SANS Cyber Defense Whitepapers

SANS Cyber Defense Whitepapers

White Papers are an excellent source for information gathering, problem-solving and learning. Below is a list of White Papers written by cyber defense practitioners seeking GSEC, GCED, and GISP Gold. SANS attempts to ensure the accuracy of information, but papers are published "as is".

Errors or inconsistencies may exist or may be introduced over time. If you suspect a serious error, please contact webmaster@sans.org.

Featured Papers

SANS Cyber Defense Whitepapers
Title Author Cert
What Every Tech Startup Should Know About Security, Privacy, and Compliance Kenneth Hartman GCCC
eAUDIT: Designing a generic tool to review entitlements Francois Begin GCCC
A Framework for Assessing 20 Critical Controls Using ISO 15504 and COBIT 5 Process Assessment Model (PAM) Muzamil Riffat GCCC
Paying Attention to Critical Controls Edward Zamora GCCC
Preventing data leakage: A risk based approach for controlled use of the use of administrative and access privileges Christoph Eckstein GCCC
The Fall of SS7 - How Can the Critical Security Controls Help? Hassan Mourad GCCC
Technical Implementation of the Critical Control "Inventory of Authorized and Unauthorized Devices" for a Small Office/Home Office Kenton Groombridge GCCC
Uncovering Indicators of Compromise (IoC) Using PowerShell, Event Logs and a Traditional Monitoring Tool Dallas Haselhorst GCCC
The Business Case for TLS Certificate Enterprise Key Management of Web Site Certificates Wrangling TLS Certificates on the Wild Web Sandra Dunn GCCC
Continuous Security: Implementing the Critical Controls in a DevOps Environment Alyssa Robinson GCCC
Cybersecurity Inventory at Home Glen Roberts GCCC
An Organic Approach to Implementing the Critical Security Controls Jim Hendrick GCCC
Budgeting for the Critical Security Controls Paul Hershberger GCCC
Implementing the Critical Security Controls in the Cloud Jon Mark Allen GCCC
Leading Effective Cybersecurity with the Critical Security Controls Wesley Whitteker GCCC
The Automotive Top 5: Applying the Critical Controls to the Modern Automobile Roderick Currie GCCC
Methods for Understanding and Reducing Social Engineering Attacks Michael Alexander GCCC
Managing Accepted Vulnerabilities Tracy Brockman GCCC
Critical Security Controls: Software Designed Inventory, Configuration, and Governance Lenny Rollison GCCC
How to Target Critical Infrastructure: The Adversary Return on Investment on an Industrial Control System Matthew Hosburgh GCCC
Implementing the Critical Security Control: Controlled Use of Administrative Privileges Paul Ackerman GCCC
Realistic Risk Management Using the CIS 20 Security Controls Andrew Baze GCCC
Simple Approach to Access Control: Port Control and MAC Filtering Bill Knaffl GCCC
Android Security: Web Browsers and Email Applications Marsha Miller GCCC
Applying Machine Learning Techniques to Measure Critical Security Controls Balaji Balakrishnan GCCC
Windows Installed Software Inventory Jonathan Risto GCCC
Automating Provisioning of NetFlow Analyzers Sumesh Shivdas GCCC
Practical Considerations on IT Outsourcing Implementation under the Monetary Authority of Singapore's Technology Risk Management Guidelines Andre Shori GCCC
Know Thy Network - Cisco Firepower and Critical Security Controls 1 & 2 Ryan Firth GCCC
Triaging the Enterprise for Application Security Assessments Stephen Deck GCCC
Security Assurance of Docker Containers Stefan Winkel GCCC
Finding Bad with Splunk David Brown GCCC
Real-World Case Study: The Overloaded Security Professional's Guide to Prioritizing Critical Security Controls Phillip Bosco GCCC
Leveraging the Asset Inventory Database Timothy Straightiff GCCC
Building and Maintaining a Denial of Service Defense for Businesses Matt Freeman GCCC
JavaScript Weaponized Matthew Toussain GCCC
Next Generation Endpoint Protection??CIS Control 8, Malware Defense Effectiveness, Performance Metrics and False Positive Rates Nolan Sapp GCCC
Packet Capture on AWS Teri Radichel GCCC
A Technical Approach at Securing SaaS using Cloud Access Security Brokers Luciana Obregon GCCC
Securing Against the Most Common Vectors of Cyber Attacks Joseph Matthews GCCC
ComBAT Phishing with Email Automation Seth Polley GCCC
OSSIM: CIS Critical Security Controls Assessment in a Windows Environment. Kevin Geil GCCC
Hardening BYOD: Implementing Critical Security Control 3 in a Bring Your Own Device (BYOD) Architecture Christopher Jarko GCCC
Man-In-The-Middle Attack Against Modbus TCP Illustrated with Wireshark Gabriel Sanchez GCCC
Threat Rigidity in Cybersecurity Mike Weeks GCCC
Increase the Value of Static Analysis by Enhancing its Rule Set Michael Hendrik Matthee GCCC
PCI DSS and Security Breaches: Preparing for a Security Breach that Affects Cardholder Data Christian Moldes GCCC
Generating Anomalies Improves Return on Investment: A Case Study for Implementing Honeytokens Wesley Earnest GCCC
Securing Against the Most Common Vectors of Cyber Attacks Richard Hummel GCCC
Defense-in-Policy begets Defense-in-Depth Matthew Greenwell GCED
Framework for Innovative Security Decisions Ergash Karshiev GCED
Dissect the Phish to Hunt Infections Seth Polley GCED
GIAC GCIA Assignment - Pass Kirk Becker GCIA
Intel IXP Network Processor Based Intrusion Detection Greg Pangrazio GCIA
GIAC GCIA Assignment - Pass Jerry Shenk GCIA
Assumptions in Intrusion Detection - Blind Spots in Analysis Rodney Caudle GCIA
GIAC GCIA Assignment - Pass Adam Kliarsky GCIA
Detecting and Preventing Rogue Devices on the Network Ibrahim Halil Saruhan GCIA
GIAC GCIA Assignment - Pass Andrew Magnusson GCIA
Detecting Torrents Using Snort Rick Wanner GCIA
GIAC GCIA Assignment - Pass Alexander Schinner GCIA
Challenges of Managing an Intrusion Detection System (IDS) in the Enterprise Russell Meyer GCIA
GIAC GCIA Assignment - Pass Josh Berry GCIA
IOSMap: TCP and UDP Port Scanning on Cisco IOS Platforms Robert Vandenbrink GCIA
GIAC GCIA Assignment - Pass Michael Meacle GCIA
Social Engineering: Manipulating the Source Jared Kee GCIA
GIAC GCIA Assignment - Pass Blaine Hein GCIA
Snort 3.0 Beta 3 for Analysts Doug Burks GCIA
GIAC GCIA Assignment - Pass Bobby Noell GCIA
Intrusion Detection & Response Leveraging Next Generation Firewall Technology Ahmed Abdel-Aziz GCIA
GIAC GCIA Assignment - Pass Jose Faial GCIA
Check Point Firewall Log Analysis In-Depth Mark Stingley GCIA
GIAC GCIA Assignment - Pass Paul Schmelzel GCIA
Covert Channels Erik Couture GCIA
GIAC GCIA Assignment - Pass Ben Allen GCIA
GIAC GCIA Assignment - Pass Carl Gibbons GCIA
GIAC GCIA Assignment - Pass Erik Montcalm GCIA
GIAC GCIA Assignment - Pass John Melvin GCIA
GIAC GCIA Assignment - Pass Greg Lalla GCIA
GIAC GCIA Assignment - Pass Edward Ray GCIA
GIAC GCIA Assignment - Pass Vance Victorino GCIA
GIAC GCIA Assignment - Pass Jim Hendrick GCIA
GIAC GCIA Assignment - Pass Eric Evans GCIA
GIAC GCIA Assignment - Pass Ricky Smith GCIA
GIAC GCIA Assignment - Pass Geoffrey Sanders GCIA
GIAC GCIA Assignment - Pass Thomas Hoffecker GCIA
GIAC GCIA Assignment - Pass David Perez GCIA
GIAC GCIA Assignment - Pass Peter Szczepankiewicz GCIA
GIAC GCIA Assignment - Pass Rob McBee GCIA
GIAC GCIA Assignment - Pass Heather Larrieu GCIA
GIAC GCIA Assignment - Pass Johnny Wong GCIA
GIAC GCIA Assignment - Pass Frans Kollee GCIA
GIAC GCIA Assignment - Pass Joanne Schell GCIA
GIAC GCIA Assignment - Pass Nils Reichen GCIA
GIAC GCIA Assignment - Pass Carl Madzelan GCIA
GIAC GCIA Assignment - Pass Lorna Hutcheson GCIA
GIAC GCIA Assignment - Pass John Petkovsek GCIA
GIAC GCIA Assignment - Pass Orazio Mistretta GCIA
GIAC GCIA Assignment - Pass Sean-Paul Heare GCIA
GIAC GCIA Assignment - Pass Dongmei Huang GCIA
GIAC GCIA Assignment - Pass Terry MacDonald GCIA
GIAC GCIA Assignment - Pass John Hally GCIA
GIAC GCIA Assignment - Pass Bill Young GCIA
GIAC GCIA Assignment - Pass Brian Sheffler GCIA
GIAC GCIA Assignment - Pass Don Murdoch GCIA
GIAC GCIA Assignment - Pass Patrick Ethier GCIA
GIAC GCIA Assignment - Pass Jim Becher GCIA
GIAC GCIA Assignment - Pass Pedro Bueno GCIA
GIAC GCIA Assignment - Pass Andrew Patrick GCIA
GIAC GCIA Assignment - Pass David Manley GCIA
GIAC GCIA Assignment - Pass Beth Binde GCIA
GIAC GCIA Assignment - Pass Chris Hayden GCIA
GIAC GCIA Assignment - Pass Ashley Thomas GCIA
GIAC GCIA Assignment - Pass Jalal Moloo GCIA
GIAC GCIA Assignment - Pass Denis Brooker GCIA
GIAC GCIA Assignment - Pass Bente Petersen GCIA
GIAC GCIA Assignment - Pass Mohammed Haron GCIA
GIAC GCIA Assignment - Pass Mark Embrich GCIA
GIAC GCIA Assignment - Pass Daniel Wesemann GCIA
GIAC GCIA Assignment - Pass Tim Newell GCIA
GIAC GCIA Assignment - Pass Ron Shuck GCIA
GIAC GCIA Assignment - Pass Glenn Larratt GCIA
GIAC GCIA Assignment - Pass Jared McLaren GCIA
