This webcast is no longer available. Webcasts prior to 2013 are no longer offered.
Click here to go back to the webcasts home page.
Tunneling, Pivoting, and Web Application Penetration TestingBy Gordon Fraser
PKI Trust Models: Whom do you trust?By Blaine Hein
Coding For Incident Response: Solving the Language DilemmaBy Shelly Giesbrecht
Last 25 Papers »
Learn to code Python to use in Penetration Testing w/ @MarkB [...]August 5, 2015 - 3:05 AM
Learn to hack/defend an ICS/SCADA enabled model city - CYBER [...]August 5, 2015 - 12:05 AM
Have you taken WEB APP #PenTest training w/ @sethmisenar? W [...]August 4, 2015 - 8:05 PM
Mon-Fri 9am - 8pm EST/EDT
"As a security professional, this info is foundational to do a competent job, let alone be successful."- Michael Foster, Providence Health and Security
"It was a great learning experience that helped open my eyes wider. The instructor's knowledge was fantastic."- Manuja Wikesekera, Melbourne Cricket Club
"SANS always provides you what you need to become a better security professional at the right price."- Rasik Vekaria, BP