Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

MalwareD: A study on network and host based defenses that prevent malware from accomplishing its goals.

WhitepaperCybersecurity and IT Essentials
  • 17 Sep 2014

Implementing Public Key Infrastructure (PKI) Using Microsoft Windows Server 2012 Certificate Services

WhitepaperCybersecurity and IT Essentials
  • 16 Sep 2014

A Project Management Approach to Writing a GIAC Gold Paper

WhitepaperCybersecurity Leadership
  • 15 Sep 2014

Case Study: Critical Controls that Could Have Prevented Target Breach

Whitepaper
  • 12 Sep 2014

How the SANS Critical Controls Prevent the Red Team from P0wning your Database

WhitepaperCybersecurity and IT Essentials
  • 4 Sep 2014

Straddling the Next Frontier Part 1: Quantum Computing Primer

Whitepaper
  • 3 Sep 2014

Straddling the Next Frontier Part 2: How Quantum Computing has already begun impacting the Cyber Security landscape

Whitepaper
  • 3 Sep 2014

Creating a Baseline of Process Activity for Memory Forensics

WhitepaperDigital Forensics and Incident Response
  • 27 Aug 2014

Differences between HTML5 or AJAX web applications

Whitepaper
  • 27 Aug 2014

H.O.T. | Security

Whitepaper
  • 21 Aug 2014

Airwatch MDM and Android: a policy and technical review

Whitepaper
  • 21 Aug 2014

Beyond the cookie: Using network traffic characteristics to enhance confidence in user identity

Whitepaper
  • 19 Aug 2014