Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Database Activity Monitoring (DAM): Understanding And Configuring Basic Network Monitoring Using Imperva's SecureSphere

WhitepaperCyber Defense
  • 5 Jan 2016

Automated Network Defense through Threat Intelligence and Knowledge Management

WhitepaperCyber Defense
  • 4 Jan 2016

Moving Legacy Software and FOSS to the Cloud, Securely

WhitepaperCloud Security
  • 28 Dec 2015

Extracting Files from Network Packet Captures

WhitepaperDigital Forensics and Incident Response
  • 28 Dec 2015

Burp Suite(up) with fancy scanning mechanisms

Whitepaper
  • 28 Dec 2015

Poaching: Hunting Without Permission

WhitepaperDigital Forensics and Incident Response
  • 23 Dec 2015

The Power and Implications of Enabling PowerShell Remoting Across the Enterprise

WhitepaperDigital Forensics and Incident Response
  • 23 Dec 2015

Clickbait: Owning SSL via Heartbleed, POODLE, and Superfish

WhitepaperOffensive Operations
  • 23 Dec 2015
  • SANS Institute

Exploits of Yesteryear Are Never Truly Gone

WhitepaperCyber Defense
  • 23 Dec 2015

Continuous Security: Implementing the Critical Controls in a DevOps Environment

WhitepaperCloud Security
  • 23 Dec 2015

Applying Data Analytics on Vulnerability Data

WhitepaperCybersecurity Leadership
  • 23 Dec 2015

Investigative Forensic Workflow-based Case Study for Vectra and Cyphort

WhitepaperDigital Forensics and Incident Response
  • 18 Dec 2015