GIAC GCIA Assignment - Pass Karim Merabet GCIA
GIAC GCIA Assignment - Pass Chris Sia GCIA
GIAC GCIA Assignment - Pass Dan Hawrylkiw GCIA
GIAC GCIA Assignment - Pass Kris Wicks GCIA
GIAC GCIA Assignment - Pass Kevin Bong GCIA
GIAC GCIA Assignment - Pass Manuel Humberto Santander Pelaez GCIA
GIAC GCIA Assignment - Pass Michael McDonnell GCIA
SANS GIAC Intrusion Detection Curriculum Parliament Hill 2000 Guy Bruneau GCIA
GIAC GCIA Assignment - Pass James Hoover GCIA
Using Decision Tree Analysis for Intrusion Detection: A How-To Guide Jeff Markey GCIA
GIAC GCIA Assignment - Pass Keven Murphy GCIA
A Small Business No Budget Implementation of the SANS 20 Security Controls Russell Eubanks GCIA
GIAC GCIA Assignment - Pass Thomas Shepherd GCIA
Base64 Can Get You Pwned Kevin Fiscus GCIA
GIAC GCIA Assignment - Pass Gregory Lajon GCIA
OS fingerprinting with IPv6 Christoph Eckstein GCIA
GIAC GCIA Assignment - Pass David Heed GCIA
GIAC GCIA Assignment - Pass John Jenkinson GCIA
GIAC GCIA Assignment - Pass Alan Woodroffe GCIA
GIAC GCIA Assignment - Pass Reuben Rubio GCIA
GIAC GCIA Assignment - Pass Philipp Stadler GCIA
GIAC GCIA Assignment - Pass Harvey Lange GCIA
GIAC GCIA Assignment - Pass Toby Kohlenberg GCIA
GIAC GCIA Assignment - Pass Robert Ashworth GCIA
GIAC GCIA Assignment - Pass Janice Slocumb GCIA
GIAC GCIA Assignment - Pass Wes Bateman GCIA
GIAC GCIA Assignment - Pass Nathan Kim GCIA
GIAC GCIA Assignment - Pass Geoffrey Poer GCIA
GIAC GCIA Assignment - Pass Donald Pitts GCIA
GIAC GCIA Assignment - Pass Brian Credeur GCIA
GIAC GCIA Assignment - Pass Michael Lastor GCIA
GIAC GCIA Assignment - Pass Bill Phillips GCIA
GIAC GCIA Assignment - Pass Miika Turkia GCIA
GIAC GCIA Assignment - Pass Charles Hutson GCIA
GIAC GCIA Assignment - Pass Jasmir Beciragic GCIA
GIAC GCIA Assignment - Pass Chris Talianek GCIA
GIAC GCIA Assignment - Pass Michael Semling GCIA
GIAC GCIA Assignment - Pass Michael Worman GCIA
GIAC GCIA Assignment - Pass Rhonda Maluia GCIA
GIAC GCIA Assignment - Pass Curtis Blais GCIA
GIAC GCIA Assignment - Pass Joseph Rach GCIA
GIAC GCIA Assignment - Pass Donald Tomczak GCIA
GIAC GCIA Assignment - Pass Kevin Pietersma GCIA
GIAC GCIA Assignment - Pass John Dietrich GCIA
GIAC GCIA Assignment - Pass Michael Wee GCIA
GIAC GCIA Assignment - Pass Kevin Miller GCIA
GIAC GCIA Assignment - Pass JD Baldwin GCIA
GIAC GCIA Assignment - Pass William Davis GCIA
GIAC GCIA Assignment - Pass David Blaine GCIA
GIAC GCIA Assignment - Pass James Summers GCIA
Intrusion Detection, Evasion, and Trace Analysis Michael Wyman GCIA
GIAC GCIA Assignment - Pass George Huang GCIA
Pass - English Version Marco Brando GCIA
GIAC GCIA Assignment - Pass Donna Andert GCIA
Intrusion Report for SANS University Gaspar Modelo Howard GCIA
GIAC GCIA Assignment - Pass Bob Long GCIA
Detecting Spam with Genetic Regular Expressions Eric Conrad GCIA
GIAC GCIA Assignment - Pass Daniel Strom GCIA
Security Audit Intrusion Report Michael Gauthier GCIA
GIAC GCIA Assignment - Pass David Nolan GCIA
Tuning an IDS/IPS From The Ground UP Brandon Greenwood GCIA
GIAC GCIA Assignment - Pass David Hesprich GCIA
Visual Baselines - Maximizing Economies of Scale Using Round Robin Databases Kirsten Hook GCIA
GIAC GCIA Assignment - Pass Jim Clausing GCIA
Distilling Data in a SIM: A Strategy for the Analysis of Events in the ArcSight ESM James Voorhees GCIA
GIAC GCIA Assignment - Pass Joe Dietz GCIA
Enhancing IDS using, Tiny Honeypot Richard Hammer GCIA
PORTKnockOut: Data Exfiltration via Port Knocking over UDP Matthew Lichtenberger GCIA
Intrusion Detection Through Relationship Analysis Patrick Neise GCIA
Detecting Penetration Testers on a Windows Network with Splunk Fred Speece GCIA
Using Web Application Firewall to detect and block common web application attacks Issac Kim GCIA
Implementing Full Packet Capture Matthew Koch GCIA
The User Agent Field: Analyzing and Detecting the Abnormal or Malicious in your Organization Darren Manners GCIA
The Age of Encryption Wesley Whitteker GCIA
Evil Through the Lens of Web Logs Russ McRee GCIA
Network Inspection of Duplicate Packets Randy Devlin GCIA
IP Fragment Reassembly with Scapy Mark Baggett GCIA
Active Defense via a Labyrinth of Deception Nathaniel Quist GCIA
Small Business: The New Target What can they Do? Robert Comella GCIA
Is Anyone Out There? Monitoring DNS for Misuse Kaleb Fornero GCIA
Logging and Monitoring to Detect Network Intrusions and Compliance Violations in the Environment Sunil Gupta GCIA
Intrusion Detection Evasion Techniques and Case Studies Pierce Gibbs GCIA
Track 3 - Intrusion Detection In-Depth GIAC Certified Intrusion Analyst (GCIA) Practical Assignment Version 4.0 Jan Stodola GCIA
Does it come with Networking? Tracy Brockman GCIA
An Analysis of the Snort Data Acquisition Modules Christopher Murphy GCIA
Indicators of Compromise TeslaCrypt Malware Kevin Kelly GCIA
Analyzing Network Traffic with Basic Linux Tools Travis Green GCIA
OS X as a Forensic Platform David Martin GCIA
Web Application Attack Analysis Using Bro IDS Ganesh Kumar Varadarajan GCIA
Detecting Attacks Against The 'Internet of Things' Adam Kliarsky GCIA
Host-Based Detection and Data Loss Prevention Using Open Source Tools Chris Hoke GCIA
Snort IDS & SSL Packets inspection Yousef Bakhdlaghi GCIA
What's Running on Your Network? Francois Begin GCIA
Hunting Threats Inside Packet Captures Muhammad Alharmeel GCIA
Monitoring Network Traffic for Android Devices Angel Alonso-Parrizas GCIA
Intrusion detection through traffic analysis from the endpoint using Splunk Stream Etrik Eddy GCIA
Detecting DNS Tunneling Greg Farnham GCIA
Hacking the CAN Bus: Basic Manipulation of a Modern Automobile Through CAN Bus Reverse Engineering Roderick Currie GCIA
Beating the IPS Michael Dyrmose GCIA
Basic NGIPS Operation and Management for Intrusion Analysts Mike Mahurin GCIA
Log2Pcap Joaquin Moreno Garijo GCIA
Security Tools for the SMB and SME Segments James Waite GCIA
Setting Up a Database Security Logging and Monitoring Program Jim Horwath GCIA
IDS Performance in a Complex Modern Network: Hybrid Clouds, Segmented Workloads, and Virtualized Networks Brandon Peterson GCIA
Implementing Active Defense Systems on Private Networks Josh Johnson GCIA
Challenges to Implementing Network Access Control Joseph Matthews GCIA
60 Seconds on the Wire: A Look at Malicious Traffic Kiel Wadner GCIA
HL7 Data Interfaces in Medical Environments: Understanding the Fundamental Flaw in Healthcare Dallas Haselhorst GCIA
Open Source Host Based Intrusion Detections System (OHIDS) Tom Webb GCIA
A Spicy Approach to WebSockets: Enhancing Bro’s WebSockets Network Analysis by Generating a Custom Protocol Parser with Spicy Jennifer Gates GCIA
The Security Onion Cloud Client Network Security Monitoring for the Cloud Joshua Brower GCIA
Trust No One: A Gap Analysis of Moving IP-Based Network Perimeters to A Zero Trust Network Architecture John Becker GCIA
A Hands-on XML External Entity Vulnerability Training Module Carrie Roberts GCIA
Can the "Gorilla" Deliver? Assessing the Security of Google's New "Thread" Internet of Things (IoT) Protocol Kenneth Strayer GCIA
Testing Application Identification Features of Firewalls William McGlasson GCIA
Tackling the Unique Digital Forensic Challenges for Law Enforcement in the Jurisdiction of the Ninth U.S. Circuit Court John Garris GCIA
Setting up Splunk for Event Correlation in Your Home Lab Aron Warren GCIA
Data Mining in the Dark: Darknet Intelligence Automation Brian Nafziger GCIA
An Early Malware Detection, Correlation, and Incident Response System with Case Studies Yaser Mansour GCIA
The State of Honeypots: Understanding the Use of Honey Technologies Today Andrea Dominguez GCIA
Integrating Wired and Wireless IDS Data Michael Stanton GCIA
Looking Under the Rock: Deployment Strategies for TLS Decryption Chris Farrell GCIA
Rootkit Detection with OSSEC Sally Vandeven GCIA
Container Intrusions: Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments Alfredo Hickman GCIA
Intrusion Analysis Using Windows PowerShell Mike Weeks GCIA
Using Windows 10 and Windows Server 2016 to create an Endpoint Detection and Response solution Sebastien Godin GCIA
Designing and Implementing a Honeypot for a SCADA Network Charles Scott GCIA
PCAP Next Generation: Is Your Sniffer Up to Snuff? Scott Fether GCIA
Wireshark: A Guide to Color My Packets Roy Cheok GCIA
Evaluation of Comprehensive Taxonomies for Information Technology Threats Steven Launius GCIA
Beyond the cookie: Using network traffic characteristics to enhance confidence in user identity Courtney Imbert GCIA
Understanding Mobile Device Wi-Fi Traffic Analysis Erik Choron GCIA
Straddling the Next Frontier Part 1: Quantum Computing Primer Eric Jodoin GCIA
Do Random IP Lookups Mean Anything? Jay Yaneza GCIA
