<!DOCTYPE html><html data-theme="dark" lang="en-US"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" as="image" imageSrcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=16&amp;quality=75&amp;format=webp 16w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=32&amp;quality=75&amp;format=webp 32w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=48&amp;quality=75&amp;format=webp 48w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=64&amp;quality=75&amp;format=webp 64w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=96&amp;quality=75&amp;format=webp 96w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=128&amp;quality=75&amp;format=webp 128w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=3840&amp;quality=75&amp;format=webp 3840w" imageSizes="300px, (min-width: 768px) 445px"/><link rel="stylesheet" href="/_next/static/css/8f4c1d5ac92728b5.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/f60c4c18eaea2539.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/10a162551269c449.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/19ce4d406e564b03.css" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/206023683b1c0579.css" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-11f4915bd98f8a25.js"/><script src="/_next/static/chunks/c05f6132-04ed626f2288e828.js" async=""></script><script src="/_next/static/chunks/2328-7afeeffa74a984be.js" async=""></script><script src="/_next/static/chunks/main-app-5ac86ba54cb5ca21.js" async=""></script><script src="/_next/static/chunks/0ac02ab0-9734b1a658ed1114.js" async=""></script><script src="/_next/static/chunks/3970-9261773f9c0e8d18.js" async=""></script><script src="/_next/static/chunks/1299-897517986f6d760d.js" async=""></script><script src="/_next/static/chunks/2534-c754c698a60b8575.js" async=""></script><script src="/_next/static/chunks/6676-20e4890b05aafbf0.js" async=""></script><script src="/_next/static/chunks/2682-17379429f0b93fb5.js" async=""></script><script src="/_next/static/chunks/2411-d7e1899bfb2358fc.js" async=""></script><script src="/_next/static/chunks/5463-5252e78b2dd34d4e.js" async=""></script><script src="/_next/static/chunks/1638-693bfc588657e07c.js" async=""></script><script src="/_next/static/chunks/181-8557cc112cd03503.js" async=""></script><script src="/_next/static/chunks/6551-731be90d7a47741b.js" async=""></script><script src="/_next/static/chunks/app/layout-db05aba00a9dacde.js" async=""></script><script src="/_next/static/chunks/1800-14fa0c06af0073b0.js" async=""></script><script src="/_next/static/chunks/1413-6d820c3bb613cd06.js" async=""></script><script src="/_next/static/chunks/app/page-d57d6546cb7e66be.js" async=""></script><script src="/_next/static/chunks/app/error-8391fd18fc444d3f.js" async=""></script><script src="/_next/static/chunks/1044-687250a180f48329.js" async=""></script><script src="/_next/static/chunks/1049-097a54a192c2924a.js" async=""></script><script src="/_next/static/chunks/9633-b2d87d5d19bd0ffd.js" async=""></script><script src="/_next/static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js" async=""></script><link rel="preload" href="https://cdn.optimizely.com/js/28081820005.js" as="script"/><link rel="preload" href="https://www.googletagmanager.com/gtm.js?id=GTM-5T9DW3B" as="script"/><meta name="next-size-adjust" content=""/><meta content="cC-8xOerZ3opiLx9VloUCzc6SgMfOZHYihJzWA19-KI" name="google-site-verification"/><title>Digital Forensics and Incident Response Training | SANS Institute</title><meta name="description" content="Learn about SANS Digital Forensics courses, training and certifications as well as an extensive suite of free Digital Forensics resources."/><meta name="language" content="en"/><link rel="canonical" href="https://www.sans.org/cybersecurity-focus-areas/digital-forensics-incident-response"/><meta property="og:title" content="Digital Forensics and Incident Response Training | SANS Institute"/><meta property="og:description" content="Learn about SANS Digital Forensics courses, training and certifications as well as an extensive suite of free Digital Forensics resources."/><meta property="og:url" content="https://www.sans.org/cybersecurity-focus-areas/digital-forensics-incident-response"/><meta property="og:site_name" content="SANS Institute"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary"/><meta name="twitter:site" content="@SANSInstitute"/><meta name="twitter:title" content="Digital Forensics and Incident Response Training | SANS Institute"/><meta name="twitter:description" content="Learn about SANS Digital Forensics courses, training and certifications as well as an extensive suite of free Digital Forensics resources."/><link rel="icon" href="/favicon.ico" type="image/x-icon" sizes="48x48"/><link rel="icon" href="/icon1.png?2951f2f1b780f8ac" type="image/png" sizes="96x96"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js" noModule=""></script></head><body class="__variable_71459b __variable_5c0054 __variable_9e78df"><div hidden=""><!--$--><!--/$--></div><!--$--><!--/$--><!--$--><!--/$--><noscript><iframe height="0" src="https://www.googletagmanager.com/ns.html?id=GTM-N9Z5JVC" style="display:none;visibility:hidden" width="0"></iframe></noscript><script>((a,b,c,d,e,f,g,h)=>{let i=document.documentElement,j=["light","dark"];function k(b){var c;(Array.isArray(a)?a:[a]).forEach(a=>{let c="class"===a,d=c&&f?e.map(a=>f[a]||a):e;c?(i.classList.remove(...d),i.classList.add(b)):i.setAttribute(a,b)}),c=b,h&&j.includes(c)&&(i.style.colorScheme=c)}if(d)k(d);else try{let a=localStorage.getItem(b)||c,d=g&&"system"===a?window.matchMedia("(prefers-color-scheme: dark)").matches?"dark":"light":a;k(d)}catch(a){}})("data-theme","theme","system",null,["light","dark"],null,true,false)</script><div class="c-skip-links"><ul class="skip-links__list u-container"><li class="skip-links__list-item"><button class="c-button button--tertiary-white skip-links__list-item-button" type="button"><span class="button__label">Skip to main content</span></button></li><li class="skip-links__list-item"><button class="c-button button--tertiary-white skip-links__list-item-button" type="button"><span class="button__label">Go to search</span></button></li><li class="skip-links__list-item"><button class="c-button button--tertiary-white skip-links__list-item-button" type="button"><span class="button__label">Go to footer</span></button></li></ul></div><header class="c-header header--is-visible"><div class="c-topbar"><div class="c-container topbar__container"><nav aria-label="Topbar navigation" class="topbar__nav"><div class="topbar__nav-item"><a class="topbar__nav-item-link" href="/account/login"><svg height="16" width="16"><use href="/icons.svg#login"></use></svg>Log In</a></div><div class="topbar__nav-item"><a class="topbar__nav-item-link" href="/account/create"><svg height="16" width="16"><use href="/icons.svg#new"></use></svg>Join - It&#x27;s Free</a></div></nav><button class="c-theme-switcher" type="button"><svg height="24" width="24" class="theme-switcher__icon"><use href="/icons.svg#moon"></use></svg><span class="sr-only"></span><span class="theme-switcher__toggle"></span><svg height="24" width="24" class="theme-switcher__icon"><use href="/icons.svg#sun"></use></svg></button></div></div><div class="header__wrapper"><div class="c-container header__container"><a aria-disabled="false" aria-label="Go to homepage" href="/"><svg height="33" width="65" class="header__logo"><use href="/icons.svg#logo"></use></svg></a><div class="header__drawer"><div class="c-mobile-drawer-search" role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="mobile-drawer-search-label"><form class="mobile-drawer-search__form" noValidate="" role="search" action="" method="GET"><label class="sr-only" for="mobile-drawer-search-input" id="mobile-drawer-search-label">Search</label><div class="c-search-input mobile-drawer-search__input"><input autoCapitalize="none" class="search-input__field" type="search" aria-autocomplete="both" aria-labelledby="mobile-drawer-search-label" id="mobile-drawer-search-input" autoComplete="off" autoCorrect="off" enterKeyHint="search" spellCheck="false" placeholder="What are you looking for?" maxLength="512"/><div class="search-input__buttons"><button class="c-button button--primary button--icon-right button--is-icon-only" type="submit"><div class="c-loading-spinner loading-spinner--size-md button__loader"><div class="loading-spinner__spinner"></div></div><span class="sr-only">Search</span></button></div></div></form><div class="search-results--mobile-drawer"></div></div><div class="c-header-navigation"><div aria-label="Main tab navigation" class="header-navigation__tabs" role="tablist"><button id="header-navigation-tab-0" role="tab" tabindex="0" class="c-button button--tertiary-white button--icon-right button--icon-translate-right header-navigation__tab" aria-controls="header-navigation-tabpanel-0" aria-selected="false" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Training</span></button><button id="header-navigation-tab-1" role="tab" tabindex="0" class="c-button button--tertiary-white button--icon-right button--icon-translate-right header-navigation__tab" aria-controls="header-navigation-tabpanel-1" aria-selected="false" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learning Paths</span></button><button id="header-navigation-tab-2" role="tab" tabindex="0" class="c-button button--tertiary-white button--icon-right button--icon-translate-right header-navigation__tab" aria-controls="header-navigation-tabpanel-2" aria-selected="false" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Free Resources</span></button><button id="header-navigation-tab-3" role="tab" tabindex="0" class="c-button button--tertiary-white button--icon-right button--icon-translate-right header-navigation__tab" aria-controls="header-navigation-tabpanel-3" aria-selected="false" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">For Organizations</span></button></div><div aria-labelledby="header-navigation-tab-0" id="header-navigation-tab-0" role="tabpanel" class="header-navigation__tabpanel"><div class="u-container header-navigation__tabpanel-container"><button class="c-button button--tertiary-white button--icon-left button--icon-translate-right header-navigation__tabpanel-back-button" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Back</span></button><a class="header-navigation__tabpanel-link" href="/cyber-security-training-overview">Training</a><div class="c-grid grid--columns-12"><nav aria-label="navigation for: training" class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-8 header-navigation__tabpanel-items"><div class="header-navigation__tabpanel-item-single"><a aria-label="Courses" class="header-navigation__tabpanel-link-container" href="/cybersecurity-courses"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#courses-cards-three"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Courses</p><p class="c-text header-navigation__tabpanel-item-single-description">Build cyber prowess with training from renowned experts</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Ways to Train" class="header-navigation__tabpanel-link-container" href="/cyber-security-training-formats"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#training"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Ways to Train</p><p class="c-text header-navigation__tabpanel-item-single-description">Multiple training options to best fit your schedule and preferred learning style</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Cyber Ranges" class="header-navigation__tabpanel-link-container" href="/cyber-ranges"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#hands-on-solutions"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Cyber Ranges</p><p class="c-text header-navigation__tabpanel-item-single-description">Hands-on training to keep you at the top of your game</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a href="/cyber-security-training-events" aria-label="Training Events &amp; Summits" class="header-navigation__tabpanel-link-container" target="_self"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#location"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Training Events &amp; Summits</p><p class="c-text header-navigation__tabpanel-item-single-description">Expert-led training at locations around the world</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Certifications" class="header-navigation__tabpanel-link-container" href="/cyber-security-certifications"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#sealcheck-certification"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Certifications</p><p class="c-text header-navigation__tabpanel-item-single-description">Demonstrate cybersecurity expertise with GIAC certifications</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Free Training Events" class="header-navigation__tabpanel-link-container" href="/free-cybersecurity-events"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#calendar-check"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Free Training Events</p><p class="c-text header-navigation__tabpanel-item-single-description">Upcoming workshops, webinars and local events
</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Workforce Security and Risk Training " class="header-navigation__tabpanel-link-container" href="/for-organizations/workforce"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#shield-workforce"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Workforce Security and Risk Training </p><p class="c-text header-navigation__tabpanel-item-single-description">Harden enterprise security with end-user and role-based training</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Meet Our Instructors" class="header-navigation__tabpanel-link-container" href="/instructors"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#user-private-training"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Meet Our Instructors</p><p class="c-text header-navigation__tabpanel-item-single-description">Train with world-class cybersecurity experts who bring real-world expertise to class.</p></div></a></div></nav><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-10 grid__item--col-end-13 header-navigation__tabpanel-featured header-navigation__tabpanel-featured--is-card"><div class="header-navigation__tabpanel-card"><div class="header-navigation__tabpanel-card-title"><span class="c-heading heading--is-h6 heading--is-h6-desktop">Featured Course</span><a class="c-button button--tertiary header-navigation__tabpanel-card-button" href="/cyber-security-courses"><span class="button__label">View All Courses</span></a></div><article class="c-course-card course-card--is-default header-navigation__tabpanel-course-card" id="SEC595"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals</h3><header class="course-card__header"></header><div class="course-card__labels"><span class="course-card__label-code">SEC595</span><span class="course-card__label-focus-area">Cyber Defense, Artificial Intelligence</span></div><div class="course-card__image-wrapper"><img alt="SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png?width=3840&amp;quality=75&amp;format=webp"/></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/applied-data-science-machine-learning"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/applied-data-science-machine-learning#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></div></div></div></div><div class="header-navigation__tabpanel-bottom-bar"><div class="c-container"><span class="c-text header-navigation__tabpanel-bottom-bar-title">Get a Free Hour of SANS Training</span><div class="header-navigation__tabpanel-bottom-bar-wrapper"><p class="c-text header-navigation__tabpanel-bottom-bar-description">Experience SANS training through course previews.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right header-navigation__tabpanel-bottom-bar-button" href="/course-preview"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn More</span></a></div></div></div></div><div aria-labelledby="header-navigation-tab-1" id="header-navigation-tab-1" role="tabpanel" class="header-navigation__tabpanel"><div class="u-container header-navigation__tabpanel-container"><button class="c-button button--tertiary-white button--icon-left button--icon-translate-right header-navigation__tabpanel-back-button" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Back</span></button><a class="header-navigation__tabpanel-link" href="/learning-paths">Learning Paths</a><div class="c-grid grid--columns-12"><nav aria-label="navigation for: learning paths" class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-8 header-navigation__tabpanel-items"><div class="header-navigation__tabpanel-item-single"><a aria-label="By Focus Area" class="header-navigation__tabpanel-link-container" href="/cybersecurity-focus-areas"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#focus"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">By Focus Area</p><p class="c-text header-navigation__tabpanel-item-single-description">Chart your path to job-specific training courses</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="New to Cyber" class="header-navigation__tabpanel-link-container" href="/mlp/new-to-cyber"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#new"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">New to Cyber</p><p class="c-text header-navigation__tabpanel-item-single-description">Give your cybersecurity career the right foundation for success</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="By Job Role" class="header-navigation__tabpanel-link-container" href="/job-roles"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#briefcase-management"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">By Job Role</p><p class="c-text header-navigation__tabpanel-item-single-description">Find the courses and certifications that align with our current or desired role</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Leadership" class="header-navigation__tabpanel-link-container" href="/cybersecurity-focus-areas/leadership"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#ranking"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Leadership</p><p class="c-text header-navigation__tabpanel-item-single-description">Training designed to help security leaders reduce organizational risk</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="By Skills Framework or Directive" class="header-navigation__tabpanel-link-container" href="/frameworks-and-directives"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#atom"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">By Skills Framework or Directive</p><p class="c-text header-navigation__tabpanel-item-single-description">Explore how SANS courses align with leading cybersecurity skills frameworks including NICE, ECSF and DoD 8140</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Degree and Certificate Programs" class="header-navigation__tabpanel-link-container" href="https://www.sans.edu/"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#degree"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Degree and Certificate Programs</p><p class="c-text header-navigation__tabpanel-item-single-description">Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="By Skills Roadmap" class="header-navigation__tabpanel-link-container" href="/cyber-security-skills-roadmap"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#learning-paths"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">By Skills Roadmap</p><p class="c-text header-navigation__tabpanel-item-single-description">Find the right training path based on critical skills</p></div></a></div></nav><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-10 grid__item--col-end-13 header-navigation__tabpanel-featured header-navigation__tabpanel-featured--is-card"><div class="header-navigation__tabpanel-card"><div class="header-navigation__tabpanel-card-title"><span class="c-heading heading--is-h6 heading--is-h6-desktop">Featured</span><a class="c-button button--tertiary header-navigation__tabpanel-card-button" href="/cybersecurity-focus-areas"><span class="button__label">View all Focus Areas</span></a></div><div class="c-learning-paths-card learning-parths-card--is-simplified learning-paths-card--is-color-ai header-navigation__tabpanel-learning-path-card"><svg height="24" width="24" class="learning-paths-card__icon"><use href="/icons.svg#related"></use></svg><a class="c-button button--tertiary-white button--icon-right button--icon-translate-right learning-paths-card__cta" href="/cybersecurity-focus-areas/ai"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">NEW - AI Security Training</span></a></div></div></div></div></div><div class="header-navigation__tabpanel-bottom-bar"><div class="c-container"><span class="c-text header-navigation__tabpanel-bottom-bar-title">Can&#x27;t find what you are looking for?</span><div class="header-navigation__tabpanel-bottom-bar-wrapper"><p class="c-text header-navigation__tabpanel-bottom-bar-description">Let us help.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right header-navigation__tabpanel-bottom-bar-button" href="/about/contact"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Contact us</span></a></div></div></div></div><div aria-labelledby="header-navigation-tab-2" id="header-navigation-tab-2" role="tabpanel" class="header-navigation__tabpanel"><div class="u-container header-navigation__tabpanel-container"><button class="c-button button--tertiary-white button--icon-left button--icon-translate-right header-navigation__tabpanel-back-button" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Back</span></button><a class="header-navigation__tabpanel-link" href="/security-resources">Free Resources</a><div class="c-grid grid--columns-12"><div aria-label="navigation for: free resources" class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-9 header-navigation__tabpanel-items header-navigation__tabpanel-items--is-3-grid"><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Watch &amp; Listen</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/webcasts"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Webinars</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/presentations"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Summit Presentations</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/podcasts"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Podcasts &amp; Live Streams</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/security-resources/watch-and-listen"><span class="button__label">Overview</span></a></nav><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Read</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/blog"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Blog</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/newsletters"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Newsletters</span></a><a href="https://isc.sans.edu/" class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" target="_blank"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Internet Storm Center</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/security-resources/read"><span class="button__label">Overview</span></a></nav><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Download</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/tools"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Open Source Tools</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/posters"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Posters &amp; Cheat Sheets</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/information-security-policy"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Policy Templates</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/white-papers"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">White Papers</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/security-resources/download"><span class="button__label">Overview</span></a></nav></div><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-10 grid__item--col-end-13 header-navigation__tabpanel-featured header-navigation__tabpanel-featured--is-items"><div class="header-navigation__tabpanel-item-single"><a aria-label="SANS Community Benefits" class="header-navigation__tabpanel-link-container" href="/member-benefits"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#new"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">SANS Community Benefits</p><p class="c-text header-navigation__tabpanel-item-single-description">Connect, learn, and share with other cybersecurity professionals</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Customer Case Studies" class="header-navigation__tabpanel-link-container" href="/customer-reviews"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#people-3"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Customer Case Studies</p><p class="c-text header-navigation__tabpanel-item-single-description">Discover how organizations and individual cyber practitioners use SANS training and GIAC certifications</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="AI Risk &amp; Readiness" class="header-navigation__tabpanel-link-container" href="/artificial-intelligence"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#head"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">AI Risk &amp; Readiness</p><p class="c-text header-navigation__tabpanel-item-single-description">Explore expert-driven guidance, training, and tools to help defend against AI-powered threats and adopt AI securely</p></div></a></div></div></div></div><div class="header-navigation__tabpanel-bottom-bar"><div class="c-container"><span class="c-text header-navigation__tabpanel-bottom-bar-title">Join the SANS Community</span><div class="header-navigation__tabpanel-bottom-bar-wrapper"><p class="c-text header-navigation__tabpanel-bottom-bar-description">Become a member for instant access to our free resources.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right header-navigation__tabpanel-bottom-bar-button" href="/member-benefits"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Sign Up</span></a></div></div></div></div><div aria-labelledby="header-navigation-tab-3" id="header-navigation-tab-3" role="tabpanel" class="header-navigation__tabpanel"><div class="u-container header-navigation__tabpanel-container"><button class="c-button button--tertiary-white button--icon-left button--icon-translate-right header-navigation__tabpanel-back-button" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Back</span></button><a class="header-navigation__tabpanel-link" href="/for-organizations">For Organizations</a><div class="c-grid grid--columns-12"><div aria-label="navigation for: for organizations" class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-9 header-navigation__tabpanel-items header-navigation__tabpanel-items--is-3-grid"><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Team Development</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/team-development/why-partner-with-sans"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Why Partner with SANS</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/team-development/group-purchasing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Group Purchases</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/team-development/cybersecurity-assessments"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Skills &amp; Talent Assessments</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/team-development/private-training"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Private &amp; Custom Training Programs</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/for-organizations/team-development"><span class="button__label">Overview</span></a></nav><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Leadership Development</span><a href="/cyber-security-courses?refinementList%5Bfacets.focusArea%5D%5B0%5D=Cybersecurity%20Leadership" class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Management Courses &amp; Accreditation</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/cyber-ranges/cyber-crisis-exercises"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Cyber Crisis Exercises</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/cyber-leaders-network"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">SANS Cyber Leaders Network</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/cybersecurity-focus-areas/leadership"><span class="button__label">Overview</span></a></nav><nav class="header-navigation__tabpanel-item-multiple"><span class="c-text text--is-sm text--is-regular header-navigation__tabpanel-item-multiple-label">Workforce Security &amp; Risk</span><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/security-awareness-training"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Security Awareness Training</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/compliance-training"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Compliance Training</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/risk-management"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Risk Management</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/services"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Services</span></a><a class="c-button button--unstyled button--icon-right button--icon-translate-right header-navigation__tabpanel-item-multiple-link" href="/for-organizations/workforce/resources"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Resources</span></a><a class="c-button button--tertiary header-navigation__tabpanel-item-multiple-cta" href="/for-organizations/workforce"><span class="button__label">Overview</span></a></nav></div><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-10 grid__item--col-end-13 header-navigation__tabpanel-featured header-navigation__tabpanel-featured--is-items"><div class="header-navigation__tabpanel-item-single"><a aria-label="Public Sector" class="header-navigation__tabpanel-link-container" href="/for-organizations/public-sector"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#building-office-enterprise"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Public Sector</p><p class="c-text header-navigation__tabpanel-item-single-description">Mission-focused cybersecurity training for government, defense, and education</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Partnerships" class="header-navigation__tabpanel-link-container" href="/partnerships"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#people-2"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Partnerships</p><p class="c-text header-navigation__tabpanel-item-single-description">Explore industry-specific programming and customized training solutions</p></div></a></div><div class="header-navigation__tabpanel-item-single"><a aria-label="Sponsorship Opportunities" class="header-navigation__tabpanel-link-container" href="/sponsorship"><svg height="14" width="14" aria-hidden="true" class="header-navigation__tabpanel-item-single-icon"><use href="/icons.svg#info"></use></svg><div class="header-navigation__tabpanel-item-single-content"><p class="c-text header-navigation__tabpanel-item-single-link">Sponsorship Opportunities</p><p class="c-text header-navigation__tabpanel-item-single-description">Sponsor a SANS event or research paper</p></div></a></div></div></div></div><div class="header-navigation__tabpanel-bottom-bar"><div class="c-container"><span class="c-text header-navigation__tabpanel-bottom-bar-title">Interested in developing a training plan to fit your organization’s needs?</span><div class="header-navigation__tabpanel-bottom-bar-wrapper"><p class="c-text header-navigation__tabpanel-bottom-bar-description">We&#x27;re here to help.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right header-navigation__tabpanel-bottom-bar-button" href="/about/contact"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Contact Us</span></a></div></div></div></div></div><a class="c-button button--primary button--icon-right button--icon-translate-right header__button" target="_top" href="/about/contact#connect-with-a-training-advisor"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Contact Sales</span></a><div class="c-topbar header__drawer-topbar"><div class="c-container topbar__container"><nav aria-label="Topbar navigation" class="topbar__nav"><div class="topbar__nav-item"><a class="topbar__nav-item-link" href="/account/login"><svg height="16" width="16"><use href="/icons.svg#login"></use></svg>Log In</a></div><div class="topbar__nav-item"><a class="topbar__nav-item-link" href="/account/create"><svg height="16" width="16"><use href="/icons.svg#new"></use></svg>Join - It&#x27;s Free</a></div></nav><button class="c-theme-switcher" type="button"><svg height="24" width="24" class="theme-switcher__icon"><use href="/icons.svg#moon"></use></svg><span class="sr-only"></span><span class="theme-switcher__toggle"></span><svg height="24" width="24" class="theme-switcher__icon"><use href="/icons.svg#sun"></use></svg></button></div></div></div><button class="c-button button--tertiary-white button--icon-right header__button-modal" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#menu"></use></svg><span class="button__label">Menu</span></button><div class="header__buttons"><div id="search"><button class="c-button button--secondary button--icon-left header__button header__button--search" aria-label="Open search" type="button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#search"></use></svg><span class="button__label">Search</span></button><div class="desktop-header-search__modal" role="combobox" aria-expanded="false" aria-haspopup="listbox" aria-labelledby="desktop-header-search-label"><div class="desktop-header-search__input-wrapper"><div class="c-container desktop-header-search__input-container"><form class="desktop-header-search__form" noValidate="" role="search" action="" method="GET"><label class="sr-only" for="desktop-header-search-input" id="desktop-header-search-label">Search</label><input class="desktop-header-search__input" aria-autocomplete="both" aria-labelledby="desktop-header-search-label" id="desktop-header-search-input" autoComplete="off" autoCorrect="off" autoCapitalize="none" enterKeyHint="search" spellCheck="false" placeholder="What are you looking for?" maxLength="512" type="search" name="query"/><button class="c-button button--unstyled button--icon-right button--is-icon-only desktop-header-search__close-button" aria-label="Close" type="reset"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#close"></use></svg></button></form></div></div><div class="desktop-header-search__panel"></div></div></div><a class="c-button button--primary button--icon-right button--icon-translate-right header__button" target="_top" href="/about/contact#connect-with-a-training-advisor"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Contact Sales</span></a></div></div></div></header><main id="main"><div class="secondary-hero secondary-hero--has-sticky-links secondary-hero--has-image"><div class="c-grid grid--has-container grid--columns-6 grid--columns-tablet-8 grid--columns-desktop-12"><div class="grid__item grid__item--col-span-6 grid__item--col-span-tablet-4 grid__item--col-span-desktop-6 secondary-hero__text-grid-item"><div class="c-animate-in slide-in-from-bottom secondary-hero__animate-in-content"><script type="application/ld+json">{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"item":"https://www.sans.org/cybersecurity-focus-areas","name":"Cybersecurity Focus Areas"},{"@type":"ListItem","position":2,"item":"https://www.sans.org/cybersecurity-focus-areas/digital-forensics-incident-response","name":"Digital Forensics and Incident Response Training"}]}</script><nav aria-label="Breadcrumbs" class="c-breadcrumbs secondary-hero__breadcrumbs"><ol class="breadcrumbs__list"><li class="breadcrumbs__list-item"><a class="breadcrumbs__list-item-link" href="/cybersecurity-focus-areas">Cybersecurity Focus Areas</a></li><li class="breadcrumbs__list-item breadcrumbs__list-item--is-active"><span aria-current="page" class="breadcrumbs__list-item-link">Digital Forensics and Incident Response Training</span></li></ol><a class="c-button button--tertiary-white button--icon-left button--icon-translate-right breadcrumbs__button" href="/cybersecurity-focus-areas"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Previous level</span></a></nav><div class="secondary-hero__content-wrappper"><div class="secondary-hero__body"><h1 class="c-heading secondary-hero__title">Digital Forensics and Incident Response Training</h1><p class="secondary-hero__text">Digital Forensics and Incident Response (DFIR) is essential to understand how intrusions occur, uncover malicious behavior, explain exactly “what happened”, and restore integrity across digital environments. DFIR combines cybersecurity, threat hunting, and investigative techniques to identify, analyze, respond to, and proactively hunt cyber threats and criminal activity.