GCUX 509 are multiple choice or practical exams.
  18. There are a few security certification forums but none for SANS certifications. Considering how big they are wouldn´t it be good to also have a forum for SANS certs? Regards, MoZ
×
×
  • Create New...