Data Charging Bypass: How your IDS can help Hassan Mourad GCIA
Methods for the Controlled Deployment and Operation of a Virtual Patching Program William Vink GCIA
Faster than a speeding bullet: Geolocation data and account misuse Tim Collyer GCIA
PiOT - a small form factor defense for indefensible devices James Leyte-Vidal GCIA
Leveraging the SCADA Cloud for Fun and Profit Matthew Hosburgh GCIA
Which YARA Rules Rule: Basic or Advanced? Chris Culling GCIA
NetFlow Collection and Analysis Using NFCAPD, Python, and Splunk David Mashburn GCIA
Processing experimental protocols against IDS Tommy Adams GCIA
Enhancing Intrusion Analysis through Data Visualization Wylie Shanks GCIA
Secure Internet Gateways: Backing Down from a Fight Seth Polley GCIA
Open Source IDS High Performance Shootout George Khalil GCIA
Onion-Zeek-RITA: Improving Network Visibility and Detecting C2 Activity Dallas Haselhorst GCIA
Web Application Firewalls Jason Pubal GCIA
Intrusion Prevention System Signature Management Theory Joshua Levine GCIA
IPv6 and Open Source IDS Jon Mark Allen GCIA
SSL/TLS Interception Challenge from the Shadow to the Light Ngoc Huy Nguyen GCIA
Honeytokens and honeypots for web ID and IH Rich Graves GCIA
Security Considerations for Voice over Wi-Fi (VoWiFi) Systems Joel Chapman GCIA
Practical Attack Detection, Analysis, and Response using Big Data, Semantics, and Kill Chains within the OODA Loop Brian Nafziger GCIA
The Perfect ICS Storm Glenn Aydell GCIA
Challenges for IDS/IPS Deployment in Industrial Control Systems Michael Horkan GCIA
Using Network Based Security Systems to Search for STIX and TAXII Based Indicators of Compromise Jason Mack GCIA
Protecting Home Devices from Malicious or Blacklisted Websites Sumesh Shivdas GCIA
Following a Breach Simulating and Detecting a Common Attack Dale Daugherty GCIA
Fingerprinting Windows 10 Technical Preview Jake Haaksma GCIA
Practical approaches for MTCP Security Joshua Lewis GCIA
Passing the Sniff (Snort) Test Matthew Hansen GCIA
Learning from the Dridex Malware - Adopting an Effective Strategy Lionel Teo Jia Yeong GCIA
The LogLED An LED-Based Information Security Dashboard Paul Ackerman GCIA
Infrastructure Security Architecture for Effective Security Monitoring Luciana Obregon GCIA
Exploits of Yesteryear Are Never Truly Gone Marsha Miller GCIA
Poaching: Hunting Without Permission David Switzer GCIA
Clickbait: Owning SSL via Heartbleed, POODLE, and Superfish Matthew Toussain GCIA
Extracting Files from Network Packet Captures Stephen Deck GCIA
Automated Network Defense through Threat Intelligence and Knowledge Management Christopher O'Brien GCIA
Database Activity Monitoring (DAM): Understanding And Configuring Basic Network Monitoring Using Imperva's SecureSphere Charles Brodsky GCIA
Zork as a Computer Investigative Mind Set Timothy Cook GCIA
How to Leverage PowerShell to Create a User- Friendly Version of WinDump Robert Adams GCIA
Network Forensics and HTTP/2 Stefan Winkel GCIA
Intrusion Detection and Prevention Systems Cheat Sheet: Choosing the Best Solution, Common Misconfigurations, Evasion Techniques, and Recommendations. Phillip Bosco GCIA
Security Systems Engineering Approach in Evaluating Commercial and Open Source Software Products Jesus Abelarde GCIA
Don't Always Judge a Packet by Its Cover Gabriel Sanchez GCIA
Breach Control: Best Practices in Health Care Brian E. Quick GCIA
Balancing Security and Innovation With Event Driven Automation Teri Radichel GCIA
The Role of Static Analysis in Hardening Open Source Intrusion Detection Systems Jeff Sass GCIA
Securing Jenkins CI Systems Allen Jeng GCIA
Practical Approach to Detecting and Preventing Web Application Attacks over HTTP/2 Russel Van Tuyl GCIA
BitTorrent & Digital Contraband Kenneth Hartman GCIA
Neutrino Exploit Kit Analysis and Threat Indicators Luis Rocha GCIA
Catching Flies: A Guide to the Various Flavors of Honeypots Scott Smith GCIA
Tagging Data to Prevent Data Leakage (Forming Content Repositories) Michael Hendrik Matthee GCIA
Under The Ocean of the Internet - The Deep Web Brett Hawkins GCIA
Using Splunk to Detect DNS Tunneling Steve Jaworski GCIA
Gh0st in the Dshell: Decoding Undocumented Protocols David Martin GCIA
Deception Techniques as Part of Intrusion Detection Strategy Colm Kennedy GCIA
Building a Forensically Capable Network Infrastructure Nik Alleyne GCIA
Arming SMB's Against Ransomware Attacks Tim Ashford GCIA
Profiling Web Applications for Improved Intrusion Detection Manuel Leos Rivas GCIA
Using Vagrant to Build a Manageable and Sharable Intrusion Detection Lab Shaun McCullough GCIA
Building a Home Network Configured to Collect Artifacts for Supporting Network Forensic Incident Response Gordon Fraser GCIA
Security Audit Report Mandar Rege GCUX
Security Audit Report Daniel Robb GCUX
Security Audit Report Zarina Musa GCUX
Security Assessment Michael Gauthier GCUX
Security Audit Report Gary Needham GCUX
Network Security Assessment Jos Purvis GCUX
Installing and Securing a Shell Access Server Using Red Hat 6.2 Linux Stephen Gibson GCUX
Solaris 8 (sparc) Security Checklist for JFY, Inc. Ben Laws GCUX
Build Securely a Shadow Sensor Step-by-Step Powered by Slackware Linux Guy Bruneau GCUX
How to Build and Secure a General Purpose "Internet Ready" Workstation Robert Beswick GCUX
Consultants Report from Auditing UNIX Lenny Zeltser GCUX
Linux Red Hat 7.1 Security Assessment Bente Petersen GCUX
SuSE Linux 7.1 Professional Installation Checklist Felix Schallock GCUX
Linux DNS (Domain Name Server) System Setup Checklist Martin Tremblay GCUX
Checklist for Securing RedHat Linux 7.1 on an IBM Thinkpad Laptop Paul DePriest GCUX
A Guide to Building and Securing an Intranet Mail Server/Hub with AIX 5L Version 5.1 on an IBM RS/6000 Server Devon Caines GCUX
Installing and Securing an SSH Server with HP Secure OS Software for Linux and Cryptography Kenneth Gallo GCUX
Step-by-step Guide to Securing Red Hat 7.1 Linux Lawrence Grim GCUX
Securing a Multi-User Solaris 8 SPARC System Yong Choe GCUX
AIX Version 4.3.3 on Power2 3xx Series RS/6000 John Jenkinson GCUX
Building a Secure Solaris 8 Backup Server Jason Christensen GCUX
Securing a Red Hat Linux 7.2 Anonymous FTP Server with Security Support syslog Server Brian Melcher GCUX
SOHO OpenBSD Intranet IMAP Server Donald Pitts GCUX
Step-by-step Guide to Securing an IRIX Mediabase Video Web Server Robert Drollinger GCUX
Audit of Gauntlet 5.5 Firewall (Running on Solaris 2.6 with BIND 8.2.3-REL) Jeff Holland GCUX
Building a Cost Effective Syslog Server using Solaris For Intel and SunScreen Lite - Honor Harpal Parmar GCUX
An Introduction To File Integrity Checking On Unix Systems Del Armstrong GCUX
Linux Firewall Audit: GIAC Enterprises Elaine Madison GCUX
Centralized Monitoring of Distributed Systems Edward Finneran GCUX
Auditing a University Solaris System Geoffrey Poer GCUX
Building a Secure OpenBSD Mail System on a Small Budget Jesse Trucks GCUX
HIPAA/ISO 17799 Security Audit of GIAC Enterprises Onsite Employee Health Clinic Database Server Sherry Cummins GCUX
Bastion Build Revisited Al Un GCUX
Securing Unix Step by Step George Markham GCUX
Building a Secure Backup Server for theSolaris 9 Operating Environment Shaun McAdams GCUX
Auditor's Report - GIAC University - Solaris MTA Security Audit Susan Hanna GCUX
When Business Need Justifies Leaving RPC Services Enabled Bertha Marasky GCUX
Applying the CIS Linux Benchmark v1.1.0 Recommendations to a Mandrake 9.1 Laptop with Higher Security Enabled Laurie Zirkle GCUX
Building a Secured OS for a Root Certificate Authority Don Murdoch GCUX
Security Analysis Of GIAC Enterprises FTP Gateway Ivar Aarsnes GCUX
Audit Of The GIAC Enterprises Production Web And Database Servers Richard Allen Stone GCUX
Public Servers Vulnerability Assessment Report Ricky Smith GCUX
Linux kernel rootkits: protecting the systems Ring-Zero Raul Siles GCUX
Building a Cost Effective Enterprise-Wide Monitoring Solution Using Big Brother Jim Horwath GCUX
Securing an AIX 5.2 Development Server Chris Talianek GCUX
Building a Secure Sun JumpStart Environment Using the Solaris Security Toolkit, Step-by-Step Mahrlon Willis GCUX
Security Aspects of a Samhain Client/Server Installation to Protect a Solaris Web Server Winston Holmes GCUX
Setting up a Secure Mail Server with HP-UX 11i v1, Qmail and Qpopper Patrick Wallek GCUX
Deploying Nagios Monitoring Services on Secured Red Hat Enterprise Linux 3 Environment Alexey Rogozhkin GCUX
Solaris 10 Filesystem Integrity Protection Using Radmind Sam Wilson GCUX
An Introduction to SELinux for Administrators Jeff Pike GCUX
Securing Linux Containers Major Hayden GCUX
Incident identification through outlier analysis Joshua Lewis GCUX
Linux/Unix v. Ransomware: How Ransomware Attacks Inform the Defense of Linux & Unix Systems David Kennel GCUX