</p></div></div></div></div><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-7 grid__item--col-start-desktop-9 grid__item--col-end-7 grid__item--col-end-tablet-13 grid__item--col-end-desktop-13 secondary-hero__image-grid-item"><div class="secondary-hero__image-container"><div class="c-background-rings" style="--ring-color:var(--color-focusarea-digital-forensics)"><div class="background-rings__ring background-rings__ring--default"></div><div class="background-rings__ring background-rings__ring--default"></div><div class="background-rings__ring background-rings__ring--default"></div></div><div class="secondary-hero__image-holder"><img alt="Digital Forensics, Incident Response &amp; Threat Hunting Training" decoding="async" data-nimg="fill" class="secondary-hero__image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="300px, (min-width: 768px) 445px" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=16&amp;quality=75&amp;format=webp 16w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=32&amp;quality=75&amp;format=webp 32w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=48&amp;quality=75&amp;format=webp 48w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=64&amp;quality=75&amp;format=webp 64w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=96&amp;quality=75&amp;format=webp 96w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=128&amp;quality=75&amp;format=webp 128w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png?width=3840&amp;quality=75&amp;format=webp"/></div></div></div></div></div><div class="c-sticky-anchor-links"><div class="c-container sticky-anchor-links__container"><div class="sticky-anchor-links__divider"></div><span class="c-text sticky-anchor-links__jump-label">Jump to:</span><div class="sticky-anchor-links__select-wrapper"><select class="sticky-anchor-links__select c-button button--secondary"><option disabled="" value="" selected="">Please select</option><option value="#related-courses">Related Courses</option><option value="#instructors">Instructors</option><option value="#featured-content">Featured Content</option><option value="#faqs">FAQs</option></select><svg height="12" width="12" class="sticky-anchor-links__select-icon"><use href="/icons.svg#arrow-right-heavy"></use></svg></div><ul class="sticky-anchor-links__list sticky-anchor-links__list-anchors"><li class="sticky-anchor-links__list-item"><a class="c-button button--secondary sticky-anchor-links__list-item-button" href="#related-courses"><span class="button__label">Related Courses</span></a></li><li class="sticky-anchor-links__list-item"><a class="c-button button--secondary sticky-anchor-links__list-item-button" href="#instructors"><span class="button__label">Instructors</span></a></li><li class="sticky-anchor-links__list-item"><a class="c-button button--secondary sticky-anchor-links__list-item-button" href="#featured-content"><span class="button__label">Featured Content</span></a></li><li class="sticky-anchor-links__list-item"><a class="c-button button--secondary sticky-anchor-links__list-item-button" href="#faqs"><span class="button__label">FAQs</span></a></li></ul></div></div><div class="c-stacked-wrapper stacked-wrapper--has-spacing-top u-bg-color-surface-primary"><div class="c-stacked-wrapper u-bg-color-surface-primary c-dynamic-content-wrapper"><div class="c-animate-in slide-in-from-bottom generic-content-block__wrapper" id=""><div class="c-grid c-generic-content-block grid--has-container grid--columns-12"><div class="generic-content-block__grid-item generic-content-block__grid-item--is-aligned-left"><div class="c-rich-text generic-content-block__rich-text"><h2>Investigate, Analyze, Respond, and Hunt Proactively, with Confidence</h2><p>DFIR is about more than just cyberattacks—it’s about uncovering the truth behind any digital incident. Whether you’re responding to a ransomware breach, investigating insider abuse, analyzing digital evidence in criminal cases, or even performing proactive compromise assessments, SANS Digital Forensics and Incident Response training, designed by real-world practitioners, equips professionals with the technical skills and an investigative mindset to follow the evidence wherever it leads.</p><p>From intrusion response to deep-dive forensic analysis of systems, mobile devices, cloud, and memory, our curriculum balances the needs of both security operations and criminal investigations.</p></div></div></div></div></div><div class="c-animate-in slide-in-from-bottom"><section class="c-container c-promotional-icon-block"><div class="c-grid c-headline promotional-icon-block__headline grid--columns-6 grid--columns-tablet-12"><div class="grid__item grid__item--col-span-6 grid__item--col-span-tablet-9 headline__content"><div class="headline__title-wrapper"><h2 class="c-heading heading--is-h3 heading--is-h3-desktop headline__title">What You&#x27;ll Learn</h2></div></div></div><div class="c-grid promotional-icon-block__grid grid--columns-12"><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-4 promotional-icon-block__item"><h3 class="promotional-icon-block__item-title">Digital Forensics</h3><p class="promotional-icon-block__item-description">Master evidence collection, timeline analysis, and media exploitation by extracting and analyzing hidden artifacts, reconstructing user activity, and uncovering critical evidence in investigations.</p><svg height="24" width="24" class="promotional-icon-block__item-icon"><use href="/icons.svg#fingerprint"></use></svg></div><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-4 promotional-icon-block__item"><h3 class="promotional-icon-block__item-title">Threat Hunting, Ransomware &amp; Threat Intelligence</h3><p class="promotional-icon-block__item-description">Develop proactive techniques to uncover hidden threats, analyze ransomware tactics, and utilize intelligence to anticipate and counter cyber threats. </p><svg height="24" width="24" class="promotional-icon-block__item-icon"><use href="/icons.svg#eye"></use></svg></div><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-4 promotional-icon-block__item"><h3 class="promotional-icon-block__item-title">Malware Analysis, Memory Forensics &amp; Underground Investigations</h3><p class="promotional-icon-block__item-description">Examine malicious code, analyze volatile memory, and investigate cybercriminal activity to understand attacker techniques and enhance detection. </p><svg height="24" width="24" class="promotional-icon-block__item-icon"><use href="/icons.svg#detective-experts"></use></svg></div></div></section></div><div class="c-animate-in slide-in-from-bottom quote-card-carousel__wrapper"><div class="c-grid c-carousel grid--has-container grid--columns-12"><div class="grid__item sr-only carousel__title"><h2 class="c-heading heading--is-h3 heading--is-h3-desktop" id="heading-_R_1uav5u9bb_">Student Insights</h2></div><div aria-atomic="true" aria-labelledby="heading-_R_1uav5u9bb_" aria-live="polite" aria-roledescription="carousel" class="carousel__root carousel--with-auto-height" role="region"><div class="grid__item carousel__grid-item-slider"><article class="c-quote-card c-wide-card wide-card--default wide-card--surface-secondary"><div class="c-background-rings wide-card__background-rings"><div class="background-rings__ring background-rings__ring--default"></div><div class="background-rings__ring background-rings__ring--default"></div><div class="background-rings__ring background-rings__ring--default"></div><div class="background-rings__ring background-rings__ring--default"></div></div><div class="wide-card__body"><blockquote><div class="quote-card__quote">SANS DFIR offers the ultimate in quality instruction and thoughtful curriculum development. I learned so much this week and can&#x27;t wait to review and apply what I learned. I hope all my coworkers will get a chance to experience this quality of training.</div><footer class="quote-card__author"><span>Gabrielle S.</span><cite class="quote-card__author-title">U.S. Federal Agency</cite></footer></blockquote></div></article></div></div></div></div><div class="c-animate-in slide-in-from-bottom"><div id="related-courses" class="c-grid c-carousel carousel--is-fullwidth grid--has-container grid--columns-12"><div class="grid__item carousel__title"><h2 class="c-heading heading--is-h3-desktop" id="heading-_R_2eav5u9bb_">Featured Courses</h2><div class="carousel__link-item-headline"><a class="c-button button--tertiary" href="https://www.sans.org/cyber-security-courses?refinementList%5Bfacets.focusArea%5D%5B0%5D=Digital%20Forensics%20and%20Incident%20Response"><span class="button__label">View All Courses</span></a></div></div><div aria-atomic="true" aria-labelledby="heading-_R_2eav5u9bb_" aria-live="polite" aria-roledescription="carousel" class="carousel__root" role="region"><div class="grid__item carousel__grid-item-slider"><div class="carousel__base" style="--slides-per-view:1;--slides-per-view-desktop:3;--slides-per-view-tablet:2"><ul class="carousel__container"><li class="carousel__slide"><span class="sr-only">Slide 1 of 12</span><article class="c-course-card course-card--is-default" id="FOR498"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">FOR498: Digital Acquisition and Rapid Triage</h3><header class="course-card__header"><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Essentials</span></header><div class="course-card__labels"><span class="course-card__label-code">FOR498</span><span class="course-card__label-focus-area">Digital Forensics and Incident Response</span></div><div class="course-card__image-wrapper"><img alt="FOR498: Digital Acquisition and Rapid Triage" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-digital-forensics" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3f80ef8f1ff3ca78/67f7ea68713415e43ddfc914/course_social_FOR498_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3f80ef8f1ff3ca78/67f7ea68713415e43ddfc914/course_social_FOR498_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3f80ef8f1ff3ca78/67f7ea68713415e43ddfc914/course_social_FOR498_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3f80ef8f1ff3ca78/67f7ea68713415e43ddfc914/course_social_FOR498_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3f80ef8f1ff3ca78/67f7ea68713415e43ddfc914/course_social_FOR498_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3f80ef8f1ff3ca78/67f7ea68713415e43ddfc914/course_social_FOR498_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3f80ef8f1ff3ca78/67f7ea68713415e43ddfc914/course_social_FOR498_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3f80ef8f1ff3ca78/67f7ea68713415e43ddfc914/course_social_FOR498_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3f80ef8f1ff3ca78/67f7ea68713415e43ddfc914/course_social_FOR498_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3f80ef8f1ff3ca78/67f7ea68713415e43ddfc914/course_social_FOR498_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-digital-forensics"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 20 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j8baeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j8baeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j8baeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j8baeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/digital-acquisition-rapid-triage"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/digital-acquisition-rapid-triage#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 2 of 12</span><article class="c-course-card course-card--is-default" id="FOR572"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response</h3><header class="course-card__header"><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Advanced</span></header><div class="course-card__labels"><span class="course-card__label-code">FOR572</span><span class="course-card__label-focus-area">Digital Forensics and Incident Response</span></div><div class="course-card__image-wrapper"><img alt="FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-digital-forensics" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt11e483a1c608dd18/67f7ea8ae335cc83fc0674fb/course_social_FOR572_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt11e483a1c608dd18/67f7ea8ae335cc83fc0674fb/course_social_FOR572_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt11e483a1c608dd18/67f7ea8ae335cc83fc0674fb/course_social_FOR572_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt11e483a1c608dd18/67f7ea8ae335cc83fc0674fb/course_social_FOR572_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt11e483a1c608dd18/67f7ea8ae335cc83fc0674fb/course_social_FOR572_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt11e483a1c608dd18/67f7ea8ae335cc83fc0674fb/course_social_FOR572_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt11e483a1c608dd18/67f7ea8ae335cc83fc0674fb/course_social_FOR572_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt11e483a1c608dd18/67f7ea8ae335cc83fc0674fb/course_social_FOR572_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt11e483a1c608dd18/67f7ea8ae335cc83fc0674fb/course_social_FOR572_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt11e483a1c608dd18/67f7ea8ae335cc83fc0674fb/course_social_FOR572_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-digital-forensics"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 20 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j8jaeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j8jaeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j8jaeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j8jaeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/advanced-network-forensics-threat-hunting-incident-response"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/advanced-network-forensics-threat-hunting-incident-response#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 3 of 12</span><article class="c-course-card course-card--is-default" id="FOR585"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">FOR585: Smartphone Forensic Analysis In-Depth</h3><header class="course-card__header"><span class="c-tag tag--lightgreen"><span class="tag__text">MAJOR UPDATES</span></span><div class="course-card__tags-wrapper"><span class="c-tag tag--lightgreen course-hero__tag"><span class="tag__text">AI SKILLS</span></span></div><span class="course-card__header-skill-level">Essentials</span></header><div class="course-card__labels"><span class="course-card__label-code">FOR585</span><span class="course-card__label-focus-area">Digital Forensics and Incident Response</span></div><div class="course-card__image-wrapper"><img alt="FOR585: Smartphone Forensic Analysis In-Depth" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-digital-forensics" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6114b179dd2cac05/67f7ea78990fe5ae1e1f5d42/course_social_FOR585_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6114b179dd2cac05/67f7ea78990fe5ae1e1f5d42/course_social_FOR585_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6114b179dd2cac05/67f7ea78990fe5ae1e1f5d42/course_social_FOR585_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6114b179dd2cac05/67f7ea78990fe5ae1e1f5d42/course_social_FOR585_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6114b179dd2cac05/67f7ea78990fe5ae1e1f5d42/course_social_FOR585_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6114b179dd2cac05/67f7ea78990fe5ae1e1f5d42/course_social_FOR585_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6114b179dd2cac05/67f7ea78990fe5ae1e1f5d42/course_social_FOR585_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6114b179dd2cac05/67f7ea78990fe5ae1e1f5d42/course_social_FOR585_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6114b179dd2cac05/67f7ea78990fe5ae1e1f5d42/course_social_FOR585_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6114b179dd2cac05/67f7ea78990fe5ae1e1f5d42/course_social_FOR585_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-digital-forensics"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 22 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j8raeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j8raeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j8raeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j8raeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/advanced-smartphone-mobile-device-forensics"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/advanced-smartphone-mobile-device-forensics#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 4 of 12</span><article class="c-course-card course-card--is-default" id="FOR528"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">FOR528: Ransomware and Cyber Extortion</h3><header class="course-card__header"><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">FOR528</span><span class="course-card__label-focus-area">Digital Forensics and Incident Response</span></div><div class="course-card__image-wrapper"><img alt="FOR528: Ransomware and Cyber Extortion" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-digital-forensics" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt18822a6bc6fe662a/67f7ea88990fe55c991f5d4b/course_social_FOR528_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt18822a6bc6fe662a/67f7ea88990fe55c991f5d4b/course_social_FOR528_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt18822a6bc6fe662a/67f7ea88990fe55c991f5d4b/course_social_FOR528_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt18822a6bc6fe662a/67f7ea88990fe55c991f5d4b/course_social_FOR528_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt18822a6bc6fe662a/67f7ea88990fe55c991f5d4b/course_social_FOR528_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt18822a6bc6fe662a/67f7ea88990fe55c991f5d4b/course_social_FOR528_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt18822a6bc6fe662a/67f7ea88990fe55c991f5d4b/course_social_FOR528_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt18822a6bc6fe662a/67f7ea88990fe55c991f5d4b/course_social_FOR528_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt18822a6bc6fe662a/67f7ea88990fe55c991f5d4b/course_social_FOR528_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt18822a6bc6fe662a/67f7ea88990fe55c991f5d4b/course_social_FOR528_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-digital-forensics"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->4 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->24 CPEs / 24 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 13 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j93aeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j93aeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j93aeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j93aeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/ransomware-and-cyber-extortion"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/ransomware-and-cyber-extortion#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 5 of 12</span><article class="c-course-card course-card--is-default" id="FOR508"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics</h3><header class="course-card__header"><span class="c-tag tag--lightgreen"><span class="tag__text">UPDATED</span></span><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">FOR508</span><span class="course-card__label-focus-area">Digital Forensics and Incident Response</span></div><div class="course-card__image-wrapper"><img alt="FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-digital-forensics" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5979fe9404326821/67f7ea7453db7b3c3022622a/course_social_FOR508_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5979fe9404326821/67f7ea7453db7b3c3022622a/course_social_FOR508_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5979fe9404326821/67f7ea7453db7b3c3022622a/course_social_FOR508_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5979fe9404326821/67f7ea7453db7b3c3022622a/course_social_FOR508_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5979fe9404326821/67f7ea7453db7b3c3022622a/course_social_FOR508_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5979fe9404326821/67f7ea7453db7b3c3022622a/course_social_FOR508_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5979fe9404326821/67f7ea7453db7b3c3022622a/course_social_FOR508_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5979fe9404326821/67f7ea7453db7b3c3022622a/course_social_FOR508_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5979fe9404326821/67f7ea7453db7b3c3022622a/course_social_FOR508_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5979fe9404326821/67f7ea7453db7b3c3022622a/course_social_FOR508_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-digital-forensics"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 35 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j9baeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j9baeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j9baeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j9baeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/advanced-incident-response-threat-hunting-training"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/advanced-incident-response-threat-hunting-training#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 6 of 12</span><article class="c-course-card course-card--is-default" id="FOR500"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">FOR500: Windows Forensic Analysis</h3><header class="course-card__header"><span class="c-tag tag--lightgreen"><span class="tag__text">UPDATED</span></span><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Essentials</span></header><div class="course-card__labels"><span class="course-card__label-code">FOR500</span><span class="course-card__label-focus-area">Digital Forensics and Incident Response</span></div><div class="course-card__image-wrapper"><img alt="FOR500: Windows Forensic Analysis" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-digital-forensics" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt83c9fed664aa9f32/67f7ea6d7134152177dfc918/course_social_FOR500_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt83c9fed664aa9f32/67f7ea6d7134152177dfc918/course_social_FOR500_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt83c9fed664aa9f32/67f7ea6d7134152177dfc918/course_social_FOR500_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt83c9fed664aa9f32/67f7ea6d7134152177dfc918/course_social_FOR500_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt83c9fed664aa9f32/67f7ea6d7134152177dfc918/course_social_FOR500_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt83c9fed664aa9f32/67f7ea6d7134152177dfc918/course_social_FOR500_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt83c9fed664aa9f32/67f7ea6d7134152177dfc918/course_social_FOR500_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt83c9fed664aa9f32/67f7ea6d7134152177dfc918/course_social_FOR500_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt83c9fed664aa9f32/67f7ea6d7134152177dfc918/course_social_FOR500_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt83c9fed664aa9f32/67f7ea6d7134152177dfc918/course_social_FOR500_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-digital-forensics"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 22 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j9jaeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j9jaeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j9jaeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j9jaeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/windows-forensic-analysis"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/windows-forensic-analysis#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 7 of 12</span><article class="c-course-card course-card--is-default" id="FOR578"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">FOR578: Cyber Threat Intelligence</h3><header class="course-card__header"><span class="c-tag tag--lightgreen"><span class="tag__text">MAJOR UPDATES</span></span><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">FOR578</span><span class="course-card__label-focus-area">Digital Forensics and Incident Response</span></div><div class="course-card__image-wrapper"><img alt="FOR578: Cyber Threat Intelligence" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-digital-forensics" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdc84c6c6dc104bdb/67f7ea7f6481d47da68d2e9b/course_social_FOR578_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdc84c6c6dc104bdb/67f7ea7f6481d47da68d2e9b/course_social_FOR578_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdc84c6c6dc104bdb/67f7ea7f6481d47da68d2e9b/course_social_FOR578_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdc84c6c6dc104bdb/67f7ea7f6481d47da68d2e9b/course_social_FOR578_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdc84c6c6dc104bdb/67f7ea7f6481d47da68d2e9b/course_social_FOR578_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdc84c6c6dc104bdb/67f7ea7f6481d47da68d2e9b/course_social_FOR578_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdc84c6c6dc104bdb/67f7ea7f6481d47da68d2e9b/course_social_FOR578_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdc84c6c6dc104bdb/67f7ea7f6481d47da68d2e9b/course_social_FOR578_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdc84c6c6dc104bdb/67f7ea7f6481d47da68d2e9b/course_social_FOR578_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdc84c6c6dc104bdb/67f7ea7f6481d47da68d2e9b/course_social_FOR578_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-digital-forensics"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 20 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6j9raeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2j9raeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6j9raeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2j9raeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/cyber-threat-intelligence"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/cyber-threat-intelligence#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 8 of 12</span><article class="c-course-card course-card--is-default" id="FOR518"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">FOR518: Mac and iOS Forensic Analysis and Incident Response</h3><header class="course-card__header"><span class="c-tag tag--lightgreen"><span class="tag__text">UPDATED</span></span><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">FOR518</span><span class="course-card__label-focus-area">Digital Forensics and Incident Response</span></div><div class="course-card__image-wrapper"><img alt="FOR518: Mac and iOS Forensic Analysis and Incident Response" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-digital-forensics" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd581cee7e22a2297/67f7ea746481d479e38d2e97/course_social_FOR518_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd581cee7e22a2297/67f7ea746481d479e38d2e97/course_social_FOR518_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd581cee7e22a2297/67f7ea746481d479e38d2e97/course_social_FOR518_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd581cee7e22a2297/67f7ea746481d479e38d2e97/course_social_FOR518_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd581cee7e22a2297/67f7ea746481d479e38d2e97/course_social_FOR518_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd581cee7e22a2297/67f7ea746481d479e38d2e97/course_social_FOR518_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd581cee7e22a2297/67f7ea746481d479e38d2e97/course_social_FOR518_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd581cee7e22a2297/67f7ea746481d479e38d2e97/course_social_FOR518_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd581cee7e22a2297/67f7ea746481d479e38d2e97/course_social_FOR518_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd581cee7e22a2297/67f7ea746481d479e38d2e97/course_social_FOR518_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-digital-forensics"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 23 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6ja3aeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2ja3aeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6ja3aeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2ja3aeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/mac-and-ios-forensic-analysis-and-incident-response"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/mac-and-ios-forensic-analysis-and-incident-response#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 9 of 12</span><article class="c-course-card course-card--is-default" id="FOR509"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">FOR509: Enterprise Cloud Forensics and Incident Response</h3><header class="course-card__header"><span class="c-tag tag--lightgreen"><span class="tag__text">MAJOR UPDATES</span></span><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">FOR509</span><span class="course-card__label-focus-area">Digital Forensics and Incident Response</span></div><div class="course-card__image-wrapper"><img alt="FOR509: Enterprise Cloud Forensics and Incident Response" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-digital-forensics" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-digital-forensics"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 23 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6jabaeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2jabaeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6jabaeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2jabaeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/enterprise-cloud-forensics-incident-response"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/enterprise-cloud-forensics-incident-response#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 10 of 12</span><article class="c-course-card course-card--is-default" id="FOR563"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">FOR563: Applied AI for Digital Forensics and Incident Response: Leveraging Local Large Language Models</h3><header class="course-card__header"><span class="c-tag tag--yellow"><span class="tag__text">NEW</span></span><div class="course-card__tags-wrapper"><span class="c-tag tag--gradient-ai course-hero__tag"><span class="tag__text">AI-FOCUSED</span></span></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">FOR563</span><span class="course-card__label-focus-area">Digital Forensics and Incident Response, Artificial Intelligence</span></div><div class="course-card__image-wrapper"><img alt="FOR509: Enterprise Cloud Forensics and Incident Response" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-digital-forensics" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-digital-forensics"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->1 Day (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->6 CPEs / 6 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 4 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6jajaeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2jajaeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6jajaeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2jajaeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/applied-ai-local-large-language-models"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/applied-ai-local-large-language-models#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 11 of 12</span><article class="c-course-card course-card--is-default" id="FOR577"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">FOR577: LINUX Incident Response and Threat Hunting</h3><header class="course-card__header"><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Intermediate</span></header><div class="course-card__labels"><span class="course-card__label-code">FOR577</span><span class="course-card__label-focus-area">Digital Forensics and Incident Response</span></div><div class="course-card__image-wrapper"><img alt="FOR577: LINUX Incident Response and Threat Hunting" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-digital-forensics" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt25e7177961f87783/67f7ea7861ba90f940f37cdc/course_social_FOR577_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt25e7177961f87783/67f7ea7861ba90f940f37cdc/course_social_FOR577_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt25e7177961f87783/67f7ea7861ba90f940f37cdc/course_social_FOR577_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt25e7177961f87783/67f7ea7861ba90f940f37cdc/course_social_FOR577_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt25e7177961f87783/67f7ea7861ba90f940f37cdc/course_social_FOR577_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt25e7177961f87783/67f7ea7861ba90f940f37cdc/course_social_FOR577_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt25e7177961f87783/67f7ea7861ba90f940f37cdc/course_social_FOR577_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt25e7177961f87783/67f7ea7861ba90f940f37cdc/course_social_FOR577_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt25e7177961f87783/67f7ea7861ba90f940f37cdc/course_social_FOR577_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt25e7177961f87783/67f7ea7861ba90f940f37cdc/course_social_FOR577_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-digital-forensics"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 23 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6jaraeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2jaraeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6jaraeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2jaraeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/linux-threat-hunting-incident-response"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/linux-threat-hunting-incident-response#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li><li class="carousel__slide"><span class="sr-only">Slide 12 of 12</span><article class="c-course-card course-card--is-default" id="FOR610"><div class="course-card__grid"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop course-card__title">FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques</h3><header class="course-card__header"><div class="course-card__tags-wrapper"></div><span class="course-card__header-skill-level">Advanced</span></header><div class="course-card__labels"><span class="course-card__label-code">FOR610</span><span class="course-card__label-focus-area">Digital Forensics and Incident Response</span></div><div class="course-card__image-wrapper"><img alt="FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques" loading="lazy" width="1514" height="792" decoding="async" data-nimg="1" class="course-card__image course-card__image--is-color-digital-forensics" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta38256d4408bae54/67f7ea76c4dd09921b7501da/course_social_FOR610_1514_x_792.