Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Mark Baggett

FellowChief Technology Officer at The Internet Storm Center

Specialities

Cyber Defense

Connect with Mark

Mark Baggett

About Mark Baggett

Mark Baggett’s first foray into information security was on the receiving end of hacking, and he was amazed by the experience. “The hackers made my computer do stuff that I didn't think was possible,” he says. “It was like magic and I had to know how the trick was done.” He immediately became obsessed with understanding all the tricks, how they worked, and how to prevent them from happening again.

Fast forward to today and Mark’s infosec career spans nearly 30 years with 15 of those years spent teaching for SANS. Mark is currently a faculty fellow for SANS and an independent consultant through his company Indepth Defense providing forensics, incident response, and penetration testing services. Mark served as the technical advisor to the DoD for SANS from 2011 until 2024, where he assisted various government organizations in the development of information security capabilities. Today he is the Chief Technology Officer for the Internet Storm Center.

Press & Media

More From Mark

  • Meet SANS Senior Instructor: Mark Baggett
  • eapmd5crack.py A python implementation of an EAP authentication cracking.
  • Freq Server A Web server that integrates with SEIM systems and identifies hosts being used for Command and control by identifying domains being used for Command and Control. The tools uses character frequency analysis to identify random hostnames.
  • Domain Stats - A SEIM Integration tool that monitors DNS hostnames used by your network to identify first contact with new domains and contact with new domains that have been established in the last 2 years, effective in identifying malicious actors.
  • API-ify A Web server that provides an API that allows network defenders to consume the output of any Linux based command and integrate it into their ELK stack, splunk or other SEIM tools.
  • Reassembler A tool that allows network defenders to reassemble and view packets using the 5 widely used fragment reassembly policies commonly found in Intrusion Detection Systems.
  • SET-KBLED A Powershell script that will allow you to set the Keyboard LED Color to the color of your Clevo chipset based Keyboard.
  • SRUM-DUMP Windows GUI Forensics tool produces XLSX spreadsheet with detailed information on all processes that have run in the last 30 days on Windows computers.
  • ESE Analyst Command line based tool that dumps and analyzes databases used on Windows systems that stores various forensics information. Plugins are used to dump different types of data.
  • Werejugo A Windows Forensics tool that analyzes the registry, event logs and wireless network configurations to identify physical locations of where the laptop has been used.