Certified Professionals: Latest Papers

Certified Professionals:

Showing last 50 papers

Analyst Last Name First Name Paper Cert Date
5598 Roberts Glen Hardware Keyloggers GSLC Jul 29, 2016
38698 Hutter David Physical Security and Why It Is Important GSEC Jul 28, 2016
3402 Risto Jonathan Polymorphic, multi-lingual websites: A theoretical approach for improved website security GWAPT Jul 25, 2016
99 Murdoch Don Portable System for Network Forensics Data Collection and Analysis GSE Jul 15, 2016
38852 Long II Michael Scalable Methods for Conducting Cyber Threat Hunt Operations GSEC Jul 14, 2016
3779 Sitnica Adi Using Information Security as an Auditing Tool GSNA Jul 14, 2016
454 Hosburgh Matthew How to Target Critical Infrastructure: The Adversary Return on Investment on an Industrial Control System GCCC Jul 12, 2016
15813 Risto Jonathan Success Rates for Client Side Vulnerabilities GCIH Jun 14, 2016
702 Riffat Muzamil Legal Aspects of Privacy and Security: A Case-Study of Apple versus FBI Arguments GLEG Jun 03, 2016
8809 Martin David Gh0st in the Dshell: Decoding Undocumented Protocols GCIA Jun 03, 2016
5698 Jaworski Steve Using Splunk to Detect DNS Tunneling GCIA Jun 01, 2016
11201 Hawkins Brett Under The Ocean of the Internet - The Deep Web GCIA May 27, 2016
434 Rollison Lenny Critical Security Controls: Software Designed Inventory, Configuration, and Governance GCCC May 24, 2016
444 Brockman Tracy Managing Accepted Vulnerabilities GCCC May 20, 2016
38426 Thomas David An Approach to Reducing Federal Data Breaches GSEC May 17, 2016
34096 Fornero Kaleb Extending your Business Network through a Virtual Private Network (VPN) GSEC May 17, 2016
38077 Nardella Roberto Basic Reverse Engineering with Immunity Debugger GSEC May 09, 2016
38423 Espinosa Gomez Mauricio Full Packet Capture Infrastructure Based on Docker Containers GSEC May 06, 2016
270 Alexander Michael Methods for Understanding and Reducing Social Engineering Attacks GCCC May 03, 2016
11018 Matthee Michael Hendrik Tagging Data to Prevent Data Leakage (Forming Content Repositories) GCIA May 03, 2016
24353 Mehmood Shafqat Enterprise Survival Guide for Ransomware Attacks GCIH May 03, 2016
38256 Knaffl Bill Case Study: How CIS Controls Can Limit the Cascading Failures During an Attack GSEC May 03, 2016
38500 Perry Scott Creating a Secure and Compliant Digital Forensics and Incident Response Network with Remote Access GSEC Apr 29, 2016
38333 Salazar Diana Cloud Security Framework Audit Methods GSEC Apr 27, 2016
505 Warren Aron Using Sulley to Protocol Fuzz for Linux Software Vulnerabilities GXPN Apr 25, 2016
1624 Arnold Tom Incident Response in Amazon EC2: First Responders Guide to Security Incidents in the Cloud GCFE Apr 21, 2016
11078 Smith Scott Catching Flies: A Guide to the Various Flavors of Honeypots GCIA Apr 19, 2016
8773 Rocha Luis Neutrino Exploit Kit Analysis and Threat Indicators GCIA Apr 13, 2016
9800 Hartman Kenneth BitTorrent & Digital Contraband GCIA Apr 13, 2016
10767 Van Tuyl Russel Practical Approach to Detecting and Preventing Web Application Attacks over HTTP/2 GCIA Apr 11, 2016
11043 Jeng Allen Securing Jenkins CI Systems GCIA Apr 08, 2016
8683 Chisholm Colin Boiling the Ocean: Security Operations and Log Analysis GCIH Apr 06, 2016
289 Currie Roderick The Automotive Top 5: Applying the Critical Controls to the Modern Automobile GCCC Apr 04, 2016
38016 Kime Brian Threat Intelligence: Planning and Direction GSEC Mar 29, 2016
32260 Kennel David OPM vs. APT: How Proper Implementation of Key Controls Could Have Prevented a Disaster GSEC Mar 29, 2016
11015 Sass Jeff The Role of Static Analysis in Hardening Open Source Intrusion Detection Systems GCIA Mar 29, 2016
11322 Knutson Tony Filesystem Timestamps: What Makes Them Tick? GCFA Mar 29, 2016
11008 Radichel Teri Balancing Security and Innovation With Event Driven Automation GCIA Mar 22, 2016
97 Hosburgh Matthew Constructing a Measurable Tabletop Exercise for a SCADA Environment GICSP Mar 14, 2016
696 Jarko Christopher GLEG Mar 10, 2016
42 Vines Thomas E-Discovery Operations: Tactical considerations for defensible eDiscovery GLEG Mar 08, 2016
397 Whitteker Wesley Leading Effective Cybersecurity with the Critical Security Controls GCCC Mar 08, 2016
31524 Martin David Tracing the Lineage of DarkSeoul GSEC Mar 04, 2016
37909 Mulder James Mimikatz Overview, Defenses and Detection GSEC Feb 29, 2016
37793 Peterson Brandon Secure Network Design: Micro Segmentation GSEC Feb 29, 2016
11049 Quick Brian E. Breach Control: Best Practices in Health Care GCIA Feb 25, 2016
2390 Vandalon Jules Crossing the line: Joining forces with your customers GISF Feb 24, 2016
37829 Standridge Scott Password Management Applications and Practices GSEC Feb 23, 2016
8846 Todd David Selling Your Information Security Strategy GSLC Feb 18, 2016
10962 Sanchez Gabriel Don't Always Judge a Packet by Its Cover GCIA Feb 16, 2016