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta38256d4408bae54/67f7ea76c4dd09921b7501da/course_social_FOR610_1514_x_792.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta38256d4408bae54/67f7ea76c4dd09921b7501da/course_social_FOR610_1514_x_792.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta38256d4408bae54/67f7ea76c4dd09921b7501da/course_social_FOR610_1514_x_792.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta38256d4408bae54/67f7ea76c4dd09921b7501da/course_social_FOR610_1514_x_792.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta38256d4408bae54/67f7ea76c4dd09921b7501da/course_social_FOR610_1514_x_792.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta38256d4408bae54/67f7ea76c4dd09921b7501da/course_social_FOR610_1514_x_792.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta38256d4408bae54/67f7ea76c4dd09921b7501da/course_social_FOR610_1514_x_792.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta38256d4408bae54/67f7ea76c4dd09921b7501da/course_social_FOR610_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta38256d4408bae54/67f7ea76c4dd09921b7501da/course_social_FOR610_1514_x_792.png?width=3840&amp;quality=75&amp;format=webp"/><svg height="56" width="56" class="course-card__logo-icon"><use href="/icons.svg#courses-digital-forensics"></use></svg></div><div class="course-card__body"><div class="course-card__course-details"><ul class="c-detail-list course-card__detail-list course-card__detail-list--is-tablet-and-up"><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 Days (Instructor-Led)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->36 CPEs / 36 Hours (Self-Paced)<!-- --> </li><li class="detail-list__list-item"><svg height="24" width="24" class="detail-list__list-item-icon"><use href="/icons.svg#workshops"></use></svg> <!-- -->Labs: 48 Hands-On Labs<!-- --> </li></ul><div class="c-accordion accordion--small course-card__quick-view-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item"><h4 class="accordion__header"><button type="button" aria-controls="radix-_R_6jb3aeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2jb3aeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Quick view<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#chevron"></use></svg></button></h4><div data-state="closed" id="radix-_R_6jb3aeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2jb3aeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="course-card__buttons"><a class="c-button button--secondary button--icon-right button--icon-translate-right" href="/cyber-security-courses/reverse-engineering-malware-malware-analysis-tools-techniques"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View course details</span></a><a class="c-button button--primary button--icon-right button--icon-translate-right" href="/cyber-security-courses/reverse-engineering-malware-malware-analysis-tools-techniques#schedule-pricing"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Register</span></a></div></div></article></li></ul></div></div><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-3 carousel__grid-item-controls"><div class="carousel__controls carousel__controls--is-disabled"><div class="carousel__link-item-controls"><a class="c-button button--tertiary" href="https://www.sans.org/cyber-security-courses?refinementList%5Bfacets.focusArea%5D%5B0%5D=Digital%20Forensics%20and%20Incident%20Response"><span class="button__label">View All Courses</span></a></div><button aria-disabled="true" class="c-button button--secondary button--icon-right button--icon-translate-right button--is-icon-only button--size-large carousel__button carousel__button-prev" aria-label="Go to previous slide" type="button" datalayer="[object Object]"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg></button><div class="carousel__controls-pagination"></div><button aria-disabled="true" class="c-button button--secondary button--icon-right button--icon-translate-right button--is-icon-only button--size-large carousel__button carousel__button-next" aria-label="Go to next slide" type="button" datalayer="[object Object]"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg></button></div></div></div></div></div><div class="c-animate-in slide-in-from-bottom"><div class="c-container c-card-grid card-grid--is-default card-grid__headline--is-load-more c-person-grid" id="instructors"><div class="c-animate-in slide-in-from-bottom card-grid__headline-wrapper"><div id="speakers" class="c-grid c-headline card-grid__headline grid--columns-6 grid--columns-tablet-12"><div class="grid__item grid__item--col-span-6 grid__item--col-span-tablet-9 headline__content"><div class="headline__title-wrapper"><h2 class="c-heading heading--is-h3 heading--is-h3-desktop headline__title">Meet Your Experts</h2></div></div></div></div><div class="c-grid card-grid__grid card-grid__grid--3-columns card-grid__grid--equal-height-rows grid--columns-12"><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-person-card-small person-card-small--small person-card--with-link"><div class="person-card__layout"><header class="person-card-small__image-holder"><div class="person-card-small__blurry-backdrop-filter"></div><img alt="Steve Anson" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="person-card-small__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdf410c6f6994abd2/67c5d73253fc5e6004b1b567/370x370_Steve-Anson.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdf410c6f6994abd2/67c5d73253fc5e6004b1b567/370x370_Steve-Anson.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdf410c6f6994abd2/67c5d73253fc5e6004b1b567/370x370_Steve-Anson.jpg?width=768&amp;quality=75&amp;format=webp"/><img alt="" loading="lazy" decoding="async" data-nimg="fill" class="person-card-small__blurry-bg-image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="100vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdf410c6f6994abd2/67c5d73253fc5e6004b1b567/370x370_Steve-Anson.jpg?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdf410c6f6994abd2/67c5d73253fc5e6004b1b567/370x370_Steve-Anson.jpg?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdf410c6f6994abd2/67c5d73253fc5e6004b1b567/370x370_Steve-Anson.jpg?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdf410c6f6994abd2/67c5d73253fc5e6004b1b567/370x370_Steve-Anson.jpg?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdf410c6f6994abd2/67c5d73253fc5e6004b1b567/370x370_Steve-Anson.jpg?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdf410c6f6994abd2/67c5d73253fc5e6004b1b567/370x370_Steve-Anson.jpg?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdf410c6f6994abd2/67c5d73253fc5e6004b1b567/370x370_Steve-Anson.jpg?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdf410c6f6994abd2/67c5d73253fc5e6004b1b567/370x370_Steve-Anson.jpg?width=3840&amp;quality=75&amp;format=webp"/></header><div class="person-card-small__text"><div><h3 class="person-card__name">Steve Anson</h3><span class="person-card__role">Co-Founder</span></div><p class="person-card__description">Steve has transformed global cybersecurity by leading complex digital crime investigations for the FBI and DoD, and by training national cyber units in over 60 countries. His work has set the global standard for incident response and threat hunting.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right person-card__cta-button person-card__cta-button--single" href="/profiles/steve-anson"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn more</span></a></div></div></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-person-card-small person-card-small--small person-card--with-link"><div class="person-card__layout"><header class="person-card-small__image-holder"><div class="person-card-small__blurry-backdrop-filter"></div><img alt="Heather Barnhart" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="person-card-small__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0f65657fd38ddb53/674d831464eb63b0c7d739df/Heather_Mahalik_370x370.webp?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0f65657fd38ddb53/674d831464eb63b0c7d739df/Heather_Mahalik_370x370.webp?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0f65657fd38ddb53/674d831464eb63b0c7d739df/Heather_Mahalik_370x370.webp?width=768&amp;quality=75&amp;format=webp"/><img alt="" loading="lazy" decoding="async" data-nimg="fill" class="person-card-small__blurry-bg-image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="100vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0f65657fd38ddb53/674d831464eb63b0c7d739df/Heather_Mahalik_370x370.webp?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0f65657fd38ddb53/674d831464eb63b0c7d739df/Heather_Mahalik_370x370.webp?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0f65657fd38ddb53/674d831464eb63b0c7d739df/Heather_Mahalik_370x370.webp?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0f65657fd38ddb53/674d831464eb63b0c7d739df/Heather_Mahalik_370x370.webp?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0f65657fd38ddb53/674d831464eb63b0c7d739df/Heather_Mahalik_370x370.webp?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0f65657fd38ddb53/674d831464eb63b0c7d739df/Heather_Mahalik_370x370.webp?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0f65657fd38ddb53/674d831464eb63b0c7d739df/Heather_Mahalik_370x370.webp?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0f65657fd38ddb53/674d831464eb63b0c7d739df/Heather_Mahalik_370x370.webp?width=3840&amp;quality=75&amp;format=webp"/></header><div class="person-card-small__text"><div><h3 class="person-card__name">Heather Barnhart</h3><span class="person-card__role">DFIR Curriculum Lead and Head of Faculty</span></div><p class="person-card__description">Heather brings 24+ years of experience supporting government agencies, defense contractors, law enforcement, and Fortune 500 companies. Her extensive case experience spans fraud investigations, crimes against children, counterterrorism, and more. </p><a class="c-button button--tertiary button--icon-right button--icon-translate-right person-card__cta-button person-card__cta-button--single" href="/profiles/heather-barnhart"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn more</span></a></div></div></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-person-card-small person-card-small--small person-card--with-link"><div class="person-card__layout"><header class="person-card-small__image-holder"><div class="person-card-small__blurry-backdrop-filter"></div><img alt="Ovie Carroll" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="person-card-small__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf4600237f5473859/67c5d71224e52cb520e6f975/370x370_Ovie-Carroll.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf4600237f5473859/67c5d71224e52cb520e6f975/370x370_Ovie-Carroll.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf4600237f5473859/67c5d71224e52cb520e6f975/370x370_Ovie-Carroll.jpg?width=768&amp;quality=75&amp;format=webp"/><img alt="" loading="lazy" decoding="async" data-nimg="fill" class="person-card-small__blurry-bg-image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="100vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf4600237f5473859/67c5d71224e52cb520e6f975/370x370_Ovie-Carroll.jpg?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf4600237f5473859/67c5d71224e52cb520e6f975/370x370_Ovie-Carroll.jpg?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf4600237f5473859/67c5d71224e52cb520e6f975/370x370_Ovie-Carroll.jpg?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf4600237f5473859/67c5d71224e52cb520e6f975/370x370_Ovie-Carroll.jpg?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf4600237f5473859/67c5d71224e52cb520e6f975/370x370_Ovie-Carroll.jpg?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf4600237f5473859/67c5d71224e52cb520e6f975/370x370_Ovie-Carroll.jpg?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf4600237f5473859/67c5d71224e52cb520e6f975/370x370_Ovie-Carroll.jpg?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf4600237f5473859/67c5d71224e52cb520e6f975/370x370_Ovie-Carroll.jpg?width=3840&amp;quality=75&amp;format=webp"/></header><div class="person-card-small__text"><div><h3 class="person-card__name">Ovie Carroll</h3><span class="person-card__role">Director</span></div><p class="person-card__description">For Ovie Carroll, digital forensics is all about the hunt for evidence in digital places that are hiding critical clues, followed by deep analysis to prove something that the evidence was never intended to prove. </p><a class="c-button button--tertiary button--icon-right button--icon-translate-right person-card__cta-button person-card__cta-button--single" href="/profiles/ovie-carroll"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn more</span></a></div></div></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-person-card-small person-card-small--small person-card--with-link"><div class="person-card__layout"><header class="person-card-small__image-holder"><div class="person-card-small__blurry-backdrop-filter"></div><img alt="David Cowen" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="person-card-small__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltac8d65d1bcb8528d/67c5d755f5cfb3fd1ed6ee64/David_Cowen_370x370.png?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltac8d65d1bcb8528d/67c5d755f5cfb3fd1ed6ee64/David_Cowen_370x370.png?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltac8d65d1bcb8528d/67c5d755f5cfb3fd1ed6ee64/David_Cowen_370x370.png?width=768&amp;quality=75&amp;format=webp"/><img alt="" loading="lazy" decoding="async" data-nimg="fill" class="person-card-small__blurry-bg-image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="100vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltac8d65d1bcb8528d/67c5d755f5cfb3fd1ed6ee64/David_Cowen_370x370.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltac8d65d1bcb8528d/67c5d755f5cfb3fd1ed6ee64/David_Cowen_370x370.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltac8d65d1bcb8528d/67c5d755f5cfb3fd1ed6ee64/David_Cowen_370x370.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltac8d65d1bcb8528d/67c5d755f5cfb3fd1ed6ee64/David_Cowen_370x370.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltac8d65d1bcb8528d/67c5d755f5cfb3fd1ed6ee64/David_Cowen_370x370.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltac8d65d1bcb8528d/67c5d755f5cfb3fd1ed6ee64/David_Cowen_370x370.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltac8d65d1bcb8528d/67c5d755f5cfb3fd1ed6ee64/David_Cowen_370x370.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltac8d65d1bcb8528d/67c5d755f5cfb3fd1ed6ee64/David_Cowen_370x370.png?width=3840&amp;quality=75&amp;format=webp"/></header><div class="person-card-small__text"><div><h3 class="person-card__name">David Cowen</h3><span class="person-card__role">Vice President</span></div><p class="person-card__description">David brings 25+ years in cybersecurity, shifting from pen testing to DFIR in 1999. He’s VP at Charles River Associates, a SANS instructor and course author, and Red Team Captain for the National Collegiate Cyber Defense Competition.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right person-card__cta-button person-card__cta-button--single" href="/profiles/david-cowen"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn more</span></a></div></div></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-person-card-small person-card-small--small person-card--with-link"><div class="person-card__layout"><header class="person-card-small__image-holder"><div class="person-card-small__blurry-backdrop-filter"></div><img alt="Sarah Edwards" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="person-card-small__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt05f7eacccc80f861/67c5d725cdb05a144c5e2770/370x370_Sarah-Edwards.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt05f7eacccc80f861/67c5d725cdb05a144c5e2770/370x370_Sarah-Edwards.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt05f7eacccc80f861/67c5d725cdb05a144c5e2770/370x370_Sarah-Edwards.jpg?width=768&amp;quality=75&amp;format=webp"/><img alt="" loading="lazy" decoding="async" data-nimg="fill" class="person-card-small__blurry-bg-image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="100vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt05f7eacccc80f861/67c5d725cdb05a144c5e2770/370x370_Sarah-Edwards.jpg?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt05f7eacccc80f861/67c5d725cdb05a144c5e2770/370x370_Sarah-Edwards.jpg?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt05f7eacccc80f861/67c5d725cdb05a144c5e2770/370x370_Sarah-Edwards.jpg?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt05f7eacccc80f861/67c5d725cdb05a144c5e2770/370x370_Sarah-Edwards.jpg?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt05f7eacccc80f861/67c5d725cdb05a144c5e2770/370x370_Sarah-Edwards.jpg?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt05f7eacccc80f861/67c5d725cdb05a144c5e2770/370x370_Sarah-Edwards.jpg?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt05f7eacccc80f861/67c5d725cdb05a144c5e2770/370x370_Sarah-Edwards.jpg?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt05f7eacccc80f861/67c5d725cdb05a144c5e2770/370x370_Sarah-Edwards.jpg?width=3840&amp;quality=75&amp;format=webp"/></header><div class="person-card-small__text"><div><h3 class="person-card__name">Sarah Edwards</h3><span class="person-card__role">Head Of DFIR</span></div><p class="person-card__description">Sarah Edwards is a pioneering force in Apple forensics, having revolutionized the field through the creation of APOLLO—an open-source tool that deciphers macOS and iOS pattern-of-life data.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right person-card__cta-button person-card__cta-button--single" href="/profiles/sarah-edwards"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn more</span></a></div></div></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-person-card-small person-card-small--small person-card--with-link"><div class="person-card__layout"><header class="person-card-small__image-holder"><div class="person-card-small__blurry-backdrop-filter"></div><img alt="Phil Hagen" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="person-card-small__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt557801d539f2e005/68416f7974f8797e01422198/Phil_Hagan_370x370.jpeg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt557801d539f2e005/68416f7974f8797e01422198/Phil_Hagan_370x370.jpeg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt557801d539f2e005/68416f7974f8797e01422198/Phil_Hagan_370x370.jpeg?width=768&amp;quality=75&amp;format=webp"/><img alt="" loading="lazy" decoding="async" data-nimg="fill" class="person-card-small__blurry-bg-image" style="position:absolute;height:100%;width:100%;left:0;top:0;right:0;bottom:0;color:transparent" sizes="100vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt557801d539f2e005/68416f7974f8797e01422198/Phil_Hagan_370x370.jpeg?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt557801d539f2e005/68416f7974f8797e01422198/Phil_Hagan_370x370.jpeg?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt557801d539f2e005/68416f7974f8797e01422198/Phil_Hagan_370x370.jpeg?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt557801d539f2e005/68416f7974f8797e01422198/Phil_Hagan_370x370.jpeg?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt557801d539f2e005/68416f7974f8797e01422198/Phil_Hagan_370x370.jpeg?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt557801d539f2e005/68416f7974f8797e01422198/Phil_Hagan_370x370.jpeg?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt557801d539f2e005/68416f7974f8797e01422198/Phil_Hagan_370x370.jpeg?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt557801d539f2e005/68416f7974f8797e01422198/Phil_Hagan_370x370.jpeg?width=3840&amp;quality=75&amp;format=webp"/></header><div class="person-card-small__text"><div><h3 class="person-card__name">Phil Hagen</h3><span class="person-card__role">Principal Information Security Researcher</span></div><p class="person-card__description">Phil Hagen shaped network forensics with SOF-ELK® and SANS FOR572, setting standards in large-scale log analysis and response. His role in exposing a global fraud ring behind hundreds of millions in losses defines his lasting impact on cybersecurity.</p><a class="c-button button--tertiary button--icon-right button--icon-translate-right person-card__cta-button person-card__cta-button--single" href="/profiles/phil-hagen"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn more</span></a></div></div></div></div></div></div><div class="c-animate-in slide-in-from-bottom"><div class="card-grid__load-more-button-container"><button class="c-button button--tertiary button--icon-right card-grid__load-more-button"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Show all</span></button></div></div></div></div><div class="c-container c-card-grid card-grid--is-skill-cards card-grid__headline--is-load-more"><div class="c-animate-in slide-in-from-bottom card-grid__headline-wrapper"><div class="c-grid c-headline card-grid__headline grid--columns-6 grid--columns-tablet-12"><div class="grid__item grid__item--col-span-6 grid__item--col-span-tablet-9 headline__content"><div class="headline__title-wrapper"><h2 class="c-heading heading--is-h3 heading--is-h3-desktop headline__title">Explore Careers Within Digital Forensics</h2></div></div></div></div><div class="c-grid card-grid__grid card-grid__grid--4-columns grid--columns-12"><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-skills-card skills-card--is-digital-forensics-and-incident-response"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop skills-card__title">Threat Hunter</h3><span class="skills-card__category skills-card__category--fixed">Digital Forensics and Incident Response</span><a class="c-button button--tertiary button--icon-right button--icon-translate-right skills-card__button" href="/job-roles/threat-hunter"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Explore learning path</span></a></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-skills-card skills-card--is-digital-forensics-and-incident-response"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop skills-card__title">Digital Forensics Analyst</h3><span class="skills-card__category skills-card__category--fixed">Digital Forensics and Incident Response</span><a class="c-button button--tertiary button--icon-right button--icon-translate-right skills-card__button" href="/job-roles/digital-forensics-analyst"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Explore learning path</span></a></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-skills-card skills-card--is-digital-forensics-and-incident-response"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop skills-card__title">Malware Analyst</h3><span class="skills-card__category skills-card__category--fixed">Digital Forensics and Incident Response</span><a class="c-button button--tertiary button--icon-right button--icon-translate-right skills-card__button" href="/job-roles/malware-analyst"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Explore learning path</span></a></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-skills-card skills-card--is-digital-forensics-and-incident-response"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop skills-card__title">Incident Response Team Member</h3><span class="skills-card__category skills-card__category--fixed">Digital Forensics and Incident Response</span><a class="c-button button--tertiary button--icon-right button--icon-translate-right skills-card__button" href="/job-roles/incident-response-team-member"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Explore learning path</span></a></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-skills-card skills-card--is-digital-forensics-and-incident-response"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop skills-card__title">Media Exploitation Analyst</h3><span class="skills-card__category skills-card__category--fixed">Digital Forensics and Incident Response</span><a class="c-button button--tertiary button--icon-right button--icon-translate-right skills-card__button" href="/job-roles/media-exploitation-analyst"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Explore learning path</span></a></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-skills-card skills-card--is-digital-forensics-and-incident-response"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop skills-card__title">Military Operations/Law Enforcement Agents</h3><span class="skills-card__category skills-card__category--fixed">Digital Forensics and Incident Response</span><a class="c-button button--tertiary button--icon-right button--icon-translate-right skills-card__button" href="/job-roles/military-operations-law-enforcement-agents"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Explore learning path</span></a></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-skills-card skills-card--is-digital-forensics-and-incident-response"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop skills-card__title">Intrusion Detection/SOC Analysts</h3><span class="skills-card__category skills-card__category--fixed">Digital Forensics and Incident Response</span><a class="c-button button--tertiary button--icon-right button--icon-translate-right skills-card__button" href="/job-roles/intrusion-detectionsoc-analysts"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Explore learning path</span></a></div></div></div><div><div class="c-animate-in slide-in-from-bottom card-grid__item-wrapper"><div class="c-skills-card skills-card--is-cyber-defense"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop skills-card__title">Cybersecurity Analyst/Engineer</h3><span class="skills-card__category skills-card__category--fixed">Cyber Defense</span><a class="c-button button--tertiary button--icon-right button--icon-translate-right skills-card__button" href="/job-roles/cybersecurity-analyst-engineer"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Explore learning path</span></a></div></div></div></div></div><div class="c-animate-in slide-in-from-bottom"><section class="c-grid c-split-content split-content--is-default split-content--has-bg-default grid--has-container grid--columns-12"><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-1 grid__item--col-end-13 grid__item--col-end-tablet-6 split-content__content-wrapper"><div class="split-content__title-wrapper"><h3 class="c-heading heading--is-h3 heading--is-h3-desktop split-content__title">SANS Law Enforcement Appreciation Programs (LEAP)</h3></div><div class="c-rich-text split-content__description"><p>SANS is proud to support State, Provincial, and Local Law Enforcement and the badged professionals behind them, especially those experiencing hardship funding their training efforts. To support these professionals in their quest to keep our communities safe, there are two promotional programs that can offer significant flexibility toward SANS courses.</p></div><div class="split-content__ctas-wrapper"><a class="c-button button--primary button--icon-right button--icon-translate-right split-content__cta" target="_top" href="https://www.sans.org/for-organizations/public-sector/state-local-le-program"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Learn More</span></a></div></div><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-7 grid__item--col-end-13 grid__item--col-end-tablet-13 split-content__media-wrapper"><div class="c-media split-content__media"><img alt="Two Police Officers Smiling" loading="lazy" width="1168" height="860" decoding="async" data-nimg="1" class="media__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt57b39d71e6770911/693bf923019baa42d2a80600/SANS-DFIR-Focus-Page_Law-Enforcement_1168_x_860.png?width=1200&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt57b39d71e6770911/693bf923019baa42d2a80600/SANS-DFIR-Focus-Page_Law-Enforcement_1168_x_860.png?width=2560&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt57b39d71e6770911/693bf923019baa42d2a80600/SANS-DFIR-Focus-Page_Law-Enforcement_1168_x_860.png?width=2560&amp;quality=75&amp;format=webp"/></div></div></section></div><div class="c-animate-in slide-in-from-bottom"><div class="c-grid c-carousel carousel--is-fullwidth grid--has-container grid--columns-12"><div class="grid__item carousel__title"><h2 class="c-heading heading--is-h3-desktop" id="heading-_R_4eav5u9bb_">Upcoming Webinars</h2></div><div aria-atomic="true" aria-labelledby="heading-_R_4eav5u9bb_" aria-live="polite" aria-roledescription="carousel" class="carousel__root" role="region"><div class="grid__item carousel__grid-item-slider"><div class="carousel__base" style="--slides-per-view:1;--slides-per-view-desktop:3;--slides-per-view-tablet:2"><ul class="carousel__container"><li class="carousel__slide"><span class="sr-only">Slide 1 of 6</span><a class="c-podcast-card c-webinar-card webinar-card--margin" href="/webcasts/advancing-cti-teams-foundations-real-world-operations"><div class="podcast-card__grid"> <div><h2 class="c-heading heading--is-h5 heading--is-h5-desktop podcast-card__title">Advancing CTI Teams: From Foundations to Real-World Operations</h2></div> <div><p class="c-text podcast-card__description">Turn threat data into actionable intelligence. Join CTI experts to learn how to overcome common challenges, build consistent workflows, and evolve from foundational skills to real-world threat investigations and operational impact.</p></div><div class="podcast-card__labels"><span class="podcast-card__label-code">Webinar</span><span class="podcast-card__label-name">Digital Forensics and Incident Response</span></div><img alt="Man lecturing in front of board" loading="lazy" width="600" height="510" decoding="async" data-nimg="1" class="podcast-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1d2734b2050a759a/69330a9a46234f1436dfcbdd/assets_fallback_2-column_Event_600x510.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1d2734b2050a759a/69330a9a46234f1436dfcbdd/assets_fallback_2-column_Event_600x510.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1d2734b2050a759a/69330a9a46234f1436dfcbdd/assets_fallback_2-column_Event_600x510.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1d2734b2050a759a/69330a9a46234f1436dfcbdd/assets_fallback_2-column_Event_600x510.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1d2734b2050a759a/69330a9a46234f1436dfcbdd/assets_fallback_2-column_Event_600x510.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1d2734b2050a759a/69330a9a46234f1436dfcbdd/assets_fallback_2-column_Event_600x510.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1d2734b2050a759a/69330a9a46234f1436dfcbdd/assets_fallback_2-column_Event_600x510.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1d2734b2050a759a/69330a9a46234f1436dfcbdd/assets_fallback_2-column_Event_600x510.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1d2734b2050a759a/69330a9a46234f1436dfcbdd/assets_fallback_2-column_Event_600x510.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1d2734b2050a759a/69330a9a46234f1436dfcbdd/assets_fallback_2-column_Event_600x510.png?width=3840&amp;quality=75&amp;format=webp"/><ul class="c-detail-list podcast-card__detail-list"><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->16 Apr 2026<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->10:30 EDT<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#instructors"></use></svg> <!-- -->Rebekah Brown &amp;  John Doyle<!-- --> </li></ul><span class="c-button button--secondary button--icon-right button--icon-translate-right podcast-card__cta"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View details</span></span></div></a></li><li class="carousel__slide"><span class="sr-only">Slide 2 of 6</span><a class="c-podcast-card c-webinar-card webinar-card--margin" href="/webcasts/enterprise-dfir-scale-investigation-response"><div class="podcast-card__grid"> <div><h2 class="c-heading heading--is-h5 heading--is-h5-desktop podcast-card__title">Enterprise DFIR at Scale: From Investigation to Response</h2></div> <div><p class="c-text podcast-card__description">Enterprise DFIR at Scale: From Investigation to Response.</p></div><div class="podcast-card__labels"><span class="podcast-card__label-code">Webinar</span><span class="podcast-card__label-name">Digital Forensics and Incident Response</span></div><img alt="Webcast Abstract Image" loading="lazy" width="600" height="510" decoding="async" data-nimg="1" class="podcast-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png?width=3840&amp;quality=75&amp;format=webp"/><ul class="c-detail-list podcast-card__detail-list"><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->30 Apr 2026<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->10:30 EDT<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#instructors"></use></svg> <!-- -->Matt Bromiley<!-- --> </li></ul><span class="c-button button--secondary button--icon-right button--icon-translate-right podcast-card__cta"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View details</span></span></div></a></li><li class="carousel__slide"><span class="sr-only">Slide 3 of 6</span><a class="c-podcast-card c-webinar-card webinar-card--margin" href="/webcasts/spring-cyber-solutions-fest-2026-detection-response-track"><div class="podcast-card__grid"> <div><h2 class="c-heading heading--is-h5 heading--is-h5-desktop podcast-card__title">Spring Cyber Solutions Fest 2026: Detection &amp; Response Track</h2></div> <div><p class="c-text podcast-card__description">The Detection &amp; Response Track at SANS Spring Cyber Solutions Fest 2026 brings together frontline experts, innovative practitioners, and cutting-edge solution providers to explore how modern security teams are adapting to an evolving threat landscape.</p></div><div class="podcast-card__labels"><span class="podcast-card__label-code">Webinar</span><span class="podcast-card__label-name">Digital Forensics and Incident Response</span></div><img alt="Man presenting webcast to screen" loading="lazy" width="363" height="336" decoding="async" data-nimg="1" class="podcast-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png?width=3840&amp;quality=75&amp;format=webp"/><ul class="c-detail-list podcast-card__detail-list"><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->6 May 2026<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->10:00 EDT<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#instructors"></use></svg> <!-- -->Megan Roddie-Fonseca<!-- --> </li></ul><span class="c-button button--secondary button--icon-right button--icon-translate-right podcast-card__cta"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View details</span></span></div></a></li><li class="carousel__slide"><span class="sr-only">Slide 4 of 6</span><a class="c-podcast-card c-webinar-card webinar-card--margin" href="/webcasts/spring-cyber-solutions-fest-2026-insider-threat-malware-ransomware-track"><div class="podcast-card__grid"> <div><h2 class="c-heading heading--is-h5 heading--is-h5-desktop podcast-card__title">Spring Cyber Solutions Fest 2026: Insider Threat / Malware / Ransomware Track</h2></div> <div><p class="c-text podcast-card__description">The Insider Threat / Malware / Ransomware Track at SANS Spring Cyber Solutions Fest 2026 brings together leading practitioners, researchers, and solution providers to explore how modern threats are evolving inside and outside the organization.