Design a Secure Windows 2000 Infrastructure Erik Weinmeister GCWN
Securing Task Station Computers Using Windows 2000 Group Policy Roger McClinton GCWN
A Secure Windows 2000 Infrastructure David Heed GCWN
Securing Windows 2000 with Security Templates John Jenkinson GCWN
A Secure Windows 2000 Infrastructure for GIAC Enterprises Harpal Parmar GCWN
Designing a Secure Windows 2000 Infrastructure Lenny Zeltser GCWN
Designing a Secure Windows 2000 Network Infrastructure David Branscome GCWN
Deploying Microsoft HiSecurity Template on a Windows 2000 Professional Workstation within a Windows NT 4.0 Domain Joe Matyaz GCWN
GIAC Enterprises: Fortunes for the Future - Implementing Active Directory with Defense in Depth Lorna Hutcheson GCWN
Group Policies for GIAC Enterprises Ricky Smith GCWN
The Impact of Cumulative Secure and High Secure Windows 2000 Professional Security Templates on a Workstation Running SCT Banner Siegfried Hill GCWN
Protect your enterprise against clients centric attacks, using Windows 2000 GPO Thierry Agassis GCWN
Guide to Deploying a Windows 2000/Exchange 2000/File/Print Server in a Single Server Environment Gary Pasikowski GCWN
Windows 2000 Monitoring from Windows NT in a Workgroup Frank Vianzon GCWN
Creating a Certificate-Enabled Public Web Site With Windows 2000 Michael Reiter GCWN
Securing Windows 2000 for Web Server Deployment Jay Robinson GCWN
Central Auditing of Windows NT Using Windows Script Host (WSH) Roger Mclaren GCWN
Usefulness and Shortcomings of the Pre-configured Security Policy Templates that are Included with Windows 2000 Yong Choe GCWN
Consolidated Security Event Monitoring for Microsoft Windows NT 4.0 Server Jeff Shawgo GCWN
Windows NT Web Server Auditing Dean Farrington GCWN
Securing the SNMP Service Robert Hayden GCWN
Enhancing E-mail Security using Exchange Server 2003 and Outlook 2003 Cheryl Jones GCWN
Encrypting Mail in a Windows Network David Perez GCWN
SANS and GIAC Together Again Don Murdoch GCWN
Active Directory, Group Policy And Auditingsystem Design For Merged Windows 2000 Multiforest Environment Tomislav Herceg GCWN
Securing Wireless LANS in Microsoft Networks using Wi-Fi Protected AccessTM and Digital Certificates John Holmblad GCWN
Windows Security Architecture issues for an IT outsourcing company within a single infrastructure Christian Gigandet GCWN
Implementing a Secure Microsoft Windows Server 2003 Terminal Services Infrastructure: A Case Study for ACME Healthcare, Inc. James Tarala GCWN
Implementing a Windows 2003 PKI from an Existing Windows 2000 Network Norman Christopher-Knight GCWN
Securing Windows 2000 with Security Templates Patricia Shirer GCWN
GIAC Certified Windows Security Administrator Bryce Thompson GCWN
SANS/GIAC Enterprises Active Directory Merger - Design, Security Policy, and Auditing Practices Ben Schmitt GCWN
Securing a Windows 2000 Application Server With Security Templates Joshua Sprenger GCWN
Custom IIS Authentication and Access Control using ISAPI Filter Arsne von Wyss GCWN
Securing Windows running Trend Micro Services with Security Templates Curtis Simonson GCWN
A Comparison of 3rd Party Anti-Spyware Tools for a Business Environment Richard Snow GCWN
Implementing a Secure Wireless Network for a Windows Environment Dan Thompson GCWN
Implementing IEEE 802.1x for Wired Networks Johan Loos GCWN
Migration to Office 365, a Case Study on Security and Administration in the Non-profit Sector Richard Snow GCWN
Supplementing Windows Audit, Alerting, and Remediation with PowerShell Daniel Owen GCWN
The Effectiveness of Tools in Detecting the 'Maleficent Seven' Privileges in the Windows Environment Tobias Mccurry GCWN
Crossing the line: Joining forces with your customers Jules Vandalon GISF
Continuous Monitoring: Build A World Class Monitoring System for Enterprise, Small Office, or Home Austin Taylor GMON
PDF Metadata Extraction with Python Christopher Plaisance GPYC
Nessus: Vulnerability Scanning and Beyond Paul Schmelzel GSEC
Importance of a Standard Methodology in Computer Forensics Jim McMillan GSEC
Cyber IPB Steve Winterfeld GSEC
Limiting the Exposure of a Netware Server in an IP World Dana Mclaughlin GSEC
A Qualitative Risk Analysis and Management Tool - CRAMM Zeki Yazar GSEC
Hacktivism - A Free Form of Expression or a Digital Vandalism Eva Dadok GSEC
Iris Recognition Technology for Improved Authentication Penny Khaw GSEC
Scripting as a Method of Establishing a Reliable Baseline Posture George Moncrief GSEC
Distributed Object Technology: Security Perspective Subbu Cherukuwada GSEC
Firewall Load Balancers Megan Restuccia GSEC
SSH and Intrusion Detection Heather Larrieu GSEC
An Explanation of "TCP Wrappers" for the Security Manager Richard Branicki GSEC
Implementing n Internet Content Filtering and Reporting Program Eric Wilkens GSEC
Securing Microsoft Outlook 2000 Using the Outlook Security Update in a Microsoft Exchange Server 5.5 Environment Brad Peer GSEC
A Tool for Running Snort in Dynamic IP Address Assignment Environment Shin Ishikawa GSEC
Security Issues in NIS Jim O'Brien GSEC
Echelon: The Dangers of Communication in the 21st Century Chad Yancey GSEC
Why Your Switched Network Isn't Secure Steven Sipes GSEC
Protecting Against the Unexpected Keith Seymour GSEC
Critical Infrastructure Protection: Establishing an Information Sharing and Analysis Center Can Be Like Developing an Organizational Security Policy Frances Wentworth GSEC
The Limits on Wireless Security: 802.11 in Early 2002 James Voorhees GSEC
Security Implications of Update Agent Software Shaun Glaim GSEC
Computing Industry Certifications and Security Kurt Jensen GSEC
Wireless Networking Security: As Part of Your Perimeter Defense Strategy Daniel Owen GSEC
Implementing a Windows 2000 Host Based Intrusion Detection System Richard Springs GSEC
Monitoring for Security Events Using Windows Management Instrumentation Stephen Seigler GSEC
Steganography: What's the Real Risk? John Hally GSEC
Secure Shell Daemon crc32 Compensations Attack Detector Vulnerability Tim Yeager GSEC
The Key to Internet Security Is Education Cindy James GSEC
Twists in Security for Law Enforcement Conrad Larkin GSEC
Scanning for viruses Dan Boyd GSEC
Violations of Basic Computer Security Principles within the Television Broadcast Community and Some Suggested Solutions Paul Claxton GSEC
Building a Security Test Environment Richard Noel GSEC
An Informal Analysis of One Site's Attempts to Contact Host Owners Laurie Zirkle GSEC
A Guide to Government Security Mandates Christian Enloe GSEC
We're Auditors - We're Here to Help James Butler GSEC
Symantec Enterprise VPN Solution: Extending our Network through the Internet Robin Parrish GSEC
Host vs. Network-Based Intrusion Detection Systems David Trzcinski GSEC
Integrating Real-Time Services on the Web Pete Kobak GSEC
Instruments of the Information Security Trade Mark Graff GSEC
NIDS Countermeasures: What, Why, Where, When, and How Jonathan Kobrick GSEC
Black ICE 2.5 Events, False Positives and Custom Attack Signatures Alan J Mercer GSEC
Current Steganography Tools and Methods Erin Michaud GSEC
Research Guide to Web Resources at Microsoft.com and Applying This to Patching Internet Information Server Barry Dahling GSEC
Light at the end of the TCP Tunnel: Freedom or Oncoming Train? Risks, Benefits and Best Practices James Ault GSEC
No Budget, no Policy: Leading the Bull by the Nose or Thank God for the Cisco IOS Firewall Feature Set Richard Haynal GSEC
The Logbook of The World Ted Demopoulos GSEC
Researching a Topic on the Internet Eve Edelson GSEC
Let's Slam SQL: The Slammer Worm and Lessons Learned Brian Greif GSEC
Rootkit: Attacker Undercover Tools Saliman Manap GSEC
Conducting an electronic information risk assessment for Gramm-Leach-Bliley Act compliance. Kevin Bong GSEC
The History and Evolution of Intrusion Detection Guy Bruneau GSEC
Windows Update and Its Derivatives - With a focus on SUS Pei-li Chao GSEC
Security Awareness: Help the Users Understand Kenton Smith GSEC
ACF2 Mainframe Security Bethany Hinsch GSEC
Securing a Windows 2000 IIS Web Server - Lessons Learned Harpal Parmar GSEC
Introducing Security to the Small Business Enterprise Jeff Herbert GSEC
Basic Travel Security Revisited Thomas Palmer GSEC
A Guide to Hash Algorithms Britt Savage GSEC
Can Hackers Turn Off Your Lights? Jonathan Stidham GSEC
Limiting Concurrent Logins in Windows NT/2000 Gene Burton GSEC
The Code Red Worm John Dolak GSEC
Case study: Implementing Trend Micro antivirus solutions in the enterprise. Mark De Rijk GSEC
Proactively Guarding Against Unknown Web Server Attacks William Geiger GSEC
Security Process for the implementation of a Company's extranet network connections. Kirk Steinklauber GSEC
