Cyber Defense

The Secrets of Successful Cybersecurity Writing: Hack the Reader

My newwriting course for cybersecurity professionals, SEC402, teaches how you can write better reports, emails, and other content you regularly create. This isan unusual opportunity to improve your writing skills without sitting through tedious lectures or writing irrelevant essays. Instead, as you learn how to avoid common pitfalls, you'll make your writing remarkable. This is … Continue reading The Secrets of Successful Cybersecurity Writing: Hack the Reader


Instructor Spotlight: Keith Palmgren, SANS Senior Instructor

Meet Keith Palmgren.Keith is a Cybersecurity professional with over 30 years of experience specializing in the IT Security field. He is a SANS Senior Instructor and the author of SANS SEC301: Introduction to Cyber Security. During his career, Keith has authored 23 training courses. The American Council on Education certified seven of those courses as … Continue reading Instructor Spotlight: Keith Palmgren, SANS Senior Instructor


Your SIEM Questions Answered

by Justin Henderson, John Hubbard, Ismael Valenzuela In this post, SANS instructors Justin Henderson, John Hubbard, and Ismael Valenzuela tackle some of the common questions they get from defenders looking to use their Security Information and Event Management (SIEM) platform as a high-impact detection tool. If you are considering attending the Tactical Detection & Data … Continue reading Your SIEM Questions Answered


Q & A with James Shewmaker, Certified Instructor

Meet James Shewmaker.James Shewmaker is the founder of and principal consultant at Bluenotch Corporation in Long Beach, California, which provides customized security services focusing on investigations, penetration testing, and analysis. James authored and maintains the post-exploitation content in the SANS SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking course. Before becoming a SANS Certified … Continue reading Q & A with James Shewmaker, Certified Instructor


Protect Privileged AD Accounts With Five Free Controls

By: Erik Van Buggenhout (@ErikVaBU), SANS Certified Instructor &Co-Author of SEC599:Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses Once an adversary has obtained an initial entry point into your environment, they typically pivot around in the AD, looking to escalate their privileges further and eventually gain access to your crown jewels. One … Continue reading Protect Privileged AD Accounts With Five Free Controls