</p></div><div class="podcast-card__labels"><span class="podcast-card__label-code">Webinar</span><span class="podcast-card__label-name">Digital Forensics and Incident Response</span></div><img alt="Woman watching webcast on screen" loading="lazy" width="600" height="510" decoding="async" data-nimg="1" class="podcast-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6c777e80c1dd8364/684bdbdb44bc4a2537a885e3/assets_2-column_Webcast1_600x510.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6c777e80c1dd8364/684bdbdb44bc4a2537a885e3/assets_2-column_Webcast1_600x510.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6c777e80c1dd8364/684bdbdb44bc4a2537a885e3/assets_2-column_Webcast1_600x510.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6c777e80c1dd8364/684bdbdb44bc4a2537a885e3/assets_2-column_Webcast1_600x510.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6c777e80c1dd8364/684bdbdb44bc4a2537a885e3/assets_2-column_Webcast1_600x510.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6c777e80c1dd8364/684bdbdb44bc4a2537a885e3/assets_2-column_Webcast1_600x510.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6c777e80c1dd8364/684bdbdb44bc4a2537a885e3/assets_2-column_Webcast1_600x510.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6c777e80c1dd8364/684bdbdb44bc4a2537a885e3/assets_2-column_Webcast1_600x510.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6c777e80c1dd8364/684bdbdb44bc4a2537a885e3/assets_2-column_Webcast1_600x510.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6c777e80c1dd8364/684bdbdb44bc4a2537a885e3/assets_2-column_Webcast1_600x510.png?width=3840&amp;quality=75&amp;format=webp"/><ul class="c-detail-list podcast-card__detail-list"><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->7 May 2026<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->10:00 EDT<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#instructors"></use></svg> <!-- -->Ryan Chapman<!-- --> </li></ul><span class="c-button button--secondary button--icon-right button--icon-translate-right podcast-card__cta"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View details</span></span></div></a></li><li class="carousel__slide"><span class="sr-only">Slide 5 of 6</span><a class="c-podcast-card c-webinar-card webinar-card--margin" href="/webcasts/sans-2026-dfir-summit-solutions-track"><div class="podcast-card__grid"> <div><h2 class="c-heading heading--is-h5 heading--is-h5-desktop podcast-card__title">SANS 2026 DFIR Summit Solutions Track</h2></div> <div><p class="c-text podcast-card__description">SANS 2026 DFIR Summit Solutions Track delivers a deep technical exploration of the tools, methodologies, and operational models driving next-generation digital forensics and incident response.</p></div><div class="podcast-card__labels"><span class="podcast-card__label-code">Webinar</span><span class="podcast-card__label-name">Digital Forensics and Incident Response</span></div><img alt="Webcast" loading="lazy" width="363" height="336" decoding="async" data-nimg="1" class="podcast-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt80d3329eba533dd4/6811dad2484ca40ae68399c7/assets_card_WebcastAbstract_363x336.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt80d3329eba533dd4/6811dad2484ca40ae68399c7/assets_card_WebcastAbstract_363x336.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt80d3329eba533dd4/6811dad2484ca40ae68399c7/assets_card_WebcastAbstract_363x336.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt80d3329eba533dd4/6811dad2484ca40ae68399c7/assets_card_WebcastAbstract_363x336.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt80d3329eba533dd4/6811dad2484ca40ae68399c7/assets_card_WebcastAbstract_363x336.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt80d3329eba533dd4/6811dad2484ca40ae68399c7/assets_card_WebcastAbstract_363x336.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt80d3329eba533dd4/6811dad2484ca40ae68399c7/assets_card_WebcastAbstract_363x336.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt80d3329eba533dd4/6811dad2484ca40ae68399c7/assets_card_WebcastAbstract_363x336.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt80d3329eba533dd4/6811dad2484ca40ae68399c7/assets_card_WebcastAbstract_363x336.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt80d3329eba533dd4/6811dad2484ca40ae68399c7/assets_card_WebcastAbstract_363x336.png?width=3840&amp;quality=75&amp;format=webp"/><ul class="c-detail-list podcast-card__detail-list"><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->15 Oct 2026<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->10:00 EDT<!-- --> </li></ul><span class="c-button button--secondary button--icon-right button--icon-translate-right podcast-card__cta"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View details</span></span></div></a></li><li class="carousel__slide"><span class="sr-only">Slide 6 of 6</span><a class="c-podcast-card c-webinar-card webinar-card--margin" href="/webcasts/sans-2026-detection-response-survey-report"><div class="podcast-card__grid"> <div><h2 class="c-heading heading--is-h5 heading--is-h5-desktop podcast-card__title">SANS 2026 Detection and Response Survey Report: Signals, Not Noise</h2></div> <div><p class="c-text podcast-card__description">Now in its third year, this independent, vendor-neutral survey captures both a snapshot and a trendline—offering critical insights into what’s working, what’s lagging, and where the industry is heading. Join us as we break down the results and uncover how real-world teams are cutting through noise to focus on signals that matter.</p></div><div class="podcast-card__labels"><span class="podcast-card__label-code">Webinar</span><span class="podcast-card__label-name">Digital Forensics and Incident Response</span></div><img alt="Blog" loading="lazy" width="600" height="510" decoding="async" data-nimg="1" class="podcast-card__image" style="color:transparent" sizes="100vw, (min-width: 768px) 66vw" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png?width=256&amp;quality=75&amp;format=webp 256w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png?width=375&amp;quality=75&amp;format=webp 375w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png?width=384&amp;quality=75&amp;format=webp 384w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png?width=768&amp;quality=75&amp;format=webp 768w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png?width=1024&amp;quality=75&amp;format=webp 1024w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png?width=1200&amp;quality=75&amp;format=webp 1200w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png?width=1920&amp;quality=75&amp;format=webp 1920w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png?width=2560&amp;quality=75&amp;format=webp 2560w, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png?width=3840&amp;quality=75&amp;format=webp 3840w" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png?width=3840&amp;quality=75&amp;format=webp"/><ul class="c-detail-list podcast-card__detail-list"><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#calendar"></use></svg> <!-- -->9 Dec 2026<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#time"></use></svg> <!-- -->10:30 EST<!-- --> </li><li class="detail-list__list-item"><svg height="16" width="16" class="detail-list__list-item-icon"><use href="/icons.svg#instructors"></use></svg> <!-- -->Josh Lemon<!-- --> </li></ul><span class="c-button button--secondary button--icon-right button--icon-translate-right podcast-card__cta"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">View details</span></span></div></a></li></ul></div></div><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-3 carousel__grid-item-controls"><div class="carousel__controls carousel__controls--is-disabled"><button aria-disabled="true" class="c-button button--secondary button--icon-right button--icon-translate-right button--is-icon-only button--size-large carousel__button carousel__button-prev" aria-label="Go to previous slide" type="button" datalayer="[object Object]"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg></button><div class="carousel__controls-pagination"></div><button aria-disabled="true" class="c-button button--secondary button--icon-right button--icon-translate-right button--is-icon-only button--size-large carousel__button carousel__button-next" aria-label="Go to next slide" type="button" datalayer="[object Object]"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg></button></div></div></div></div></div><section class="c-container c-insights-card-holder" id="featured-content"><div class="c-animate-in slide-in-from-bottom"><div class="insights-card-holder__intro"><h2 class="c-heading heading--is-h3 heading--is-h2-desktop">DFIR Insights From The Experts</h2></div></div><div class="c-animate-in slide-in-from-bottom"><div class="c-grid c-insight-card-featured insights-card-holder__featured grid--columns-12"><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-6 insight-card-featured__grid-content"><div class="insight-card__content"><a class="insight-card__title-link" href="/cyber-security-training-events/dfir-europe-2026"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop insight-card__title">SANS DFIR Europe Summit and Training 2026</h3></a><p class="c-text text--is-md insight-card__description">SANS DFIR Europe Summit and Training 2026 delivers cutting-edge, hands-on cybersecurity training led by top digital forensics and incident response experts. Join us live in beautiful Prague or attend virtually from anywhere.</p><div class="insight-card__labels"><span class="insight-card__label-code">Event</span></div></div></div><div class="grid__item grid__item--col-span-12 grid__item--col-span-tablet-6 insight-card-featured__grid-image"><img alt="Prague, Bridge" loading="lazy" width="757" height="251" decoding="async" data-nimg="1" class="insight-card-featured__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltba0fa6abe1a5349e/680fb79fc98d9b986c3c71b3/assets_thumbnail_757x251_Prague1.png?width=768&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltba0fa6abe1a5349e/680fb79fc98d9b986c3c71b3/assets_thumbnail_757x251_Prague1.png?width=1920&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltba0fa6abe1a5349e/680fb79fc98d9b986c3c71b3/assets_thumbnail_757x251_Prague1.png?width=1920&amp;quality=75&amp;format=webp"/></div></div></div><div class="c-animate-in slide-in-from-bottom"><div class="c-grid c-carousel insights-card-holder__carousel carousel--is-fullwidth grid--columns-12"><div aria-atomic="true" aria-labelledby="heading-_R_suav5u9bb_" aria-live="polite" aria-roledescription="carousel" class="carousel__root" role="region"><div class="grid__item carousel__grid-item-slider"><div class="carousel__base" style="--slides-per-view:1;--slides-per-view-desktop:3;--slides-per-view-tablet:3"><ul class="carousel__container"><li class="carousel__slide"><span class="sr-only">Slide 1 of 3</span><div class="c-insight-card"><div class="insight-card__content"><div class="insight-card__content"><a class="insight-card__title-link" href="/posters/linux-incident-response-threat-hunting-poster"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop insight-card__title">LINUX Incident Response and Threat Hunting Poster</h3></a><div class="insight-card__labels"><span class="insight-card__label-code">Poster and cheat sheet</span></div><div class="insight-card__author"><span class="c-text text--is-sm insight-card__author-name"><span class="c-text text--is-xs insight-card__author-name-intro">Created By</span>Kathryn Hedley &amp; Tarot (Taz) Wake</span><div class="insight-card__author-images"><a class="insight-card__author-image-link" href="/profiles/kathryn-hedley"><img alt="Kathryn Hedley" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="insight-card__author-image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd6e8471416e529b6/681367dae16f9642431589b6/Kat-Hedley--370x370.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd6e8471416e529b6/681367dae16f9642431589b6/Kat-Hedley--370x370.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd6e8471416e529b6/681367dae16f9642431589b6/Kat-Hedley--370x370.jpg?width=768&amp;quality=75&amp;format=webp"/></a><a class="insight-card__author-image-link" href="/profiles/tarot-wake"><img alt="Tarot (Taz) Wake" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="insight-card__author-image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blte71c8faf529b8442/681367ff3c472fa79d5ab7cb/Taz_Wake_-370x370.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blte71c8faf529b8442/681367ff3c472fa79d5ab7cb/Taz_Wake_-370x370.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blte71c8faf529b8442/681367ff3c472fa79d5ab7cb/Taz_Wake_-370x370.jpg?width=768&amp;quality=75&amp;format=webp"/></a></div></div></div></div><img alt="Man Using Laptop and Phone" loading="lazy" width="1168" height="860" decoding="async" data-nimg="1" class="insight-card__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltc4ef353384fcc84e/680fb70ec39b0f04cdcbe460/assets_split-content_read_1168x860.png?width=1200&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltc4ef353384fcc84e/680fb70ec39b0f04cdcbe460/assets_split-content_read_1168x860.png?width=2560&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltc4ef353384fcc84e/680fb70ec39b0f04cdcbe460/assets_split-content_read_1168x860.png?width=2560&amp;quality=75&amp;format=webp"/></div></li><li class="carousel__slide"><span class="sr-only">Slide 2 of 3</span><div class="c-insight-card"><div class="insight-card__content"><div class="insight-card__content"><a class="insight-card__title-link" href="/white-papers/empowering-responders-automated-investigation"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop insight-card__title">Empowering Responders with Automated Investigation</h3></a><div class="insight-card__labels"><span class="insight-card__label-code">Whitepaper</span></div><div class="insight-card__author"><span class="c-text text--is-sm insight-card__author-name"><span class="c-text text--is-xs insight-card__author-name-intro">Written By</span>Megan Roddie-Fonseca</span><div class="insight-card__author-images"><a class="insight-card__author-image-link" href="/profiles/megan-roddie"><img alt="Megan Roddie-Fonseca" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="insight-card__author-image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltedffddcd494a86dc/67c5d78521a60e1ef4a4632d/Megan_Roddie_370x370.png?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltedffddcd494a86dc/67c5d78521a60e1ef4a4632d/Megan_Roddie_370x370.png?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltedffddcd494a86dc/67c5d78521a60e1ef4a4632d/Megan_Roddie_370x370.png?width=768&amp;quality=75&amp;format=webp"/></a></div></div></div></div><img alt="Red Cloud Upload Symbols" loading="lazy" width="600" height="510" decoding="async" data-nimg="1" class="insight-card__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdccd7c3464c61505/684023cea1ab6579459b0542/assets_2-column_Blog-Abstract6_600x510.png?width=768&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdccd7c3464c61505/684023cea1ab6579459b0542/assets_2-column_Blog-Abstract6_600x510.png?width=1200&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdccd7c3464c61505/684023cea1ab6579459b0542/assets_2-column_Blog-Abstract6_600x510.png?width=1200&amp;quality=75&amp;format=webp"/></div></li><li class="carousel__slide"><span class="sr-only">Slide 3 of 3</span><div class="c-insight-card"><div class="insight-card__content"><div class="insight-card__content"><a class="insight-card__title-link" href="/blog/admiralty-code-part-2-ticketmaster-data-breach-claims"><h3 class="c-heading heading--is-h5 heading--is-h5-desktop insight-card__title">Admiralty Code Part 2: Ticketmaster Data Breach Claims </h3></a><div class="insight-card__labels"><span class="insight-card__label-code">Blog</span></div><div class="insight-card__author"><span class="c-text text--is-sm insight-card__author-name"><span class="c-text text--is-xs insight-card__author-name-intro">Written By</span>Sean O&#x27;Connor, Will Thomas &amp; Freddy Murstad</span><div class="insight-card__author-images"><a class="insight-card__author-image-link" href="/profiles/sean-o-connor"><img alt="Sean O&#x27;Connor" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="insight-card__author-image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaa0484999854d53e/67c5d795d3f86d42e1ec4a31/Sean_O_Connor_-_Headshot_-_370x370_2024.jpg?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaa0484999854d53e/67c5d795d3f86d42e1ec4a31/Sean_O_Connor_-_Headshot_-_370x370_2024.jpg?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaa0484999854d53e/67c5d795d3f86d42e1ec4a31/Sean_O_Connor_-_Headshot_-_370x370_2024.jpg?width=768&amp;quality=75&amp;format=webp"/></a><a class="insight-card__author-image-link" href="/profiles/will-thomas"><img alt="Will Thomas" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="insight-card__author-image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd7a9a47150f4e391/67c5d7a2f5cfb3bc58d6ee7f/Will_Thomas_370x370.png?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd7a9a47150f4e391/67c5d7a2f5cfb3bc58d6ee7f/Will_Thomas_370x370.png?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd7a9a47150f4e391/67c5d7a2f5cfb3bc58d6ee7f/Will_Thomas_370x370.png?width=768&amp;quality=75&amp;format=webp"/></a><a class="insight-card__author-image-link" href="/profiles/freddy-murstad"><img alt="Freddy Murstad" loading="lazy" width="370" height="370" decoding="async" data-nimg="1" class="insight-card__author-image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt703b5e6eacc17218/69401d1a8528d70bd32a8ce9/Freddy_Murstad_370x370.png?width=375&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt703b5e6eacc17218/69401d1a8528d70bd32a8ce9/Freddy_Murstad_370x370.png?width=768&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt703b5e6eacc17218/69401d1a8528d70bd32a8ce9/Freddy_Murstad_370x370.png?width=768&amp;quality=75&amp;format=webp"/></a></div></div></div></div><img alt="Blog" loading="lazy" width="600" height="510" decoding="async" data-nimg="1" class="insight-card__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png?width=768&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png?width=1200&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png?width=1200&amp;quality=75&amp;format=webp"/></div></li></ul></div></div></div></div></div><div class="c-animate-in slide-in-from-bottom"><a class="c-button button--primary button--icon-right button--icon-translate-right insights-card-holder__cta" target="_self" href="/security-resources"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">More Insights</span></a></div></section><div class="c-animate-in slide-in-from-bottom"><section class="c-grid c-split-content split-content--is-default split-content--has-bg-default split-content--is-reversed grid--has-container grid--columns-12"><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-8 grid__item--col-end-13 grid__item--col-end-tablet-13 split-content__content-wrapper"><div class="split-content__title-wrapper"><h3 class="c-heading heading--is-h3 heading--is-h3-desktop split-content__title">Incident Response Is Becoming More Complex – Even for Experienced DFIR Teams</h3></div><div class="c-rich-text split-content__description"><p>Modern incidents unfold faster and span more systems than ever before. Evidence arrives out of sequence, attacks move between cloud and endpoint environments in minutes, and early missteps can derail an investigation before scope and intent are clear. </p><p>Explore expert insights and resources on where incident response breaks down, and how experienced DFIR teams maintain focus, coordination, and investigative discipline under pressure. </p></div><div class="split-content__ctas-wrapper"><a class="c-button button--primary button--icon-right button--icon-translate-right split-content__cta" target="_top" href="/mlp/incident-response"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Explore Incident Response Resources</span></a></div></div><div class="grid__item grid__item--col-start-1 grid__item--col-start-tablet-1 grid__item--col-end-13 grid__item--col-end-tablet-7 split-content__media-wrapper"><div class="c-media split-content__media"><img alt="Stylized Woman Working on Computer" loading="lazy" width="1168" height="860" decoding="async" data-nimg="1" class="media__image" style="color:transparent" srcSet="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt13e98e4f52a36775/697a5c5c03985775a7827787/IR-Campaign_Woman_1168x860.jpg?width=1200&amp;quality=75&amp;format=webp 1x, https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt13e98e4f52a36775/697a5c5c03985775a7827787/IR-Campaign_Woman_1168x860.jpg?width=2560&amp;quality=75&amp;format=webp 2x" src="https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt13e98e4f52a36775/697a5c5c03985775a7827787/IR-Campaign_Woman_1168x860.jpg?width=2560&amp;quality=75&amp;format=webp"/></div></div></section></div><script type="application/ld+json">{"@context":"https://schema.org","@type":"FAQPage","mainEntity":[{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"Digital Forensics and Incident Response (DFIR) focuses on investigating cyber incidents, collecting evidence, and mitigating damage after an attack. Threat Hunting is a proactive approach to identifying hidden threats before they trigger an incident by analyzing behaviors, anomalies, and adversary tactics. "},"name":"What Is DFIR, And How Does It Differ From Threat Hunting?"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"Traditional security tools rely on known indicators of compromise (IOCs), but sophisticated attackers use stealthy techniques to evade detection. Threat Hunting helps identify adversaries using behavioral analysis, hypothesis-driven investigations, and proactive detection methods."},"name":"Why Is Threat Hunting Important If We Already Have Security Monitoring? "},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"DFIR professionals need expertise in forensic analysis, memory and malware analysis, network investigations, threat intelligence, incident response, and threat hunting methodologies. Hands-on experience with forensic tools and scripting (Python, PowerShell) is also valuable. "},"name":"What Are The Key Skills Required For DFIR Professionals?"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"Ransomware encrypts critical data, disrupts business operations, and often prohibits access to critical forensic evidence. DFIR experts analyze ransom tactics, identify the attack vector, conduct memory forensics, and work on containment, recovery, and attribution of the attack."},"name":"How Does Ransomware Impact DFIR Investigations? "},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"Threat Hunters analyze anomalies such as unusual login attempts, persistence mechanisms, process injections, beaconing activity, unauthorized privilege escalation, suspicious network traffic patterns, and many, many other things to detect hidden threats."},"name":"What Are Common Tactics, Techniques, And Procedures (TTPs) That Threat Hunters Look For? "},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"Organizations should invest in continuous training, advanced forensic tools, real-world simulations, and proactive threat intelligence integration. Building a strong incident response plan and conducting regular threat hunts can significantly enhance detection and response effectiveness. "},"name":" How Can Organizations Improve Their DFIR And Threat Hunting Capabilities?"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"DFIR (Digital Forensics and Incident Response) is critical today because organizations face a growing range of digital threats, from cyberattacks and insider misuse to data leaks and fraud. It provides the investigative tools and techniques needed to uncover what happened, how it happened, and who was involved. DFIR helps identify impacted systems, recover lost data, and support legal or regulatory action. Beyond response, it plays a vital role in strengthening defenses and preparing for future incidents by turning evidence into actionable insights. "},"name":"Why Is DFIR Important/Critical Today?"},{"@type":"Question","acceptedAnswer":{"@type":"Answer","text":"SANS DFIR training builds the skills needed to investigate a wide range of digital incidents — from data breaches and ransomware to insider threats and nation-state attacks. It covers digital forensics, threat hunting, malware analysis, cloud investigations, dark web investigations, and network forensics across Windows, Linux, and mobile environments. You'll also learn how to analyze logs, reconstruct attacker activity, and use threat intelligence to guide response. "},"name":"What Topics Are Covered In SANS DFIR Training? "}]}</script><div id="faqs" class="c-grid c-accordion-section accordion-section--transparent grid--has-container grid--columns-1 grid--columns-tablet-3"><div class="grid__item grid__item--col-span-1"><div class="c-animate-in slide-in-from-bottom"><h2 class="c-heading heading--is-h3 heading--is-h3-desktop">Frequently Asked Questions</h2></div></div><div class="grid__item grid__item--col-span-1 grid__item--col-span-tablet-2"><div class="c-animate-in"><div class="c-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:0ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_8mmeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_mmeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">What Is DFIR, And How Does It Differ From Threat Hunting?<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_8mmeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_mmeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:100ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_96meav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_16meav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Why Is Threat Hunting Important If We Already Have Security Monitoring? <svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_96meav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_16meav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:200ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_9mmeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_1mmeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">What Are The Key Skills Required For DFIR Professionals?<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_9mmeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_1mmeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:300ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_a6meav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_26meav5u9bb_" class="accordion__trigger" data-radix-collection-item="">How Does Ransomware Impact DFIR Investigations? <svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_a6meav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_26meav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:400ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_ammeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_2mmeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">What Are Common Tactics, Techniques, And Procedures (TTPs) That Threat Hunters Look For? <svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_ammeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_2mmeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:500ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_b6meav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_36meav5u9bb_" class="accordion__trigger" data-radix-collection-item=""> How Can Organizations Improve Their DFIR And Threat Hunting Capabilities?<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_b6meav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_36meav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:600ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_bmmeav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_3mmeav5u9bb_" class="accordion__trigger" data-radix-collection-item="">Why Is DFIR Important/Critical Today?<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_bmmeav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_3mmeav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item" style="transition-delay:700ms"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_c6meav5u9bb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_46meav5u9bb_" class="accordion__trigger" data-radix-collection-item="">What Topics Are Covered In SANS DFIR Training? <svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_c6meav5u9bb_" hidden="" role="region" aria-labelledby="radix-_R_46meav5u9bb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div></div></div><!--$--><!--/$--></main><footer class="c-footer" id="footer"><div class="c-container"><div class="footer__newsletter"><h2 class="c-heading footer__newsletter-title">Get Curated News, Vulnerabilities, and Essential Security Awareness Tips</h2><div class="footer__newsletter"><button class="c-button button--primary button--icon-right button--icon-translate-right footer__newsletter-button" type="button" aria-haspopup="dialog" aria-expanded="false" aria-controls="radix-_R_16pbb_" data-state="closed"><svg height="24" width="24" aria-hidden="true" class="button__icon"><use href="/icons.svg#arrow-right-heavy"></use></svg><span class="button__label">Subscribe to Newsletter </span></button></div></div><div class="c-grid footer__navigation grid--columns-12"><div class="grid__item grid__item--col-span-12 grid__item--col-span-desktop-3"><h2 class="c-heading heading--is-h4 heading--is-h4-desktop footer__navigation-title">The Highest Standard in Cybersecurity Education Since 1989</h2></div><div class="grid__item grid__item--col-start-1 grid__item--col-start-desktop-5 grid__item--col-end-13"><div class="c-accordion footer__navigation-accordion" data-orientation="vertical"><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item footer__navigation-list-item"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_japbb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_3apbb_" class="accordion__trigger" data-radix-collection-item="">Company<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_japbb_" hidden="" role="region" aria-labelledby="radix-_R_3apbb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item footer__navigation-list-item"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_lapbb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_5apbb_" class="accordion__trigger" data-radix-collection-item="">Help &amp; Support<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_lapbb_" hidden="" role="region" aria-labelledby="radix-_R_5apbb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item footer__navigation-list-item"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_napbb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_7apbb_" class="accordion__trigger" data-radix-collection-item="">Training Programs<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_napbb_" hidden="" role="region" aria-labelledby="radix-_R_7apbb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div><div class="accordion__outline-wrapper"><div data-state="closed" data-orientation="vertical" class="accordion__item footer__navigation-list-item"><h3 class="accordion__header"><button type="button" aria-controls="radix-_R_papbb_" aria-expanded="false" data-state="closed" data-orientation="vertical" id="radix-_R_9apbb_" class="accordion__trigger" data-radix-collection-item="">Get Involved<svg height="16" width="16" class="accordion__chevron"><use href="/icons.svg#arrow-down-light"></use></svg></button></h3><div data-state="closed" id="radix-_R_papbb_" hidden="" role="region" aria-labelledby="radix-_R_9apbb_" data-orientation="vertical" class="accordion__content" style="--radix-accordion-content-height:var(--radix-collapsible-content-height);--radix-accordion-content-width:var(--radix-collapsible-content-width)"></div></div></div></div></div></div><div class="footer__copy"><a aria-label="Go to homepage" class="footer__copy-logo-link" href="/"><svg class="footer__copy-logo" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 65 33" fill="none"><path fill="currentColor" d="M7.53 13.095C4.945 9.15 2.576 6.678 2.576 3.947c0-1.994 1.008-3.22 2.588-3.22 2.323 0 4.252 3.514 4.778 9.744h.734V.433H9.94l-.965 1.91C7.926.91 6.521 0 5.163 0 2.488.001.339 2.624.339 7.263c0 4.9 2.149 8.205 4.691 12.021 2.763 4.117 4.385 7.18 4.385 9.652 0 1.95-1.184 3.048-2.762 3.048-2.893 0-5.48-3.86-5.744-11.302H0v12.114h.91l1.183-2.306C3.583 32.224 4.986 33 6.828 33c3.157 0 5.394-3.124 5.394-8.196 0-4.076-1.886-7.503-4.691-11.709m51.9 19.038c-2.544 0-4.852-3.143-5.55-8.682h6.514c1.16 2.078 1.8 3.926 1.8 5.477 0 1.951-1.184 3.206-2.764 3.206m-23.353-9.72V5.898l7.23 16.514h-7.23zm-1.225 4.6c0 3.076-.014 4.572-2.208 4.572h-1.388l-1.43-8.133h5.026zm-15.504-4.6 2.744-16.062 2.656 16.062zm40.96-9.318c-2.586-3.945-4.953-6.417-4.953-9.148 0-1.994 1.007-3.22 2.585-3.22 2.325 0 4.254 3.514 4.78 9.744h.659V.433h-.66l-.964 1.91C60.703.91 59.3 0 57.94 0c-2.674 0-4.822 2.623-4.822 7.262 0 4.899 2.148 8.3 4.691 12.117.708 1.055 1.341 2.167 1.89 3.033h-5.94c-.033-.692-.056-.866-.071-1.731h-.984v1.73h-4.201V5.032c0-2.731.175-3.73 2.45-3.685V.433h-6.825v.913c2.1 0 2.976 1.258 2.976 4.119v14.352L39.308.433h-6.382V1.3h1.924v21.113h-5.238L25.773.433h-3.859L16.57 27.12c-.527 2.687-.442 4.054-3.068 4.445v.886h7.175v-.886c-1.924-.044-2.448-.565-2.448-1.952 0-.607.047-1.13.09-1.519l.793-4.643h5.875l1.316 8.134h-2.475v.866h15.926v-.886c-2.45-.174-3.676-1.562-3.676-4.813V23.45h7.736l3.784 9h.906v-9h4.201v9.345h.984l1.184-2.307C56.362 32.225 57.765 33 59.607 33 62.763 33 65 29.876 65 24.804c0-4.076-1.886-7.503-4.691-11.709z"></path></svg></a><nav aria-label="Social Navigation" class="footer__socials"><a aria-label="LinkedIn" class="footer__socials-link" title="LinkedIn" target="_blank" href="https://www.linkedin.com/company/sans-institute"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="M26.154 4H5.846A1.846 1.846 0 0 0 4 5.846v20.308A1.846 1.846 0 0 0 5.846 28h20.308A1.846 1.846 0 0 0 28 26.154V5.846A1.846 1.846 0 0 0 26.154 4m0 22.154H5.846V5.846h20.308zm-13.846-12v7.384a.923.923 0 0 1-1.847 0v-7.384a.923.923 0 0 1 1.847 0m10.154 3.23v4.154a.923.923 0 1 1-1.847 0v-4.153a2.308 2.308 0 1 0-4.615 0v4.153a.923.923 0 0 1-1.846 0v-7.384a.923.923 0 0 1 1.822-.206 4.153 4.153 0 0 1 6.486 3.437m-9.693-6.46a1.385 1.385 0 1 1-2.77-.001 1.385 1.385 0 0 1 2.77 0"></path></svg></a><a aria-label="X" class="footer__socials-link" title="X" target="_blank" href="https://x.com/SANSInstitute"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="m26.838 26.45-7.82-12.29 7.716-8.489a1 1 0 0 0-1.479-1.344l-7.35 8.085-5.058-7.949A1 1 0 0 0 12.004 4H6.007a1 1 0 0 0-.843 1.537l7.82 12.288-7.716 8.495a.999.999 0 1 0 1.479 1.344l7.35-8.085 5.058 7.949a1 1 0 0 0 .844.457h5.996a1 1 0 0 0 .843-1.535m-6.291-.464L7.827 6h3.623l12.725 19.987z"></path></svg></a><a aria-label="YouTube" class="footer__socials-link" title="YouTube" target="_blank" href="https://www.youtube.com/@SANSInstitute"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="m20.555 15.168-6-4A1 1 0 0 0 13 12v8a1 1 0 0 0 1.555.832l6-4a1 1 0 0 0 0-1.665M15 18.13v-4.256L18.198 16zM29.291 8.69a3 3 0 0 0-1.811-2.05C23.195 4.985 16.375 5 16 5S8.805 4.985 4.52 6.64a3 3 0 0 0-1.811 2.05C2.385 9.938 2 12.218 2 16s.385 6.063.709 7.31a3 3 0 0 0 1.811 2.051C8.625 26.945 15.05 27 15.918 27h.165c.867 0 7.296-.055 11.397-1.639a3 3 0 0 0 1.811-2.051c.324-1.25.709-3.527.709-7.31s-.385-6.062-.709-7.31m-1.936 14.125a1 1 0 0 1-.596.686c-3.957 1.528-10.685 1.5-10.75 1.5H16c-.068 0-6.791.025-10.75-1.5a1 1 0 0 1-.596-.686C4.35 21.674 4 19.571 4 16s.35-5.674.645-6.809a1 1 0 0 1 .596-.691C9.056 7.026 15.45 7 15.973 7h.033c.068 0 6.798-.022 10.75 1.5a1 1 0 0 1 .596.686C27.65 10.326 28 12.43 28 16s-.35 5.674-.645 6.809z"></path></svg></a><a aria-label="Facebook" class="footer__socials-link" title="Facebook" target="_blank" href="https://www.facebook.com/sansinstitute/"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="M16 4a12 12 0 1 0 12 12A12.013 12.013 0 0 0 16 4m.923 22.111V18.77h2.77a.923.923 0 1 0 0-1.846h-2.77v-2.77a1.846 1.846 0 0 1 1.846-1.845h1.846a.923.923 0 0 0 0-1.847H18.77a3.69 3.69 0 0 0-3.692 3.693v2.77h-2.77a.923.923 0 1 0 0 1.845h2.77v7.342a10.154 10.154 0 1 1 1.846 0"></path></svg></a><a aria-label="Tik Tok" class="footer__socials-link" title="Tik Tok" target="_blank" href="https://www.tiktok.com/@sansinstituteofficial"><svg class="footer__socials-link-icon" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 32 32" fill="none"><path fill="currentColor" d="M28,9c-3.3,0-6-2.7-6-6,0-.6-.4-1-1-1h-5c-.6,0-1,.4-1,1v16.5c0,1.4-1.1,2.5-2.5,2.5s-2.5-1.1-2.5-2.5c0-1,.6-1.8,1.4-2.3.3-.2.6-.5.6-.9v-5.3c0-.6-.4-1-1-1,0,0-.1,0-.2,0-4.5.8-7.8,4.9-7.8,9.5s4.3,9.5,9.5,9.5,9.5-4.3,9.5-9.5v-5c1.9,1,3.9,1.5,6,1.5.6,0,1-.4,1-1v-5c0-.6-.4-1-1-1ZM27,14c-2-.2-3.8-.9-5.4-2-.4-.3-1.1-.2-1.4.2-.1.2-.2.4-.2.6v6.8c0,4.1-3.4,7.5-7.5,7.5s-7.5-3.4-7.5-7.5,2.1-6.1,5-7.2v3.5c-2.1,1.4-2.6,4.2-1.2,6.2,1.4,2.1,4.2,2.6,6.2,1.2,1.2-.8,2-2.2,2-3.7V4h3.1c.5,3.6,3.3,6.5,6.9,6.9v3Z"></path></svg></a></nav><small class="footer__copy-nav"><div class="footer__copyright"><nav aria-label="Legal navigation" class="footer__copy-nav-list"><a class="footer__copy-nav-list-link" target="_blank" href="/legal/privacy">Privacy Policy</a><a class="footer__copy-nav-list-link" href="/legal/terms-conditions">Terms and Conditions</a><a class="footer__copy-nav-list-link" target="_blank" href="/legal/do-not-share-sell">Do Not Sell/Share My Personal Information</a><a class="footer__copy-nav-list-link" href="/legal/cookie-notice">Cookie Notice</a></nav></div><div class="footer__trademark"><span class="c-text footer__copy-nav-trademark">© <!