Disconnect from the Internet - Whale's e-Gap In-Depth Kevin Gennuso GSEC
Integration Of Single Sign On Within The Framework Of An J2EE Environment In Banking Field
French Translation
Philippe Gros GSEC
How to Choose an Intrusion Detection Solution Baiju Shah GSEC
Detailed Forensic Procedure for Laptop computers Matt Pierce GSEC
The Weakest Link: The Human Factor Bradley Fulton GSEC
Case Study: Transforming a Traditional Windows Client/Server Application Into a Secured ASP Offering David Strubbe GSEC
Protecting Sensitive Data in Secure Domains Mikael Trosell GSEC
Steganography Michael Meister GSEC
Backup Rotations - A Final Defense Stephen Lennon GSEC
Slippery Slope or Terra Firma? Current and Future Anti-Spam Measures Charlene LeBlanc GSEC
Cisco Router Hardening: Step-by-Step Dana Graesser Williams GSEC
Implementing a Security Program from the Beginning, for the Beginner Thomas Paulger GSEC
Information Security: Handling Compromises Craig Bowser GSEC
A New Evolution in Hack Attacks: A General Overview of Types, Methods, Tools, and Prevention Kelley Ealy GSEC
Kerberos Authentication in Windows 2000 Vishwas Gadgil GSEC
Long Distance Failover - High Availability using Cisco PIX Firewall Chris Ellem GSEC
Spyware and Network Security Lester Cheveallier GSEC
Enhancing risk management within a research laboratory, from behind an academic institution's firewall - a case study Paul Buzzell GSEC
Why Small Businesses Need to Secure Their Computers (and How to Do It!) Bruce Diamond GSEC
The Need for an Established Security Awareness Training Program Richard Lewis GSEC
Successful Partnerships for Fighting Computer Crime Beth Binde GSEC
Lean Thinking in Information Security Stuart Berman GSEC
Cheese Worm: Pros and Cons of a "Friendly" Worm Bryan Barber GSEC
Deploying a website built using Oracle9iAS Portal Stephen Coates GSEC
Using Open Source to Create a Cohesive Firewall/IDS System Thomas Dager GSEC
Why The Need for Internet Content Filtering/Management- A Close Look at Internet Manager Elron Web Inspector 6.03 Michell Singleton GSEC
Logfile Analysis: Identifying a Network Attack Michael Fleming GSEC
Lessons in Learning Network Security Coleen Regalmuto GSEC
The China Syndrome Charles Bacon GSEC
Secure File Transfer with SSH2 Renato Lozano GSEC
Filtering Routers in a Small Office/Home Office with a Mixed OS Environment Ricky Smith GSEC
Discovery, Eradication and Analysis of an attack on an open system: Welcome to the Jungle Steve Terrell GSEC
System Security and Your Responsibilities: Minimizing Your Liability Gary Holtz GSEC
Branch Office connectivity: Private Frame to VPN's, makes dollars and sense. David Boyden GSEC
Spoofing: An Overview of Some Current Spoofing Threats Neil Riser GSEC
A Best Practices Guide To Secure a Windows(R) XP Professional Installation Zacharias Groves GSEC
Implementing/Re-Implementing Change Control Policies Derek Milroy GSEC
Securing the Gold through Better Network Design: A Case Study Todd Sheppard GSEC
Open File Shares: An Unexpected Business Risk Jaime Carpenter GSEC
Hard Earned Lessons In Implementing Computer Security Incident Response Jason Chee GSEC
Know Yourself: Vulnerability Assessments Adrien de Beaupre GSEC
Keeping Red Hat Linux Systems Secure with up2date John Mravunac GSEC
Risk Assessment in the University Setting Kent Knudsen GSEC
Network- and Host-Based Vulnerability Assessments: An Introduction to a Cost Effective and Easy to Use Strategy. Ragi Guirguis GSEC
Preventing Your Computer from Becoming a Zombie Jamy Klein GSEC
Getting Started: The Impacts of Privacy and Security Under HIPAA - A Case Study Barbara Filkins GSEC
Prosecution: A Subset of Incident Response Procedures Gary Pasikowski GSEC
CyberPorn Tricks and Awareness Stephen Karrick GSEC
Corporate LAN Intranet Server Compromise Jasey DePriest GSEC
Case Study: Spam Blocking, Content Filtering, Virus Scanning and Attachment Blocking in a Novell GroupWise Environment With Guinevere, SpamAssassin and Symantec (Norton) Anti-Virus Corporate Edition Doug Hitchen GSEC
Implementing Site-to-Site IPSEC VPNs Using Cisco Routers Millie Ives GSEC
Data-Centric Quantitative Computer Security Risk Assessment Brett Berger GSEC
Good News, Bad News: The Infosec Issues of Usenet Bob Long GSEC
SSH (Secure Shell) Authentication Methods and Security Control Robert Decker III GSEC
Overview of Biometric Encryption Mark Wood GSEC
Logging and Reporting : A view from the top Rick Hislop GSEC
Business Consideration and Network Implementation of Generally Accepted Security Standards Patrick Nolan GSEC
Brush up on Bluetooth Jeffrey Hall GSEC
Is It Really Gone? Grant Thompson GSEC
Wireless Security: Past, Present and Future Keith Morris GSEC
Creating Security Policies - Lessons Learned Mark Worthington GSEC
Information Security Managing Risk with Defense in Depth Ken Straub GSEC
To CVP or not to CVP Kurt Koenigsknecht GSEC
Securing Wireless Clients using IPsec via Linux Gateway Robert King GSEC
Inverse Mapping Using Disguised TCP Resets Minna Kangasluoma GSEC
Case Study: LDAP Authentication and Authorization for Open Source Web Applications Justin Alcorn GSEC
Securing the Wile Modem: A Case Study on the Use of Policies, War Dialers and Firewalls for Phone Lines Archie Woodworth GSEC
Security Elements of IIS 6.0 Anthony DeVoto GSEC
Certificate Revocation in Public Key Infrastructures Scott Fairbrother GSEC
Auditing-In-Depth For Solaris Jeff Pike GSEC
Malicious Code: VBS/OnTheFly (Anna Kournikova) Marco Smitshoek GSEC
Obstacles to - And Workarounds For - Deploying Secure Systems Craig Cox GSEC
How Hard Does the Hack Have to Hurt? An Analysis of the Damage Requirement of the Computer Fraud and Abuse Act 18 U.S.C. Section 1030 Kristine Green GSEC
Configuring Watchguard Proxies: A Guideline to Supplementing Virus Protection and Policy Enforcement Alan Mercer GSEC
Securing NT4 Workstations in an Educational Computer Lab Environment Eric Nooden GSEC
Viral Polymorphism Stephen Pearce GSEC
The Importance of the Ramen Worm Paul DePriest GSEC
Architecting, Designing and Building a Secure Information Technology Infrastructure, a case study John Johnston GSEC
Basic Steps to Hardening a Standalone Windows 2000 Installation Todd Anderson GSEC
Secure Setup of a Corporate Detection and Scanning Environment Dieter Sarrazyn GSEC
Kerberos Network Authentication Security Protocol - Recent Security Vulnerabilities Jay Holcomb GSEC
The Evolving Threats to the Availability and Security of the Domain Name Service John Holmblad GSEC
PC Week hack of 1999 Shawn Balestracci GSEC
Case Study: Implementing a Secure Wireless Network using WPA Randy Hensel GSEC
Information Warfare: Are You Battlefield Ready? Phillip Conrad GSEC
Role-Based Access Control: The NIST Solution Hazen Weber GSEC
Nessus - Get on Board Greg Brooks GSEC
Public-key Cryptography: PGP, SSL, and SSH Thomas Jonson GSEC
Search Engines: The Ignored Threat Paul Heely GSEC
Enforcing the "Least Privilege" Principle through Active Directory, OUs, GPOs, and Group Policy Filtering Ricardo Rodriguez GSEC
BIND 8 Buffer Overflow in TSIG Richard Biever GSEC
Microsoft Internet Explorer 6.0 Security: Step-by-Step Chris Christianson GSEC
NetBus Chris Hayden GSEC
Aggressive Patching and the Use of a Standard Build: An OpenBSD example Michael Sullenszino GSEC
Attacks from Within: A Look at Security Concerns for ASPs Tyson Kopczynski GSEC
Secure Open-Source Network IDS Jared McLaren GSEC
AES: The New Key on the Block Christopher Silveira GSEC
How to Install IC Radius and Extend via Custom Perl Script Michael Meacle GSEC
Log Consolidation with syslog Donald Pitts GSEC
Protecting your Internal Systems from a Compromised Host Michael Nancarrow GSEC
Protecting Your Home Computer from the Internet, Can You Keep the Heat Out? Robert Ashworth GSEC
Cloud Security Framework Audit Methods Diana Salazar GSEC
BYOB: Build Your Own Botnet Francois Begin GSEC
Creating a Secure and Compliant Digital Forensics and Incident Response Network with Remote Access Scott Perry GSEC
Security Policy and Social Media Use Maxwell Chi GSEC
Case Study: How CIS Controls Can Limit the Cascading Failures During an Attack Bill Knaffl GSEC
Using SSL to Secure LDAP Traffic to Microsoft Domain Controllers Andrew Reid GSEC
Full Packet Capture Infrastructure Based on Docker Containers Mauricio Espinosa Gomez GSEC
Cloud Computing - Maze in the Haze Godha Iyengar GSEC
Basic Reverse Engineering with Immunity Debugger Roberto Nardella GSEC
iPad Security Settings And Risk Review For iOS 4.X Jim Horwath GSEC
Extending your Business Network through a Virtual Private Network (VPN) Kaleb Fornero GSEC
Laptop Security: Windows® Vista vs. XP Greg Hill GSEC
An Approach to Reducing Federal Data Breaches David Thomas GSEC
Incident Handler's Handbook Patrick Kral GSEC
