Certified Professionals: Latest Papers

Certified Professionals:

Showing last 50 papers

Analyst Last Name First Name Paper Cert Date
10377 Yeatman William Integration of Network Conversation Metadata with Asset and Configuration Management Databases GCIA May 26, 2015
16808 Imbert Courtney Knitting SOCs GCIH May 26, 2015
3382 Varga-Perke Balint Automated Security Testing of Oracle Forms Applications GWAPT May 26, 2015
36463 McCullough Shaun Lenovo and the Terrible, Horrible, No Good, Very Bad Week GSEC May 21, 2015
5882 Graves Rich Honeytokens and honeypots for web ID and IH GCIA May 14, 2015
8922 Allen Jon Mark IPv6 and Open Source IDS GCIA May 14, 2015
9991 Khalil George IDS File Forensics GCFA May 13, 2015
22279 Groombridge Kenton Nftables as a Second Language GSEC May 11, 2015
344 Shanks Wylie Building a Vulnerability Management Program - A project management approach GCPM May 11, 2015
19939 Eichelberger Florian Using Software Defined Radio to attack "Smart Home" systems GCIH May 01, 2015
35066 Simsay Jason Is It Patched Or Is It Not? GSEC Apr 23, 2015
2573 Bohio Muhammad Junaid Analyzing a Backdoor/Bot for the MIPS Platform GREM Apr 13, 2015
3029 Sylvander Harri XtremeRAT - When Unicode Breaks GREM Apr 09, 2015
654 Greenwell Matthew Defense-in-Policy begets Defense-in-Depth GCED Apr 03, 2015
35394 Sepe Ryan Denial of Service Deterrence GSEC Apr 01, 2015
524 Hoehl Michael Proposal for standard Cloud Computing Security SLAs - Key Metrics for Safeguarding Confidential Data in the Cloud GLEG Apr 01, 2015
23150 Vedaa Charles Practical El Jefe GCIH Mar 31, 2015
858 Schum Chris Correctly Implementing Forward Secrecy GCIH Mar 30, 2015
10612 Brower Joshua Using Sysmon to Enrich Security Onion's Host-Level Capabilities GCFA Mar 27, 2015
33656 Johnson Josh Finding Evil in the Whitelist GSEC Mar 24, 2015
36190 Jeng Allen Minimizing Damage From J.P. Morgan's Data Breach GSEC Mar 17, 2015
6883 Pubal Jason Web Application Firewalls GCIA Mar 16, 2015
635 Belangia David Data Breach Preparation GLEG Mar 16, 2015
7338 Douglas Mick Powercat GPEN Mar 04, 2015
20328 Mourad Hassan Sleeping Your Way out of the Sandbox GSEC Mar 04, 2015
54 Hartman Kenneth What Every Tech Startup Should Know About Security, Privacy, and Compliance GCCC Feb 25, 2015
6768 Risto Jonathan Exercise - not just for your body anymore GSLC Feb 20, 2015
8591 Khalil George Open Source IDS High Performance Shootout GCIA Feb 17, 2015
1296 Cardinal Steven Monitoring Baselines with Nagios GSNA Feb 12, 2015
9027 Shanks Wylie Enhancing Intrusion Analysis through Data Visualization GCIA Feb 12, 2015
36189 Sass Jeff The Role of Static Analysis in Heartbleed GSEC Feb 12, 2015
9290 Mashburn David NetFlow Collection and Analysis Using NFCAPD, Python, and Splunk GCIA Feb 10, 2015
8038 Ashley Daryl An Analysis of Gameover Zeus Network Traffic GCIA Feb 09, 2015
350 Imbert Courtney Using the PMBoK Framework on Small Business IT Projects GCPM Feb 09, 2015
17828 Young Jason The Integration of Information Security to FDA and GAMP 5 Validation Processes GCIH Feb 05, 2015
23577 D'Herdt Jan Detecting Crypto Currency Mining in Corporate Environments GCIH Feb 04, 2015
6613 Catanoi Maxim Penetration Testing: Alternative to Password Cracking GPEN Feb 02, 2015
8570 Filkins Barbara A Plan for How to Get There and What to Do When You Arrive: Practical Advice on Establishing a Security Information Management Program within Healthcare GSLC Jan 26, 2015
95 Hayden Ernie An Abbreviated History of Automation & Industrial Controls System and Cybersecurity GICSP Jan 26, 2015
13998 Poputa-Clean Paul Automated Defense - Using Threat Intelligence to Augment GCIH Jan 19, 2015
10363 Cain Chris Analyzing Man-in-the-Browser (MITB) Attacks GCFA Jan 12, 2015
15218 Hoehl Michael Cyber Breach Coaching GCIH Jan 12, 2015
35836 Ackerman Paul A No-Budget Approach to Malware Containment GSEC Jan 09, 2015
6684 Panczel Zoltan AIX for penetration testers GPEN Jan 08, 2015
10212 Hosburgh Matthew Leveraging the SCADA Cloud for Fun and Profit GCIA Dec 19, 2014
6419 Thyer Jonathan Let's face it, you are probably compromised. What next? GPEN Dec 15, 2014
8477 Sitnica Adi Energy and Utilities Defense Response based on 2014 Attack Pattern GSLC Dec 11, 2014
383 Hubert Keil Evidence Collection From Social Media Sites GLEG Dec 02, 2014
6078 Vazquez Carlos Auditing using Vulnerability tools to identify today's threats Business Performance GSLC Dec 02, 2014
8456 Hershberger Paul Security Skills Assessment and Training: The Critical Security Control that can make or break all others GSLC Dec 02, 2014