Certified Professionals: Latest Papers

Certified Professionals:

Showing last 50 papers

Analyst Last Name First Name Paper Cert Date
7669 Cary Kim Node Router Sensors: What just happened? GCIH Nov 22, 2016
4663 Robinson Alyssa A Checklist for Audit of Docker Containers GSNA Nov 22, 2016
493 Winkel Stefan Security Assurance of Docker Containers GCCC Nov 22, 2016
20548 Collyer Tim BGP Hijinks and Hijacks - Incident Response When Your Backbone Is Your Enemy GCIH Nov 21, 2016
4727 Risto Jonathan Auditing Windows installed software through command line scripts GSNA Nov 14, 2016
11090 Devlin Randy Network Inspection of Duplicate Packets GCIA Nov 11, 2016
11418 Whitteker Wesley The Age of Encryption GCIA Nov 07, 2016
9924 Koch Matthew Implementing Full Packet Capture GCIA Nov 07, 2016
496 Deck Stephen Triaging the Enterprise for Application Security Assessments GCCC Nov 04, 2016
11501 Speece Fred Detecting Penetration Testers on a Windows Network with Splunk GCIA Oct 31, 2016
27815 Ramos Jose The Information We Seek GCIH Oct 25, 2016
9988 Neise Patrick Intrusion Detection Through Relationship Analysis GCIA Oct 24, 2016
38683 Matthews Joseph A Secure Approach to Deploying Wireless Networks GSEC Oct 19, 2016
21599 Andrei Lucian Detecting Incidents Using McAfee Products GCIH Oct 10, 2016
11317 Lichtenberger Matthew PORTKnockOut: Data Exfiltration via Port Knocking over UDP GCIA Sep 29, 2016
10225 Fraser Gordon Building a Home Network Configured to Collect Artifacts for Supporting Network Forensic Incident Response GCIA Sep 21, 2016
10804 McCullough Shaun Using Vagrant to Build a Manageable and Sharable Intrusion Detection Lab GCIA Sep 20, 2016
477 Firth Ryan Know Thy Network - Cisco Firepower and Critical Security Controls 1 & 2 GCCC Sep 19, 2016
463 Shori Andre GCCC Sep 19, 2016
482 Shivdas Sumesh Automating Provisioning of NetFlow Analyzers GCCC Sep 14, 2016
11347 Leos Rivas Manuel Profiling Web Applications for Improved Intrusion Detection GCIA Sep 07, 2016
554 Risto Jonathan Windows Installed Software Inventory GCCC Sep 07, 2016
470 Balakrishnan Balaji Applying Machine Learning Techniques to Measure Critical Security Controls GCCC Sep 06, 2016
35267 Devito Mark A security assessment of Z-Wave devices and replay attack vulnerability. GSEC Aug 31, 2016
11205 Ashford Tim Arming SMB's Against Ransomware Attacks GCIA Aug 31, 2016
456 Miller Marsha Android Security: Web Browsers and Email Applications GCCC Aug 29, 2016
16883 Saxena Sourabh Demystifying Malware Traffic GCIH Aug 29, 2016
9347 Alleyne Nik Building a Forensically Capable Network Infrastructure GCIA Aug 24, 2016
4660 Heijmans Niels GREM Aug 23, 2016
495 Knaffl Bill Simple Approach to Access Control: Port Control and MAC Filtering GCCC Aug 22, 2016
25516 Simsay Jason Incident Handling Preparation: Learning Normal with the Kansa PowerShell Incident Response Framework GCIH Aug 22, 2016
38727 Andrasik Andrew In but not Out: Protecting Confidentiality during Penetration Testing GSEC Aug 22, 2016
4639 Smith Robert Filling the Gaps GSNA Aug 18, 2016
32540 Earnest Wesley Investing in Information Security: A Case Study in Community Banking GSEC Aug 12, 2016
38768 Becker John Introduction to Rundeck for Secure Script Executions GSEC Aug 11, 2016
37714 Devlin Randy Data Loss Prevention GSEC Aug 08, 2016
38628 Johns Jennifer Changing the Perspective of Information Security in the Cloud: Cloud Access Security Brokers and Cloud Identity and Access Management GSEC Aug 04, 2016
4623 Dunn Sandra Defending Against the Weaponization of Trust: Defense in Depth Assessment of TLS GSNA Aug 01, 2016
11233 Kennedy Colm Deception Techniques as Part of Intrusion Detection Strategy GCIA Aug 01, 2016
458 Baze Andrew Realistic Risk Management Using the CIS 20 Security Controls GCCC Aug 01, 2016
8483 Freeman Matt "Is there a Yelp for Ransomware?" Incident response planning that doesn't rely on Plan B GSLC Aug 01, 2016
5598 Roberts Glen Hardware Keyloggers GSLC Jul 29, 2016
38698 Hutter David Physical Security and Why It Is Important GSEC Jul 28, 2016
3402 Risto Jonathan Polymorphic, multi-lingual websites: A theoretical approach for improved website security GWAPT Jul 25, 2016
475 Ackerman Paul Implementing the Critical Security Control: Controlled Use of Administrative Privileges GCCC Jul 25, 2016
316 Murdoch Don Portable System for Network Forensics Data Collection and Analysis GCFA Jul 15, 2016
38852 Long II Michael Scalable Methods for Conducting Cyber Threat Hunt Operations GSEC Jul 14, 2016
3779 Sitnica Adi Using Information Security as an Auditing Tool GSNA Jul 14, 2016
454 Hosburgh Matthew How to Target Critical Infrastructure: The Adversary Return on Investment on an Industrial Control System GCCC Jul 12, 2016
15813 Risto Jonathan Success Rates for Client Side Vulnerabilities GCIH Jun 14, 2016