Student Presentations

Student Presentations

All individuals accepted into the SANS Technology Institute are provided with the opportunity to be a published prestigious researcher and author for our security college. Apply today! Click Here »

Students seeking a Master of Science in Information Security must give public presentations based on their research. Student presentations are posted here as a resource for the community.

2012
Title Author Month Files
Diskless Cluster Computing: Security Benefit of oneSIS and Git Aron Warren Sep View Presentation with Notes - PPT (401 KB)
Steganography: Then and Now John Hally May View Presentation with Notes - PPTX (614 KB)
A Preamble into Aligning Systems Engineering and Information Security Risk Dr.Craig Wright May View Presentation with Notes - PPTX (168 KB)
Baselining Windows and Comparative Analysis: Quick and Easy Kevin Fuller May View Presentation with Notes - PPT (606 KB)
Deployment of iPads - Lessons from the Trenches Jim Horwath Mar View Presentation with Notes - PPTX (274 KB)
2011
Title Author Month Files
Expanding Response: Deeper Analysis for Incident Handlers Russ McRee Nov View Presentation with Notes - PPT (622 KB)
Detecting and Responding to Data Link Layer Attacks with Scapy TJ O'Connor Sep View Presentation with Notes - PPT (2.44 MB)
Scoping Security Assessments: A Project Management Approach Ahmed Abdel-Aziz Sep View Presentation with Notes - PPT (387 KB)
Covert Channels: A Primer for Security Professionals Erik Couture Mar View Presentation with Notes - PPT (1MB)
Animal Farm: Protection from Client-side Attacks by Rendering Content with Python and Squid TJ O'Connor Mar View Presentation with Notes - PPT (1.6MB)
2010
Title Author Month Files
Server Lock-down: Identifying and Removing Needless APT Packages on Linux Systems Robert Comella Dec View Presentation with Notes - PDF (2.8 MB)
Covering the Tracks on Mac OS X Charlie Scott Nov View Presentation with Notes - PDF (2.5 MB)
Leveraging the Load Balance to Fight DDoS Brough Davis Sep View Presentation with Notes - PPTX (12MB)
The Afterglow Effect and Peer 2 Peer Networks Jay Radcliffe Jun View Presentation with Notes - PPTX (258KB)
SIEM Based Intrusion Detection Jim Beechey Mar View Presentation with Notes - PPT (1.4MB)
2009
Title Author Month Files
Making Your SIEM Work for You John Jarocki Dec View Presentation with Notes - ZIP (676KB)
Intrusion Detection & Response: Leveraging Next Generation Firewalls Ahmed Abdel-Aziz Dec View Presentation - PPT (602KB)
Detecting BitTorrent Using Snort Richard Wanner Dec View Presentation - PDF (191KB)
View Presentation with Notes - PDF (2.2MB)
Investigative Trees - Converting Attack Trees into Guides for Incident Response Rodney Caudle Dec View Presentation with Notes - PPT (224KB)
How to Make Browsers Safer Using Virtualization Seth Misenar Sep View Presentation - PDF (137KB)
How is Your Company Positioned to Deal with Law Enforcement? Tim Proffitt Sep View Presentation - PDF (188KB)
Writing Nessus Compliance Checks for Mac OS X 10.5 Rick D. Smith Jun View Presentation - PDF (2.7MB)
IOSMap: TCP and UDP Port Scanning on Cisco IOS Platforms Rob VandenBrink Jun View Presentation - PDF (906KB)
Achievements and Pitfalls of Creating and Maintaining Vulnerability Assessment Programs Tim Proffitt Mar View Presentation with Notes - PPT (579KB)
Detecting Anonymous Proxy Usage John Brozycki Mar View Presentation - PDF (296KB)
2008
Title Author Month Files
Metaspolit Payloads and Antivirus Mark Baggett Dec View PPT Presentation - PPT (312KB)
View Presentation - PPT (312KB)
Security Awareness Training Using an Actual Incident Russell Meyer Aug View Presentation - PDF (2MB)
Log Management SIMetry: A Step by Step Guide to Selecting the Correct Solution Jim Beechey Jun View Presentation - PDF (248KB)
Genetic Regular Expressions: A New Method for Detecting and Blocking Spam Eric Conrad Jun View Presentation with Notes - PDF (288KB)
Auditing a Web Application Brad Ruppert Jun View Presentation - PDF (256KB)
Log Analyzer for Dummies Emilio Valente Jun View Presentation - PDF (92KB)
Creating a remote command shell using default windows command line tools Kevin Bong Jun View Presentation with Notes - PDF (512KB)
Finding Success with a SIM: Uncovering What You Need to Analyze Jim Voorhees Jun View Presentation - PDF (194KB)
Intrusion Detection: Catch the Bad Guys before They Compromise Your Network Manuel Humberto Santander Pelaez Apr View Presentation - PPT (1.4MB)
Site Specific Report for HQ - Selected Alerts for March 2005 Russell Meyer Apr View Report - PDF (55KB)
Example Summary Matrix of the Internal IDS Sensor Alerts for August 2004 Russell Meyer Apr View Matrix - PDF (38KB)
IDS Report for Monday 9-26-05 Russell Meyer Apr View Report - PDF (57KB)
Creating Actionable Information from Intrusion Detection System (IDS) Alerts Russell Meyer Apr View Presentation - PDF (2.9MB)
2007
Title Author Month Files
Computer Forensics: From Programming Error to Antiforensics Techniques: Lessons Learned Manuel Humberto Santander Pelaez Dec View Presentation - PDF (868KB)
Heap 'Off By 1' Overflow Illustrated Eric Conrad Oct View Presentation with Notes - PDF (652KB)
View Presentation - PDF (828KB)
WMF (Windows Metafile Format) Vulnerability Jim Voorhees Sep View Presentation - PDF (48KB)
View Presentation with Notes - PDF (68KB)
Overcoming Patch Management Pitfalls Brad Ruppert Sep View Presentation with Notes - PDF (3MB)
View Presentation - PDF (3.5MB)
VPNSCAN: Extending the Audit and Compliance Perimeter Rob VandenBrink Jul View Presentation - PDF (100KB)
View Presentation with Notes - PDF (112KB)
Web Presence Monitoring Using Perl Kevin Bong Jul View Presentation - PDF (248KB)
Assumptions in Intrusion Analysis: Gap Analysis Rodney Caudle Jul View Presentation - PDF (222KB)
View Presentation with Notes - PDF (164KB)
MRTG (Multi Router Traffic Grapher) used for Basic Server Monitoring T. Brian Granier Apr View Presentation - PDF (260KB)
View Presentation with Notes - PDF (348KB)
2006
Title Author Month Files
Phish Feeding: An Active Response to Phishing Campaigns John Brozycki Oct View Report - PDF (332KB)
View Presentation - PDF (616KB)
The Spam/Anti-Spam Battlefield T. Brian Granier Oct View Presentation with Notes - PDF (1.1MB)
View Presentation - PDF (468KB)
Cyberlaw: Honeypot Edition Jay Radcliffe Oct View Presentation - PDF (468KB)
Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer Aug View Presentation - PDF (389KB)
Inside-Out Firewall Vulnerability Revisited Richard Hammer Jun View Presentation - PDF (416KB)