-- -->2026<!-- --> <!-- -->The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute.</span><span class="c-text footer__copy-nav-trademark">Our <a href="/legal/terms-conditions">Terms and Conditions</a> detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.</span></div></small></div></div></footer><script src="/_next/static/chunks/webpack-11f4915bd98f8a25.js" id="_R_" async=""></script><script>(self.__next_f=self.__next_f||[]).push([0])</script><script>self.__next_f.push([1,"1:\"$Sreact.fragment\"\n3:I[21911,[],\"\"]\n4:I[44843,[],\"\"]\n6:I[91390,[],\"OutletBoundary\"]\n8:I[851,[],\"AsyncMetadataOutlet\"]\na:I[91390,[],\"ViewportBoundary\"]\nc:I[91390,[],\"MetadataBoundary\"]\nd:\"$Sreact.suspense\"\nf:I[66461,[],\"\"]\n10:I[92671,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"\"]\n11:I[18373,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"GoogleTagManager\"]\n12:I[53120,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"default\""])</script><script>self.__next_f.push([1,"]\n13:I[32517,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"SendLyticsEmailCampaignId\"]\n15:I[18677,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"LangBoundaryRefresher\"]\n16:I[13146,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"default\"]\n17:I[61997,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c75"])</script><script>self.__next_f.push([1,"4c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"default\"]\n19:I[50527,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"ThemeProvider\"]\n1a:I[91541,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"SkipLinks\"]\n1b:I[293,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"stat"])</script><script>self.__next_f.push([1,"ic/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"default\"]\n1d:I[99960,[\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"8039\",\"static/chunks/app/error-8391fd18fc444d3f.js\"],\"default\"]\n20:I[57281,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"default\"]\n21:I[51312,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"SansLink\"]\n23:I[50600,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"FooterNavigation\"]\n2a:I[41912,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3"])</script><script>self.__next_f.push([1,"970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"HeaderProvider\"]\n2b:I[8299,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"Header\"]\n:HL[\"/_next/static/media/07f0d0991c204e49-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/1c2b560656f22784-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/25e9b8f09a8d4ee4-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/442946fed64c2011-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/4f498a2054f9dc71-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/64d67560db5baada-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/794d29e41a12b5c4-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/a048339354d5408e-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/media/b036901809a398af-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/st"])</script><script>self.__next_f.push([1,"atic/media/d644870e415613ec-s.p.woff2\",\"font\",{\"crossOrigin\":\"\",\"type\":\"font/woff2\"}]\n:HL[\"/_next/static/css/8f4c1d5ac92728b5.css\",\"style\"]\n:HL[\"/_next/static/css/f60c4c18eaea2539.css\",\"style\"]\n:HL[\"/_next/static/css/10a162551269c449.css\",\"style\"]\n:HL[\"/_next/static/css/19ce4d406e564b03.css\",\"style\"]\n:HL[\"/_next/static/css/206023683b1c0579.css\",\"style\"]\n"])</script><script>self.__next_f.push([1,"0:{\"P\":null,\"b\":\"YhY6kuKTxZ6AzGAnnFTnu\",\"p\":\"\",\"c\":[\"\",\"cybersecurity-focus-areas\",\"digital-forensics-incident-response\"],\"i\":false,\"f\":[[[\"\",{\"children\":[[\"slugs\",\"cybersecurity-focus-areas/digital-forensics-incident-response\",\"c\"],{\"children\":[\"__PAGE__\",{}]}]},\"$undefined\",\"$undefined\",true],[\"\",[\"$\",\"$1\",\"c\",{\"children\":[[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/8f4c1d5ac92728b5.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"1\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/f60c4c18eaea2539.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"2\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/10a162551269c449.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}]],\"$L2\"]}],{\"children\":[[\"slugs\",\"cybersecurity-focus-areas/digital-forensics-incident-response\",\"c\"],[\"$\",\"$1\",\"c\",{\"children\":[null,[\"$\",\"$L3\",null,{\"parallelRouterKey\":\"children\",\"error\":\"$undefined\",\"errorStyles\":\"$undefined\",\"errorScripts\":\"$undefined\",\"template\":[\"$\",\"$L4\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":\"$undefined\",\"forbidden\":\"$undefined\",\"unauthorized\":\"$undefined\"}]]}],{\"children\":[\"__PAGE__\",[\"$\",\"$1\",\"c\",{\"children\":[\"$L5\",[[\"$\",\"link\",\"0\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/19ce4d406e564b03.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}],[\"$\",\"link\",\"1\",{\"rel\":\"stylesheet\",\"href\":\"/_next/static/css/206023683b1c0579.css\",\"precedence\":\"next\",\"crossOrigin\":\"$undefined\",\"nonce\":\"$undefined\"}]],[\"$\",\"$L6\",null,{\"children\":[\"$L7\",[\"$\",\"$L8\",null,{\"promise\":\"$@9\"}]]}]]}],{},null,false]},null,false]},null,false],[\"$\",\"$1\",\"h\",{\"children\":[null,[[\"$\",\"$La\",null,{\"children\":\"$Lb\"}],[\"$\",\"meta\",null,{\"name\":\"next-size-adjust\",\"content\":\"\"}]],[\"$\",\"$Lc\",null,{\"children\":[\"$\",\"div\",null,{\"hidden\":true,\"children\":[\"$\",\"$d\",null,{\"fallback\":null,\"children\":\"$Le\"}]}]}]]}],false]],\"m\":\"$undefined\",\"G\":[\"$f\",[]],\"s\":false,\"S\":false}\n"])</script><script>self.__next_f.push([1,"2:[\"$\",\"html\",null,{\"data-theme\":\"dark\",\"lang\":\"en-US\",\"children\":[[\"$\",\"head\",null,{\"children\":[[\"$\",\"meta\",null,{\"content\":\"cC-8xOerZ3opiLx9VloUCzc6SgMfOZHYihJzWA19-KI\",\"name\":\"google-site-verification\"}],[\"$\",\"$L10\",null,{\"id\":\"optimizely-init\",\"dangerouslySetInnerHTML\":{\"__html\":\"\\n              window[\\\"optimizely\\\"] = window[\\\"optimizely\\\"] || [];\\n              const oneTrustCookie = document.cookie\\n                .split(';')\\n                .map(function(x) { return x.trim(); })\\n                .filter(function(x) { return x.startsWith('OptanonConsent'); })[0];\\n              if (!oneTrustCookie) {\\n                window[\\\"optimizely\\\"].push({ type: \\\"disable\\\" });\\n              } else {\\n                var optOutPreference = !decodeURIComponent(oneTrustCookie).includes('C0003:1');\\n                window[\\\"optimizely\\\"].push({ type: \\\"optOut\\\", isOptOut: optOutPreference });\\n              }\\n            \"}}],[\"$\",\"$L10\",null,{\"src\":\"https://cdn.optimizely.com/js/28081820005.js\"}]]}],[\"$\",\"$L11\",null,{\"gtmId\":\"GTM-5T9DW3B\"}],[\"$\",\"$L12\",null,{}],[\"$\",\"$L13\",null,{}],[\"$\",\"body\",null,{\"className\":\"__variable_71459b __variable_5c0054 __variable_9e78df\",\"children\":[[\"$\",\"noscript\",null,{\"children\":[\"$\",\"iframe\",null,{\"height\":\"0\",\"src\":\"https://www.googletagmanager.com/ns.html?id=GTM-N9Z5JVC\",\"style\":{\"display\":\"none\",\"visibility\":\"hidden\"},\"width\":\"0\"}]}],\"$L14\",[\"$\",\"$L15\",null,{}],[\"$\",\"$L16\",null,{}]]}]]}]\n"])</script><script>self.__next_f.push([1,"b:[[\"$\",\"meta\",\"0\",{\"charSet\":\"utf-8\"}],[\"$\",\"meta\",\"1\",{\"name\":\"viewport\",\"content\":\"width=device-width, initial-scale=1\"}]]\n7:null\n"])</script><script>self.__next_f.push([1,"14:[\"$\",\"$L17\",null,{\"locale\":\"en-US\",\"now\":\"$D2026-04-13T10:01:43.707Z\",\"timeZone\":\"UTC\",\"messages\":{\"facets\":{\"view\":\"View:\",\"skillLevel\":\"Skill Level\",\"focusArea\":\"Focus Area\",\"role\":\"Role\",\"tags\":\"Tags\",\"topic\":\"Topic\",\"status\":\"Status\",\"language\":\"Language\",\"policyCategory\":\"Category\",\"date\":\"Date\",\"type\":\"Type\",\"format\":\"Format\",\"location\":\"Location\",\"noMatches\":\"No possible matches found, reset or adjust the filters to refine these.\"},\"carousel\":{\"controls\":{\"currentSlideIndexAria\":\"Slide {current} of {total}\",\"next\":\"Go to next slide\",\"prev\":\"Go to previous slide\"},\"slider\":{\"slideXofY\":\"Slide {current} of {total}\"}},\"profile\":{\"noUpcomingCoursesTitle\":\"No Upcoming Courses\"},\"common\":{\"close\":\"Close\",\"closeItem\":\"Close {item}\",\"loadMore\":\"Load more\",\"readMore\":\"Read more\",\"readLess\":\"Read less\",\"moreInfo\":\"More info\",\"showAll\":\"Show all\",\"day\":\"Day {day}\",\"by\":\"by\",\"for\":\"for\",\"courses\":\"{count, plural, =0 {No Courses} =1 {1 Course} other {# Courses}}\",\"cpesEvent\":\"{count, plural, =0 {No CPEs} =1 {1 CPE} other {# CPEs}} (Summit Only)\",\"cpes\":\"{count, plural, =0 {No CPEs} =1 {1 CPE} other {# CPEs}}\",\"tournaments\":\"{count, plural, =0 {No Tournaments} =1 {1 NetWars Tournament} other {# NetWars Tournaments}}\",\"hours\":\"{count, plural, =0 {0 Hours} =1 {1 Hour} other {# Hours}}\",\"minutes\":\"{count, plural, =0 {0 Hours} =1 {1 Minute} other {# Minutes}}\",\"days\":\"{count, plural, =0 {0 Days} =1 {1 Day} other {# Days}}\",\"labs\":\"{count, plural, =0 {No Labs} =1 {Labs: 1 Hands-On Lab} other {Labs: # Hands-On Labs}}\",\"minute\":\"Minute\",\"duration\":\"Duration:\",\"durationDaysLabel\":\"(Instructor-Led)\",\"durationHoursLabel\":\"(Self-Paced)\",\"priceCourse\":\"{price} (Course)\",\"allDates\":\"All dates\",\"priceCertification\":\"{price} (Certification)\",\"plusXMore\":\"+ {count} more\",\"privacyPolicy\":\"Privacy Policy\",\"message\":\"message\",\"viewMoreFaqs\":\"View More FAQs\",\"relatedEvents\":\"Related events\",\"viewAllEvents\":\"View all events\",\"virtual\":\"Virtual\",\"authoredBy\":\"Authored by\",\"register\":\"Register\",\"webinar\":\"Webinar\",\"majorUpdates\":\"Major Updates\",\"search\":\"Search\",\"live\":\"Live\",\"date\":{\"startsAt\":\"Starts {startDatePart} at {startTimePart} {tz}\",\"to\":\"{dateString}: {startTime} to {endTime} {tz}\"},\"splitContentTags\":{\"Major Updates\":\"Major Updates\",\"Updated\":\"Updated\",\"Beta\":\"Beta\",\"Free\":\"Free\",\"New\":\"New\",\"Special Offer\":\"Special Offer\",\"Featured\":\"Featured\",\"Part One\":\"Part One\",\"Part Two\":\"Part Two\"}},\"video\":{\"play\":\"Play video\",\"youtube\":{\"error\":\"Unable to load the video due to an issue with YouTube\"},\"modal\":{\"playButtonLabel\":\"Play video in modal\",\"title\":\"Video modal: watch the video\"}},\"cards\":{\"courseCard\":{\"buttonPrimaryLabel\":\"Register\",\"buttonSecondaryLabel\":\"View course details\",\"enrollInPerson\":\"Enroll In-Person\",\"enrollVirtual\":\"Enroll Virtual\",\"logInLabel\":\"Log in to register:\",\"quickViewLabel\":\"Quick view\",\"soldOut\":\"Sold out\",\"waitingList\":\"Join waiting list\",\"AIFocused\":\"AI-FOCUSED\",\"AISkills\":\"AI SKILLS\"},\"webinarCard\":{\"ctaLabel\":\"View details\",\"cardType\":\"Webinar\",\"live\":\"Live\",\"type\":{\"technical-presentation\":\"Technical Presentation\",\"workshop\":\"Workshop\",\"solutions-forum\":\"Solutions Forum\",\"industry-research-presentation\":\"Industry Research Presentation\",\"panel-discussion\":\"Panel Discussion\",\"leadership-insights\":\"Leadership Insights\"}},\"eventCard\":{\"buttonPrimaryLabel\":\"Register\",\"buttonSecondaryLabel\":\"View event details\"},\"downloadCard\":{\"downloadExample\":\"Download example\",\"readAll\":\"Read Whitepaper\",\"readMore\":\"Read more about {title}\"},\"insightCard\":{\"authoredBy\":\"Authored by\",\"writtenBy\":\"Written By\",\"createdBy\":\"Created By\",\"features\":\"Features\",\"presentedBy\":\"Presented by\",\"typePodcast\":{\"typeTitle\":\"Podcast\",\"authorsLabel\":\"Features\",\"defaultImageAlt\":\"Podcast placeholder image\"},\"typePosterAndCheatSheet\":{\"typeTitle\":\"Poster and cheat sheet\",\"defaultImageAlt\":\"Poster and cheat sheet placeholder image\"},\"typeSummitPresentation\":{\"typeTitle\":\"Summit presentation\",\"defaultImageAlt\":\"Summit presentation placeholder image\"},\"typeWebinar\":{\"typeTitle\":\"Webinar\",\"defaultImageAlt\":\"Webinar placeholder image\",\"presented\":\"Presented:\",\"upcoming\":\"Upcoming:\"},\"typeWhitepaper\":{\"typeTitle\":\"Whitepaper\",\"defaultImageAlt\":\"Whitepaper placeholder image\"},\"typeBlog\":{\"typeTitle\":\"Blog\",\"defaultImageAlt\":\"Blog placeholder image\"},\"typeCourseSingle\":{\"typeTitle\":\"Course\",\"defaultImageAlt\":\"Course placeholder image\"},\"typeEventSingle\":{\"typeTitle\":\"Event\",\"defaultImageAlt\":\"Event placeholder image\"},\"typeCaseStudy\":{\"typeTitle\":\"Case Study\",\"defaultImageAlt\":\"Case study placeholder image\"},\"typeOpenSourceTools\":{\"typeTitle\":\"Open Source Tools\",\"defaultImageAlt\":\"Open Source Tools placeholder image\"},\"typePolicy\":{\"typeTitle\":\"Policy\",\"defaultImageAlt\":\"Policy placeholder image\"}},\"personCard\":{\"ctaLabel\":\"Learn more\",\"readMoreAbout\":\"Read more about {name}\"},\"learningPathsCard\":{\"ctaLabel\":\"Learn more\"},\"podcastCard\":{\"ctaLabel\":\"Listen now\",\"resourceType\":\"Podcast\",\"season\":\"Season {season}\"},\"scheduleCard\":{\"facilitatedBy\":\"Facilitated by\",\"moderatedBy\":\"Moderated by\",\"openToNonCourseLearners\":\"Open to non-course learners\",\"panelList\":\"Panelists\",\"presentedBy\":\"Presented by\",\"virtual\":\"Virtual\"},\"skillsCard\":{\"relatedRoleTitle\":\"Similar roles\",\"ctaLabel\":\"Explore learning path\"},\"whitepaperSplitContent\":{\"readMore\":\"Read more\",\"relatedWebinar\":\"Related Webcast\"}},\"form\":{\"downloadLabel\":\"Download\",\"requiredLabel\":\"Required\",\"sponsorsIntro\":\"The webinar is offered fre of charge through collaboration between SANS and its sponsor(s). If you prefer not to share your registration details with sponsor(s), a recorded webinar will be available approximately 30 days after its initial release through SANS archive. To access the recording, you will need to create a SANS account, but your information will not be shared with sponsors(s).\",\"sponsorsConsent\":\"I consent to sharing my information with SANS and the sponsor(s) listed below for this webinar. Registration information includes your name, title, organization, state, country, phone number and email address. Each organization will use your registration details in accordance with their respective privacy policies. You can review SANS's privacy policy bellow and the sponsors's privacy policies on their websites which are accessible by clicking on their logos below. By proceeding with registration you acknowledge and agree to these terms\",\"serverError\":\"Unable to process your request. Please try again later.\",\"successMessage\":\"Form submitted successfully\",\"submitNotice\":\"By providing this information, you agree to the processing of your personal data by SANS as described in our \u003clink\u003ePrivacy Policy\u003c/link\u003e.\",\"gdprNotice\":\"Please send me opportunities to become certified, learn new cyber skills, and find team training options.\",\"errors\":{\"required\":\"Field is required\",\"minLength\":\"Input is too short (minimium of 2 characters)\",\"maxLength\":\"Input is too long (maximum of 2000 characters)\",\"email\":\"Invalid email address\",\"phoneNumber\":\"Invalid phone number\"},\"webinar\":{\"registrationSuccess\":\"Thank you for registering!\"},\"labels\":{\"yes\":\"Yes\",\"no\":\"No\"},\"errorGeneric\":\"Unable to process your form request. Please try again later.\",\"standardFields\":{\"firstName\":{\"label\":\"First Name\"},\"lastName\":{\"label\":\"Last Name\"},\"email\":{\"label\":\"Your Email\"},\"jobTitle\":{\"label\":\"Job Title\"},\"organization\":{\"label\":\"Organization\"},\"country\":{\"label\":\"Country\",\"placeholder\":\"Select country\"},\"industry\":{\"label\":\"Industry\",\"placeholder\":\"Select industry\"},\"state\":{\"label\":\"US State\",\"placeholder\":\"Select state\"},\"phoneNumber\":{\"label\":\"Phone number\",\"date\":\"Please enter a valid date\"}},\"submit\":\"Submit\"},\"courses\":{\"jobRolesTitle\":\"Relevant Job Roles\",\"related\":{\"title\":\"Related Courses\",\"description\":\"Short description of the section to provide users context and value of the content being featured in this carousel.\",\"viewAll\":\"View all courses\",\"cta\":\"/cyber-security-courses\"},\"lister\":{\"heroTitle\":\"Search courses\"},\"filters\":{\"focusArea\":\"Focus Area\",\"status\":\"Status\",\"filterCourses\":\"Filter courses\"},\"scheduleTable\":{\"instructedBy\":\"Instructed by\",\"enrollCtaLabel\":\"Start enrolling\",\"filterLabels\":{\"date\":\"Date\",\"allDates\":\"All dates\",\"next30days\":\"Next 30 days\",\"next60days\":\"Next 60 days\",\"next6months\":\"Next 6 months\",\"next12months\":\"Next 12 months\",\"location\":\"Location\",\"trainingFormat\":\"Format\",\"focusArea\":\"Focus Area\",\"status\":\"Status\"},\"tooltips\":{\"price\":\"Course price tooltip\"},\"labels\":{\"courseScheduleList\":\"Schedule {timezone}\",\"dateAndTime\":\"Date \u0026 Time\",\"enrollmentOptions\":\"Registration Options\",\"enrollmentOptionsCtaMobile\":\"Registration Options\",\"fetchingSchedule\":\"Fetching schedule..\",\"loadMore\":\"Load more\",\"showAll\":\"Show all\",\"locationAndInstructor\":\"Location \u0026 instructor\",\"price\":\"Course price\",\"InPerson\":\"In-Person\",\"SelfPaced\":\"Self-Paced\",\"Virtual\":\"Virtual\",\"viewEventDetails\":\"View event details\",\"soldout\":\"Sold Out {modality}\",\"registrationClosed\":\"Registration Closed\",\"waitlist\":\"Join {modality} Waitlist\",\"onDemandPrice\":\"OnDemand Bundle +{price}\",\"certificationPrice\":\"Certification +{price}\",\"contactUs\":\"\u003clink\u003eContact us\u003c/link\u003e for group pricing options\"},\"modality\":{\"dateAndTime\":{\"onDemand\":{\"subtitle\":\"Self-Paced, 4 months access\",\"4MonthsAccess\":\"4 months access\",\"title\":\"OnDemand (Anytime)\"},\"selfPaced\":{\"title\":\"Anytime\"}},\"Ondemand\":\"Virtual (OnDemand)\",\"virtual\":\"Virtual (live)\",\"selfPaced\":\"Virtual (Self-paced)\"},\"title\":\"Course schedule \u0026 pricing\"},\"syllabus\":{\"textBlock\":{\"columnTitles\":{\"labs\":\"Labs\",\"topics\":\"Topics covered\"}},\"splitFixScroll\":{\"ctaLetterLabel\":\"Download the letter\",\"ctaSyllabusLabel\":\"Download full syllabus\"}}},\"events\":{\"types\":{\"Summit\":\"Summit\",\"TrainingEvent\":\"Training Event\"},\"register\":{\"free\":\"Free\"},\"filters\":{\"trackName\":\"Track Name\",\"trackType\":\"Track Type\",\"eventFormat\":\"Event Type\"},\"options\":{\"InPerson\":\"In-Person\",\"InPerson\u0026Virtual\":\"In-Person \u0026 Virtual\",\"Keynote\":\"Keynote\",\"NetWars\":\"NetWars\",\"Reception\":\"Reception\",\"Virtual\":\"Virtual\",\"Social\":\"Social\",\"Community\":\"Community\",\"Workshop\":\"Workshop\",\"Talk\":\"Talk\"}},\"faq\":{\"resetSearch\":\"Reset search\",\"noResults\":\"We couldn’t find a match for \\\"{term}\\\". Try searching again using different search terms\",\"placeholderText\":\"Search keywords or questions\"},\"lister\":{\"filters\":{\"labels\":{\"whitepapers\":\"Filter Whitepapers\",\"filterBlogs\":\"Filter blogs\",\"generic\":\"Filter\",\"event_single\":\"Filter events\",\"archived\":\"Archived\",\"upcoming\":\"Upcoming\"},\"applyButton\":\"Apply filters\",\"backToFilters\":\"Back to filters\",\"buttonLabel\":\"Filter\",\"filterBy\":\"Filter by:\",\"filterDrawerTitle\":\"Filter by:\",\"filterCoursesDrawerTitle\":\"Filter courses\",\"reset\":\"Clear all filters\"},\"noResults\":{\"listerNothingFound\":\"No results found\",\"description\":\"Please try a different combination of filters and search again.\",\"title\":\"We couldn't find a match for your selection\"},\"quickFilters\":{\"title\":\"Recommended:\"},\"showing\":{\"of\":\"of\",\"prefix\":\"Showing\"},\"date\":{\"from\":\"From\",\"until\":\"Until\",\"today\":\"Today\"},\"sort\":{\"labels\":{\"relevance\":\"Relevance\",\"newestFirst\":\"Newest first\",\"oldestFirst\":\"Oldest first\",\"recency\":\"Recency\",\"role\":\"Role\",\"alphabeticalAZ\":\"Alphabetical A-Z\",\"alphabeticalZA\":\"Alphabetical Z-A\"},\"drawerTitle\":\"Sort and view by:\",\"mobileButtonLabel\":\"Sort and view\",\"show\":\"Show:\",\"sortBy\":\"Sort by:\",\"reset\":\"Reset\",\"submit\":\"Apply sorting\"},\"view\":{\"label\":\"View:\",\"grid\":\"Grid\",\"list\":\"List\"}},\"pagination\":{\"goTo\":\"Go to page {page}\",\"next\":\"Next\",\"previous\":\"Previous\"},\"heros\":{\"course\":{\"secondaryCta\":\"Course Preview\",\"primaryCta\":\"Register Now\",\"createdBy\":\"Course authored by:\"},\"download\":{\"c2MatrixEdition\":\"C2 Matrix Edition:\",\"communityEdition\":\"Community Edition:\",\"createdBy\":\"Created by:\",\"ctaLogIn\":\"Login to download\",\"ctaC2MatrixEdition\":\"Download C2 Matrix Edition\",\"ctaCommunityEdition\":\"Download Community Edition\",\"ctaGeneric\":\"Download\",\"lastUpdate\":\"Last updated\"},\"summitPresentation\":{\"downloadFile\":\"Download File\",\"presentedBy\":\"Presented by:\"},\"privacy\":{\"ctaDownloadFile\":\"Download PDF\",\"ctaDownloadDocument\":\"Download DOCX\",\"downloadFileLabel\":\"Download File:\",\"downloadDocumentLabel\":\"Download Document:\"},\"posters\":{\"downloadFile\":\"Download File\",\"publishedDate\":\"Published\"},\"whitepaper\":{\"downloadFile\":\"Download File\",\"sponsorsIntro\":\"This content is provided free of charge through collaboration between SANS and its sponsor(s). If you prefer not to share your contact details with the sponsor(s), you have the option of waiting approximately 30 days after the original publication date.  After 30 days, to download the content, you will be required to create a SANS account, but your information will not be shared with the sponsor(s).\",\"sponsorsConsent\":\" I consent to sharing my information with SANS and the sponsor(s) listed below for this paper. This information includes your name, title, organization, state, country, phone number and email address. Each organization will use your details in accordance with their respective privacy policies. You can review the SANS privacy policy below and the sponsors' privacy policies on their websites which are accessible by clicking on their logos below. By proceeding, you acknowledge and agree to these terms and the processing of your personal data by SANS as described in our Privacy Policy.\"},\"instructor\":{\"connectWith\":\"Connect with {name}\",\"specialities\":\"Specialities\",\"titleWithCompany\":\"{title} at {company}\"},\"podcast\":{\"features\":\"Features\",\"participants\":\"Participants\",\"published\":\"Published\",\"categories\":{\"cyberLeaders\":\"Cyber leaders\",\"waitJustAnInfoSec\":\"Wait just an Infosec\",\"cloudAce\":\"Cloud ace\",\"blueprint\":\"Blueprint\",\"trustMeIMCertified\":\"Trust me, I’m certified\",\"ouch_\":\"Ouch!\"}},\"webinar\":{\"login\":\"Login to register\",\"unavailable\":\"This webinar is currently unavailable. Please check back latter.\",\"join\":\"Join\",\"watch\":\"Watch\",\"testZoomConnection\":\"Registration Complete - Test Connection\",\"downloadPresentation\":\"Download Presentation\",\"addToCalendar\":\"Add to Calendar\",\"calendars\":{\"google\":\"Google\",\"outlook\":\"Outlook\",\"ical\":\"Ical\",\"yahoo\":\"Yahoo\"},\"type\":{\"technical-presentation\":\"Technical Presentation\",\"workshop\":\"Workshop\",\"solutions-forum\":\"Solutions Forum\",\"industry-research-presentation\":\"Industry Research Presentation\",\"panel-discussion\":\"Panel Discussion\",\"leadership-insights\":\"Leadership Insights\"}}},\"filterAndSort\":{\"mobileSortDrawerCtaLabel\":\"Sort and view\",\"mobileFilterDrawerCtaLabel\":\"Filter results\",\"sort\":{\"label\":\"Sort by:\",\"options\":{\"relevance\":\"Relevance\",\"recency\":\"Recency\"}},\"reset\":\"Clear all\",\"hitsPerPage\":{\"label\":\"Show:\"},\"filter\":{\"label\":\"Filter results\"}},\"navigation\":{\"breadcrumbs\":{\"label\":\"Breadcrumbs\",\"previousLevel\":\"Previous level\"},\"search\":{\"resultPage\":{\"title\":\"Search results\",\"nothingFoundForQuery\":\"No results found for “\u003cmark\u003e{query}\u003c/mark\u003e”, try again with a different search term.\"},\"results\":{\"heading\":\"Search results\"},\"globalSearch\":{\"suggested\":\"Suggested Searches\",\"quickLinks\":\"Suggested Links\",\"placeholder\":\"What are you looking for?\",\"resetSearch\":\"Clear all filters\",\"noFiltersAvailable\":\"No filters available\",\"noResultsFoundFor\":\"No results found for \\\"{query}\\\", try again with a different search term.\"},\"sortingTooltip\":\"Showing results for both Relevance and Recency: Newest to Oldest. Sort by Recency: Newest to Oldest only.\",\"error\":\"An error occurred while fetching search results, please try again later.\",\"closeSearchPanel\":\"Close search panel\",\"noResults\":\"No results found\",\"placeholderText\":\"Type to search..\",\"popularSearches\":\"Popular searches\",\"resetSearch\":\"Reset search\",\"searching\":\"searching..\",\"suggestedSearches\":\"Suggested Searches\",\"labels\":{\"course_landing_page\":\"Course\",\"course_listing_page\":\"Courses\",\"course_single_page\":\"Course\",\"default_page\":\"Page\",\"event_single\":\"Event\",\"focus_area_page\":\"Focus Area\",\"framework_single_page\":\"Framework\",\"homepage\":\"Homepage\",\"job_role_page\":\"Job Role\",\"learning_path_page\":\"Learning Path\",\"organization_landing_page\":\"Organization\",\"person\":\"Person\",\"job_roles_listing_page\":\"Job Roles\",\"podcast_single_page\":\"Podcast\",\"policy_single_page\":\"Policy\",\"poster_and_cheat_sheet_single\":\"Poster \u0026 Cheat Sheet\",\"resource_landing_page\":\"Resource\",\"summit_presentation_single\":\"Summit Presentation\",\"webinar_single\":\"Webinar\",\"white_paper_single\":\"Whitepaper\",\"webcast_single\":\"Webinar\",\"open_source_tools_single\":\"Open Source Tool\",\"open_source_tools_listing_page\":\"Open Source Tools\",\"blog_single_page\":\"Blog\",\"newsletter_ouch\":\"Newsletter OUCH\",\"newsletter_ouch_listing_page\":\"Newsletter OUCH\",\"newsletter_risk\":\"Newsletter RISK\",\"newsletter_risk_listing_page\":\"Newsletter RISK\",\"newsletter_newsbites\":\"Newsletter NewsBites\",\"newsletter_newsbites_listing_page\":\"Newsletter NewsBites\",\"podcast_listing_page\":\"Podcasts\",\"blog_listing_page\":\"Blogs\",\"webinar_listing_page\":\"Webinars\",\"posters_listing_page\":\"Posters \u0026 Cheat Sheets\",\"instructor_listing_page\":\"Instructors\",\"summit_presentation_listing_page\":\"Summit Presentations\",\"policy_listing_page\":\"Policies\",\"event_listing_page\":\"Events\",\"white_paper_listing_page\":\"Whitepapers\"}},\"header\":{\"mainNavigation\":\"Main tab navigation\",\"back\":\"Back\",\"tabpanelNavigation\":\"navigation for: \",\"viewAll\":\"View all\",\"close\":\"Close\",\"logo\":\"Go to homepage\",\"menu\":\"Menu\",\"search\":\"Search\",\"openSearch\":\"Open search\",\"closeSearch\":\"Close search\"},\"footer\":{\"legalNavigation\":\"Legal navigation\",\"logoNavigation\":\"Go to homepage\",\"socialNavigation\":\"Social Navigation\"},\"topbar\":{\"aria\":{\"dropdownNavigation\":\"Topbar dropdown navigation\",\"navigation\":\"Topbar navigation\"}},\"skipLinks\":{\"skipToMainContent\":\"Skip to main content\",\"skipToSearch\":\"Go to search\",\"skipToFooter\":\"Go to footer\"}},\"platformLinksAndDescription\":{\"apple\":\"Apple Podcasts\",\"listenOn\":\"Listen on\",\"readTranscript\":\"Read transcript\",\"spotify\":\"Spotify\",\"youtube\":\"YouTube\"},\"scheduleBlock\":{\"courses\":\"Courses\",\"coursesContactDescription\":\"Looking for group pricing?\",\"coursesContactLink\":\"Contact us!\",\"title\":\"Schedule\",\"register\":\"Register\",\"tabMobileLabel\":\"Select day:\",\"noResults\":{\"description\":\"Please try a different combination of filters and search again.\",\"title\":\"We couldn't find a match for your selection\"}},\"registrationOptions\":{\"includes\":\"Includes\",\"inPerson\":\"In person\",\"login\":\"Login to register\",\"online\":\"Live online\",\"priceFrom\":\"from\",\"register\":\"Register\",\"selectCourse\":\"Select course to Enroll\",\"soldOut\":\"Sold out\"},\"socials\":{\"share\":{\"facebook\":\"Share on facebook\",\"label\":\"Share\",\"link\":\"Copy link\",\"linkedin\":\"Share on linkedin\",\"x\":\"Share on X\"}},\"splitStandardTextBlock\":{\"aboutLabel\":\"About\",\"secondaryHeading\":\"Press \u0026 Media\"},\"stickyAnchorLinks\":{\"select\":\"Please select\",\"register\":\"Register\",\"jumpLabel\":\"Jump to:\",\"componentLabels\":{\"accordionSection\":\"FAQs\",\"contactCreditCard\":\"Credit Card Payment Support\",\"contactGenericContentBlock\":\"General Inquiries\",\"contactNavigationCards\":\"Helpful Resources\",\"contactPressAndMedia\":\"Press \u0026 Media Inquiries\",\"eventSingleCourses\":\"Quick Course Lister\",\"courseScheduleTable\":\"Schedule \u0026 Pricing\",\"courseSyllabus\":\"Syllabus\",\"courseSyllabusFaqs\":\"FAQs\",\"eventCarousel\":\"Upcoming Events\",\"profileWebinars\":\"Webcasts\",\"eventSplitContent\":\"Location\",\"featuredCardSection\":\"Event Highlights\",\"featuredCoursesWide\":\"Courses\",\"featuredFreeResources\":\"Resources\",\"focusAreaCourseCardCarousel\":\"Related Courses\",\"insightCardHolder\":\"Featured Content\",\"instructorsGrid\":\"Instructors\",\"jobRoleSkillCards\":\"Similar Roles\",\"profileSplitStandardTextBlock\":\"Profile\",\"promotionalContentBanner\":\"Promotional Content Banner\",\"readMoreSection\":\"Overview\",\"registerBlock\":\"Courses\",\"registerBlockCourses\":\"Courses2\",\"relatedCoursesCarousel\":\"Courses\",\"relatedEventsCarousel\":\"Upcoming Events\",\"scheduleBlock\":\"Schedule\",\"speakersGrid\":\"Speakers\",\"sponsors\":\"Sponsors\",\"studentReviews\":\"Student Reviews\",\"contactForm\":\"Connect with a Training Advisor\"}},\"price\":\"Excl. Tax\",\"newsletter\":{\"types\":{\"newsbites\":\"Newsbites\",\"ouch\":\"OUCH\",\"@risk\":\"@RISK\"},\"title\":\"Subscribe to SANS Newsletters\",\"newsletterSelectionError\":\"At least one newsletter must be selected\",\"email\":\"Your Email\",\"subscribedTo\":\"You subscribed to\",\"subscribedSuccess\":\"Thank you for subscribing to the SANS Newsletters!\",\"location\":\"Location\",\"selectCountry\":\"Select your country\",\"selectNewsletters\":\"Select newsletters\",\"serverError\":\"Unable to process your newsletter subscription. Please try again later.\"},\"newsletters\":{\"ouch\":{\"editorial\":{\"translatorHeader\":\"OUCH! Translators\"},\"download_translations\":\"Download Translations\",\"downloadLanguageButton\":\"Download as PDF\",\"downloadLanguageButtonAria\":\"Download as PDF in {language}\",\"downloadNewsletter\":\"Download newsletter\",\"newsletterLanguage\":\"Newsletter language\",\"selectLanguage\":\"Select a language\",\"content\":\"Guest Editor\",\"learn_more\":\"Learn More\",\"read_more\":\"Read More\",\"downloadTranslations\":\"Download translations\"},\"newsletter\":\"Newsletter\",\"sponsors\":\"Sponsors\",\"issue\":\"ISSUE {issue}\",\"volume\":\"VOLUME {volume}\",\"sponsors_description\":\"Short description of the section to provide users context and value of the content being featured in this carousel.\",\"read_more_newsletter\":\"Read more newsletters\",\"risk\":{\"internet_storm_center_spotlight\":\"Internet Storm Center Spotlight\",\"recent_security_issues\":\"Internet Storm Center Entries\",\"security_news\":\"Recent CVEs\",\"sponsors\":\"Sponsors\",\"read_more\":\"Read More\"},\"newsbites\":{\"top_of_the_news\":\"Top of the News\",\"rest_of_the_news\":\"The Rest of the Week's News\",\"view_older_issues\":\"View Older Issues\",\"view_older_issues_content\":\"Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.\",\"read_more_newsletter\":\"Browse Archive\",\"editorsNotes\":\"Editor's Notes\",\"internet_storm_center_tech_corner\":\"Internet Storm Center Tech Corner\",\"readMoreIn\":\"Read more in\",\"sponsors\":\"Sponsors\",\"read_more\":\"Read More\"}},\"languages\":{\"english\":\"English\",\"arabic\":\"Arabic\",\"bahasa\":\"Bahasa\",\"bosnian\":\"Bosnian\",\"bulgarian\":\"Bulgarian\",\"chineseSimplified\":\"Chinese Simplified\",\"chineseTraditionalTaiwanese\":\"Chinese Traditional Taiwanese\",\"danish\":\"Danish\",\"dutch\":\"Dutch\",\"farsi\":\"Farsi\",\"finnish\":\"Finnish\",\"frenchCanadian\":\"French Canadian\",\"french\":\"French\",\"georgian\":\"Georgian\",\"german\":\"German\",\"hebrew\":\"Hebrew\",\"hindi\":\"Hindi\",\"hungarian\":\"Hungarian\",\"indonesian\":\"Indonesian\",\"italian\":\"Italian\",\"japanese\":\"Japanese\",\"korean\":\"Korean\",\"latvian\":\"Latvian\",\"lithuanian\":\"Lithuanian\",\"malaysian\":\"Malaysian\",\"norwegian\":\"Norwegian\",\"persian\":\"Persian\",\"polish\":\"Polish\",\"portuguese\":\"Portuguese\",\"romanian\":\"Romanian\",\"russian\":\"Russian\",\"serbian\":\"Serbian\",\"spanish\":\"Spanish\",\"swedish\":\"Swedish\",\"turkish\":\"Turkish\",\"urdu\":\"Urdu\"},\"contactForm\":{\"title\":\"Connect with a Training Advisor\",\"paragraph\":\"Speak with one of our representatives to learn how SANS can support you and your organization's cybersecurity training needs.