Back to Results
First PageMeta Content
Security / SANS Institute / Global Information Assurance Certification / Penetration test / Consensus audit guidelines / Network security / Microsoft Security Essentials / Application security / Sourcefire / Computer network security / Computer security / Computing


Washington, DC | December 7-16, 2012
Add to Reading List

Document Date: 2012-08-21 04:14:04


Open Document

File Size: 3,25 MB

Share Result on Facebook

City

Washington / DC / Washington / /

Company

ACS Inc. / GIAC Approved Training S A / National Security Systems / Backshore Communications / Cisco / Fortune / Intrusion Prevention Technologies / DuPont / InGuardians Inc. / CISSP / Intrusion Detection Technologies / Boeing / Sourcefire / Microsoft / /

Currency

AUD / /

Event

FDA Phase / /

Facility

SANS Technology Institute / DuPont Circle Hotel / University of Cincinnati Register / /

IndustryTerm

Web Applications Security Essentials GSEC GWEB Secure Coding LEG523 Law / http /

OperatingSystem

Unix / Linux / Microsoft Windows / /

Organization

Pentest An / SANS Institute / University of Cincinnati Register / Committee on National Security Systems / SANS Technology Institute / Graduate School / STI Graduate School / US Federal Reserve / Department of Defense / SANS Internet Storm Center / /

Person

Bryce Galbraith Maximize / Steven Park / Alan Paller / Eric Conrad Cyber / Cham / Bryce Galbraith / Laura Freeman / Eric Cole / Eric Conrad / Leon Noseworthy / Jarrod Frates / Toolkit / Mike Poor / Kevin McLaughlin / Andrew Longsworth / /

Position

senior instructor and co-author / president / detective / consultant / contributing author / technology and security leader / skilled analyst / UNIX systems administrator / author / lead author / founder and senior security analyst / research engineer / combat-ready analyst / analyst / Director of Research The / Instructor / /

Product

Snort / IPv6 / /

ProgrammingLanguage

JAVA / R / C / DC / C++ / /

PublishedMedium

The CISSP Study Guide / /

RadioStation

CBK / /

Technology

IPv6 / Internet Security Technologies / php / Linux system / Response •M icrosoft Protocols / Unix / Linux / operating system / Mobile Device / TCP/IP / related protocols / CMP / Encryption / Cryptography / four covers encryption / DNS / Java / firewall / http / DLP / simulation / VOIP / web server / /

URL

www.sans.org/assessments / www.sans.org/security-training/curriculums/security / www.sans.edu / http /

SocialTag