Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Lessons Learned from Treatment of Trauma in Individuals and Organizations Under Repeated Cyber Attacks

WhitepaperDigital Forensics and Incident Response
  • 13 Jun 2016

Gh0st in the Dshell: Decoding Undocumented Protocols

WhitepaperCyber Defense
  • 3 Jun 2016

Legal Aspects of Privacy and Security: A Case- Study of Apple versus FBI Arguments

WhitepaperCybersecurity Leadership
  • 3 Jun 2016

Using Splunk to Detect DNS Tunneling

WhitepaperCyber Defense
  • 1 Jun 2016

Evaluating Cyber Risk in Engineering Environments: A Proposed Framework and Methodology

WhitepaperCybersecurity and IT Essentials
  • 31 May 2016

Under The Ocean of the Internet - The Deep Web

WhitepaperDigital Forensics and Incident Response
  • 27 May 2016

Critical Security Controls: Software Designed Inventory, Configuration, and Governance

WhitepaperCybersecurity and IT Essentials
  • 24 May 2016

Managing Accepted Vulnerabilities

WhitepaperCybersecurity Leadership
  • 20 May 2016

An Approach to Reducing Federal Data Breaches

Whitepaper
  • 17 May 2016

Extending your Business Network through a Virtual Private Network (VPN)

WhitepaperCybersecurity Leadership
  • 17 May 2016

Basic Reverse Engineering with Immunity Debugger

Whitepaper
  • 9 May 2016

Full Packet Capture Infrastructure Based on Docker Containers

WhitepaperCloud Security
  • 6 May 2016