\",\"interestedIn\":\"What are you interested in?\",\"selectInterestedIn\":\"Select a service\",\"interestedDetails\":\"Anything specific?\",\"selectInterestedDetails\":\"Select a specific service\",\"interestedInSelectionError\":\"Please select an interest\",\"interests\":{\"individualTraining\":\"Individual Training\",\"teamDevelopment\":\"Team Development\",\"workforceSecurityCompliance\":\"Workforce Security \u0026 Compliance\",\"sponsorshipsPartnerships\":\"Sponsorships \u0026 Partnerships\"},\"interestDetails\":{\"coursesAndCertifications\":\"Courses \u0026 Certifications\",\"handsOnSimulations\":\"Hands-On Simulations\",\"learningPaths\":\"Learning Paths\",\"groupPurchasing\":\"Group Purchasing\",\"skillsAssessments\":\"Skills Assessments\",\"privateAndCustomTraining\":\"Private \u0026 Custom Training\",\"securityAwarenessTraining\":\"Security Awareness Training\",\"complianceTraining\":\"Compliance Training\",\"riskManagement\":\"Risk Management\",\"services\":\"Services\",\"sponsorResearch\":\"Sponsor Research\",\"sponsorAnEvent\":\"Sponsor an Event\",\"partnerWithSans\":\"Partner with SANS\"},\"firstName\":\"First Name\",\"lastName\":\"Last Name\",\"email\":\"Email\",\"phoneNumber\":\"Phone number\",\"organizationName\":\"Organization Name\",\"jobTitle\":\"Job Title\",\"industry\":\"Industry\",\"selectIndustry\":\"Select industry\",\"country\":\"Country\",\"selectCountry\":\"Select your country\",\"state\":\"State\",\"selectState\":\"Select your state\",\"selectStateError\":\"Please select your state\",\"message\":\"Message\",\"successMessage\":\"Thank you for contacting SANS! One of our team members will be reaching out shortly to discuss in further detail.\",\"errorGeneric\":\"Unable to process your contact request. Please try again later.\",\"submitNotice\":\"By providing this information, you agree to the processing of your personal data by SANS as described in our \u003clink\u003ePrivacy Policy\u003c/link\u003e.\",\"serverError\":\"Unable to process your contact form. Please try again later.\"},\"error\":{\"notFoundPage\":{\"ctaLabel\":\"Back to homepage\",\"title\":\"Looks like you`re trying to access a page or resource that has gone undercover\"},\"courseSinglePage\":{\"missingUsps\":\"We're updating our course schedule - please check back later.\"}},\"urls\":{\"login\":\"/account/login\",\"events\":\"/cyber-security-training-events\"},\"resourceCards\":{\"title\":{\"newsletter\":\"Newsletter\",\"blog_single_page\":\"Blog\",\"podcast_single_page\":\"Podcast\",\"open_source_tools_single\":\"Open Source Tools\",\"white_paper_single\":\"Whitepaper\",\"poster_and_cheat_sheet_single\":\"Poster \u0026 Cheat Sheets\",\"summit_presentation_single\":\"Summit Presentation\",\"policy_single_page\":\"Policy template\",\"webinar_single\":\"Webinar\"},\"icon\":{\"label\":{\"season\":\"Season {season}\",\"newsletterIssue\":\"Issue #{number}\",\"newsletterVolume\":\"Volume #{number}\"}}},\"notice\":{\"discountDeadlineLabel\":\"Hotel Group Discount Deadline\",\"refundDeadlineLabel\":\"Refund Deadline\",\"title\":\"Important Dates\",\"earlyBirdTitle\":\"Early Bird Offer\",\"earlyBirdDescription\":\"Save {discount} {currencyType} using the code \\\"{couponCode}\\\" and pay for any 4-6 day course (excluding Beta Courses and 300 Level Courses) by {validUntilDate}.\"}},\"children\":\"$L18\"}]\n"])</script><script>self.__next_f.push([1,"18:[\"$\",\"$L19\",null,{\"defaultTheme\":\"system\",\"enableColorScheme\":false,\"children\":[[\"$\",\"$L1a\",null,{}],[\"$\",\"$L1b\",null,{}],\"$L1c\",[\"$\",\"main\",null,{\"id\":\"main\",\"children\":[\"$\",\"$L3\",null,{\"parallelRouterKey\":\"children\",\"error\":\"$1d\",\"errorStyles\":[],\"errorScripts\":[],\"template\":[\"$\",\"$L4\",null,{}],\"templateStyles\":\"$undefined\",\"templateScripts\":\"$undefined\",\"notFound\":[\"$L1e\",[]],\"forbidden\":\"$undefined\",\"unauthorized\":\"$undefined\"}]}],\"$L1f\"]}]\n"])</script><script>self.__next_f.push([1,"1e:[\"$\",\"div\",null,{\"className\":\"c-not-found-section\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-grid not-found-section__hero grid--has-container grid--columns-12\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-start-1 grid__item--col-start-tablet-2 grid__item--col-start-desktop-4 grid__item--col-end-13 grid__item--col-end-tablet-12 grid__item--col-end-desktop-10 not-found-section__details\",\"children\":[[\"$\",\"h1\",null,{\"className\":\"c-heading heading--is-h3 heading--is-h3-desktop not-found-section__title\",\"children\":\"Looks like the page you're looking for doesn't exist or has moved.\"}],[\"$\",\"$L20\",null,{\"asElement\":\"$21\",\"href\":\"/\",\"icon\":\"arrow-right-heavy\",\"variant\":\"primary\",\"children\":\"Redirect to homepage\"}],false]}],[\"$\",\"span\",null,{\"className\":\"not-found-section__code\",\"children\":\"404\"}]]}],false]}]\n"])</script><script>self.__next_f.push([1,"1f:[\"$\",\"footer\",null,{\"className\":\"c-footer\",\"id\":\"footer\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-container\",\"children\":[\"$L22\",[\"$\",\"$L23\",null,{\"navigation\":[{\"items\":[{\"href\":\"/about\",\"isExternalLink\":false,\"label\":\"About\",\"target\":\"$undefined\"},{\"href\":\"/instructors\",\"isExternalLink\":false,\"label\":\"Instructors\",\"target\":\"$undefined\"},{\"href\":\"/mlp/careers\",\"isExternalLink\":false,\"label\":\"Careers\",\"target\":\"$undefined\"},{\"href\":\"/press\",\"isExternalLink\":false,\"label\":\"Press\",\"target\":\"$undefined\"}],\"label\":\"Company\"},{\"items\":[{\"href\":\"/about/contact\",\"isExternalLink\":false,\"label\":\"Contact\",\"target\":\"_self\"},{\"href\":\"/frequently-asked-questions\",\"isExternalLink\":false,\"label\":\"FAQs\",\"target\":\"_self\"},{\"href\":\"https://partnerportal.sans.org/?_gl=1*leto7p*_gcl_aw*R0NMLjE3NDQ3OTUxNjYuQ2owS0NRandxdjJfQmhDMEFSSXNBRmI1QWM4TW5jZzYyX2tYRWxBNTJTV2c5TmZHRlF5RTNGaG96X09rM2laRXJ2RDd0NHR0UXdsLVBBVWFBdXN6RUFMd193Y0I.*_ga*MTEwOTM1MTUzLjE3MzYxODIwNzQ.*_ga_18EC69JQ0P*MTc0NTU5MTYxOC4yNzAuMS4xNzQ1NTk3MDgyLjQzLjAuMA..\",\"isExternalLink\":true,\"label\":\"Partner Portal\",\"target\":\"_self\"},{\"href\":\"/legal\",\"isExternalLink\":false,\"label\":\"Legal\",\"target\":\"_self\"}],\"label\":\"Help \u0026 Support\"},{\"items\":[{\"href\":\"/work-study-program\",\"isExternalLink\":false,\"label\":\"Work Study Program\",\"target\":\"$undefined\"},{\"href\":\"/mlp/cyber-academies\",\"isExternalLink\":false,\"label\":\"Academies \u0026 Programs\",\"target\":\"$undefined\"},{\"href\":\"/partnerships\",\"isExternalLink\":false,\"label\":\"Workforce Development Partnerships\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/public-sector/state-local-le-program\",\"isExternalLink\":false,\"label\":\"Law Enforcement\",\"target\":\"$undefined\"},{\"href\":\"/mlp/skillsfuture-singapore\",\"isExternalLink\":false,\"label\":\"SkillsFuture Singapore\",\"target\":\"$undefined\"},{\"href\":\"https://www.sans.edu/\",\"isExternalLink\":true,\"label\":\"Degree Programs\",\"target\":\"$undefined\"}],\"label\":\"Training Programs\"},{\"items\":[{\"href\":\"/member-benefits\",\"isExternalLink\":false,\"label\":\"Become a SANS Member\",\"target\":\"$undefined\"},{\"href\":\"/teach\",\"isExternalLink\":false,\"label\":\"Become an Instructor\",\"target\":\"$undefined\"},{\"href\":\"/sponsorship\",\"isExternalLink\":false,\"label\":\"Become a Sponsor\",\"target\":\"$undefined\"},{\"href\":\"/cyber-security-summit/speak-at-a-summit\",\"isExternalLink\":false,\"label\":\"Speak at a Summit\",\"target\":\"$undefined\"},{\"href\":\"/about/awards\",\"isExternalLink\":false,\"label\":\"Award Programs\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/cyber-leaders-network\",\"isExternalLink\":false,\"label\":\"Join the Cyber Leaders Network\",\"target\":\"$undefined\"}],\"label\":\"Get Involved\"}],\"title\":\"The Highest Standard in Cybersecurity Education Since 1989\"}],\"$L24\"]}]}]\n"])</script><script>self.__next_f.push([1,"25:T5f7,"])</script><script>self.__next_f.push([1,"M7.53 13.095C4.945 9.15 2.576 6.678 2.576 3.947c0-1.994 1.008-3.22 2.588-3.22 2.323 0 4.252 3.514 4.778 9.744h.734V.433H9.94l-.965 1.91C7.926.91 6.521 0 5.163 0 2.488.001.339 2.624.339 7.263c0 4.9 2.149 8.205 4.691 12.021 2.763 4.117 4.385 7.18 4.385 9.652 0 1.95-1.184 3.048-2.762 3.048-2.893 0-5.48-3.86-5.744-11.302H0v12.114h.91l1.183-2.306C3.583 32.224 4.986 33 6.828 33c3.157 0 5.394-3.124 5.394-8.196 0-4.076-1.886-7.503-4.691-11.709m51.9 19.038c-2.544 0-4.852-3.143-5.55-8.682h6.514c1.16 2.078 1.8 3.926 1.8 5.477 0 1.951-1.184 3.206-2.764 3.206m-23.353-9.72V5.898l7.23 16.514h-7.23zm-1.225 4.6c0 3.076-.014 4.572-2.208 4.572h-1.388l-1.43-8.133h5.026zm-15.504-4.6 2.744-16.062 2.656 16.062zm40.96-9.318c-2.586-3.945-4.953-6.417-4.953-9.148 0-1.994 1.007-3.22 2.585-3.22 2.325 0 4.254 3.514 4.78 9.744h.659V.433h-.66l-.964 1.91C60.703.91 59.3 0 57.94 0c-2.674 0-4.822 2.623-4.822 7.262 0 4.899 2.148 8.3 4.691 12.117.708 1.055 1.341 2.167 1.89 3.033h-5.94c-.033-.692-.056-.866-.071-1.731h-.984v1.73h-4.201V5.032c0-2.731.175-3.73 2.45-3.685V.433h-6.825v.913c2.1 0 2.976 1.258 2.976 4.119v14.352L39.308.433h-6.382V1.3h1.924v21.113h-5.238L25.773.433h-3.859L16.57 27.12c-.527 2.687-.442 4.054-3.068 4.445v.886h7.175v-.886c-1.924-.044-2.448-.565-2.448-1.952 0-.607.047-1.13.09-1.519l.793-4.643h5.875l1.316 8.134h-2.475v.866h15.926v-.886c-2.45-.174-3.676-1.562-3.676-4.813V23.45h7.736l3.784 9h.906v-9h4.201v9.345h.984l1.184-2.307C56.362 32.225 57.765 33 59.607 33 62.763 33 65 29.876 65 24.804c0-4.076-1.886-7.503-4.691-11.709z"])</script><script>self.__next_f.push([1,"24:[\"$\",\"div\",null,{\"className\":\"footer__copy\",\"children\":[[\"$\",\"$L21\",null,{\"aria-label\":\"Go to homepage\",\"className\":\"footer__copy-logo-link\",\"href\":\"/\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__copy-logo\",\"height\":\"$undefined\",\"width\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 65 33\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"$25\"}]}]}],[\"$\",\"nav\",null,{\"aria-label\":\"Social Navigation\",\"className\":\"footer__socials\",\"children\":[[\"$\",\"$L21\",\"0\",{\"aria-label\":\"LinkedIn\",\"className\":\"footer__socials-link\",\"href\":\"https://www.linkedin.com/company/sans-institute\",\"title\":\"LinkedIn\",\"target\":\"_blank\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"M26.154 4H5.846A1.846 1.846 0 0 0 4 5.846v20.308A1.846 1.846 0 0 0 5.846 28h20.308A1.846 1.846 0 0 0 28 26.154V5.846A1.846 1.846 0 0 0 26.154 4m0 22.154H5.846V5.846h20.308zm-13.846-12v7.384a.923.923 0 0 1-1.847 0v-7.384a.923.923 0 0 1 1.847 0m10.154 3.23v4.154a.923.923 0 1 1-1.847 0v-4.153a2.308 2.308 0 1 0-4.615 0v4.153a.923.923 0 0 1-1.846 0v-7.384a.923.923 0 0 1 1.822-.206 4.153 4.153 0 0 1 6.486 3.437m-9.693-6.46a1.385 1.385 0 1 1-2.77-.001 1.385 1.385 0 0 1 2.77 0\"}]}]}],[\"$\",\"$L21\",\"1\",{\"aria-label\":\"X\",\"className\":\"footer__socials-link\",\"href\":\"https://x.com/SANSInstitute\",\"title\":\"X\",\"target\":\"_blank\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"m26.838 26.45-7.82-12.29 7.716-8.489a1 1 0 0 0-1.479-1.344l-7.35 8.085-5.058-7.949A1 1 0 0 0 12.004 4H6.007a1 1 0 0 0-.843 1.537l7.82 12.288-7.716 8.495a.999.999 0 1 0 1.479 1.344l7.35-8.085 5.058 7.949a1 1 0 0 0 .844.457h5.996a1 1 0 0 0 .843-1.535m-6.291-.464L7.827 6h3.623l12.725 19.987z\"}]}]}],[\"$\",\"$L21\",\"2\",{\"aria-label\":\"YouTube\",\"className\":\"footer__socials-link\",\"href\":\"https://www.youtube.com/@SANSInstitute\",\"title\":\"YouTube\",\"target\":\"_blank\",\"children\":\"$L26\"}],\"$L27\",\"$L28\"]}],\"$L29\"]}]\n"])</script><script>self.__next_f.push([1,"26:[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"m20.555 15.168-6-4A1 1 0 0 0 13 12v8a1 1 0 0 0 1.555.832l6-4a1 1 0 0 0 0-1.665M15 18.13v-4.256L18.198 16zM29.291 8.69a3 3 0 0 0-1.811-2.05C23.195 4.985 16.375 5 16 5S8.805 4.985 4.52 6.64a3 3 0 0 0-1.811 2.05C2.385 9.938 2 12.218 2 16s.385 6.063.709 7.31a3 3 0 0 0 1.811 2.051C8.625 26.945 15.05 27 15.918 27h.165c.867 0 7.296-.055 11.397-1.639a3 3 0 0 0 1.811-2.051c.324-1.25.709-3.527.709-7.31s-.385-6.062-.709-7.31m-1.936 14.125a1 1 0 0 1-.596.686c-3.957 1.528-10.685 1.5-10.75 1.5H16c-.068 0-6.791.025-10.75-1.5a1 1 0 0 1-.596-.686C4.35 21.674 4 19.571 4 16s.35-5.674.645-6.809a1 1 0 0 1 .596-.691C9.056 7.026 15.45 7 15.973 7h.033c.068 0 6.798-.022 10.75 1.5a1 1 0 0 1 .596.686C27.65 10.326 28 12.43 28 16s-.35 5.674-.645 6.809z\"}]}]\n"])</script><script>self.__next_f.push([1,"27:[\"$\",\"$L21\",\"3\",{\"aria-label\":\"Facebook\",\"className\":\"footer__socials-link\",\"href\":\"https://www.facebook.com/sansinstitute/\",\"title\":\"Facebook\",\"target\":\"_blank\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"M16 4a12 12 0 1 0 12 12A12.013 12.013 0 0 0 16 4m.923 22.111V18.77h2.77a.923.923 0 1 0 0-1.846h-2.77v-2.77a1.846 1.846 0 0 1 1.846-1.845h1.846a.923.923 0 0 0 0-1.847H18.77a3.69 3.69 0 0 0-3.692 3.693v2.77h-2.77a.923.923 0 1 0 0 1.845h2.77v7.342a10.154 10.154 0 1 1 1.846 0\"}]}]}]\n"])</script><script>self.__next_f.push([1,"28:[\"$\",\"$L21\",\"4\",{\"aria-label\":\"Tik Tok\",\"className\":\"footer__socials-link\",\"href\":\"https://www.tiktok.com/@sansinstituteofficial\",\"title\":\"Tik Tok\",\"target\":\"_blank\",\"children\":[\"$\",\"svg\",null,{\"className\":\"footer__socials-link-icon\",\"width\":\"$undefined\",\"height\":\"$undefined\",\"xmlns\":\"http://www.w3.org/2000/svg\",\"viewBox\":\"0 0 32 32\",\"fill\":\"none\",\"ref\":\"$undefined\",\"children\":[\"$\",\"path\",null,{\"fill\":\"currentColor\",\"d\":\"M28,9c-3.3,0-6-2.7-6-6,0-.6-.4-1-1-1h-5c-.6,0-1,.4-1,1v16.5c0,1.4-1.1,2.5-2.5,2.5s-2.5-1.1-2.5-2.5c0-1,.6-1.8,1.4-2.3.3-.2.6-.5.6-.9v-5.3c0-.6-.4-1-1-1,0,0-.1,0-.2,0-4.5.8-7.8,4.9-7.8,9.5s4.3,9.5,9.5,9.5,9.5-4.3,9.5-9.5v-5c1.9,1,3.9,1.5,6,1.5.6,0,1-.4,1-1v-5c0-.6-.4-1-1-1ZM27,14c-2-.2-3.8-.9-5.4-2-.4-.3-1.1-.2-1.4.2-.1.2-.2.4-.2.6v6.8c0,4.1-3.4,7.5-7.5,7.5s-7.5-3.4-7.5-7.5,2.1-6.1,5-7.2v3.5c-2.1,1.4-2.6,4.2-1.2,6.2,1.4,2.1,4.2,2.6,6.2,1.2,1.2-.8,2-2.2,2-3.7V4h3.1c.5,3.6,3.3,6.5,6.9,6.9v3Z\"}]}]}]\n"])</script><script>self.__next_f.push([1,"29:[\"$\",\"small\",null,{\"className\":\"footer__copy-nav\",\"children\":[[\"$\",\"div\",null,{\"className\":\"footer__copyright\",\"children\":[\"$\",\"nav\",null,{\"aria-label\":\"Legal navigation\",\"className\":\"footer__copy-nav-list\",\"children\":[[\"$\",\"$L21\",\"0\",{\"className\":\"footer__copy-nav-list-link\",\"href\":\"/legal/privacy\",\"target\":\"_blank\",\"children\":\"Privacy Policy\"}],[\"$\",\"$L21\",\"1\",{\"className\":\"footer__copy-nav-list-link\",\"href\":\"/legal/terms-conditions\",\"target\":\"$undefined\",\"children\":\"Terms and Conditions\"}],[\"$\",\"$L21\",\"2\",{\"className\":\"footer__copy-nav-list-link\",\"href\":\"/legal/do-not-share-sell\",\"target\":\"_blank\",\"children\":\"Do Not Sell/Share My Personal Information\"}],[\"$\",\"$L21\",\"3\",{\"className\":\"footer__copy-nav-list-link\",\"href\":\"/legal/cookie-notice\",\"target\":\"$undefined\",\"children\":\"Cookie Notice\"}]]}]}],[\"$\",\"div\",null,{\"className\":\"footer__trademark\",\"children\":[[\"$\",\"span\",null,{\"className\":\"c-text footer__copy-nav-trademark\",\"children\":[\"© \",2026,\" \",\"The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute.\"]}],[\"$\",\"span\",null,{\"className\":\"c-text footer__copy-nav-trademark\",\"children\":[\"Our \",[\"$\",\"$L21\",null,{\"href\":\"/legal/terms-conditions\",\"children\":\"Terms and Conditions\"}],\" detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.\"]}]]}]]}]\n"])</script><script>self.__next_f.push([1,"1c:[\"$\",\"$L2a\",null,{\"children\":[false,false,[\"$\",\"$L2b\",null,{\"headerData\":{\"headerCta\":{\"href\":\"/about/contact#connect-with-a-training-advisor\",\"label\":\"Contact Sales\",\"size\":\"regular\",\"target\":\"_top\",\"variant\":\"primary\"},\"logo\":\"logo\",\"menuItems\":[{\"bottomBar\":{\"cta\":{\"href\":\"/course-preview\",\"isExternalLink\":false,\"label\":\"Learn More\",\"target\":\"$undefined\"},\"description\":\"Experience SANS training through course previews.\",\"title\":\"Get a Free Hour of SANS Training\"},\"featuredItemCard\":{\"title\":\"Featured Course\",\"courseCard\":{\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/applied-data-science-machine-learning#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/applied-data-science-machine-learning\"}},\"image\":{\"alt\":\"SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta744d1449d56747e/68cc24727ca471dde41357dd/course-cards_cyber-defense_SEC595_1514x792.png\",\"width\":1514},\"labels\":{\"code\":\"SEC595\",\"focusArea\":\"Cyber Defense, Artificial Intelligence\"},\"title\":\"SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals\"},\"cta\":{\"href\":\"/cyber-security-courses\",\"label\":\"View All Courses\",\"size\":\"$undefined\",\"target\":\"$undefined\",\"variant\":\"$undefined\"}},\"href\":\"/cyber-security-training-overview\",\"itemsSingle\":[{\"description\":\"Build cyber prowess with training from renowned experts\",\"href\":\"/cybersecurity-courses\",\"icon\":\"courses-cards-three\",\"label\":\"Courses\",\"target\":\"$undefined\"},{\"description\":\"Multiple training options to best fit your schedule and preferred learning style\",\"href\":\"/cyber-security-training-formats\",\"icon\":\"training\",\"label\":\"Ways to Train\",\"target\":\"$undefined\"},{\"description\":\"Hands-on training to keep you at the top of your game\",\"href\":\"/cyber-ranges\",\"icon\":\"hands-on-solutions\",\"label\":\"Cyber Ranges\",\"target\":\"$undefined\"},{\"description\":\"Expert-led training at locations around the world\",\"href\":\"/cyber-security-training-events\",\"icon\":\"location\",\"label\":\"Training Events \u0026 Summits\",\"target\":\"_self\"},{\"description\":\"Demonstrate cybersecurity expertise with GIAC certifications\",\"href\":\"/cyber-security-certifications\",\"icon\":\"sealcheck-certification\",\"label\":\"Certifications\",\"target\":\"$undefined\"},{\"description\":\"Upcoming workshops, webinars and local events\\n\",\"href\":\"/free-cybersecurity-events\",\"icon\":\"calendar-check\",\"label\":\"Free Training Events\",\"target\":\"$undefined\"},{\"description\":\"Harden enterprise security with end-user and role-based training\",\"href\":\"/for-organizations/workforce\",\"icon\":\"shield-workforce\",\"label\":\"Workforce Security and Risk Training \",\"target\":\"$undefined\"},{\"description\":\"Train with world-class cybersecurity experts who bring real-world expertise to class.\",\"href\":\"/instructors\",\"icon\":\"user-private-training\",\"label\":\"Meet Our Instructors\",\"target\":\"$undefined\"}],\"label\":\"Training\"},{\"bottomBar\":{\"cta\":{\"href\":\"/about/contact\",\"isExternalLink\":false,\"label\":\"Contact us\",\"target\":\"$undefined\"},\"description\":\"Let us help.\",\"title\":\"Can't find what you are looking for?\"},\"featuredItemCard\":{\"title\":\"Featured\",\"learningPathsCard\":{\"cta\":{\"href\":\"/cybersecurity-focus-areas/ai\",\"label\":\"Learn more\"},\"description\":\"Artificial Intelligence (AI) Cyber Security Training and Resources Ensure professionals at every level are prepared to navigate the complexities of an AI-driven future, equipping them with critical understanding of AI-powered threats and the skills to leverage AI to enhance security operations.\",\"focusArea\":\"ai\",\"icon\":\"related\",\"title\":\"NEW - AI Security Training\"},\"cta\":{\"href\":\"/cybersecurity-focus-areas\",\"label\":\"View all Focus Areas\",\"size\":\"$undefined\",\"target\":\"$undefined\",\"variant\":\"$undefined\"}},\"href\":\"/learning-paths\",\"itemsSingle\":[{\"description\":\"Chart your path to job-specific training courses\",\"href\":\"/cybersecurity-focus-areas\",\"icon\":\"focus\",\"label\":\"By Focus Area\",\"target\":\"$undefined\"},{\"description\":\"Give your cybersecurity career the right foundation for success\",\"href\":\"/mlp/new-to-cyber\",\"icon\":\"new\",\"label\":\"New to Cyber\",\"target\":\"$undefined\"},{\"description\":\"Find the courses and certifications that align with our current or desired role\",\"href\":\"/job-roles\",\"icon\":\"briefcase-management\",\"label\":\"By Job Role\",\"target\":\"$undefined\"},{\"description\":\"Training designed to help security leaders reduce organizational risk\",\"href\":\"/cybersecurity-focus-areas/leadership\",\"icon\":\"ranking\",\"label\":\"Leadership\",\"target\":\"$undefined\"},{\"description\":\"Explore how SANS courses align with leading cybersecurity skills frameworks including NICE, ECSF and DoD 8140\",\"href\":\"/frameworks-and-directives\",\"icon\":\"atom\",\"label\":\"By Skills Framework or Directive\",\"target\":\"$undefined\"},{\"description\":\"Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.\",\"href\":\"https://www.sans.edu/\",\"icon\":\"degree\",\"label\":\"Degree and Certificate Programs\",\"target\":\"$undefined\"},{\"description\":\"Find the right training path based on critical skills\",\"href\":\"/cyber-security-skills-roadmap\",\"icon\":\"learning-paths\",\"label\":\"By Skills Roadmap\",\"target\":\"$undefined\"}],\"label\":\"Learning Paths\"},{\"bottomBar\":{\"cta\":{\"href\":\"/member-benefits\",\"isExternalLink\":false,\"label\":\"Sign Up\",\"target\":\"$undefined\"},\"description\":\"Become a member for instant access to our free resources.\",\"title\":\"Join the SANS Community\"},\"featuredItems\":[{\"description\":\"Connect, learn, and share with other cybersecurity professionals\",\"icon\":\"new\",\"href\":\"/member-benefits\",\"isExternalLink\":false,\"label\":\"SANS Community Benefits\",\"target\":\"$undefined\"},{\"description\":\"Discover how organizations and individual cyber practitioners use SANS training and GIAC certifications\",\"icon\":\"people-3\",\"href\":\"/customer-reviews\",\"isExternalLink\":false,\"label\":\"Customer Case Studies\",\"target\":\"$undefined\"},{\"description\":\"Explore expert-driven guidance, training, and tools to help defend against AI-powered threats and adopt AI securely\",\"icon\":\"head\",\"href\":\"/artificial-intelligence\",\"isExternalLink\":false,\"label\":\"AI Risk \u0026 Readiness\",\"target\":\"$undefined\"}],\"href\":\"/security-resources\",\"itemsMultiple\":[{\"cta\":{\"href\":\"/security-resources/watch-and-listen\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Watch \u0026 Listen\",\"navigation\":[{\"href\":\"/webcasts\",\"isExternalLink\":false,\"label\":\"Webinars\",\"target\":\"$undefined\"},{\"href\":\"/presentations\",\"isExternalLink\":false,\"label\":\"Summit Presentations\",\"target\":\"$undefined\"},{\"href\":\"/podcasts\",\"isExternalLink\":false,\"label\":\"Podcasts \u0026 Live Streams\",\"target\":\"$undefined\"}]},{\"cta\":{\"href\":\"/security-resources/read\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Read\",\"navigation\":[{\"href\":\"/blog\",\"isExternalLink\":false,\"label\":\"Blog\",\"target\":\"$undefined\"},{\"href\":\"/newsletters\",\"isExternalLink\":false,\"label\":\"Newsletters\",\"target\":\"$undefined\"},{\"href\":\"https://isc.sans.edu/\",\"isExternalLink\":true,\"label\":\"Internet Storm Center\",\"target\":\"_blank\"}]},{\"cta\":{\"href\":\"/security-resources/download\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Download\",\"navigation\":[{\"href\":\"/tools\",\"isExternalLink\":false,\"label\":\"Open Source Tools\",\"target\":\"$undefined\"},{\"href\":\"/posters\",\"isExternalLink\":false,\"label\":\"Posters \u0026 Cheat Sheets\",\"target\":\"$undefined\"},{\"href\":\"/information-security-policy\",\"isExternalLink\":false,\"label\":\"Policy Templates\",\"target\":\"$undefined\"},{\"href\":\"/white-papers\",\"isExternalLink\":false,\"label\":\"White Papers\",\"target\":\"$undefined\"}]}],\"label\":\"Free Resources\"},{\"bottomBar\":{\"cta\":{\"href\":\"/about/contact\",\"isExternalLink\":false,\"label\":\"Contact Us\",\"target\":\"$undefined\"},\"description\":\"We're here to help.\",\"title\":\"Interested in developing a training plan to fit your organization’s needs?\"},\"featuredItems\":[{\"description\":\"Mission-focused cybersecurity training for government, defense, and education\",\"icon\":\"building-office-enterprise\",\"href\":\"/for-organizations/public-sector\",\"isExternalLink\":false,\"label\":\"Public Sector\",\"target\":\"$undefined\"},{\"description\":\"Explore industry-specific programming and customized training solutions\",\"icon\":\"people-2\",\"href\":\"/partnerships\",\"isExternalLink\":false,\"label\":\"Partnerships\",\"target\":\"$undefined\"},{\"description\":\"Sponsor a SANS event or research paper\",\"icon\":\"info\",\"href\":\"/sponsorship\",\"isExternalLink\":false,\"label\":\"Sponsorship Opportunities\",\"target\":\"$undefined\"}],\"href\":\"/for-organizations\",\"itemsMultiple\":[{\"cta\":{\"href\":\"/for-organizations/team-development\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Team Development\",\"navigation\":[{\"href\":\"/for-organizations/team-development/why-partner-with-sans\",\"isExternalLink\":false,\"label\":\"Why Partner with SANS\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/team-development/group-purchasing\",\"isExternalLink\":false,\"label\":\"Group Purchases\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/team-development/cybersecurity-assessments\",\"isExternalLink\":false,\"label\":\"Skills \u0026 Talent Assessments\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/team-development/private-training\",\"isExternalLink\":false,\"label\":\"Private \u0026 Custom Training Programs\",\"target\":\"$undefined\"}]},{\"cta\":{\"href\":\"/cybersecurity-focus-areas/leadership\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Leadership Development\",\"navigation\":[{\"href\":\"/cyber-security-courses?refinementList%5Bfacets.focusArea%5D%5B0%5D=Cybersecurity%20Leadership\",\"isExternalLink\":true,\"label\":\"Management Courses \u0026 Accreditation\",\"target\":\"$undefined\"},{\"href\":\"/cyber-ranges/cyber-crisis-exercises\",\"isExternalLink\":false,\"label\":\"Cyber Crisis Exercises\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/cyber-leaders-network\",\"isExternalLink\":false,\"label\":\"SANS Cyber Leaders Network\",\"target\":\"$undefined\"}]},{\"cta\":{\"href\":\"/for-organizations/workforce\",\"isExternalLink\":false,\"label\":\"Overview\",\"target\":\"$undefined\"},\"label\":\"Workforce Security \u0026 Risk\",\"navigation\":[{\"href\":\"/for-organizations/workforce/security-awareness-training\",\"isExternalLink\":false,\"label\":\"Security Awareness Training\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/workforce/compliance-training\",\"isExternalLink\":false,\"label\":\"Compliance Training\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/workforce/risk-management\",\"isExternalLink\":false,\"label\":\"Risk Management\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/workforce/services\",\"isExternalLink\":false,\"label\":\"Services\",\"target\":\"$undefined\"},{\"href\":\"/for-organizations/workforce/resources\",\"isExternalLink\":false,\"label\":\"Resources\",\"target\":\"$undefined\"}]}],\"label\":\"For Organizations\"}],\"topbar\":{\"navigation\":[{\"href\":\"/account/login\",\"isExternalLink\":true,\"label\":\"Log In\",\"target\":\"_self\",\"icon\":\"login\",\"dropdownNavigation\":[]},{\"href\":\"/account/create\",\"isExternalLink\":true,\"label\":\"Join - It's Free\",\"target\":\"$undefined\",\"icon\":\"new\",\"dropdownNavigation\":[]}]}},\"algoliaGlobalSearch\":{\"apiKey\":\"efc23343b7c48a65f7ddba6f07e3c086\",\"appId\":\"M2CVJC95IX\",\"url\":\"m2cvjc95ix-dsn.algolia.net\"}}]]}]\n"])</script><script>self.__next_f.push([1,"2c:I[18131,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"5463\",\"static/chunks/5463-5252e78b2dd34d4e.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"7177\",\"static/chunks/app/layout-db05aba00a9dacde.js\"],\"FooterNewsletterWrapper\"]\n"])</script><script>self.__next_f.push([1,"22:[\"$\",\"div\",null,{\"className\":\"footer__newsletter\",\"children\":[[\"$\",\"h2\",null,{\"className\":\"c-heading footer__newsletter-title\",\"children\":\"Get Curated News, Vulnerabilities, and Essential Security Awareness Tips\"}],[\"$\",\"$L2c\",null,{\"buttonLabel\":\"Subscribe to Newsletter \",\"countryListOptions\":[{\"id\":261,\"abbreviation\":\"US\",\"text\":\"United States\",\"is_gdpr\":false},{\"id\":76,\"abbreviation\":\"CA\",\"text\":\"Canada\",\"is_gdpr\":true},{\"id\":260,\"abbreviation\":\"GB\",\"text\":\"United Kingdom\",\"is_gdpr\":true},{\"id\":233,\"abbreviation\":\"ES\",\"text\":\"Spain\",\"is_gdpr\":true},{\"id\":59,\"abbreviation\":\"BE\",\"text\":\"Belgium\",\"is_gdpr\":true},{\"id\":95,\"abbreviation\":\"DK\",\"text\":\"Denmark\",\"is_gdpr\":true},{\"id\":199,\"abbreviation\":\"NO\",\"text\":\"Norway\",\"is_gdpr\":true},{\"id\":189,\"abbreviation\":\"NL\",\"text\":\"Netherlands\",\"is_gdpr\":true},{\"id\":51,\"abbreviation\":\"AU\",\"text\":\"Australia\",\"is_gdpr\":false},{\"id\":138,\"abbreviation\":\"IN\",\"text\":\"India\",\"is_gdpr\":false},{\"id\":146,\"abbreviation\":\"JP\",\"text\":\"Japan\",\"is_gdpr\":false},{\"id\":227,\"abbreviation\":\"SG\",\"text\":\"Singapore\",\"is_gdpr\":false},{\"id\":39,\"abbreviation\":\"AF\",\"text\":\"Afghanistan\",\"is_gdpr\":false},{\"id\":1188,\"abbreviation\":\"AX\",\"text\":\"Aland Islands\",\"is_gdpr\":true},{\"id\":40,\"abbreviation\":\"AL\",\"text\":\"Albania\",\"is_gdpr\":false},{\"id\":41,\"abbreviation\":\"DZ\",\"text\":\"Algeria\",\"is_gdpr\":false},{\"id\":42,\"abbreviation\":\"AS\",\"text\":\"American Samoa\",\"is_gdpr\":false},{\"id\":43,\"abbreviation\":\"AD\",\"text\":\"Andorra\",\"is_gdpr\":false},{\"id\":44,\"abbreviation\":\"AO\",\"text\":\"Angola\",\"is_gdpr\":false},{\"id\":45,\"abbreviation\":\"AI\",\"text\":\"Anguilla\",\"is_gdpr\":true},{\"id\":46,\"abbreviation\":\"AQ\",\"text\":\"Antarctica\",\"is_gdpr\":false},{\"id\":47,\"abbreviation\":\"AG\",\"text\":\"Antigua and Barbuda\",\"is_gdpr\":false},{\"id\":48,\"abbreviation\":\"AR\",\"text\":\"Argentina\",\"is_gdpr\":false},{\"id\":49,\"abbreviation\":\"AM\",\"text\":\"Armenia\",\"is_gdpr\":false},{\"id\":50,\"abbreviation\":\"AW\",\"text\":\"Aruba\",\"is_gdpr\":true},{\"id\":52,\"abbreviation\":\"AT\",\"text\":\"Austria\",\"is_gdpr\":true},{\"id\":53,\"abbreviation\":\"AZ\",\"text\":\"Azerbaijan\",\"is_gdpr\":false},{\"id\":54,\"abbreviation\":\"BS\",\"text\":\"Bahamas\",\"is_gdpr\":false},{\"id\":55,\"abbreviation\":\"BH\",\"text\":\"Bahrain\",\"is_gdpr\":false},{\"id\":56,\"abbreviation\":\"BD\",\"text\":\"Bangladesh\",\"is_gdpr\":false},{\"id\":57,\"abbreviation\":\"BB\",\"text\":\"Barbados\",\"is_gdpr\":false},{\"id\":58,\"abbreviation\":\"BY\",\"text\":\"Belarus\",\"is_gdpr\":false},{\"id\":60,\"abbreviation\":\"BZ\",\"text\":\"Belize\",\"is_gdpr\":false},{\"id\":61,\"abbreviation\":\"BJ\",\"text\":\"Benin\",\"is_gdpr\":false},{\"id\":62,\"abbreviation\":\"BM\",\"text\":\"Bermuda\",\"is_gdpr\":true},{\"id\":63,\"abbreviation\":\"BT\",\"text\":\"Bhutan\",\"is_gdpr\":false},{\"id\":64,\"abbreviation\":\"BO\",\"text\":\"Bolivia\",\"is_gdpr\":false},{\"id\":1189,\"abbreviation\":\"BQ\",\"text\":\"Bonaire, Sint Eustatius, and Saba\",\"is_gdpr\":true},{\"id\":65,\"abbreviation\":\"BA\",\"text\":\"Bosnia And Herzegovina\",\"is_gdpr\":false},{\"id\":66,\"abbreviation\":\"BW\",\"text\":\"Botswana\",\"is_gdpr\":false},{\"id\":67,\"abbreviation\":\"BV\",\"text\":\"Bouvet Island\",\"is_gdpr\":false},{\"id\":68,\"abbreviation\":\"BR\",\"text\":\"Brazil\",\"is_gdpr\":false},{\"id\":69,\"abbreviation\":\"IO\",\"text\":\"British Indian Ocean Territory\",\"is_gdpr\":false},{\"id\":70,\"abbreviation\":\"BN\",\"text\":\"Brunei Darussalam\",\"is_gdpr\":false},{\"id\":71,\"abbreviation\":\"BG\",\"text\":\"Bulgaria\",\"is_gdpr\":true},{\"id\":72,\"abbreviation\":\"BF\",\"text\":\"Burkina Faso\",\"is_gdpr\":false},{\"id\":73,\"abbreviation\":\"BI\",\"text\":\"Burundi\",\"is_gdpr\":false},{\"id\":74,\"abbreviation\":\"KH\",\"text\":\"Cambodia\",\"is_gdpr\":false},{\"id\":75,\"abbreviation\":\"CM\",\"text\":\"Cameroon\",\"is_gdpr\":false},{\"id\":77,\"abbreviation\":\"CV\",\"text\":\"Cape Verde\",\"is_gdpr\":false},{\"id\":78,\"abbreviation\":\"KY\",\"text\":\"Cayman Islands\",\"is_gdpr\":true},{\"id\":79,\"abbreviation\":\"CF\",\"text\":\"Central African Republic\",\"is_gdpr\":false},{\"id\":80,\"abbreviation\":\"TD\",\"text\":\"Chad\",\"is_gdpr\":false},{\"id\":81,\"abbreviation\":\"CL\",\"text\":\"Chile\",\"is_gdpr\":false},{\"id\":82,\"abbreviation\":\"CN\",\"text\":\"China\",\"is_gdpr\":false},{\"id\":83,\"abbreviation\":\"CX\",\"text\":\"Christmas Island\",\"is_gdpr\":false},{\"id\":84,\"abbreviation\":\"CC\",\"text\":\"Cocos (Keeling) Islands\",\"is_gdpr\":false},{\"id\":85,\"abbreviation\":\"CO\",\"text\":\"Colombia\",\"is_gdpr\":false},{\"id\":86,\"abbreviation\":\"KM\",\"text\":\"Comoros\",\"is_gdpr\":false},{\"id\":88,\"abbreviation\":\"CK\",\"text\":\"Cook Islands\",\"is_gdpr\":false},{\"id\":89,\"abbreviation\":\"CR\",\"text\":\"Costa Rica\",\"is_gdpr\":false},{\"id\":90,\"abbreviation\":\"CI\",\"text\":\"Cote D'ivoire\",\"is_gdpr\":false},{\"id\":91,\"abbreviation\":\"HR\",\"text\":\"Croatia (Local Name: Hrvatska)\",\"is_gdpr\":true},{\"id\":1192,\"abbreviation\":\"CW\",\"text\":\"Curacao\",\"is_gdpr\":true},{\"id\":93,\"abbreviation\":\"CY\",\"text\":\"Cyprus\",\"is_gdpr\":true},{\"id\":94,\"abbreviation\":\"CZ\",\"text\":\"Czech Republic\",\"is_gdpr\":true},{\"id\":1190,\"abbreviation\":\"CD\",\"text\":\"Democratic Republic of the Congo\",\"is_gdpr\":false},{\"id\":96,\"abbreviation\":\"DJ\",\"text\":\"Djibouti\",\"is_gdpr\":false},{\"id\":97,\"abbreviation\":\"DM\",\"text\":\"Dominica\",\"is_gdpr\":false},{\"id\":98,\"abbreviation\":\"DO\",\"text\":\"Dominican Republic\",\"is_gdpr\":false},{\"id\":1198,\"abbreviation\":\"TL\",\"text\":\"East Timor\",\"is_gdpr\":false},{\"id\":100,\"abbreviation\":\"EC\",\"text\":\"Ecuador\",\"is_gdpr\":false},{\"id\":101,\"abbreviation\":\"EG\",\"text\":\"Egypt\",\"is_gdpr\":false},{\"id\":102,\"abbreviation\":\"SV\",\"text\":\"El Salvador\",\"is_gdpr\":false},{\"id\":103,\"abbreviation\":\"GQ\",\"text\":\"Equatorial Guinea\",\"is_gdpr\":false},{\"id\":104,\"abbreviation\":\"ER\",\"text\":\"Eritrea\",\"is_gdpr\":false},{\"id\":105,\"abbreviation\":\"EE\",\"text\":\"Estonia\",\"is_gdpr\":true},{\"id\":240,\"abbreviation\":\"SZ\",\"text\":\"Eswatini\",\"is_gdpr\":false},{\"id\":106,\"abbreviation\":\"ET\",\"text\":\"Ethiopia\",\"is_gdpr\":false},{\"id\":108,\"abbreviation\":\"FK\",\"text\":\"Falkland Islands (Malvinas)\",\"is_gdpr\":true},{\"id\":109,\"abbreviation\":\"FO\",\"text\":\"Faroe Islands\",\"is_gdpr\":true},{\"id\":110,\"abbreviation\":\"FJ\",\"text\":\"Fiji\",\"is_gdpr\":false},{\"id\":111,\"abbreviation\":\"FI\",\"text\":\"Finland\",\"is_gdpr\":true},{\"id\":112,\"abbreviation\":\"FR\",\"text\":\"France\",\"is_gdpr\":true},{\"id\":114,\"abbreviation\":\"GF\",\"text\":\"French Guiana\",\"is_gdpr\":true},{\"id\":115,\"abbreviation\":\"PF\",\"text\":\"French Polynesia\",\"is_gdpr\":true},{\"id\":116,\"abbreviation\":\"TF\",\"text\":\"French Southern