Scalable Methods for Conducting Cyber Threat Hunt Operations Michael Long II GSEC
Diskless Cluster Computing: Security Benefit of oneSIS and Git Aron Warren GSEC
Physical Security and Why It Is Important David Hutter GSEC
Risk Assessment of Social Media Robert Shullich GSEC
Changing the Perspective of Information Security in the Cloud: Cloud Access Security Brokers and Cloud Identity and Access Management Jennifer Johns GSEC
Surfing the Web Anonymously - The Good and Evil of the Anonymizer Peter Chow GSEC
Data Loss Prevention Randy Devlin GSEC
Phishing Detection and Remediation Rich Graves GSEC
Introduction to Rundeck for Secure Script Executions John Becker GSEC
Creating a Bastioned Centralized Audit Server with GroundWork Open Source Log Monitoring for Event Signatures Christopher Duffy GSEC
Investing in Information Security: A Case Study in Community Banking Wesley Earnest GSEC
Custom Full Packet Capture System Derek Banks GSEC
In but not Out: Protecting Confidentiality during Penetration Testing Andrew Andrasik GSEC
Implementing a Vulnerability Management Process Tom Palmaers GSEC
Ransomware Susan Bradley GSEC
Corporate vs. Product Security Philip Watson GSEC
A Secure Approach to Deploying Wireless Networks Joseph Matthews GSEC
Electronic Medical Records: Success Requires an Information Security Culture Thomas Roberts GSEC
A Black-Box Approach to Embedded Systems Vulnerability Assessment Michael Horkan GSEC
Discovering Security Events of Interest Using Splunk Carrie Roberts GSEC
Legal Considerations When Creating an Incident Response Plan Bryan Chou GSEC
Protecting Small Business Banking Susan Bradley GSEC
Using COIN Doctrine to Improve Cyber Security Policies Sebastien Godin GSEC
Daisy Chain Authentication Courtney Imbert GSEC
SSL/TLS: What's under the Hood Sally Vandeven GSEC
Controlling Vendor Access for Small Businesses Chris Cain GSEC
Securing Static Vulnerable Devices Chris Farrell GSEC
Implementing a PC Hardware Configuration (BIOS) Baseline David Fletcher GSEC
Comparative Risk Analysis Between GPON Optical LAN and Traditional LAN Technologies Jason Young GSEC
Using VAX/VMS to Augment Security of a Large UNIX Environment John Jenkinson GSEC
SOHO Remote Access VPN. Easy as Pie, Raspberry Pi... Eric Jodoin GSEC
The Packet Filter: A Basic Network Security Tool Daniel Strom GSEC
Building and Managing a PKI Solution for Small and Medium Size Business Wylie Shanks GSEC
PGP in a Networked, Multi-user Environment Mark Fennig GSEC
An Architecture for Implementing Enterprise Multifactor Authentication with Open Source Tools Tom Webb GSEC
Promoting Security from the Middle Siegfried Hill GSEC
Using the Department of Defense Architecture Framework to Develop Security Requirements James Richards GSEC
Trinity v3 DDoS: Tomorrow's Headline? David Sheridan GSEC
Simulating Cyber Operations: A Cyber Security Training Framework Bryan Fite GSEC
Securing SNMP Windows Stephen Cicirelli GSEC
Inside Mac Security Ben Knowles GSEC
DSL and Computer Security Issues Joanne Ashland GSEC
Implementation and use of DNS RPZ in malware and phishing defence Alex Lomas GSEC
Cookies and Exploits Jasmir Beciragic GSEC
Skype and Data Exfiltration Kenneth Hartman GSEC
Windows NT and Novell Host Based Intrusion Detection Using Native Logging and 3rd Party Log Reporting Tools Robert Grill GSEC
Building an Application Vulnerability Management Program Jason Pubal GSEC
Public Domain FTP Buffer Overflow Vulnerabilities Feb. - Oct. 1999 Ralph Durkee GSEC
Protect Critical Infrastructure Systems With Whitelisting Dwight Anderson GSEC
Wireless LANs - the Big New Security Risk Gordon Mitchell GSEC
Botnet Tracking Tools Pierce Gibbs GSEC
The Evolution of Malicious Agents Lenny Zeltser GSEC
Point of Sale (POS) Systems and Security Wesley Whitteker GSEC
The Inside-Out Firewall Vulnerability Richard Hammer GSEC
Airwatch MDM and Android: a policy and technical review Tim Collyer GSEC
Network Security- A Guide for Small and Mid-sized Businesses Jim Hietala GSEC
Case Study: Critical Controls that Could Have Prevented Target Breach Teri Radichel GSEC
Hardening Oracle in a Linux (Unix) Environment Robert Persick GSEC
Home Field Advantage - Using Indicators of Compromise to Hunt down the Advanced Persistent Threat Matthew Toussain GSEC
An Overview of 802.11 Wireless Network Security Standards & Mechanisms Luis Carlos Wong Or GSEC
Validating Security Configurations and Detecting Backdoors in New Network Devices Christoph Eckstein GSEC
Information Systems Security Architecture: A Novel Approach to Layered Protection George Farah GSEC
A Practical Big Data Kill Chain Framework Brian Nafziger GSEC
Case Study: The Get Connected CD David Greenberg GSEC
The Spy with a License to Kill Matthew Hosburgh GSEC
Secure remote access using a Juniper SSL VPN Graham Belton GSEC
The Best Defenses Against Zero-day Exploits for Various-sized Organizations David Hammarberg GSEC
How to Configuring Local Logging on Solaris 8 and Use Symantec Intruder Alert for Centralized Logging Nolan Haisler GSEC
Application White-listing with Bit9 Parity Mike Weeks GSEC
Securing Public Access Computers In a Library Setting Andrew Sippel GSEC
Password Security-- Thirty-Five Years Later George Khalil GSEC
Vulnerabilities In TCP And UDP Ports Robert Davis GSEC
Cyberspace: America's New Battleground Maxwell Chi GSEC
Limiting Exposure to Denial of Service Attacks Heather Burritt GSEC
Agile defensive perimiters: forming the security test regression pack Michael Hendrik Matthee GSEC
Securing Windows Service Accounts Gerald Rice GSEC
A No-Budget Approach to Malware Containment Paul Ackerman GSEC
Network Security: Layering a 3R Solution @ the Perimeter Larry Copeland GSEC
The Role of Static Analysis in Heartbleed Jeff Sass GSEC
How to Avoid Inofrmation Disclosure when Managing Windows with WMI Alex Timkov GSEC
Sleeping Your Way out of the Sandbox Hassan Mourad GSEC
Apache modules for rapid mitigation of security threats Stephanie Sullivan GSEC
Minimizing Damage From J.P. Morgan's Data Breach Allen Jeng GSEC
Trends in Bot Net Command and Control Will Longman GSEC
Finding Evil in the Whitelist Josh Johnson GSEC
Application Firewalls: Don't Forget About Layer 7 Russell Eubanks GSEC
Denial of Service Deterrence Ryan Sepe GSEC
Something Phishy: How to Avoid Being Caught in the Net of Specialized Spam Karen Friend GSEC
Is It Patched Or Is It Not? Jason Simsay GSEC
Visa's 3-D Secure™:Secure Online Payment Authentication Dominique Singer GSEC
Nftables as a Second Language Kenton Groombridge GSEC
Securing the GPRS Network Infrastructure - a Network Operator's Perspective Jonathan Sau GSEC
Lenovo and the Terrible, Horrible, No Good, Very Bad Week Shaun McCullough GSEC
An Introduction to Metasploit Project for the Penetration Tester Brandon Greenwood GSEC
BYOD: Do You Know Where Your Backups Are Stored? Marsha Miller GSEC
Risks and Rewards of Instant Messaging in the Banking Sector Nicholas Rose GSEC
Two-Factor Authentication (2FA) using OpenOTP Colin Gordon GSEC
An Introduction to Implementing Object-Level Security in IBM OS/400 Jeffrey Gardner GSEC
An Introduction to Linux-based malware Matthew Koch GSEC
Security for Critical Infrastructure SCADA Systems Andrew Hildick-Smith GSEC
Coding For Incident Response: Solving the Language Dilemma Shelly Giesbrecht GSEC
Corporate Identity Fraud: Life-Cycle Management of Corporate Identity Assets Bryan Fite GSEC
Data Loss Prevention and a Point of Sales Breach Nicholas Kollasch GSEC
Malware Analysis: An Introduction Dennis Distler GSEC
Configuration Management with Windows PowerShell Desired State Configuration (DSC) Brian E. Quick GSEC
A Practical Application of Background Investigations for Small Company Security Perimeters Timothy Cook GSEC
DevOps Rescuing White Lodging from Breaches Tobias Mccurry GSEC
Applying Information Security and Privacy Principles to Governance, Risk Management & Compliance Scott Giordano GSEC
Breaking the Ice: Gaining Initial Access Phillip Bosco GSEC
Using rsync to centralize backups in small to medium-sized networks Jeff Lake GSEC
NERC CIP Patch Management and Cisco IOS Trains Aaron Prazan GSEC
Protecting Laptop Computers Greg Hill GSEC
Security Risk Communication Tools Andrew Baze GSEC
Server Security in a Citrix Presentation/Terminal Server Environment Shane Wescott GSEC
Practical Security Considerations for Managed Service Provider On-Premise Equipment Mike Yeatman GSEC
VPNScan: Extending the Audit and Compliance Perimeter Robert Vandenbrink GSEC
Shoestring Virtualization - Reducing the Risk to Small Business Data from Compromised Remote Networks Christopher Jarko GSEC
Auditing and Securing Multifunction Devices Charles Scott GSEC
Secure Architecture for Industrial Control Systems Luciana Obregon GSEC
