SANS Digital Forensics and Incident Response
Keynote | Days of Future Past: The Impacts of GenAI on Cybersecurity
1 week 1 day ago
SANS Digital Forensics and Incident Response
How persistent is an APT? Battling Three Threat Actors in a Single Environment
1 week 1 day ago
SANS Digital Forensics and Incident Response
Llama: The Fast-File Processor with No Drama
1 week 1 day ago
SANS Digital Forensics and Incident Response
The Tortured Responders Department: Scott & Rebekah's Version
1 week 1 day ago
SANS Digital Forensics and Incident Response
Additional Microsoft Cloud Data Sets You May Not Be Looking At But Probably Should
1 week 1 day ago
SANS Digital Forensics and Incident Response
SANS Threat Analysis Rundown with Katie Nickels | Sep. 2024 Edition
1 week 4 days ago
SANS Digital Forensics and Incident Response
DFIRCON Miami 2024: Special Edition
1 week 4 days ago
SANS Digital Forensics and Incident Response
SANS Threat Analysis Rundown with Katie Nickels | December 2024
1 week 5 days ago
SANS Digital Forensics and Incident Response
SANS Threat Analysis Rundown with Katie Nickels | November 2024
1 week 5 days ago
SANS Digital Forensics and Incident Response
Machine Learning for Enhanced Malware Detection & Classification
1 week 5 days ago
SANS Digital Forensics and Incident Response
SANS Threat Analysis Rundown with Katie Nickels | October 2024
1 week 6 days ago
SANS Digital Forensics and Incident Response
DFIRCON 2024 Pre-Event Community Day
1 week 6 days ago
SANS Digital Forensics and Incident Response
SANS FOR518: Mac & iOS Forensic Analysis & Incident Response
2 weeks ago
SANS Digital Forensics and Incident Response
Undecided about taking the new FOR589: Cybercrime Intelligence Course?
2 weeks ago
SANS Digital Forensics and Incident Response
Who Touched My GCP Project? Understanding the Principal Part in Cloud Audit Logs
1 month 3 weeks ago
SANS Digital Forensics and Incident Response
Leveling Up Ghidra: Learn Ghidra Plugins with a Game Boy Game
1 month 3 weeks ago
SANS Digital Forensics and Incident Response
Forensic Analysis of Compromised VPN Appliances by Advanced Actors
3 months ago
SANS Digital Forensics and Incident Response
Getting down and dirty with Mac imaging
3 months ago
SANS Digital Forensics and Incident Response
Cutting Through the Chaos: File Detection and Analysis Using Strelka
3 months ago
SANS Digital Forensics and Incident Response
Checked
15 hours 10 minutes ago