Highlights of Recent Research

In addition to pursuing class and lab exercises, SANS Master's program candidates are always conducting research. Here are some highlights of their recent findings. You can follow the links in each of the titles to find a complete copy of their research paper, and you can visit the SANS Reading room to view these and other student's research results.

Intrusion Detection Through Relationship Analysis
By Patrick Neise
October 24, 2016

Building a Home Network Configured to Collect Artifacts for Supporting Network Forensic Incident Response
By Gordon Fraser
September 21, 2016

Using Vagrant to Build a Manageable and Sharable Intrusion Detection Lab
By Shaun McCullough
September 20, 2016

Bill Gates and Trustworthy Computing: A Case Study in Transformational Leadership
By Preston S. Ackerman
September 20, 2016

Know Thy Network - Cisco Firepower and Critical Security Controls 1 & 2
By Ryan Firth
September 19, 2016

In but not Out: Protecting Confidentiality during Penetration Testing
By Andrew Andrasik
August 22, 2016

Introduction to Rundeck for Secure Script Executions
By John Becker
August 11, 2016

Legal Aspects of Privacy and Security: A Case- Study of Apple versus FBI Arguments
By Muzamil Riffat
June 3, 2016

Under The Ocean of the Internet - The Deep Web
By Brett Hawkins
May 27, 2016

Securing Jenkins CI Systems
By Allen Jeng
April 8, 2016

Dont Always Judge a Packet by Its Cover
By Gabriel Sanchez
February 16, 2016

Secure Network Design: Micro Segmentation
By Brandon Peterson
February 29, 2016

Selling Your Information Security Strategy
By David Todd
February 18, 2016

Infrastructure Security Architecture for Effective Security Monitoring
By Luciana Obregon
December 11, 2015

Cybersecurity Inventory at Home
By Glen Roberts
January 7, 2016

Security Systems Engineering Approach in Evaluating Commercial and Open Source Software Products
By Jesus Abelarde
January 29, 2016

Network Forensics and HTTP/2
By Stefan Winkel
January 18, 2016

There's No Going it Alone: Disrupting Well Organized Cyber Crime
By John Garris
November 23, 2015

Web Application File Upload Vulnerabilities
By Matthew Koch
December 7, 2015

Compliant but not Secure: Why PCI-Certified Companies Are Being Breached
By Christian Moldes
December 9, 2015

A Network Analysis of a Web Server Compromise
By Kiel Wadner
September 8, 2015

Coding For Incident Response: Solving the Language Dilemma
By Shelly Giesbrecht
July 28, 2015

Forensic Timeline Analysis using Wireshark GIAC (GCFA) Gold Certification
By David Fletcher
August 10, 2015

Accessing the inaccessible: Incident investigation in a world of embedded devices
By Eric Jodoin
June 24, 2015

Breaking the Ice: Gaining Initial Access
By Phillip Bosco
August 28, 2015

Honeytokens and honeypots for web ID and IH
By Rich Graves
May 14, 2015

Ransomware Response Project Plan
By Phillip Bosco & Stephen Deck
May 2016

Endpoint Security through Device Configuration, Policy and Network Isolation
By Barbara Filkins & Jonathan Risto
July 15, 2016