A Virtually Secure Browser Seth Misenar GSEC
Understanding and Preventing Threats to Point of Sale Systems Richard Hummel GSEC
Firefox VS Windows Internet Explorer Robert Comella GSEC
Cloud Assessment Survival Guide Edward Zamora GSEC
OS and Application Fingerprinting Techniques Jon Mark Allen GSEC
Encryption Solutions for Small Networks David Reed GSEC
Business Continuity On A Stick Patrick Kral GSEC
There's No Going it Alone: Disrupting Well Organized Cyber Crime John Garris GSEC
Catching Phishers with Honey-Mail Denise Dragos GSEC
The Power and Implications of Enabling PowerShell Remoting Across the Enterprise Robert Adams GSEC
Introduction to the Security Audit Process Jim Murray GSEC
Moving Legacy Software and FOSS to the Cloud, Securely Larry Llewellyn GSEC
The Importance of Security Awareness Training Cindy Brodie GSEC
Developments in Car Hacking Roderick Currie GSEC
Check Point firewalls - rulebase cleanup and performance tuning Barry Anderson GSEC
Active Defense Through Deceptive Configuration Techniques Nathaniel Quist GSEC
Online Backup: Worth the Risk? Stephen Strom GSEC
Security through Configuration Control at Scale – An Introduction to Ansible Patrick Neise GSEC
Remotely Accessing Sensitive Resources Jason Ragland GSEC
The Case for Endpoint Visibility Robert Mier GSEC
USB - Ubiquitous Security Backdoor Erik Couture GSEC
Password Management Applications and Practices Scott Standridge GSEC
Measuring effectiveness in Information Security Controls Manuel Humberto Santander Pelaez GSEC
Secure Network Design: Micro Segmentation Brandon Peterson GSEC
Building Servers as Appliances for Improved Security Algis Kibirkstis GSEC
Mimikatz Overview, Defenses and Detection James Mulder GSEC
GIAC GSEC Assignment - Pass Colleen Bolan GSEC
Tracing the Lineage of DarkSeoul David Martin GSEC
Securely Integrating iOS Devices into the Business Environment Joshua Brower GSEC
OPM vs. APT: How Proper Implementation of Key Controls Could Have Prevented a Disaster David Kennel GSEC
Kerberos and Access Token Limitations Joshua Sprenger GSEC
Threat Intelligence: Planning and Direction Brian Kime GSEC
Security Implications of iOS Kiel Wadner GSEC
Obfuscation and Polymorphism in Interpreted Code Kristopher Russo GSEC
Impediments to Adoption of Two-factor Authentication by Home End-Users Preston Ackerman GSEC
PLC Device Security - Tailoring needs Wen Chinn Yew GSEC
Securing the Home IoT Network Manuel Leos Rivas GSEC
Forensicating Docker with ELK Stefan Winkel GSEC
Lateral Leadership and Information Security Stefan Krampe GSEC
Complement a Vulnerability Management Program with PowerShell Colm Kennedy GSEC
HL7 Data Interfaces in Medical Environments: Understanding the Fundamental Flaw in Healthcare Dallas Haselhorst GSEC
Does Network Micro-segmentation Provide Additional Security? Steve Jaworski GSEC
Privacy and the Internet of Things Peter Milley GSEC
Building the Airplane in Mid-Flight: Bringing Cyber Security Structure to Special Operations Units Adam Baker GSEC
Cyber Defense Challenges from the Small and Medium-Sized Business Perspective Aric Asti GSEC
Online Safety in a Foreign Language - Connecting with teens Christopher Elgee GSEC
Building a Custom SIEM Integration for an API-Based Log Source Azure AD Graph Sign-In Events Jason Mihalow GSEC
Securing the Corporate WLAN in a Healthcare Regulated Organization Jim Pomeroy GSEC
Automated Detection and Analysis using Mathematical Calculations Lionel Teo Jia Yeong GSEC
Hunting with Rigor: Quantifying the Breadth, Depth and Threat Intelligence Coverage of a Threat Hunt in Industrial Control System Environments Dan Gunter GSEC
Security Considerations for Team Based Password Managers Matthew Schumacher GSEC
Practical implementation of the Australian Signals Directorate Essential Eight Maturity Model to Level Three within residential University colleges Damian Halloran GSEC
Testing Web Application Security Scanners against a Web 2.0 Vulnerable Web Application Edmund Forster GSEC
Microsoft DNS Logs Parsing and Analysis: Establishing a Standard Toolset and Methodology for Incident Responders Shelly Giesbrecht GSEC
SDN Southbound Threats Mohamed Mahdy GSEC
Gaining Visibility on the Network with Security Onion: A Cyber Threat Intelligence Based Approach Alfredo Hickman GSEC
Shell Scripting for Reconnaissance and Incident Response Mark Gray GSEC
PowerShell Security: Is it Enough? Timothy Hoffman GSEC
Hunting and Gathering with PowerShell Troy Wojewoda GSEC
Information Security Best Practices While Managing Projects Dallas Smith GSEC
Virii Generators: Understanding the Threat James Tarala GSEC
SPAM: Recourse and Education Rodney Caudle GSEC
System and Network Documentation Winston Holmes GSEC
Highly Available PCs First Step in Business Continuity for Executives Joseph Fraher GSEC
Authenticating Nortel Contivity Clients Using RSA SecurID Tokens Rusty Fancher GSEC
Skimming and Its Side Effects Nobie Cleaver GSEC
Deploying Secure Public Kiosk Networks Jon Shaffer GSEC
Passed Maxwell Chi GSEC
Information Assurance Using Biometrics Bryan Feltin GSEC
How do you like your Internal Security? Hard-Boiled or Scrambled? A Case Study of Hardening Interior Security Jennifer Gruener GSEC
Do You Copy? Security Issues with Digital Copiers Kevin Smith GSEC
Case Study: Improving Security in Corporate (SMTP) E-Mail Delivery Brian Sommers GSEC
A Detailed Look at Steganographic Techniques and Their Use in an Open-Systems Environment Bret Dunbar GSEC
Case Study in Implementing AAA Servers Using TACACS+ Steve Ingram GSEC
Stopping P2P: How to Rid Your Network of Unwanted P2P Traffic Russell Meyer GSEC
Detachable Data Compartmentalization: Layered Defense for Laptop Data Using USB Keychain Hard Drives as Detachable Data Compartmentalization Modules John Pritchard GSEC
Case Study: Adventures in Securing Mom and Pop Ken Davidson GSEC
Wireless Security Dispelling Myths Eric Smith GSEC
Smart Cards - the All-in-One Security Platform for Today's Corporate World Ee Chin Chong GSEC
Enforce Network Access Control through Security Policy Management Process and Enforcement Craig Bowser GSEC
Using IDS to Evaluate Outbound Port Usage for Security and Reduction of IDS Alerts: A Case Study Ken Underwood GSEC
Department of Defense Public Key Infrastructure Sandra Felton GSEC
The Life Cycle of A Security Awareness Program:What has and has not Worked John Turner GSEC
A Survey of IT Offshoring Kelly Gieg GSEC
Security Features in IPv6 Penny Hermann-Seton GSEC
Basic Lindows Security Andrew Bernoth GSEC
Securing Mac OS X 10.1.5 Using Free Software David Shinberg GSEC
Securing a NetWare 6.5 Installation and Server Environment Robert Clarke GSEC
Combating the Lazy User: An Examination of Various Password Policies and Guidelines Sam Wilson GSEC
A Policy to Prevent Outsider Attacks on the Local Network Clarissa Evans Brown GSEC
Aladdin Esafe Enterprise v3.0 Stacy Bolton GSEC
Dynamic Host Configuration Protocol: Security Implications and Possible Safeguards Matthew Harvey GSEC
SOAP, Web Services and Security Cameron Michelis GSEC
Step by Step Installation of a Secure Linux Web, DNS and Mail Server John Holbrook GSEC
Distributed Systems Security: Java, CORBA, and COM+ April Moreno GSEC
The Art of Web Filtering Robert Alvey GSEC
Potential Vulnerabilities of Timbuktu Remote Control Software David Batz GSEC
Managing Security with Group Policy and the Windows Server 2003 Group Policy Management Console Norman Christopher-Knight GSEC
Securing an IIS 5.0 Web Server on Windows 2000 using Security Tools and Templates Graeme McLintock GSEC
Case Study - Assessing the Impact of Unsolicited Commercial E-mail in a Large Corporation Joseph Mccomb GSEC
Packet Sniffing In a Switched Environment Tom King GSEC
CA-ACF2 User Account Cleanup Scott Meyer GSEC
A Case Study: Deployment of Virus Protection In The Global Enterprise Carl Alexander GSEC
Netfilter and IPTables - A Structural Examination Alan Jones GSEC
Is Your Storage Area Network Secure? An Overview of Storage Area Network from Security Perspective Mohammed Haron GSEC
Securing the Employees in a HIPAA-Regulated Environment Brian LaPointe GSEC
Help We Just Fired Our Only IT Person! Doug Cox GSEC
Using a Custom LiveCD and Firewall Builder to Provide Enterprise Level Security on a Budget Jim Gadrow GSEC
Mitigating Web Application Risks With A Security Code Review And Appscan. Michael Blase GSEC
Securely Operating Windows Terminal Services/Remote Desktop Multiplatform Environment Keith Lawson GSEC
PestPatrol in a Corporate Environment: A Case Study In Information Security Tim Strong GSEC
Novell NetWare 6 Security Baseline Configuration John Saley GSEC
Securing Our Critical Infrastructures Chris Brooks GSEC
How to Effectively Launch and Maintain Security Policies Vincent Fitzpatrick GSEC
