Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Understanding Mobile Device Wi-Fi Traffic Analysis

Whitepaper
  • 24 Apr 2018

Learning CBC Bit-flipping Through Gamification

Whitepaper
  • 24 Apr 2018

Securing the Corporate WLAN in a Healthcare Regulated Organization

Whitepaper
  • 6 Apr 2018

Evaluation of Comprehensive Taxonomies for Information Technology Threats

WhitepaperCybersecurity Leadership
  • 26 Mar 2018

Pick a Tool, the Right Tool: Developing a Practical Typology for Selecting Digital Forensics Tools

WhitepaperDigital Forensics and Incident Response
  • 16 Mar 2018

PCAP Next Generation: Is Your Sniffer Up to Snuff?

WhitepaperCyber Defense
  • 16 Mar 2018

Disrupting the Empire: Identifying PowerShell Empire Command and Control Activity

WhitepaperDigital Forensics and Incident Response
  • 23 Feb 2018

Using Windows 10 and Windows Server 2016 to create an Endpoint Detection and Response solution

WhitepaperCyber Defense
  • 21 Feb 2018

Adapting AppSec to a DevOps World

Whitepaper
  • 20 Feb 2018

Automating Static File Analysis and Metadata Collection Using Laika BOSS

Whitepaper
  • 19 Feb 2018

NOC/SOC Integration: Opportunities for Increased Efficiency in Incident Response within Cyber-Security

WhitepaperDigital Forensics and Incident Response
  • 14 Feb 2018

Building a Custom SIEM Integration for an API-Based Log Source Azure AD Graph Sign-In Events

WhitepaperCyber Defense
  • 3 Feb 2018