Jump to content

Search the Community

Showing results for tags 'SANS'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • ANNOUNCEMENTS
    • ANNOUNCEMENTS
  • CERTIFICATION - - - - - NO REQUESTS IN THESE FORUMS - - - - -
    • CISCO SYSTEMS
    • COMPTIA
    • LINUX
    • MICROSOFT
    • ORACLE
    • PROJECT MANAGEMENT
    • SECURITY CERTIFICATIONS
    • SUN MICROSYSTEMS
    • WIRELESS
    • OTHER CERTIFICATIONS
  • CISCO TECHNICAL SECTION
    • CISCO LABS
    • GNS3
    • NETWORK INFRASTRUCTURE
    • SECURITY
    • WIRELESS
    • SERVICE PROVIDERS
    • COLLABORATION, VOICE AND VIDEO
    • DATA CENTER
    • SMALL BUSINESS
  • MICROSOFT TECHNICAL SECTION
  • OTHER TECHNICAL SECTION
  • TRAINING OFFERS & REQUESTS
  • CERTCOLLECTION MALL
  • GENERAL FORUMS
  • COMMUNITY CENTER

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

Found 35 results

  1. I want to share these resources, but I have no idea where to upload that much of files (150 GB+) at once. If anyone want the courses listed, comment below and tell me which courses you want, I will upload if many users request on a particular course. Knowledge is free. Try harder! Here is some SANS course requested by you guys in comment [hide][Hidden Content]]
  2. [hide][Hidden Content]] Please try fix this share. No one seems successful in downloading it. Thank you
  3. Only SANS text and video materials. PDF: Video: [Hidden Content]
  4. I've been looking for these forever. Found them. Not sure how long it'll stay on Mega. [Hidden Content] Key: [Hidden Content]
  5. SANS FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics 2019 (PDF) ADVANCED THREATS ARE IN YOUR NETWORK – IT’S TIME TO GO HUNTING! FOR508: Advanced Incident Response and Threat Hunting Course will help you to: Detect how and when a breach occurred Identify compromised and affected systems Perform damage assessments and determine what was stolen or changed Contain and remediate incidents Develop key sources of threat intelligence Hunt down additional breaches using knowledge of the adversary DAY 0: A 3-letter government agency contacts you to say an advanced threat group is targeting organizations like yours, and that your organization is likely a target. They won’t tell how they know, but they suspect that there are already several breached systems within your enterprise. An advanced persistent threat, aka an APT, is likely involved. This is the most sophisticated threat that you are likely to face in your efforts to defend your systems and data, and these adversaries may have been actively rummaging through your network undetected for months or even years. This is a hypothetical situation, but the chances are very high that hidden threats already exist inside your organization’s networks. Organizations can’t afford to believe that their security measures are perfect and impenetrable, no matter how thorough their security precautions might be. Prevention systems alone are insufficient to counter focused human adversaries who know how to get around most security and monitoring tools. The key is to constantly look for attacks that get past security systems, and to catch intrusions in progress, rather than after attackers have completed their objectives and done significant damage to the organization. For the incident responder, this process is known as “threat hunting”. Threat hunting uses known adversary behaviors to proactively examine the network and endpoints in order to identify new data breaches. Threat hunting and Incident response tactics and procedures have evolved rapidly over the past several years. Your team can no longer afford to use antiquated incident response and threat hunting techniques that fail to properly identify compromised systems, provide ineffective containment of the breach, and ultimately fail to rapidly remediate the incident. Incident response and threat hunting teams are the keys to identifying and observing malware indicators and patterns of activity in order to generate accurate threat intelligence that can be used to detect current and future intrusions. PDF [hide][Hidden Content]] [hide][Hidden Content]]
  6. Evolving Evasion Capabilities Foil Traditional Forensics System memory is today's battleground for host integrity. Novel defense evasion and bypass techniques seen in modern malware continue to outpace host protections and ensure few artifacts are left behind for examiners to piece together. Hunters must have an understanding of OS memory internals in order to detect and analyze adversary behavior. FOR526: Advanced Memory Forensics and Threat Detection has advanced the investigative skills of hundreds of seasoned security professionals over the years, instilling critical knowledge of operating system internals with the practical application of memory acquisition and analysis skills. We are proud to have served in training some of the most skilled technicians in the field today. FOR526 Re-Booted: The newest version of this six-day bootcamp course, the FOR526 Re-Boot, focuses on modern multiplatform enterprise investigations and incorporates real-world, malware and artifact-laden images from system and process memory. We tackle more challenging fileless malware attacks, memory-only, LOLBin and script-based, that require more advanced analysis techniques. Investigative scenarios include acquisition and analysis of targets with security mitigations and OS optimizations such as system integrity protection and memory compression making use of varied tools and methods. Each day's content is augmented with a bootcamp scoring server tournament, allowing the opportunity to practice analysis concepts and build muscle memory. The final Capstone Challenge provides each student a virtual range enterprise to investigate, requiring live memory acquisition and analysis of compromised hosts. FOR526 provides the critical skills necessary for digital forensics examiners and incident responders to successfully perform live system memory triage and analyze captured memory images from