Impact of Automatic Update installation in Service Pack 3 from Microsoft on Windows 2000 workstation. Robert Blackwell GSEC
Practical demonstration of 802.11 wireless network system risk for non-technical business managers Marie Fromm GSEC
Securing Microsoft Exchange with Ciphertrust Ironmail John Warren GSEC
Meeting FISMA Requirements for Systems Constructing a System Security Plan Daniel Nagy GSEC
What is Seen is Screened Todd Emerton GSEC
Secure Email Deplyment with Windows 2003 and Exchange 2003 Kevin Murphy GSEC
SSL Appliance Based Solutions for Corporate Web Farms: The Benefits, the Drawbacks, and the Vulnerabilities Matthew Fries GSEC
A Case Study: Removing Server Based Trust Relationships Keith Gaughan GSEC
Development of a Network Intrusion Detection Policy Frank Yarnell GSEC
A Non-technical Perspective: Authentication - AKA: The Idiot's Guide to Passwords Matt Galin GSEC
Remote Users: Trust verses Necessity Chrystal Lionberger GSEC
NetTop for Data Privacy through Secure Desktops Rick Wanner GSEC
A Case Study on Securing Medical Practitioners' Offices and Making The Offices HIPAA-Aware Ira Victor GSEC
The "Great Firewall" of China: A Real National Strategy to Secure Cyberspace? Carolyn Pearson GSEC
Security for Online Transaction Processing in a White Label Financial Switch Fabian Soler GSEC
Managing Sophos Anti-Virus on a College Network Steven Blanc GSEC
Securing The Hp Nonstop Himalaya Using Safeguard Thomas Hamzik GSEC
Adapting Windows Security for Legacy Applications Edward Myers GSEC
Firewall Builder the GUI alternative James Coffey GSEC
An Introduction to the Computer Security Incident Response Tom Campbell GSEC
Information Security in Higher Education: Threats & Response Thomas Roberts GSEC
Preparation@Incident Response.security Dan Widger GSEC
Case Study On Improving The Security Of A Firm In A Legacy Application Setting Susan Bradley GSEC
Are SSL VPNs Ready for the Mainstream? Michael Jackson GSEC
Setting Up and Securing a Small Network with OpenBSD Blair Heiserman GSEC
Compartmented Network Design Weihan Chang GSEC
Ghosts in the machine: The who, why, and how of attacks on information security Cary Barker GSEC
Vulnerability Assessment Homyar Naterwala GSEC
Securing Wireless Networking Within The College District Case Study Gregory Evilsizer GSEC
Maintaining a secure network Robert Droppleman GSEC
Distributed Intrusion Detection Systems: An Introduction and Review Royce Robbins GSEC
Information Security.s Unlikely Advocae Matt Sorensen GSEC
Empowering Your IT Call Center as Information Security Advocates Carrollynn Brown GSEC
Building an Enterprise Ready, Client based VPN Solution. Kurt Anderson GSEC
Web Application Security - Layers of Protection William Fredholm GSEC
Monitoring the vital signs of a network with Multi Router Traffic Grapher (MRTG) Peter Chow GSEC
Steganography Policies for Protecting Your Web Site Toni Halley GSEC
Meeting the challenges of automated patch management John Walther GSEC
The Need for Information Security in Today's Economy Jeff Tarte GSEC
CARP: The Free Fail-over Protocol Pieter Danhieux GSEC
Case Study: Deploying and Configuring a Netscreen 100 Firewall Appliance to Secure the Network James Murphy GSEC
Classic Attacks Lessons from the Past Brian Johnson GSEC
Protecting the Average Consumer-What's wrong with Firewalls Thomas Hauer GSEC
SMaK Russ McRee GSEC
A Novice's Guide to Securing Windows XP Home Edition Timothy Potter GSEC
Implementing a Secure WebDAV System Richard Ross GSEC
Security for a CRM environment Jason LaFrance GSEC
Voice over Internet Protocol: A Discussion on How to Securely Implement on an Existing Data Network Kevin Larson GSEC
PureSecure(TM) Complete Intrusion Detection Jason Oseen GSEC
PHYSICALLY SECURITY CONSIDERATIONS FOR HIGHLY DISTRIBUTED AUTOMATION NETWORKS Rob McComber GSEC
Creating a Home Test Lab Russell Elliott GSEC
Database Encryption Things you know before you encrypt James Summers GSEC
Setting up a Secure Home Office Network Perry Jurancich GSEC
3DES and Secure PIN-based Electronic Transaction Processing Michael Buegler GSEC
Under the radar: A look at three covert communications channels Jim Goltz GSEC
Steganography in the Corporate Environment Joann Kennedy GSEC
Event Correlation Systems - The New Threat Frontline Kevin McIntyre GSEC
Secure Data. Is there Such a Thing? Sheetal Sood GSEC
Contingency Planning for ACE/Server 5.0 Tikuo Chen GSEC
Understanding Oracle Auditing Wayne Reeser GSEC
Slapper Paul Elwell GSEC
IT Security Awareness Best Practices James Neidich GSEC
VPN Deployment: Remote Access via Cisco PIX Dwayne Foley GSEC
Case Study: Secure Application Deployment Utilizing Terminal Server and VPN Clients Greg Croteau GSEC
The Difficulty of Detecting Rogue Wireless Access Points on a University or Organization Campus Anna Zapata GSEC
.Securing the Cisco Aironet 1200 Access Point. Jeffrey Turner GSEC
Vulnerabilities Secure Base Build of AIX 5.1 Al Un GSEC
Thumb Drive Threats and Countermeasures in a Mircosoft Windows Environment Mark Baggett GSEC
Remote Access VPN Security Concerns and Policy Enforcement Mike Stines GSEC
Configuring a Cisco PIX to use TACACS+ for authentication of a remote user VPN Charles Brodsky GSEC
Monitoring Web Server Logs Using Event Log Monitoring Steven Becker GSEC
Creating A Secure Linux Logging System Nathaniel Hall GSEC
Firewall Fingerprinting: Using default TCP/UDP port combinations and Nmap to identify firewall types in a network Charles Hamby GSEC
Putting Eyes on the Wire Don Murdoch GSEC
Achieving Managements Security Commitment Sherry Desbrough GSEC
Securing Wireless Networks Brett Thorne GSEC
Defending Against Spyware Invasion Jeff Smith GSEC
But I have a firewall, my network's secure! Derran Guinan GSEC
Setting Up Controlled Virtual Private Networks Using Microsoft's Proxy Server and Routing and Remote Access Service Mike Powell GSEC
Identity Theft:What you need to know Krzysztof Biernacki GSEC
UNIX System Management and Security: Differences between Linux, Solaris, AIX and HP-UX Haral Tsitsivas GSEC
Incident Management 101: Preparation & Initial Response (aka Identification) Robin Dickerson GSEC
Patching Windows Environments Using Microsoft Software Update Services SUS Ihaab Dais GSEC
Taking control of your Internet email using Sendmail and Mimedefang. Matthew Schumacher GSEC
Centralizing Event Logs on Windows 2000 Greg Lalla GSEC
Indelicate Balance: The Challenge of Content Filtering Systems in a Litigious Society Grant Streeter GSEC
Finding the Right Instant Messaging Solution for Your Company Jeff Richeson GSEC
Utilizing Static Packet Filters to Enhance Network Security Scott Foster GSEC
Smart Card Authentication: Added Security for Systems and Network Access Lawrence Thompson GSEC
Information Assurance Ramifications of Using OpenSSL in the Department of Defense Computing Environment Joel Kirch GSEC
Implementation Methodology for Information Security Management System (to comply with BS 7799 Requirements) Avinash Kadam GSEC
Wanted Dead or Alive: Snort Intrusion Detection System Mark Eanes GSEC
Common Ground - A Discussion of Standards in Network Security and How to Extend Them into the Network Assessment Arena Timothy Politowicz GSEC
How to Effectively Secure Your Business Albert Yu GSEC
Inter-node Security Issues in 802.11b Wireless LAN Environments Patrick Sweeney GSEC
LaBrea - A New Approach to Securing Our Networks Leigh Haig GSEC
Critical System Lifecycle: A Security Perspective Geoffrey Pascoe GSEC
The Firewall Has Been Installed, Now What? Developing a Local Firewall Security Policy Richard Walker GSEC
Making Smart Cards Work in the Enterprise Brett Lewis GSEC
Novell Small Business Suite Security Recommendations Scott Stone GSEC
Managing Network Firewalls -A Love/Hate Relationship James Medeiros GSEC
Evading Network Security Devices Utilizing Secure Shell Wesley Brown GSEC
Novell Server Quick Security Guide for the Overworked Administrator Tony Flowers GSEC
Securing the Network in a K-12 Public School Environment Russ Penner GSEC
Maintaining Departmental Security in a Centralized Environment: Keeping Things Secure When You Have to Cooperate Brent Veenstra GSEC
Linux Kernel Hardening Taylor Merry GSEC
Proactive Vulnerability Assessments with Nessus Jason Mitchell GSEC
Instant Messaging technology for the business market. Do the advantages outweigh the risks? Phuong Nguyen GSEC
Steganography - See No Evil, Hear No Evil, Speak No Evil Chris Farrow GSEC
Secure Server Policies and Procedures for Novell NetWare Compliance Dale Daugherty GSEC
The University Has a Firewall - Isn't That Enough? Why Users Still Need to Be Concerned About Computer Security Sherry Cummins GSEC
A practical guide to OpenSSH Olivier De Lampugnani GSEC