Certified Professionals: Latest Papers

Certified Professionals:

Showing last 50 papers

Analyst Last Name First Name Paper Cert Date
15813 Risto Jonathan Success Rates for Client Side Vulnerabilities GCIH Jun 14, 2016
702 Riffat Muzamil Legal Aspects of Privacy and Security: A Case-Study of Apple versus FBI Arguments GLEG Jun 03, 2016
8809 Martin David Gh0st in the Dshell: Decoding Undocumented Protocols GCIA Jun 03, 2016
5698 Jaworski Steve Using Splunk to Detect DNS Tunneling GCIA Jun 01, 2016
11201 Hawkins Brett Under The Ocean of the Internet - The Deep Web GCIA May 27, 2016
434 Rollison Lenny Critical Security Controls: Software Designed Inventory, Configuration, and Governance GCCC May 24, 2016
444 Brockman Tracy Managing Accepted Vulnerabilities GCCC May 20, 2016
38426 Thomas David An Approach to Reducing Federal Data Breaches GSEC May 17, 2016
34096 Fornero Kaleb Extending your Business Network through a Virtual Private Network (VPN) GSEC May 17, 2016
38077 Nardella Roberto Basic Reverse Engineering with Immunity Debugger GSEC May 09, 2016
38423 Espinosa Gomez Mauricio Full Packet Capture Infrastructure Based on Docker Containers GSEC May 06, 2016
270 Alexander Michael Methods for Understanding and Reducing Social Engineering Attacks GCCC May 03, 2016
11018 Matthee Michael Hendrik Tagging Data to Prevent Data Leakage (Forming Content Repositories) GCIA May 03, 2016
24353 Mehmood Shafqat Enterprise Survival Guide for Ransomware Attacks GCIH May 03, 2016
38256 Knaffl Bill Case Study: How CIS Controls Can Limit the Cascading Failures During an Attack GSEC May 03, 2016
38500 Perry Scott Creating a Secure and Compliant Digital Forensics and Incident Response Network with Remote Access GSEC Apr 29, 2016
38333 Salazar Diana Cloud Security Framework Audit Methods GSEC Apr 27, 2016
505 Warren Aron Using Sulley to Protocol Fuzz for Linux Software Vulnerabilities GXPN Apr 25, 2016
1624 Arnold Tom Incident Response in Amazon EC2: First Responders Guide to Security Incidents in the Cloud GCFE Apr 21, 2016
11078 Smith Scott Catching Flies: A Guide to the Various Flavors of Honeypots GCIA Apr 19, 2016
8773 Rocha Luis Neutrino Exploit Kit Analysis and Threat Indicators GCIA Apr 13, 2016
9800 Hartman Kenneth BitTorrent & Digital Contraband GCIA Apr 13, 2016
10767 Van Tuyl Russel Practical Approach to Detecting and Preventing Web Application Attacks over HTTP/2 GCIA Apr 11, 2016
11043 Jeng Allen Securing Jenkins CI Systems GCIA Apr 08, 2016
8683 Chisholm Colin Boiling the Ocean: Security Operations and Log Analysis GCIH Apr 06, 2016
289 Currie Roderick The Automotive Top 5: Applying the Critical Controls to the Modern Automobile GCCC Apr 04, 2016
38016 Kime Brian Threat Intelligence: Planning and Direction GSEC Mar 29, 2016
32260 Kennel David OPM vs. APT: How Proper Implementation of Key Controls Could Have Prevented a Disaster GSEC Mar 29, 2016
11015 Sass Jeff The Role of Static Analysis in Hardening Open Source Intrusion Detection Systems GCIA Mar 29, 2016
11322 Knutson Tony Filesystem Timestamps: What Makes Them Tick? GCFA Mar 29, 2016
11008 Radichel Teri Balancing Security and Innovation With Event Driven Automation GCIA Mar 22, 2016
97 Hosburgh Matthew Constructing a Measurable Tabletop Exercise for a SCADA Environment GICSP Mar 14, 2016
696 Jarko Christopher GLEG Mar 10, 2016
42 Vines Thomas E-Discovery Operations: Tactical considerations for defensible eDiscovery GLEG Mar 08, 2016
397 Whitteker Wesley Leading Effective Cybersecurity with the Critical Security Controls GCCC Mar 08, 2016
31524 Martin David Tracing the Lineage of DarkSeoul GSEC Mar 04, 2016
37909 Mulder James Mimikatz Overview, Defenses and Detection GSEC Feb 29, 2016
37793 Peterson Brandon Secure Network Design: Micro Segmentation GSEC Feb 29, 2016
11049 Quick Brian E. Breach Control: Best Practices in Health Care GCIA Feb 25, 2016
2390 Vandalon Jules Crossing the line: Joining forces with your customers GISF Feb 24, 2016
37829 Standridge Scott Password Management Applications and Practices GSEC Feb 23, 2016
8846 Todd David Selling Your Information Security Strategy GSLC Feb 18, 2016
10962 Sanchez Gabriel Don't Always Judge a Packet by Its Cover GCIA Feb 16, 2016
1556 Lewis Joshua Incident identification through outlier analysis GCUX Feb 16, 2016
37392 Mier Robert The Case for Endpoint Visibility GSEC Feb 10, 2016
364 Allen Jon Mark Implementing the Critical Security Controls in the Cloud GCCC Feb 10, 2016
33587 Neise Patrick GSEC Feb 04, 2016
37870 Quist Nathaniel Active Defense Through Deceptive Configuration Techniques GSEC Jan 29, 2016
10987 Abelarde Jesus Security Systems Engineering Approach in Evaluating Commercial and Open Source Software Products GCIA Jan 29, 2016
11035 Bosco Phillip Intrusion Detection and Prevention Systems Cheat Sheet: Choosing the Best Solution, Common Misconfigurations, Evasion Techniques, and Recommendations. GCIA Jan 25, 2016