Windows, macOS and Linux hosts. The course uses the most effective freeware and open-source tools in the industry today and provides an in-depth understanding of how these tools work. FOR526 is a critical course for any serious security professional who wishes to gain a deeper understanding of the footprint of code execution and adversary tactics in memory. FOR526: Advanced Memory Analysis & Threat Detection will teach you: Multi-platform Enterprise Memory Acquisition & Analysis: Demonstrate targeted memory capture based on target OS and incident circumstance to ensure data integrity and fidelity. How to Find Evil in Memory: Detect rogue, hidden, and injected processes, kernel-level rootkits, Dynamic Link Libraries (DLL) hijacking, process hollowing, and sophisticated persistence mechanisms. Effective Step-by-Step Memory Analysis Techniques: Use process timelining, high-low-level analysis, and walking the Virtual Address Descriptors (VAD) tree to spot anomalous behavior. Best Practice Techniques: Learn when to implement triage, live system analysis, and alternative acquisition techniques, as well as how to devise custom parsing scripts for targeted memory analysis. Course Syllabus FOR526.1: Foundations in Memory Analysis and Acquisition FOR526.2: Unstructured Analysis and Process Exploration FOR526.3: Malicious Code Detection Methods FOR526.4: Memory Analysis with Windows Debugger FOR526.5: macOS Investigations and Rootkit Detection FOR526.6: Memory Analysis Challenges Links: [hide][Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content] [Hidden Content]]
  7. Loooking for the Labs Vms or the newer pdf or videos (2017+ ) for sec542. Thanks very much!
  8. [Hidden Content] MOVED TOPIC Topic is moved to Security Section of TRAINING OFFERS & REQUESTS sub-forum and OFFER prefix added Kindly open topic in appropriate section with suitable prefix.
  9. Hello All, I got these Rapidshare & Nitro links for SANS FOR508 2019 Videos. Could someone please download and upload them on Gdrive /Mega or Torrent please. Thanks in advance ! [Hidden Content]
  10. FOR526: Advanced Memory Forensics & Threat Detection Evolving Evasion Capabilities Foil Traditional Forensics System memory is today's battleground for host integrity. Novel defense evasion and bypass techniques seen in modern malware continue to outpace host protections and ensure few artifacts are left behind for examiners to piece together. Hunters must have an understanding of OS memory internals in order to detect and analyze adversary behavior. FOR526: Advanced Memory Forensics and Threat Detection has advanced the investigative skills of hundreds of seasoned security professionals over the years, instilling critical knowledge of operating system internals with the practical application of memory acquisition and analysis skills. We are proud to have served in training some of the most skilled technicians in the field today. [Hidden Content]
  11. As title, Can anyone share Sans 526 pdfs v 2018. Thank in advance
  12. Hi everyone, Have you had SANS FOR578 CTI PDFs of 2018? If you guys have any links including premium links, please post it here, I would download and upload it to Mega for all? Thanks.
  13. Hi, There are some of these rolling down on net.... someone have it? I started download but broken.
  14. ALL SANS PDF SANS Live Online training offers live-streamed training with the same instruction, content, and learning results you would receive in-person. Training on the cutting edge: All courses are designed to align with dominant security team roles, duties, and disciplines. Explore the Training Roadmap to find the right courses for your immediate cyber security skill development. Learn from the best: SANS instructors are active security practitioners who bring their extensive knowledge and real-world experiences to the classroom. Virtual Bonus Sessions: Content-loaded bonus sessions presented by industry experts, plus virtual NetWars! GIAC Certification: Several certifications align with these training courses, validating student mastery for professional use in critical, specialized InfoSec domains, and job-specific roles. The SANS Promise: You will be able to apply the skills and techniques you’ve learned as soon as you return to work. [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]] [hide][Hidden Content]]
  15. Anyone have the PDFs for SANS 572 Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response? Thanks.
  16. Hello Friends, Here is the link to 508 2019 Ondemand videos. Please grab it fast, link is not fine. Thanks to the original poster. [Hidden Content]
  17. Dear Fellow boarders, I heard that SANS 500 ondemand 2019 videos and USB is out in wild for sometime now.Could someone be kind enough to share those here, thanks! /K
  18. Hi All, SANS DFIR (Digital Forensics Incident Response ) Summit & Training 2020 is virtual and its free .Feel Free to sign up to get reserved slot. [Hidden Content]
  19. Hi, someone could share some material about SEC522. Thks in advance!
  20. Hi Friends, Does anyone have SANS SEC530: Defensible Security Architecture and Engineering course. I am looking for just PDF files. [Hidden Content] Thanks in advance.
  21. Hello community, I'm really looking for one of these courses videos, please share them FOR572: Advanced Network Forensics & Analysis SEC573 Python for Penetration Testers
  22. Does anyone have this course? Then please share [Hidden Content]
  23. I've opened this thread to know how efficiently one can use the obtained SANS Lab materials like VM's and Workbooks locally? Suggestions are much appreciated.
  24. Does anyone have 2018 pdf for SANS sec401
  25. SANS Cyber Aces Online Tutorials For anyone with an interest in learning more about making online information more secure, this course teaches the core concepts needed to understand, assess, and protect information security systems. [Hidden Content] Warning! -> DO NOT hide public access links. Hide tags are ONLY meant to hide Download links.
×
×
  • Create New...