Territories\",\"is_gdpr\":true},{\"id\":117,\"abbreviation\":\"GA\",\"text\":\"Gabon\",\"is_gdpr\":false},{\"id\":118,\"abbreviation\":\"GM\",\"text\":\"Gambia\",\"is_gdpr\":false},{\"id\":119,\"abbreviation\":\"GE\",\"text\":\"Georgia\",\"is_gdpr\":false},{\"id\":120,\"abbreviation\":\"DE\",\"text\":\"Germany\",\"is_gdpr\":true},{\"id\":121,\"abbreviation\":\"GH\",\"text\":\"Ghana\",\"is_gdpr\":false},{\"id\":122,\"abbreviation\":\"GI\",\"text\":\"Gibraltar\",\"is_gdpr\":true},{\"id\":123,\"abbreviation\":\"GR\",\"text\":\"Greece\",\"is_gdpr\":true},{\"id\":124,\"abbreviation\":\"GL\",\"text\":\"Greenland\",\"is_gdpr\":true},{\"id\":125,\"abbreviation\":\"GD\",\"text\":\"Grenada\",\"is_gdpr\":false},{\"id\":126,\"abbreviation\":\"GP\",\"text\":\"Guadeloupe\",\"is_gdpr\":true},{\"id\":127,\"abbreviation\":\"GU\",\"text\":\"Guam\",\"is_gdpr\":false},{\"id\":128,\"abbreviation\":\"GT\",\"text\":\"Guatemala\",\"is_gdpr\":false},{\"id\":1077,\"abbreviation\":\"GG\",\"text\":\"Guernsey\",\"is_gdpr\":false},{\"id\":129,\"abbreviation\":\"GN\",\"text\":\"Guinea\",\"is_gdpr\":false},{\"id\":130,\"abbreviation\":\"GW\",\"text\":\"Guinea-Bissau\",\"is_gdpr\":false},{\"id\":131,\"abbreviation\":\"GY\",\"text\":\"Guyana\",\"is_gdpr\":false},{\"id\":132,\"abbreviation\":\"HT\",\"text\":\"Haiti\",\"is_gdpr\":false},{\"id\":133,\"abbreviation\":\"HM\",\"text\":\"Heard And McDonald Islands\",\"is_gdpr\":false},{\"id\":134,\"abbreviation\":\"HN\",\"text\":\"Honduras\",\"is_gdpr\":false},{\"id\":135,\"abbreviation\":\"HK\",\"text\":\"Hong Kong\",\"is_gdpr\":false},{\"id\":136,\"abbreviation\":\"HU\",\"text\":\"Hungary\",\"is_gdpr\":true},{\"id\":137,\"abbreviation\":\"IS\",\"text\":\"Iceland\",\"is_gdpr\":true},{\"id\":139,\"abbreviation\":\"ID\",\"text\":\"Indonesia\",\"is_gdpr\":false},{\"id\":141,\"abbreviation\":\"IQ\",\"text\":\"Iraq\",\"is_gdpr\":false},{\"id\":142,\"abbreviation\":\"IE\",\"text\":\"Ireland\",\"is_gdpr\":true},{\"id\":1079,\"abbreviation\":\"IM\",\"text\":\"Isle of Man\",\"is_gdpr\":false},{\"id\":143,\"abbreviation\":\"IL\",\"text\":\"Israel\",\"is_gdpr\":false},{\"id\":144,\"abbreviation\":\"IT\",\"text\":\"Italy\",\"is_gdpr\":true},{\"id\":145,\"abbreviation\":\"JM\",\"text\":\"Jamaica\",\"is_gdpr\":false},{\"id\":1076,\"abbreviation\":\"JE\",\"text\":\"Jersey\",\"is_gdpr\":false},{\"id\":147,\"abbreviation\":\"JO\",\"text\":\"Jordan\",\"is_gdpr\":false},{\"id\":148,\"abbreviation\":\"KZ\",\"text\":\"Kazakhstan\",\"is_gdpr\":false},{\"id\":149,\"abbreviation\":\"KE\",\"text\":\"Kenya\",\"is_gdpr\":false},{\"id\":150,\"abbreviation\":\"KI\",\"text\":\"Kiribati\",\"is_gdpr\":false},{\"id\":152,\"abbreviation\":\"KR\",\"text\":\"Korea, Republic Of\",\"is_gdpr\":false},{\"id\":1199,\"abbreviation\":\"XK\",\"text\":\"Kosovo\",\"is_gdpr\":true},{\"id\":153,\"abbreviation\":\"KW\",\"text\":\"Kuwait\",\"is_gdpr\":false},{\"id\":154,\"abbreviation\":\"KG\",\"text\":\"Kyrgyzstan\",\"is_gdpr\":false},{\"id\":155,\"abbreviation\":\"LA\",\"text\":\"Lao People's Democratic Republic\",\"is_gdpr\":false},{\"id\":156,\"abbreviation\":\"LV\",\"text\":\"Latvia\",\"is_gdpr\":true},{\"id\":157,\"abbreviation\":\"LB\",\"text\":\"Lebanon\",\"is_gdpr\":false},{\"id\":158,\"abbreviation\":\"LS\",\"text\":\"Lesotho\",\"is_gdpr\":false},{\"id\":159,\"abbreviation\":\"LR\",\"text\":\"Liberia\",\"is_gdpr\":false},{\"id\":161,\"abbreviation\":\"LI\",\"text\":\"Liechtenstein\",\"is_gdpr\":true},{\"id\":162,\"abbreviation\":\"LT\",\"text\":\"Lithuania\",\"is_gdpr\":true},{\"id\":163,\"abbreviation\":\"LU\",\"text\":\"Luxembourg\",\"is_gdpr\":true},{\"id\":164,\"abbreviation\":\"MO\",\"text\":\"Macau\",\"is_gdpr\":false},{\"id\":166,\"abbreviation\":\"MG\",\"text\":\"Madagascar\",\"is_gdpr\":false},{\"id\":167,\"abbreviation\":\"MW\",\"text\":\"Malawi\",\"is_gdpr\":false},{\"id\":168,\"abbreviation\":\"MY\",\"text\":\"Malaysia\",\"is_gdpr\":false},{\"id\":169,\"abbreviation\":\"MV\",\"text\":\"Maldives\",\"is_gdpr\":false},{\"id\":170,\"abbreviation\":\"ML\",\"text\":\"Mali\",\"is_gdpr\":false},{\"id\":171,\"abbreviation\":\"MT\",\"text\":\"Malta\",\"is_gdpr\":true},{\"id\":172,\"abbreviation\":\"MH\",\"text\":\"Marshall Islands\",\"is_gdpr\":false},{\"id\":173,\"abbreviation\":\"MQ\",\"text\":\"Martinique\",\"is_gdpr\":true},{\"id\":174,\"abbreviation\":\"MR\",\"text\":\"Mauritania\",\"is_gdpr\":false},{\"id\":175,\"abbreviation\":\"MU\",\"text\":\"Mauritius\",\"is_gdpr\":false},{\"id\":176,\"abbreviation\":\"YT\",\"text\":\"Mayotte\",\"is_gdpr\":true},{\"id\":177,\"abbreviation\":\"MX\",\"text\":\"Mexico\",\"is_gdpr\":false},{\"id\":178,\"abbreviation\":\"FM\",\"text\":\"Micronesia, Federated States Of\",\"is_gdpr\":false},{\"id\":179,\"abbreviation\":\"MD\",\"text\":\"Moldova, Republic Of\",\"is_gdpr\":false},{\"id\":180,\"abbreviation\":\"MC\",\"text\":\"Monaco\",\"is_gdpr\":false},{\"id\":181,\"abbreviation\":\"MN\",\"text\":\"Mongolia\",\"is_gdpr\":false},{\"id\":1089,\"abbreviation\":\"ME\",\"text\":\"Montenegro\",\"is_gdpr\":false},{\"id\":182,\"abbreviation\":\"MS\",\"text\":\"Montserrat\",\"is_gdpr\":true},{\"id\":183,\"abbreviation\":\"MA\",\"text\":\"Morocco\",\"is_gdpr\":false},{\"id\":184,\"abbreviation\":\"MZ\",\"text\":\"Mozambique\",\"is_gdpr\":false},{\"id\":185,\"abbreviation\":\"MM\",\"text\":\"Myanmar\",\"is_gdpr\":false},{\"id\":186,\"abbreviation\":\"NA\",\"text\":\"Namibia\",\"is_gdpr\":false},{\"id\":187,\"abbreviation\":\"NR\",\"text\":\"Nauru\",\"is_gdpr\":false},{\"id\":188,\"abbreviation\":\"NP\",\"text\":\"Nepal\",\"is_gdpr\":false},{\"id\":190,\"abbreviation\":\"AN\",\"text\":\"Netherlands Antilles\",\"is_gdpr\":false},{\"id\":191,\"abbreviation\":\"NC\",\"text\":\"New Caledonia\",\"is_gdpr\":true},{\"id\":192,\"abbreviation\":\"NZ\",\"text\":\"New Zealand\",\"is_gdpr\":false},{\"id\":193,\"abbreviation\":\"NI\",\"text\":\"Nicaragua\",\"is_gdpr\":false},{\"id\":194,\"abbreviation\":\"NE\",\"text\":\"Niger\",\"is_gdpr\":false},{\"id\":195,\"abbreviation\":\"NG\",\"text\":\"Nigeria\",\"is_gdpr\":false},{\"id\":196,\"abbreviation\":\"NU\",\"text\":\"Niue\",\"is_gdpr\":false},{\"id\":197,\"abbreviation\":\"NF\",\"text\":\"Norfolk Island\",\"is_gdpr\":false},{\"id\":165,\"abbreviation\":\"MK\",\"text\":\"North Macedonia\",\"is_gdpr\":false},{\"id\":198,\"abbreviation\":\"MP\",\"text\":\"Northern Mariana Islands\",\"is_gdpr\":false},{\"id\":200,\"abbreviation\":\"OM\",\"text\":\"Oman\",\"is_gdpr\":false},{\"id\":201,\"abbreviation\":\"PK\",\"text\":\"Pakistan\",\"is_gdpr\":false},{\"id\":202,\"abbreviation\":\"PW\",\"text\":\"Palau\",\"is_gdpr\":false},{\"id\":1045,\"abbreviation\":\"PS\",\"text\":\"Palestine\",\"is_gdpr\":false},{\"id\":203,\"abbreviation\":\"PA\",\"text\":\"Panama\",\"is_gdpr\":false},{\"id\":204,\"abbreviation\":\"PG\",\"text\":\"Papua New Guinea\",\"is_gdpr\":false},{\"id\":205,\"abbreviation\":\"PY\",\"text\":\"Paraguay\",\"is_gdpr\":false},{\"id\":206,\"abbreviation\":\"PE\",\"text\":\"Peru\",\"is_gdpr\":false},{\"id\":207,\"abbreviation\":\"PH\",\"text\":\"Philippines\",\"is_gdpr\":false},{\"id\":208,\"abbreviation\":\"PN\",\"text\":\"Pitcairn\",\"is_gdpr\":true},{\"id\":209,\"abbreviation\":\"PL\",\"text\":\"Poland\",\"is_gdpr\":true},{\"id\":210,\"abbreviation\":\"PT\",\"text\":\"Portugal\",\"is_gdpr\":true},{\"id\":211,\"abbreviation\":\"PR\",\"text\":\"Puerto Rico\",\"is_gdpr\":false},{\"id\":212,\"abbreviation\":\"QA\",\"text\":\"Qatar\",\"is_gdpr\":false},{\"id\":213,\"abbreviation\":\"RE\",\"text\":\"Reunion\",\"is_gdpr\":true},{\"id\":214,\"abbreviation\":\"RO\",\"text\":\"Romania\",\"is_gdpr\":true},{\"id\":215,\"abbreviation\":\"RU\",\"text\":\"Russian Federation\",\"is_gdpr\":false},{\"id\":216,\"abbreviation\":\"RW\",\"text\":\"Rwanda\",\"is_gdpr\":false},{\"id\":1088,\"abbreviation\":\"BL\",\"text\":\"Saint Bartholemy\",\"is_gdpr\":true},{\"id\":217,\"abbreviation\":\"KN\",\"text\":\"Saint Kitts And Nevis\",\"is_gdpr\":false},{\"id\":218,\"abbreviation\":\"LC\",\"text\":\"Saint Lucia\",\"is_gdpr\":false},{\"id\":1195,\"abbreviation\":\"MF\",\"text\":\"Saint Martin\",\"is_gdpr\":true},{\"id\":219,\"abbreviation\":\"VC\",\"text\":\"Saint Vincent And The Grenadines\",\"is_gdpr\":false},{\"id\":220,\"abbreviation\":\"WS\",\"text\":\"Samoa\",\"is_gdpr\":false},{\"id\":221,\"abbreviation\":\"SM\",\"text\":\"San Marino\",\"is_gdpr\":false},{\"id\":222,\"abbreviation\":\"ST\",\"text\":\"Sao Tome And Principe\",\"is_gdpr\":false},{\"id\":223,\"abbreviation\":\"SA\",\"text\":\"Saudi Arabia\",\"is_gdpr\":false},{\"id\":224,\"abbreviation\":\"SN\",\"text\":\"Senegal\",\"is_gdpr\":false},{\"id\":993,\"abbreviation\":\"RS\",\"text\":\"Serbia\",\"is_gdpr\":false},{\"id\":225,\"abbreviation\":\"SC\",\"text\":\"Seychelles\",\"is_gdpr\":false},{\"id\":226,\"abbreviation\":\"SL\",\"text\":\"Sierra Leone\",\"is_gdpr\":false},{\"id\":1197,\"abbreviation\":\"SX\",\"text\":\"Sint Maarten\",\"is_gdpr\":true},{\"id\":228,\"abbreviation\":\"SK\",\"text\":\"Slovakia\",\"is_gdpr\":true},{\"id\":229,\"abbreviation\":\"SI\",\"text\":\"Slovenia\",\"is_gdpr\":true},{\"id\":230,\"abbreviation\":\"SB\",\"text\":\"Solomon Islands\",\"is_gdpr\":false},{\"id\":232,\"abbreviation\":\"ZA\",\"text\":\"South Africa\",\"is_gdpr\":false},{\"id\":1193,\"abbreviation\":\"GS\",\"text\":\"South Georgia and the South Sandwich Islands\",\"is_gdpr\":false},{\"id\":1196,\"abbreviation\":\"SS\",\"text\":\"South Sudan\",\"is_gdpr\":false},{\"id\":234,\"abbreviation\":\"LK\",\"text\":\"Sri Lanka\",\"is_gdpr\":false},{\"id\":235,\"abbreviation\":\"SH\",\"text\":\"St. Helena\",\"is_gdpr\":true},{\"id\":236,\"abbreviation\":\"PM\",\"text\":\"St. Pierre And Miquelon\",\"is_gdpr\":true},{\"id\":238,\"abbreviation\":\"SR\",\"text\":\"Suriname\",\"is_gdpr\":false},{\"id\":239,\"abbreviation\":\"SJ\",\"text\":\"Svalbard And Jan Mayen Islands\",\"is_gdpr\":false},{\"id\":241,\"abbreviation\":\"SE\",\"text\":\"Sweden\",\"is_gdpr\":true},{\"id\":242,\"abbreviation\":\"CH\",\"text\":\"Switzerland\",\"is_gdpr\":true},{\"id\":244,\"abbreviation\":\"TW\",\"text\":\"Taiwan\",\"is_gdpr\":false},{\"id\":245,\"abbreviation\":\"TJ\",\"text\":\"Tajikistan\",\"is_gdpr\":false},{\"id\":246,\"abbreviation\":\"TZ\",\"text\":\"Tanzania, United Republic Of\",\"is_gdpr\":false},{\"id\":247,\"abbreviation\":\"TH\",\"text\":\"Thailand\",\"is_gdpr\":false},{\"id\":248,\"abbreviation\":\"TG\",\"text\":\"Togo\",\"is_gdpr\":false},{\"id\":249,\"abbreviation\":\"TK\",\"text\":\"Tokelau\",\"is_gdpr\":false},{\"id\":250,\"abbreviation\":\"TO\",\"text\":\"Tonga\",\"is_gdpr\":false},{\"id\":251,\"abbreviation\":\"TT\",\"text\":\"Trinidad And Tobago\",\"is_gdpr\":false},{\"id\":252,\"abbreviation\":\"TN\",\"text\":\"Tunisia\",\"is_gdpr\":false},{\"id\":253,\"abbreviation\":\"TR\",\"text\":\"Turkey\",\"is_gdpr\":false},{\"id\":254,\"abbreviation\":\"TM\",\"text\":\"Turkmenistan\",\"is_gdpr\":false},{\"id\":255,\"abbreviation\":\"TC\",\"text\":\"Turks And Caicos Islands\",\"is_gdpr\":true},{\"id\":256,\"abbreviation\":\"TV\",\"text\":\"Tuvalu\",\"is_gdpr\":false},{\"id\":257,\"abbreviation\":\"UG\",\"text\":\"Uganda\",\"is_gdpr\":false},{\"id\":258,\"abbreviation\":\"UA\",\"text\":\"Ukraine\",\"is_gdpr\":false},{\"id\":259,\"abbreviation\":\"AE\",\"text\":\"United Arab Emirates\",\"is_gdpr\":false},{\"id\":262,\"abbreviation\":\"UM\",\"text\":\"United States Minor Outlying Islands\",\"is_gdpr\":false},{\"id\":263,\"abbreviation\":\"UY\",\"text\":\"Uruguay\",\"is_gdpr\":false},{\"id\":264,\"abbreviation\":\"UZ\",\"text\":\"Uzbekistan\",\"is_gdpr\":false},{\"id\":265,\"abbreviation\":\"VU\",\"text\":\"Vanuatu\",\"is_gdpr\":false},{\"id\":266,\"abbreviation\":\"VA\",\"text\":\"Vatican City State\",\"is_gdpr\":false},{\"id\":267,\"abbreviation\":\"VE\",\"text\":\"Venezuela\",\"is_gdpr\":false},{\"id\":268,\"abbreviation\":\"VN\",\"text\":\"Vietnam\",\"is_gdpr\":false},{\"id\":269,\"abbreviation\":\"VG\",\"text\":\"Virgin Islands (British)\",\"is_gdpr\":true},{\"id\":270,\"abbreviation\":\"VI\",\"text\":\"Virgin Islands (U.S.)\",\"is_gdpr\":false},{\"id\":271,\"abbreviation\":\"WF\",\"text\":\"Wallis And Futuna Islands\",\"is_gdpr\":true},{\"id\":272,\"abbreviation\":\"EH\",\"text\":\"Western Sahara\",\"is_gdpr\":false},{\"id\":273,\"abbreviation\":\"YE\",\"text\":\"Yemen\",\"is_gdpr\":false},{\"id\":276,\"abbreviation\":\"ZM\",\"text\":\"Zambia\",\"is_gdpr\":false},{\"id\":277,\"abbreviation\":\"ZW\",\"text\":\"Zimbabwe\",\"is_gdpr\":false}]}]]}]\n"])</script><script>self.__next_f.push([1,"2d:I[57730,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"PageLoadGTM\"]\n5:[[\"$\",\"$L2d\",null,{\"event\":\"Page Load\",\"eventAction\":\"Selected Listing Title\",\"eventCategory\":\"Content interactions\",\"eventLabel\":\"focus_area_page\"}],\"$L2e\"]\n"])</script><script>self.__next_f.push([1,"2f:I[77707,[],\"IconMark\"]\n"])</script><script>self.__next_f.push([1,"9:{\"metadata\":[[\"$\",\"title\",\"0\",{\"children\":\"Digital Forensics and Incident Response Training | SANS Institute\"}],[\"$\",\"meta\",\"1\",{\"name\":\"description\",\"content\":\"Learn about SANS Digital Forensics courses, training and certifications as well as an extensive suite of free Digital Forensics resources.\"}],[\"$\",\"meta\",\"2\",{\"name\":\"language\",\"content\":\"en\"}],[\"$\",\"link\",\"3\",{\"rel\":\"canonical\",\"href\":\"https://www.sans.org/cybersecurity-focus-areas/digital-forensics-incident-response\"}],[\"$\",\"meta\",\"4\",{\"property\":\"og:title\",\"content\":\"Digital Forensics and Incident Response Training | SANS Institute\"}],[\"$\",\"meta\",\"5\",{\"property\":\"og:description\",\"content\":\"Learn about SANS Digital Forensics courses, training and certifications as well as an extensive suite of free Digital Forensics resources.\"}],[\"$\",\"meta\",\"6\",{\"property\":\"og:url\",\"content\":\"https://www.sans.org/cybersecurity-focus-areas/digital-forensics-incident-response\"}],[\"$\",\"meta\",\"7\",{\"property\":\"og:site_name\",\"content\":\"SANS Institute\"}],[\"$\",\"meta\",\"8\",{\"property\":\"og:type\",\"content\":\"website\"}],[\"$\",\"meta\",\"9\",{\"name\":\"twitter:card\",\"content\":\"summary\"}],[\"$\",\"meta\",\"10\",{\"name\":\"twitter:site\",\"content\":\"@SANSInstitute\"}],[\"$\",\"meta\",\"11\",{\"name\":\"twitter:title\",\"content\":\"Digital Forensics and Incident Response Training | SANS Institute\"}],[\"$\",\"meta\",\"12\",{\"name\":\"twitter:description\",\"content\":\"Learn about SANS Digital Forensics courses, training and certifications as well as an extensive suite of free Digital Forensics resources.\"}],[\"$\",\"link\",\"13\",{\"rel\":\"icon\",\"href\":\"/favicon.ico\",\"type\":\"image/x-icon\",\"sizes\":\"48x48\"}],[\"$\",\"link\",\"14\",{\"rel\":\"icon\",\"href\":\"/icon1.png?2951f2f1b780f8ac\",\"type\":\"image/png\",\"sizes\":\"96x96\"}],[\"$\",\"$L2f\",\"15\",{}]],\"error\":null,\"digest\":\"$undefined\"}\n"])</script><script>self.__next_f.push([1,"e:\"$9:metadata\"\n"])</script><script>self.__next_f.push([1,"30:I[53983,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"AnimateInWrapper\"]\n"])</script><script>self.__next_f.push([1,"31:I[48253,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1044\",\"static/chunks/1044-687250a180f48329.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1049\",\"static/chunks/1049-097a54a192c2924a.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"9633\",\"static/chunks/9633-b2d87d5d19bd0ffd.js\",\"8861\",\"static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js\"],\"Breadcrumbs\"]\n"])</script><script>self.__next_f.push([1,"32:I[31299,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"Image\"]\n"])</script><script>self.__next_f.push([1,"33:I[54067,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1044\",\"static/chunks/1044-687250a180f48329.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1049\",\"static/chunks/1049-097a54a192c2924a.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"9633\",\"static/chunks/9633-b2d87d5d19bd0ffd.js\",\"8861\",\"static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js\"],\"default\"]\n"])</script><script>self.__next_f.push([1,"2e:[[\"$\",\"div\",null,{\"className\":\"secondary-hero secondary-hero--has-sticky-links secondary-hero--has-image\",\"children\":[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-grid grid--has-container grid--columns-6 grid--columns-tablet-8 grid--columns-desktop-12\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-6 grid__item--col-span-tablet-4 grid__item--col-span-desktop-6 secondary-hero__text-grid-item\",\"children\":[\"$\",\"$L30\",null,{\"className\":\"secondary-hero__animate-in-content\",\"children\":[[\"$\",\"$L31\",null,{\"className\":\"secondary-hero__breadcrumbs\",\"data\":[{\"href\":\"/cybersecurity-focus-areas\",\"title\":\"Cybersecurity Focus Areas\"},{\"href\":\"/cybersecurity-focus-areas/digital-forensics-incident-response\",\"title\":\"Digital Forensics and Incident Response Training\"}]}],[\"$\",\"div\",null,{\"className\":\"secondary-hero__content-wrappper\",\"children\":[[\"$\",\"div\",null,{\"className\":\"secondary-hero__body\",\"children\":[[\"$\",\"h1\",null,{\"className\":\"c-heading secondary-hero__title\",\"children\":\"Digital Forensics and Incident Response Training\"}],\"\",[\"$\",\"p\",null,{\"className\":\"secondary-hero__text\",\"children\":\"Digital Forensics and Incident Response (DFIR) is essential to understand how intrusions occur, uncover malicious behavior, explain exactly “what happened”, and restore integrity across digital environments. DFIR combines cybersecurity, threat hunting, and investigative techniques to identify, analyze, respond to, and proactively hunt cyber threats and criminal activity.\"}]]}],\"$undefined\",\"$undefined\"]}]]}]}],[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-start-1 grid__item--col-start-tablet-7 grid__item--col-start-desktop-9 grid__item--col-end-7 grid__item--col-end-tablet-13 grid__item--col-end-desktop-13 secondary-hero__image-grid-item\",\"children\":[\"$\",\"div\",null,{\"className\":\"secondary-hero__image-container\",\"children\":[[\"$\",\"div\",null,{\"className\":\"c-background-rings\",\"style\":{\"--ring-color\":\"var(--color-focusarea-digital-forensics)\"},\"children\":[[\"$\",\"div\",\"ring-default-0\",{\"className\":\"background-rings__ring background-rings__ring--default\"}],[\"$\",\"div\",\"ring-default-1\",{\"className\":\"background-rings__ring background-rings__ring--default\"}],[\"$\",\"div\",\"ring-default-2\",{\"className\":\"background-rings__ring background-rings__ring--default\"}]]}],[\"$\",\"div\",null,{\"className\":\"secondary-hero__image-holder\",\"children\":[[\"$\",\"$L32\",null,{\"fill\":true,\"priority\":true,\"alt\":\"Digital Forensics, Incident Response \u0026 Threat Hunting Training\",\"className\":\"secondary-hero__image\",\"sizes\":\"300px, (min-width: 768px) 445px\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd23c11323568756d/681a0def9b0925050bdf094f/DFIR_Landing_Page_890x890.png\"}],\"$undefined\"]}],\"$undefined\"]}]}]]}]}],[\"$\",\"$L33\",null,{\"ctaOne\":\"$undefined\",\"ctaTwo\":\"$undefined\",\"jumpLabel\":\"\",\"links\":[{\"label\":\"Related Courses\",\"tag\":\"#related-courses\"},{\"label\":\"Instructors\",\"tag\":\"#instructors\"},{\"label\":\"Featured Content\",\"tag\":\"#featured-content\"},{\"label\":\"FAQs\",\"tag\":\"#faqs\"}]}],[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-stacked-wrapper stacked-wrapper--has-spacing-top u-bg-color-surface-primary\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-stacked-wrapper u-bg-color-surface-primary c-dynamic-content-wrapper\",\"children\":[\"$@34\"]}],[\"$\",\"$L30\",null,{\"children\":[\"$\",\"section\",null,{\"className\":\"c-container c-promotional-icon-block\",\"id\":\"$undefined\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-grid c-headline promotional-icon-block__headline grid--columns-6 grid--columns-tablet-12\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-6 grid__item--col-span-tablet-9 headline__content\",\"children\":[[\"$\",\"div\",null,{\"className\":\"headline__title-wrapper\",\"children\":[\"$undefined\",[\"$\",\"h2\",null,{\"className\":\"c-heading heading--is-h3 heading--is-h3-desktop headline__title\",\"children\":\"What You'll Learn\"}]]}],\"\"]}],false]}],[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-grid promotional-icon-block__grid grid--columns-12\",\"children\":[[\"$\",\"div\",\"0\",{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-12 grid__item--col-span-tablet-4 promotional-icon-block__item\",\"children\":[\"$L35\",\"$L36\",\"$undefined\",\"$L37\"]}],\"$L38\",\"$L39\"]}],\"$undefined\"]}]}],\"$L3a\",\"$L3b\",\"$L3c\",\"$L3d\",\"$L3e\",\"$L3f\",\"$L40\",\"$L41\",\"$undefined\",\"$L42\"]}]]\n"])</script><script>self.__next_f.push([1,"43:I[74889,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"default\"]\n44:I[62963,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"CarouselWithLabels\"]\n45:I[17787,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"CourseCardCarousel\"]\n46:I[92379,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js"])</script><script>self.__next_f.push([1,"\"],\"CardGrid\"]\n"])</script><script>self.__next_f.push([1,"54:I[51188,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1044\",\"static/chunks/1044-687250a180f48329.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1049\",\"static/chunks/1049-097a54a192c2924a.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"9633\",\"static/chunks/9633-b2d87d5d19bd0ffd.js\",\"8861\",\"static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js\"],\"SkillsCard\"]\n"])</script><script>self.__next_f.push([1,"55:I[8958,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"WebinarCardCarousel\"]\n56:I[53933,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"8974\",\"static/chunks/app/page-d57d6546cb7e66be.js\"],\"InsightsCardHolder\"]\n35:[\"$\",\"h3\",null,{\"className\":\"promotional-icon-block__item-title\",\"children\":\"Digital Forensics\"}]\n36:[\"$\",\"p\",null,{\"className\":\"promotional-icon-block__item-description\",\"children\":\"Master evidence collection, timeline analysis, and media exploitation by extracting and analyzing hidden artifacts, reconstructing user activity, and uncovering critical evidence in investigations.\"}]\n37:[\"$\",\"$L43\",null,{\"className\":\"promotional-icon-block__item-icon\",\"name\":\"fingerprint\",\"size\":24}]\n38:[\"$\",\"div\",\"1\",{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-12 grid__item--col-span-tablet-4 promotional-icon-block__item\",\"children\":[[\"$\",\"h3\",null,{\"className\":\"promotional-icon-block__item-title\",\"children\":\"Threat Hunting, Ransomware \u0026 Threat Intelligence\"}],[\"$\",\"p\",null,{\"className\":\"promotional-icon-block__item-description\",\"children\":\"Develop proactive techniques to uncover hidden threats, analyze ransomware tactics, and utilize intelligence to anticipate and counter cyber threats."])</script><script>self.__next_f.push([1," \"}],\"$undefined\",[\"$\",\"$L43\",null,{\"className\":\"promotional-icon-block__item-icon\",\"name\":\"eye\",\"size\":24}]]}]\n39:[\"$\",\"div\",\"2\",{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-12 grid__item--col-span-tablet-4 promotional-icon-block__item\",\"children\":[[\"$\",\"h3\",null,{\"className\":\"promotional-icon-block__item-title\",\"children\":\"Malware Analysis, Memory Forensics \u0026 Underground Investigations\"}],[\"$\",\"p\",null,{\"className\":\"promotional-icon-block__item-description\",\"children\":\"Examine malicious code, analyze volatile memory, and investigate cybercriminal activity to understand attacker techniques and enhance detection. \"}],\"$undefined\",[\"$\",\"$L43\",null,{\"className\":\"promotional-icon-block__item-icon\",\"name\":\"detective-experts\",\"size\":24}]]}]\n"])</script><script>self.__next_f.push([1,"3a:[\"$\",\"$L30\",null,{\"className\":\"quote-card-carousel__wrapper\",\"children\":[\"$\",\"$L44\",null,{\"withAutoHeight\":true,\"anchorTag\":\"$undefined\",\"disableContainer\":\"$undefined\",\"heading\":{\"size\":\"h3\"},\"headline\":{\"title\":\"Student Insights\"},\"hideTitle\":true,\"size\":\"default\",\"children\":[[\"$\",\"article\",\"0\",{\"className\":\"c-quote-card c-wide-card wide-card--default wide-card--surface-secondary\",\"children\":[[\"$\",\"div\",null,{\"className\":\"c-background-rings wide-card__background-rings\",\"style\":\"$undefined\",\"children\":[[\"$\",\"div\",\"ring-default-0\",{\"className\":\"background-rings__ring background-rings__ring--default\"}],[\"$\",\"div\",\"ring-default-1\",{\"className\":\"background-rings__ring background-rings__ring--default\"}],[\"$\",\"div\",\"ring-default-2\",{\"className\":\"background-rings__ring background-rings__ring--default\"}],[\"$\",\"div\",\"ring-default-3\",{\"className\":\"background-rings__ring background-rings__ring--default\"}]]}],[\"$\",\"div\",null,{\"className\":\"wide-card__body\",\"children\":[\"$\",\"blockquote\",null,{\"children\":[[\"$\",\"div\",null,{\"className\":\"quote-card__quote\",\"children\":[\"SANS DFIR offers the ultimate in quality instruction and thoughtful curriculum development. I learned so much this week and can't wait to review and apply what I learned. I hope all my coworkers will get a chance to experience this quality of training.\",\"$undefined\"]}],[\"$\",\"footer\",null,{\"className\":\"quote-card__author\",\"children\":[[\"$\",\"span\",null,{\"children\":\"Gabrielle S.\"}],[\"$\",\"cite\",null,{\"className\":\"quote-card__author-title\",\"children\":\"U.S. Federal Agency\"}]]}]]}]}]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"3b:[\"$\",\"$L45\",null,{\"headline\":{\"text\":\"\",\"title\":\"Featured Courses\",\"titleIcon\":null},\"id\":\"related-courses\",\"items\":[{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/digital-acquisition-rapid-triage#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/digital-acquisition-rapid-triage\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 20 Hands-On Labs\"}]},\"image\":{\"alt\":\"FOR498: Digital Acquisition and Rapid Triage\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt3f80ef8f1ff3ca78/67f7ea68713415e43ddfc914/course_social_FOR498_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"FOR498\",\"focusArea\":\"Digital Forensics and Incident Response\"},\"primaryFocusArea\":\"digital_forensics\",\"skillLevel\":\"Essentials\",\"tag\":\"$undefined\",\"title\":\"FOR498: Digital Acquisition and Rapid Triage\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/advanced-network-forensics-threat-hunting-incident-response#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/advanced-network-forensics-threat-hunting-incident-response\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 20 Hands-On Labs\"}]},\"image\":{\"alt\":\"FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt11e483a1c608dd18/67f7ea8ae335cc83fc0674fb/course_social_FOR572_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"FOR572\",\"focusArea\":\"Digital Forensics and Incident Response\"},\"primaryFocusArea\":\"digital_forensics\",\"skillLevel\":\"Advanced\",\"tag\":\"$undefined\",\"title\":\"FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response\"},{\"additionalPills\":[\"AISkills\"],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/advanced-smartphone-mobile-device-forensics#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/advanced-smartphone-mobile-device-forensics\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 22 Hands-On Labs\"}]},\"image\":{\"alt\":\"FOR585: Smartphone Forensic Analysis In-Depth\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6114b179dd2cac05/67f7ea78990fe5ae1e1f5d42/course_social_FOR585_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"FOR585\",\"focusArea\":\"Digital Forensics and Incident Response\"},\"primaryFocusArea\":\"digital_forensics\",\"skillLevel\":\"Essentials\",\"tag\":{\"label\":\"MAJOR UPDATES\",\"type\":\"major_updates\"},\"title\":\"FOR585: Smartphone Forensic Analysis In-Depth\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/ransomware-and-cyber-extortion#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/ransomware-and-cyber-extortion\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"calendar\",\"text\":\"4 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"24 CPEs / 24 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 13 Hands-On Labs\"}]},\"image\":{\"alt\":\"FOR528: Ransomware and Cyber Extortion\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt18822a6bc6fe662a/67f7ea88990fe55c991f5d4b/course_social_FOR528_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"FOR528\",\"focusArea\":\"Digital Forensics and Incident Response\"},\"primaryFocusArea\":\"digital_forensics\",\"skillLevel\":\"Intermediate\",\"tag\":\"$undefined\",\"title\":\"FOR528: Ransomware and Cyber Extortion\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/advanced-incident-response-threat-hunting-training#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/advanced-incident-response-threat-hunting-training\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 35 Hands-On Labs\"}]},\"image\":{\"alt\":\"FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5979fe9404326821/67f7ea7453db7b3c3022622a/course_social_FOR508_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"FOR508\",\"focusArea\":\"Digital Forensics and Incident Response\"},\"primaryFocusArea\":\"digital_forensics\",\"skillLevel\":\"Intermediate\",\"tag\":{\"label\":\"UPDATED\",\"type\":\"updated\"},\"title\":\"FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/windows-forensic-analysis#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/windows-forensic-analysis\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 22 Hands-On Labs\"}]},\"image\":{\"alt\":\"FOR500: Windows Forensic Analysis\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt83c9fed664aa9f32/67f7ea6d7134152177dfc918/course_social_FOR500_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"FOR500\",\"focusArea\":\"Digital Forensics and Incident Response\"},\"primaryFocusArea\":\"digital_forensics\",\"skillLevel\":\"Essentials\",\"tag\":{\"label\":\"UPDATED\",\"type\":\"updated\"},\"title\":\"FOR500: Windows Forensic Analysis\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/cyber-threat-intelligence#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/cyber-threat-intelligence\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 20 Hands-On Labs\"}]},\"image\":{\"alt\":\"FOR578: Cyber Threat Intelligence\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdc84c6c6dc104bdb/67f7ea7f6481d47da68d2e9b/course_social_FOR578_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"FOR578\",\"focusArea\":\"Digital Forensics and Incident Response\"},\"primaryFocusArea\":\"digital_forensics\",\"skillLevel\":\"Intermediate\",\"tag\":{\"label\":\"MAJOR UPDATES\",\"type\":\"major_updates\"},\"title\":\"FOR578: Cyber Threat Intelligence\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/mac-and-ios-forensic-analysis-and-incident-response#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/mac-and-ios-forensic-analysis-and-incident-response\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 23 Hands-On Labs\"}]},\"image\":{\"alt\":\"FOR518: Mac and iOS Forensic Analysis and Incident Response\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd581cee7e22a2297/67f7ea746481d479e38d2e97/course_social_FOR518_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"FOR518\",\"focusArea\":\"Digital Forensics and Incident Response\"},\"primaryFocusArea\":\"digital_forensics\",\"skillLevel\":\"Intermediate\",\"tag\":{\"label\":\"UPDATED\",\"type\":\"updated\"},\"title\":\"FOR518: Mac and iOS Forensic Analysis and Incident Response\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/enterprise-cloud-forensics-incident-response#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/enterprise-cloud-forensics-incident-response\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 23 Hands-On Labs\"}]},\"image\":{\"alt\":\"FOR509: Enterprise Cloud Forensics and Incident Response\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"FOR509\",\"focusArea\":\"Digital Forensics and Incident Response\"},\"primaryFocusArea\":\"digital_forensics\",\"skillLevel\":\"Intermediate\",\"tag\":{\"label\":\"MAJOR UPDATES\",\"type\":\"major_updates\"},\"title\":\"FOR509: Enterprise Cloud Forensics and Incident Response\"},{\"additionalPills\":[\"AIFocused\"],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/applied-ai-local-large-language-models#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/applied-ai-local-large-language-models\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"calendar\",\"text\":\"1 Day (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"6 CPEs / 6 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 4 Hands-On Labs\"}]},\"image\":{\"alt\":\"FOR509: Enterprise Cloud Forensics and Incident Response\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt61fb3e40b24cfa24/67f7ea76617c773adb563da6/course_social_FOR509_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"FOR563\",\"focusArea\":\"Digital Forensics and Incident Response, Artificial Intelligence\"},\"primaryFocusArea\":\"digital_forensics\",\"skillLevel\":\"Intermediate\",\"tag\":{\"label\":\"NEW\",\"type\":\"new\"},\"title\":\"FOR563: Applied AI for Digital Forensics and Incident Response: Leveraging Local Large Language Models\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/linux-threat-hunting-incident-response#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/linux-threat-hunting-incident-response\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 23 Hands-On Labs\"}]},\"image\":{\"alt\":\"FOR577: LINUX Incident Response and Threat Hunting\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt25e7177961f87783/67f7ea7861ba90f940f37cdc/course_social_FOR577_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"FOR577\",\"focusArea\":\"Digital Forensics and Incident Response\"},\"primaryFocusArea\":\"digital_forensics\",\"skillLevel\":\"Intermediate\",\"tag\":\"$undefined\",\"title\":\"FOR577: LINUX Incident Response and Threat Hunting\"},{\"additionalPills\":[],\"buttons\":{\"primary\":{\"href\":\"/cyber-security-courses/reverse-engineering-malware-malware-analysis-tools-techniques#schedule-pricing\"},\"secondary\":{\"href\":\"/cyber-security-courses/reverse-engineering-malware-malware-analysis-tools-techniques\"}},\"courseDetails\":{\"quickViewItems\":[{\"icon\":\"sealcheck-certification\",\"text\":\"$undefined\"},{\"icon\":\"calendar\",\"text\":\"6 Days (Instructor-Led)\"},{\"icon\":\"time\",\"text\":\"36 CPEs / 36 Hours (Self-Paced)\"},{\"icon\":\"workshops\",\"text\":\"Labs: 48 Hands-On Labs\"}]},\"image\":{\"alt\":\"FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques\",\"height\":792,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blta38256d4408bae54/67f7ea76c4dd09921b7501da/course_social_FOR610_1514_x_792.png\",\"width\":1514},\"labels\":{\"code\":\"FOR610\",\"focusArea\":\"Digital Forensics and Incident Response\"},\"primaryFocusArea\":\"digital_forensics\",\"skillLevel\":\"Advanced\",\"tag\":\"$undefined\",\"title\":\"FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques\"}],\"link\":{\"href\":\"https://www.sans.org/cyber-security-courses?refinementList%5Bfacets.focusArea%5D%5B0%5D=Digital%20Forensics%20and%20Incident%20Response\",\"isExternalLink\":true,\"label\":\"View All Courses\",\"target\":\"$undefined\"}}]\n"])</script><script>self.__next_f.push([1,"3c:[\"$\",\"$L30\",null,{\"children\":[\"$\",\"$L46\",null,{\"equalHeightRows\":true,\"loadMore\":true,\"className\":\"c-person-grid\",\"headline\":{\"anchorTag\":\"speakers\",\"title\":\"Meet Your Experts\"},\"id\":\"instructors\",\"variant\":\"3-columns\",\"children\":[[\"$\",\"div\",\"0\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"Steve Anson\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdf410c6f6994abd2/67c5d73253fc5e6004b1b567/370x370_Steve-Anson.