Certified Professionals: Latest Papers

Certified Professionals:

Showing last 50 papers

Analyst Last Name First Name Paper Cert Date
756 Dittmer John Minimizing Legal Risk When Using Cybersecurity Scanning Tools GLEG Jan 19, 2017
9895 Dennis Taurean How Data Analytics Saved Me Money On My Digital Forensics Services GCFA Jan 16, 2017
543 Straightiff Timothy Leveraging the Asset Inventory Database GCCC Jan 04, 2017
4691 Hershberger Paul Data Breach Impact Estimation GSNA Jan 03, 2017
11579 Fornero Kaleb Is Anyone Out There? Monitoring DNS for Misuse GCIA Dec 30, 2016
587 Bosco Phillip Real-World Case Study: The Overloaded Security Professional's Guide to Prioritizing Critical Security Controls GCCC Dec 27, 2016
36215 Chou Bryan Legal Considerations When Creating an Incident Response Plan GSEC Dec 22, 2016
431 Taylor Austin Continuous Monitoring: Build A World Class Monitoring System for Enterprise, Small Office, or Home GMON Dec 16, 2016
527 Brown David Finding Bad with Splunk GCCC Dec 16, 2016
10091 Cyrus Richie Detecting Malicious SMB Activity Using Bro GCIA Dec 13, 2016
8668 Quist Nathaniel Active Defense via a Labyrinth of Deception GCIA Dec 05, 2016
725 Yuwono Edward Next Generation of Privacy in Europe and the Impact on Information Security: Complying with the GDPR GLEG Dec 05, 2016
33154 Horkan Michael A Black-Box Approach to Embedded Systems Vulnerability Assessment GSEC Dec 05, 2016
7669 Cary Kim Node Router Sensors: What just happened? GCIH Nov 22, 2016
4663 Robinson Alyssa A Checklist for Audit of Docker Containers GSNA Nov 22, 2016
493 Winkel Stefan Security Assurance of Docker Containers GCCC Nov 22, 2016
20548 Collyer Tim BGP Hijinks and Hijacks - Incident Response When Your Backbone Is Your Enemy GCIH Nov 21, 2016
4727 Risto Jonathan Auditing Windows installed software through command line scripts GSNA Nov 14, 2016
11090 Devlin Randy Network Inspection of Duplicate Packets GCIA Nov 11, 2016
11418 Whitteker Wesley The Age of Encryption GCIA Nov 07, 2016
9924 Koch Matthew Implementing Full Packet Capture GCIA Nov 07, 2016
496 Deck Stephen Triaging the Enterprise for Application Security Assessments GCCC Nov 04, 2016
11501 Speece Fred Detecting Penetration Testers on a Windows Network with Splunk GCIA Oct 31, 2016
27815 Ramos Jose The Information We Seek GCIH Oct 25, 2016
9988 Neise Patrick Intrusion Detection Through Relationship Analysis GCIA Oct 24, 2016
38683 Matthews Joseph A Secure Approach to Deploying Wireless Networks GSEC Oct 19, 2016
21599 Andrei Lucian Detecting Incidents Using McAfee Products GCIH Oct 10, 2016
11317 Lichtenberger Matthew PORTKnockOut: Data Exfiltration via Port Knocking over UDP GCIA Sep 29, 2016
10225 Fraser Gordon Building a Home Network Configured to Collect Artifacts for Supporting Network Forensic Incident Response GCIA Sep 21, 2016
10804 McCullough Shaun Using Vagrant to Build a Manageable and Sharable Intrusion Detection Lab GCIA Sep 20, 2016
477 Firth Ryan Know Thy Network - Cisco Firepower and Critical Security Controls 1 & 2 GCCC Sep 19, 2016
463 Shori Andre GCCC Sep 19, 2016
482 Shivdas Sumesh Automating Provisioning of NetFlow Analyzers GCCC Sep 14, 2016
11347 Leos Rivas Manuel Profiling Web Applications for Improved Intrusion Detection GCIA Sep 07, 2016
554 Risto Jonathan Windows Installed Software Inventory GCCC Sep 07, 2016
470 Balakrishnan Balaji Applying Machine Learning Techniques to Measure Critical Security Controls GCCC Sep 06, 2016
35267 Devito Mark A security assessment of Z-Wave devices and replay attack vulnerability. GSEC Aug 31, 2016
11205 Ashford Tim Arming SMB's Against Ransomware Attacks GCIA Aug 31, 2016
456 Miller Marsha Android Security: Web Browsers and Email Applications GCCC Aug 29, 2016
16883 Saxena Sourabh Demystifying Malware Traffic GCIH Aug 29, 2016
9347 Alleyne Nik Building a Forensically Capable Network Infrastructure GCIA Aug 24, 2016
4660 Heijmans Niels GREM Aug 23, 2016
495 Knaffl Bill Simple Approach to Access Control: Port Control and MAC Filtering GCCC Aug 22, 2016
25516 Simsay Jason Incident Handling Preparation: Learning Normal with the Kansa PowerShell Incident Response Framework GCIH Aug 22, 2016
38727 Andrasik Andrew In but not Out: Protecting Confidentiality during Penetration Testing GSEC Aug 22, 2016
4639 Smith Robert Filling the Gaps GSNA Aug 18, 2016
32540 Earnest Wesley Investing in Information Security: A Case Study in Community Banking GSEC Aug 12, 2016
38768 Becker John Introduction to Rundeck for Secure Script Executions GSEC Aug 11, 2016
37714 Devlin Randy Data Loss Prevention GSEC Aug 08, 2016
38628 Johns Jennifer Changing the Perspective of Information Security in the Cloud: Cloud Access Security Brokers and Cloud Identity and Access Management GSEC Aug 04, 2016