Cyber Defense: Author - Danyell Shin

Writing Tips for IT Professionals

This cheat sheet offers guidelines for IT professionals seeking to improve technical writing skills.To print it, use the one-page PDF version; you can also customize the Word version of the document. Lenny Zeltser, the creatorof this cheat sheet,is the author of SEC402: Cybersecurity Writing: Hack the Reader. Click the link to learn more … Continue reading Writing Tips for IT Professionals


Cybersecurity Writing: Hack the Reader

My newwriting course for cybersecurity professionals, SEC402, teaches how you can write better reports, emails, and other content you regularly create. This isan unusual opportunity to improve your writing skills without sitting through tedious lectures or writing irrelevant essays. Instead, as you learn how to avoid common pitfalls, you'll make your writing remarkable. This is … Continue reading Cybersecurity Writing: Hack the Reader


Instructor Spotlight: Keith Palmgren, SANS Senior Instructor

Meet Keith Palmgren.Keith is a Cybersecurity professional with over 30 years of experience specializing in the IT Security field. He is a SANS Senior Instructor and the author of SANS SEC301: Introduction to Cyber Security. During his career, Keith has authored 23 training courses. The American Council on Education certified seven of those courses as … Continue reading Instructor Spotlight: Keith Palmgren, SANS Senior Instructor


Q & A with James Shewmaker, Certified Instructor

Meet James Shewmaker.James Shewmaker is the founder of and principal consultant at Bluenotch Corporation in Long Beach, California, which provides customized security services focusing on investigations, penetration testing, and analysis. James authored and maintains the post-exploitation content in the SANS SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking course. Before becoming a SANS Certified … Continue reading Q & A with James Shewmaker, Certified Instructor


Protect Privileged AD Accounts With Five Free Controls

By: Erik Van Buggenhout (@ErikVaBU), SANS Certified Instructor &Co-Author of SEC599:Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses Once an adversary has obtained an initial entry point into your environment, they typically pivot around in the AD, looking to escalate their privileges further and eventually gain access to your crown jewels. One … Continue reading Protect Privileged AD Accounts With Five Free Controls