Certified Professionals: Latest Papers

Certified Professionals:

Showing last 50 papers

Analyst Last Name First Name Paper Cert Date
26493 Eckstein Christoph Validating Security Configurations and Detecting Backdoors in New Network Devices GSEC Sep 30, 2014
583 Firth Ryan Next Generation Firewalls and Employee Privacy in the Global Enterprise GLEG Sep 30, 2014
35341 Toussain Matthew Home Field Advantage - Using Indicators of Compromise to Hunt down the Advanced Persistent Threat GSEC Sep 25, 2014
3881 Lyon Dan Modeling Security Investments With Monte Carlo Simulations GWAPT Sep 24, 2014
6517 Stanton Michael A Qradar Log Source Extension Walkthrough GCIH Sep 22, 2014
10182 Vandeven Sally Forensic Images: For Your Viewing Pleasure GCFA Sep 19, 2014
233 Hendrick Jim Security Visibility in the Enterprise GCPM Sep 19, 2014
3428 Walters Dave MalwareD: A study on network and host based defenses that prevent malware from accomplishing its goals GREM Sep 17, 2014
34760 Naish Michael Implementing Public Key Infrastructure (PKI) Using Microsoft Windows Server 2012 Certificate Services GSEC Sep 16, 2014
335 Vandeven Sally A Project Management Approach to Writing a GIAC Gold Paper GCPM Sep 15, 2014
35355 Radichel Teri Case Study: Critical Controls that Could Have Prevented Target Breach GSEC Sep 12, 2014
8431 Sapp Nolan How the SANS Critical Controls Prevent the Red Team from P0wning your Database GSLC Sep 04, 2014
10160 Jodoin Eric Straddling the Next Frontier Part 2: How Quantum Computing has already begun impacting the Cyber Security landscape GCFA Sep 03, 2014
9262 Jodoin Eric Straddling the Next Frontier Part 1: Quantum Computing Primer GCIA Sep 03, 2014
10119 Fraser Gordon Creating a Baseline of Process Activity for Memory Forensics GCFA Aug 27, 2014
4039 Thomassin Sven Differences between HTML5 or AJAX web applications GWAPT Aug 27, 2014
19154 Rocha Luis H.O.T. | Security GCIH Aug 21, 2014
28268 Collyer Tim Airwatch MDM and Android: a policy and technical review GSEC Aug 21, 2014
9063 Imbert Courtney Beyond the cookie: Using network traffic characteristics to enhance confidence in user identity GCIA Aug 19, 2014
35318 Whitteker Wesley Point of Sale (POS) Systems and Security GSEC Aug 18, 2014
1942 Mastad Paul Small devices needs a large Firewall GCIH Aug 18, 2014
35322 Gibbs Pierce Botnet Tracking Tools GSEC Aug 14, 2014
17898 Foster James Are there novel ways to mitigate credential theft attacks in Windows? GCIH Aug 13, 2014
479 Grim Lawrence IDS: File Integrity Checking GSNA Aug 07, 2014
7656 Anderson Dwight Protect Critical Infrastructure Systems With Whitelisting GSEC Aug 05, 2014
7679 Salka Timothy The Maturation of Controls Self - Assessments GSLC Jul 31, 2014
33506 Pubal Jason Building an Application Vulnerability Management Program GSEC Jul 28, 2014
20155 Vandeven Sally Digital Certificate Revocation GCIH Jul 24, 2014
2874 Cheok Roy Wireshark: A Guide to Color My Packets GCIA Jul 09, 2014
10924 Walker Juan Incident Response in a Microsoft SQL Server Environment GCIH Jul 09, 2014
89 Sorensen Robert Peter Risky Business GCPM Jul 08, 2014
3204 Hoehl Michael Web Application Penetration Testing for PCI GWAPT Jun 26, 2014
8775 Scott Charles Designing and Implementing a Honeypot for a SCADA Network GCIA Jun 20, 2014
325 Khalil George A guide to leading and motivating highly driven professionals GCPM Jun 06, 2014
7723 Piggott Daniel A Journey into Litecoin Forensic Artifacts GCFA Jun 03, 2014
6781 Panet-Raymond Marc Securing Aviation Avionics GCIH Jun 03, 2014
8449 Weeks Mike Intrusion Analysis Using Windows PowerShell GCIA May 30, 2014
5374 Teixeira Alexandre Security Analytics: having fun with Splunk and a packet capture file pcap GCIA May 30, 2014
4283 Kliarsky Adam iPwn Apps: Pentesting iOS Applications GPEN May 12, 2014
5124 Eichelberger Florian Automation of Report and Timeline-file based file and URL analysis GCFA May 06, 2014
34856 Nel Martinus SAMHAIN: Host Based Intrusion Detection via File Integrity Monitoring GSEC May 06, 2014
1815 Holland Kurtis Incident Handling Annual Testing and Training GCIH Apr 29, 2014
32137 Hartman Kenneth Skype and Data Exfiltration GSEC Apr 21, 2014
8751 Vandeven Sally Rootkit Detection with OSSEC GCIA Apr 17, 2014
9576 Lo I-Lin Vincent Windows ShellBags Forensics in Depth GCFA Apr 14, 2014
4253 Shanks Wylie Enhancing incident response through forensic, memory analysis and malware sandboxing techniques GCFA Apr 09, 2014
34022 Lomas Alex Implementation and use of DNS RPZ in malware and phishing defence GSEC Apr 03, 2014
813 Butler Chad How to Win Friends and Remediate Vulnerabilities GSSP-JAVA Mar 20, 2014
28443 Knowles Ben Inside Mac Security GSEC Mar 19, 2014
891 Loos Johan Implementing IEEE 802.1x for Wired Networks GCWN Mar 14, 2014