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdf410c6f6994abd2/67c5d73253fc5e6004b1b567/370x370_Steve-Anson.jpg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Steve Anson\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Co-Founder\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Steve has transformed global cybersecurity by leading complex digital crime investigations for the FBI and DoD, and by training national cyber units in over 60 countries. His work has set the global standard for incident response and threat hunting.\"}],[[\"$\",\"$L20\",\"/profiles/steve-anson\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/steve-anson\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Co-Founder | Speaker: Steve Anson\"},\"children\":\"Learn more\"}]]]}]]}]}],[\"$\",\"div\",\"1\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"Heather Barnhart\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0f65657fd38ddb53/674d831464eb63b0c7d739df/Heather_Mahalik_370x370.webp\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt0f65657fd38ddb53/674d831464eb63b0c7d739df/Heather_Mahalik_370x370.webp\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Heather Barnhart\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"DFIR Curriculum Lead and Head of Faculty\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Heather brings 24+ years of experience supporting government agencies, defense contractors, law enforcement, and Fortune 500 companies. Her extensive case experience spans fraud investigations, crimes against children, counterterrorism, and more. \"}],[[\"$\",\"$L20\",\"/profiles/heather-barnhart\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/heather-barnhart\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: DFIR Curriculum Lead and Head of Faculty | Speaker: Heather Barnhart\"},\"children\":\"Learn more\"}]]]}]]}]}],[\"$\",\"div\",\"2\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[\"$L47\",\"$L48\"]}]}],\"$L49\",\"$L4a\",\"$L4b\",\"$L4c\",\"$L4d\",\"$L4e\",\"$L4f\",\"$L50\",\"$L51\",\"$L52\",\"$L53\"]}]}]\n"])</script><script>self.__next_f.push([1,"3d:[\"$\",\"$L46\",null,{\"variantComponent\":\"skill-cards\",\"children\":[[\"$\",\"$L54\",\"0\",{\"category\":\"Digital Forensics and Incident Response\",\"cta\":{\"href\":\"/job-roles/threat-hunter\",\"label\":\"Explore learning path\"},\"hasFixedFocusAreaHeight\":true,\"title\":\"Threat Hunter\"}],[\"$\",\"$L54\",\"1\",{\"category\":\"Digital Forensics and Incident Response\",\"cta\":{\"href\":\"/job-roles/digital-forensics-analyst\",\"label\":\"Explore learning path\"},\"hasFixedFocusAreaHeight\":true,\"title\":\"Digital Forensics Analyst\"}],[\"$\",\"$L54\",\"2\",{\"category\":\"Digital Forensics and Incident Response\",\"cta\":{\"href\":\"/job-roles/malware-analyst\",\"label\":\"Explore learning path\"},\"hasFixedFocusAreaHeight\":true,\"title\":\"Malware Analyst\"}],[\"$\",\"$L54\",\"3\",{\"category\":\"Digital Forensics and Incident Response\",\"cta\":{\"href\":\"/job-roles/incident-response-team-member\",\"label\":\"Explore learning path\"},\"hasFixedFocusAreaHeight\":true,\"title\":\"Incident Response Team Member\"}],[\"$\",\"$L54\",\"4\",{\"category\":\"Digital Forensics and Incident Response\",\"cta\":{\"href\":\"/job-roles/media-exploitation-analyst\",\"label\":\"Explore learning path\"},\"hasFixedFocusAreaHeight\":true,\"title\":\"Media Exploitation Analyst\"}],[\"$\",\"$L54\",\"5\",{\"category\":\"Digital Forensics and Incident Response\",\"cta\":{\"href\":\"/job-roles/military-operations-law-enforcement-agents\",\"label\":\"Explore learning path\"},\"hasFixedFocusAreaHeight\":true,\"title\":\"Military Operations/Law Enforcement Agents\"}],[\"$\",\"$L54\",\"6\",{\"category\":\"Digital Forensics and Incident Response\",\"cta\":{\"href\":\"/job-roles/intrusion-detectionsoc-analysts\",\"label\":\"Explore learning path\"},\"hasFixedFocusAreaHeight\":true,\"title\":\"Intrusion Detection/SOC Analysts\"}],[\"$\",\"$L54\",\"7\",{\"category\":\"Cyber Defense\",\"cta\":{\"href\":\"/job-roles/cybersecurity-analyst-engineer\",\"label\":\"Explore learning path\"},\"hasFixedFocusAreaHeight\":true,\"title\":\"Cybersecurity Analyst/Engineer\"}]],\"headline\":{\"center\":true,\"title\":\"Explore Careers Within Digital Forensics\"},\"loadMore\":true,\"variant\":\"4-columns\"}]\n"])</script><script>self.__next_f.push([1,"3e:[\"$\",\"$L30\",null,{\"children\":[\"$\",\"section\",null,{\"id\":\"$undefined\",\"className\":\"c-grid c-split-content split-content--is-default split-content--has-bg-default grid--has-container grid--columns-12\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-start-1 grid__item--col-start-tablet-1 grid__item--col-end-13 grid__item--col-end-tablet-6 split-content__content-wrapper\",\"children\":[[\"$\",\"div\",null,{\"className\":\"split-content__title-wrapper\",\"children\":[[\"$\",\"h3\",null,{\"className\":\"c-heading heading--is-h3 heading--is-h3-desktop split-content__title\",\"children\":\"SANS Law Enforcement Appreciation Programs (LEAP)\"}],null]}],\"\",\"$undefined\",[\"$\",\"div\",null,{\"className\":\"c-rich-text split-content__description\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"SANS is proud to support State, Provincial, and Local Law Enforcement and the badged professionals behind them, especially those experiencing hardship funding their training efforts. To support these professionals in their quest to keep our communities safe, there are two promotional programs that can offer significant flexibility toward SANS courses.\"}]]}]}]]}],\"$undefined\",[\"$\",\"div\",null,{\"className\":\"split-content__ctas-wrapper\",\"children\":[[\"$\",\"$L20\",\"0\",{\"asElement\":\"$21\",\"className\":\"split-content__cta\",\"href\":\"https://www.sans.org/for-organizations/public-sector/state-local-le-program\",\"icon\":\"arrow-right-heavy\",\"size\":\"regular\",\"target\":\"_top\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Split Content Button\",\"eventCategory\":\"Split Content\",\"eventLabel\":\"Context: SANS Law Enforcement Appreciation Programs (LEAP) | Title: Learn More | Location: https://www.sans.org/for-organizations/public-sector/state-local-le-program \"},\"variant\":\"primary\",\"children\":\"Learn More\"}]]}]]}],[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-start-1 grid__item--col-start-tablet-7 grid__item--col-end-13 grid__item--col-end-tablet-13 split-content__media-wrapper\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-media split-content__media\",\"children\":[\"$\",\"$L32\",null,{\"className\":\"media__image\",\"alt\":\"Two Police Officers Smiling\",\"height\":860,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt57b39d71e6770911/693bf923019baa42d2a80600/SANS-DFIR-Focus-Page_Law-Enforcement_1168_x_860.png\",\"width\":1168}]}]}]]}]}]\n"])</script><script>self.__next_f.push([1,"3f:[\"$\",\"$L55\",null,{\"headline\":{\"text\":\"\",\"title\":\"Upcoming Webinars\",\"titleIcon\":\"$undefined\"},\"items\":[{\"cta\":{\"href\":\"/webcasts/advancing-cti-teams-foundations-real-world-operations\",\"label\":\"View details\",\"variant\":\"secondary\"},\"description\":\"Turn threat data into actionable intelligence. Join CTI experts to learn how to overcome common challenges, build consistent workflows, and evolve from foundational skills to real-world threat investigations and operational impact.\",\"details\":[{\"icon\":\"calendar\",\"text\":\"16 Apr 2026\"},{\"icon\":\"time\",\"text\":\"10:30 EDT\"},{\"icon\":\"instructors\",\"text\":\"Rebekah Brown, John Doyle\"}],\"image\":{\"alt\":\"Man lecturing in front of board\",\"height\":510,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt1d2734b2050a759a/69330a9a46234f1436dfcbdd/assets_fallback_2-column_Event_600x510.png\",\"width\":600,\"priority\":false},\"name\":\"Digital Forensics and Incident Response\",\"title\":\"Advancing CTI Teams: From Foundations to Real-World Operations\",\"type\":\"Webinar\"},{\"cta\":{\"href\":\"/webcasts/enterprise-dfir-scale-investigation-response\",\"label\":\"View details\",\"variant\":\"secondary\"},\"description\":\"Enterprise DFIR at Scale: From Investigation to Response.\",\"details\":[{\"icon\":\"calendar\",\"text\":\"30 Apr 2026\"},{\"icon\":\"time\",\"text\":\"10:30 EDT\"},{\"icon\":\"instructors\",\"text\":\"Matt Bromiley\"}],\"image\":{\"alt\":\"Webcast Abstract Image\",\"height\":510,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt152547727d3ffffa/684bda910ee3b718d843e3aa/assets_2-column_WebcastAbstract2_600x510.png\",\"width\":600,\"priority\":false},\"name\":\"Digital Forensics and Incident Response\",\"title\":\"Enterprise DFIR at Scale: From Investigation to Response\",\"type\":\"Webinar\"},{\"cta\":{\"href\":\"/webcasts/spring-cyber-solutions-fest-2026-detection-response-track\",\"label\":\"View details\",\"variant\":\"secondary\"},\"description\":\"The Detection \u0026 Response Track at SANS Spring Cyber Solutions Fest 2026 brings together frontline experts, innovative practitioners, and cutting-edge solution providers to explore how modern security teams are adapting to an evolving threat landscape.\",\"details\":[{\"icon\":\"calendar\",\"text\":\"6 May 2026\"},{\"icon\":\"time\",\"text\":\"10:00 EDT\"},{\"icon\":\"instructors\",\"text\":\"Megan Roddie-Fonseca\"}],\"image\":{\"alt\":\"Man presenting webcast to screen\",\"height\":336,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt5787795e5d9d3203/6811dad20e3d117fd47b4681/assets_card_Webcast_363x336.png\",\"width\":363,\"priority\":false},\"name\":\"Digital Forensics and Incident Response\",\"title\":\"Spring Cyber Solutions Fest 2026: Detection \u0026 Response Track\",\"type\":\"Webinar\"},{\"cta\":{\"href\":\"/webcasts/spring-cyber-solutions-fest-2026-insider-threat-malware-ransomware-track\",\"label\":\"View details\",\"variant\":\"secondary\"},\"description\":\"The Insider Threat / Malware / Ransomware Track at SANS Spring Cyber Solutions Fest 2026 brings together leading practitioners, researchers, and solution providers to explore how modern threats are evolving inside and outside the organization.\",\"details\":[{\"icon\":\"calendar\",\"text\":\"7 May 2026\"},{\"icon\":\"time\",\"text\":\"10:00 EDT\"},{\"icon\":\"instructors\",\"text\":\"Ryan Chapman\"}],\"image\":{\"alt\":\"Woman watching webcast on screen\",\"height\":510,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt6c777e80c1dd8364/684bdbdb44bc4a2537a885e3/assets_2-column_Webcast1_600x510.png\",\"width\":600,\"priority\":false},\"name\":\"Digital Forensics and Incident Response\",\"title\":\"Spring Cyber Solutions Fest 2026: Insider Threat / Malware / Ransomware Track\",\"type\":\"Webinar\"},{\"cta\":{\"href\":\"/webcasts/sans-2026-dfir-summit-solutions-track\",\"label\":\"View details\",\"variant\":\"secondary\"},\"description\":\"SANS 2026 DFIR Summit Solutions Track delivers a deep technical exploration of the tools, methodologies, and operational models driving next-generation digital forensics and incident response.\",\"details\":[{\"icon\":\"calendar\",\"text\":\"15 Oct 2026\"},{\"icon\":\"time\",\"text\":\"10:00 EDT\"},{\"icon\":\"instructors\",\"text\":\"\"}],\"image\":{\"alt\":\"Webcast\",\"height\":336,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt80d3329eba533dd4/6811dad2484ca40ae68399c7/assets_card_WebcastAbstract_363x336.png\",\"width\":363,\"priority\":false},\"name\":\"Digital Forensics and Incident Response\",\"title\":\"SANS 2026 DFIR Summit Solutions Track\",\"type\":\"Webinar\"},{\"cta\":{\"href\":\"/webcasts/sans-2026-detection-response-survey-report\",\"label\":\"View details\",\"variant\":\"secondary\"},\"description\":\"Now in its third year, this independent, vendor-neutral survey captures both a snapshot and a trendline—offering critical insights into what’s working, what’s lagging, and where the industry is heading. Join us as we break down the results and uncover how real-world teams are cutting through noise to focus on signals that matter.\",\"details\":[{\"icon\":\"calendar\",\"text\":\"9 Dec 2026\"},{\"icon\":\"time\",\"text\":\"10:30 EST\"},{\"icon\":\"instructors\",\"text\":\"Josh Lemon\"}],\"image\":{\"alt\":\"Blog\",\"height\":510,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png\",\"width\":600,\"priority\":false},\"name\":\"Digital Forensics and Incident Response\",\"title\":\"SANS 2026 Detection and Response Survey Report: Signals, Not Noise\",\"type\":\"Webinar\"}],\"link\":\"$undefined\"}]\n"])</script><script>self.__next_f.push([1,"40:[\"$\",\"$L56\",null,{\"authorImages\":\"$undefined\",\"cta\":{\"href\":\"/security-resources\",\"isExternalLink\":false,\"label\":\"More Insights\",\"target\":\"_self\"},\"featuredInsight\":{\"authors\":[],\"authorsLabel\":{\"label\":\"$undefined\"},\"description\":\"SANS DFIR Europe Summit and Training 2026 delivers cutting-edge, hands-on cybersecurity training led by top digital forensics and incident response experts. Join us live in beautiful Prague or attend virtually from anywhere.\",\"href\":\"/cyber-security-training-events/dfir-europe-2026\",\"image\":{\"alt\":\"Prague, Bridge\",\"height\":251,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltba0fa6abe1a5349e/680fb79fc98d9b986c3c71b3/assets_thumbnail_757x251_Prague1.png\",\"width\":757},\"title\":\"SANS DFIR Europe Summit and Training 2026\",\"type\":\"Event\"},\"insights\":[{\"authors\":[{\"href\":\"/profiles/kathryn-hedley\",\"image\":{\"alt\":\"Kathryn Hedley\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd6e8471416e529b6/681367dae16f9642431589b6/Kat-Hedley--370x370.jpg\",\"width\":370},\"name\":\"Kathryn Hedley\"},{\"href\":\"/profiles/tarot-wake\",\"image\":{\"alt\":\"Tarot (Taz) Wake\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blte71c8faf529b8442/681367ff3c472fa79d5ab7cb/Taz_Wake_-370x370.jpg\",\"width\":370},\"name\":\"Tarot (Taz) Wake\"}],\"authorsLabel\":{\"label\":\"Created By\"},\"description\":\"This poster highlights key processes and artifacts related to common attacks, along with effective tools and techniques for investigation.\",\"href\":\"/posters/linux-incident-response-threat-hunting-poster\",\"image\":{\"alt\":\"Man Using Laptop and Phone\",\"height\":860,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltc4ef353384fcc84e/680fb70ec39b0f04cdcbe460/assets_split-content_read_1168x860.png\",\"width\":1168},\"title\":\"LINUX Incident Response and Threat Hunting Poster\",\"type\":\"Poster and cheat sheet\"},{\"authors\":[{\"href\":\"/profiles/megan-roddie\",\"image\":{\"alt\":\"Megan Roddie-Fonseca\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltedffddcd494a86dc/67c5d78521a60e1ef4a4632d/Megan_Roddie_370x370.png\",\"width\":370},\"name\":\"Megan Roddie-Fonseca\"}],\"authorsLabel\":{\"label\":\"Written By\"},\"description\":\"This white paper investigates how Binalyze’s AIR platform reduces the overhead of forensic investigations by automating the process of collecting artifacts, triaging the data, and identifying next steps.\",\"href\":\"/white-papers/empowering-responders-automated-investigation\",\"image\":{\"alt\":\"Red Cloud Upload Symbols\",\"height\":510,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltdccd7c3464c61505/684023cea1ab6579459b0542/assets_2-column_Blog-Abstract6_600x510.png\",\"width\":600},\"title\":\"Empowering Responders with Automated Investigation\",\"type\":\"Whitepaper\"},{\"authors\":[{\"href\":\"/profiles/sean-o-connor\",\"image\":{\"alt\":\"Sean O'Connor\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltaa0484999854d53e/67c5d795d3f86d42e1ec4a31/Sean_O_Connor_-_Headshot_-_370x370_2024.jpg\",\"width\":370},\"name\":\"Sean O'Connor\"},{\"href\":\"/profiles/will-thomas\",\"image\":{\"alt\":\"Will Thomas\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltd7a9a47150f4e391/67c5d7a2f5cfb3bc58d6ee7f/Will_Thomas_370x370.png\",\"width\":370},\"name\":\"Will Thomas\"},{\"href\":\"/profiles/freddy-murstad\",\"image\":{\"alt\":\"Freddy Murstad\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt703b5e6eacc17218/69401d1a8528d70bd32a8ce9/Freddy_Murstad_370x370.png\",\"width\":370},\"name\":\"Freddy Murstad\"}],\"authorsLabel\":{\"label\":\"Written By\"},\"description\":\"We'll explore how the Admiralty System can be applied to assess unstructured and unverified data sources.\",\"href\":\"/blog/admiralty-code-part-2-ticketmaster-data-breach-claims\",\"image\":{\"alt\":\"Blog\",\"height\":510,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt2c6b5c5d421df1e2/693190505381455a585edcaa/assets_2-column_Blog-Abstract5_600x510.png\",\"width\":600},\"title\":\"Admiralty Code Part 2: Ticketmaster Data Breach Claims \",\"type\":\"Blog\"}],\"title\":\"DFIR Insights From The Experts\"}]\n"])</script><script>self.__next_f.push([1,"41:[\"$\",\"$L30\",null,{\"children\":[\"$\",\"section\",null,{\"id\":\"$undefined\",\"className\":\"c-grid c-split-content split-content--is-default split-content--has-bg-default split-content--is-reversed grid--has-container grid--columns-12\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-start-1 grid__item--col-start-tablet-8 grid__item--col-end-13 grid__item--col-end-tablet-13 split-content__content-wrapper\",\"children\":[[\"$\",\"div\",null,{\"className\":\"split-content__title-wrapper\",\"children\":[[\"$\",\"h3\",null,{\"className\":\"c-heading heading--is-h3 heading--is-h3-desktop split-content__title\",\"children\":\"Incident Response Is Becoming More Complex – Even for Experienced DFIR Teams\"}],null]}],\"\",\"$undefined\",[\"$\",\"div\",null,{\"className\":\"c-rich-text split-content__description\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"Modern incidents unfold faster and span more systems than ever before. Evidence arrives out of sequence, attacks move between cloud and endpoint environments in minutes, and early missteps can derail an investigation before scope and intent are clear. \"}]]}]}],[\"$\",\"$1\",\"1\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"Explore expert insights and resources on where incident response breaks down, and how experienced DFIR teams maintain focus, coordination, and investigative discipline under pressure. \"}]]}]}]]}],\"$undefined\",[\"$\",\"div\",null,{\"className\":\"split-content__ctas-wrapper\",\"children\":[[\"$\",\"$L20\",\"0\",{\"asElement\":\"$21\",\"className\":\"split-content__cta\",\"href\":\"/mlp/incident-response\",\"icon\":\"arrow-right-heavy\",\"size\":\"regular\",\"target\":\"_top\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Split Content Button\",\"eventCategory\":\"Split Content\",\"eventLabel\":\"Context: Incident Response Is Becoming More Complex – Even for Experienced DFIR Teams | Title: Explore Incident Response Resources | Location: /mlp/incident-response \"},\"variant\":\"primary\",\"children\":\"Explore Incident Response Resources\"}]]}]]}],[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-start-1 grid__item--col-start-tablet-1 grid__item--col-end-13 grid__item--col-end-tablet-7 split-content__media-wrapper\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-media split-content__media\",\"children\":[\"$\",\"$L32\",null,{\"className\":\"media__image\",\"alt\":\"Stylized Woman Working on Computer\",\"height\":860,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt13e98e4f52a36775/697a5c5c03985775a7827787/IR-Campaign_Woman_1168x860.jpg\",\"width\":1168}]}]}]]}]}]\n"])</script><script>self.__next_f.push([1,"57:Tf26,"])</script><script>self.__next_f.push([1,"{\"@context\":\"https://schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Digital Forensics and Incident Response (DFIR) focuses on investigating cyber incidents, collecting evidence, and mitigating damage after an attack. Threat Hunting is a proactive approach to identifying hidden threats before they trigger an incident by analyzing behaviors, anomalies, and adversary tactics. \"},\"name\":\"What Is DFIR, And How Does It Differ From Threat Hunting?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Traditional security tools rely on known indicators of compromise (IOCs), but sophisticated attackers use stealthy techniques to evade detection. Threat Hunting helps identify adversaries using behavioral analysis, hypothesis-driven investigations, and proactive detection methods.\"},\"name\":\"Why Is Threat Hunting Important If We Already Have Security Monitoring? \"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DFIR professionals need expertise in forensic analysis, memory and malware analysis, network investigations, threat intelligence, incident response, and threat hunting methodologies. Hands-on experience with forensic tools and scripting (Python, PowerShell) is also valuable. \"},\"name\":\"What Are The Key Skills Required For DFIR Professionals?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Ransomware encrypts critical data, disrupts business operations, and often prohibits access to critical forensic evidence. DFIR experts analyze ransom tactics, identify the attack vector, conduct memory forensics, and work on containment, recovery, and attribution of the attack.\"},\"name\":\"How Does Ransomware Impact DFIR Investigations? \"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Threat Hunters analyze anomalies such as unusual login attempts, persistence mechanisms, process injections, beaconing activity, unauthorized privilege escalation, suspicious network traffic patterns, and many, many other things to detect hidden threats.\"},\"name\":\"What Are Common Tactics, Techniques, And Procedures (TTPs) That Threat Hunters Look For? \"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Organizations should invest in continuous training, advanced forensic tools, real-world simulations, and proactive threat intelligence integration. Building a strong incident response plan and conducting regular threat hunts can significantly enhance detection and response effectiveness. \"},\"name\":\" How Can Organizations Improve Their DFIR And Threat Hunting Capabilities?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"DFIR (Digital Forensics and Incident Response) is critical today because organizations face a growing range of digital threats, from cyberattacks and insider misuse to data leaks and fraud. It provides the investigative tools and techniques needed to uncover what happened, how it happened, and who was involved. DFIR helps identify impacted systems, recover lost data, and support legal or regulatory action. Beyond response, it plays a vital role in strengthening defenses and preparing for future incidents by turning evidence into actionable insights. \"},\"name\":\"Why Is DFIR Important/Critical Today?\"},{\"@type\":\"Question\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"SANS DFIR training builds the skills needed to investigate a wide range of digital incidents — from data breaches and ransomware to insider threats and nation-state attacks. It covers digital forensics, threat hunting, malware analysis, cloud investigations, dark web investigations, and network forensics across Windows, Linux, and mobile environments. You'll also learn how to analyze logs, reconstruct attacker activity, and use threat intelligence to guide response. \"},\"name\":\"What Topics Are Covered In SANS DFIR Training? \"}]}"])</script><script>self.__next_f.push([1,"42:[[\"$\",\"script\",null,{\"dangerouslySetInnerHTML\":{\"__html\":\"$57\"},\"type\":\"application/ld+json\"}],\"$L58\"]\n"])</script><script>self.__next_f.push([1,"34:[\"$\",\"$L30\",\"0\",{\"className\":\"generic-content-block__wrapper\",\"id\":\"\",\"children\":[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"c-grid c-generic-content-block grid--has-container grid--columns-12\",\"children\":[\"$\",\"div\",null,{\"className\":\"generic-content-block__grid-item generic-content-block__grid-item--is-aligned-left\",\"children\":[\"\",[\"$\",\"div\",null,{\"className\":\"c-rich-text generic-content-block__rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"h2\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"Investigate, Analyze, Respond, and Hunt Proactively, with Confidence\"}]]}]}],[\"$\",\"$1\",\"1\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"DFIR is about more than just cyberattacks—it’s about uncovering the truth behind any digital incident. Whether you’re responding to a ransomware breach, investigating insider abuse, analyzing digital evidence in criminal cases, or even performing proactive compromise assessments, SANS Digital Forensics and Incident Response training, designed by real-world practitioners, equips professionals with the technical skills and an investigative mindset to follow the evidence wherever it leads.\"}]]}]}],[\"$\",\"$1\",\"2\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"From intrusion response to deep-dive forensic analysis of systems, mobile devices, cloud, and memory, our curriculum balances the needs of both security operations and criminal investigations.\"}]]}]}]]}],\"\"]}]}]}]\n"])</script><script>self.__next_f.push([1,"59:I[11431,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1044\",\"static/chunks/1044-687250a180f48329.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1049\",\"static/chunks/1049-097a54a192c2924a.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"9633\",\"static/chunks/9633-b2d87d5d19bd0ffd.js\",\"8861\",\"static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js\"],\"AccordionGroup\"]\n"])</script><script>self.__next_f.push([1,"5a:I[11431,[\"2270\",\"static/chunks/0ac02ab0-9734b1a658ed1114.js\",\"3970\",\"static/chunks/3970-9261773f9c0e8d18.js\",\"1299\",\"static/chunks/1299-897517986f6d760d.js\",\"2534\",\"static/chunks/2534-c754c698a60b8575.js\",\"6676\",\"static/chunks/6676-20e4890b05aafbf0.js\",\"2682\",\"static/chunks/2682-17379429f0b93fb5.js\",\"1044\",\"static/chunks/1044-687250a180f48329.js\",\"2411\",\"static/chunks/2411-d7e1899bfb2358fc.js\",\"1800\",\"static/chunks/1800-14fa0c06af0073b0.js\",\"1049\",\"static/chunks/1049-097a54a192c2924a.js\",\"1638\",\"static/chunks/1638-693bfc588657e07c.js\",\"181\",\"static/chunks/181-8557cc112cd03503.js\",\"6551\",\"static/chunks/6551-731be90d7a47741b.js\",\"1413\",\"static/chunks/1413-6d820c3bb613cd06.js\",\"9633\",\"static/chunks/9633-b2d87d5d19bd0ffd.js\",\"8861\",\"static/chunks/app/%5B...slugs%5D/page-de69af036dd8e6df.js\"],\"AccordionItem\"]\n"])</script><script>self.__next_f.push([1,"47:[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"Ovie Carroll\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf4600237f5473859/67c5d71224e52cb520e6f975/370x370_Ovie-Carroll.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltf4600237f5473859/67c5d71224e52cb520e6f975/370x370_Ovie-Carroll.jpg\"}]],\"$undefined\"]}]\n"])</script><script>self.__next_f.push([1,"48:[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Ovie Carroll\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Director\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"For Ovie Carroll, digital forensics is all about the hunt for evidence in digital places that are hiding critical clues, followed by deep analysis to prove something that the evidence was never intended to prove. \"}],[[\"$\",\"$L20\",\"/profiles/ovie-carroll\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/ovie-carroll\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Director | Speaker: Ovie Carroll\"},\"children\":\"Learn more\"}]]]}]\n"])</script><script>self.__next_f.push([1,"49:[\"$\",\"div\",\"3\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"David Cowen\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltac8d65d1bcb8528d/67c5d755f5cfb3fd1ed6ee64/David_Cowen_370x370.png\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltac8d65d1bcb8528d/67c5d755f5cfb3fd1ed6ee64/David_Cowen_370x370.png\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"David Cowen\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Vice President\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"David brings 25+ years in cybersecurity, shifting from pen testing to DFIR in 1999. He’s VP at Charles River Associates, a SANS instructor and course author, and Red Team Captain for the National Collegiate Cyber Defense Competition.\"}],[[\"$\",\"$L20\",\"/profiles/david-cowen\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/david-cowen\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Vice President | Speaker: David Cowen\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"4a:[\"$\",\"div\",\"4\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"Sarah Edwards\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt05f7eacccc80f861/67c5d725cdb05a144c5e2770/370x370_Sarah-Edwards.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt05f7eacccc80f861/67c5d725cdb05a144c5e2770/370x370_Sarah-Edwards.jpg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Sarah Edwards\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Head Of DFIR\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Sarah Edwards is a pioneering force in Apple forensics, having revolutionized the field through the creation of APOLLO—an open-source tool that deciphers macOS and iOS pattern-of-life data.\"}],[[\"$\",\"$L20\",\"/profiles/sarah-edwards\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/sarah-edwards\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Head Of DFIR | Speaker: Sarah Edwards\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"4b:[\"$\",\"div\",\"5\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"Phil Hagen\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt557801d539f2e005/68416f7974f8797e01422198/Phil_Hagan_370x370.jpeg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt557801d539f2e005/68416f7974f8797e01422198/Phil_Hagan_370x370.jpeg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Phil Hagen\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Principal Information Security Researcher\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Phil Hagen shaped network forensics with SOF-ELK® and SANS FOR572, setting standards in large-scale log analysis and response. His role in exposing a global fraud ring behind hundreds of millions in losses defines his lasting impact on cybersecurity.\"}],[[\"$\",\"$L20\",\"/profiles/phil-hagen\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/phil-hagen\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Principal Information Security Researcher | Speaker: Phil Hagen\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"4c:[\"$\",\"div\",\"6\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"Robert M. Lee\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt38bfd53104440264/67b71feeab27706dac0b488e/Robert_M._Lee.jpeg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt38bfd53104440264/67b71feeab27706dac0b488e/Robert_M._Lee.jpeg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Robert M. Lee\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"CEO\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"SANS Fellow and Dragos CEO Robert M. Lee, author of ICS515 and FOR578 and co-author of ICS310, teaches from landmark industrial cyber investigations, turning real adversary tradecraft into visibility, detection, and response skills in OT.\"}],[[\"$\",\"$L20\",\"/profiles/robert-m-lee\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/robert-m-lee\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: CEO | Speaker: Robert M. Lee\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"4d:[\"$\",\"div\",\"7\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"Katie Nickels\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt8901d38be8b477d5/67c5d6f921a60e4083a46312/370x370_katie-nickels.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt8901d38be8b477d5/67c5d6f921a60e4083a46312/370x370_katie-nickels.jpg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Katie Nickels\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Director of Intelligence\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Katie is the Director of Intelligence at Red Canary. She has worked on cyber threat intelligence, network defense, and incident response for nearly a decade for the U.S. Department of Defense, MITRE, Raytheon, and ManTech.\"}],[[\"$\",\"$L20\",\"/profiles/katie-nickels\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/katie-nickels\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Director of Intelligence | Speaker: Katie Nickels\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"4e:[\"$\",\"div\",\"8\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"Mike Pilkington\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt7bb1b120051e1a8b/68663fee6b7c1e5d6caeeb51/Mike_Pilkington.png\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt7bb1b120051e1a8b/68663fee6b7c1e5d6caeeb51/Mike_Pilkington.png\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Mike Pilkington\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\" Full-Time Researcher \"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"As a senior researcher at the SANS Research Operations Center and former incident response lead at Shell, Mike’s work has redefined enterprise-scale incident response and directly advanced the global community’s ability to combat cyber adversaries.\"}],[[\"$\",\"$L20\",\"/profiles/mike-pilkington\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/mike-pilkington\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context:  Full-Time Researcher  | Speaker: Mike Pilkington\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"4f:[\"$\",\"div\",\"9\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"Kevin Ripa\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltcf221196bebbae02/67c5d778938bf5a496f9db6b/Kevin_Ripa_370x370.png\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltcf221196bebbae02/67c5d778938bf5a496f9db6b/Kevin_Ripa_370x370.png\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Kevin Ripa\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"President\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Kevin Ripa has transformed the global cybersecurity landscape through decades of frontline digital forensics, assisting law enforcement, governments, and Fortune 500 companies in unraveling sophisticated cyberattacks and nation-state threats.\"}],[[\"$\",\"$L20\",\"/profiles/kevin-ripa\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/kevin-ripa\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: President | Speaker: Kevin Ripa\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"50:[\"$\",\"div\",\"10\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"Anuj Soni\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt711fccab7467e264/67c5d73f1a2ab5a58d11216e/Anuj_Soni_370x370.png\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt711fccab7467e264/67c5d73f1a2ab5a58d11216e/Anuj_Soni_370x370.png\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Anuj Soni\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Owner\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Anuj Soni, Principal Reverse Engineer at United Healthcare, has over 15 years of experience enhancing organizational security postures. His expertise has led to the identification, containment, and remediation of multiple threat actor groups. \"}],[[\"$\",\"$L20\",\"/profiles/anuj-soni\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/anuj-soni\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Owner | Speaker: Anuj Soni\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"51:[\"$\",\"div\",\"11\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"Tarot (Taz) Wake\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blte71c8faf529b8442/681367ff3c472fa79d5ab7cb/Taz_Wake_-370x370.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blte71c8faf529b8442/681367ff3c472fa79d5ab7cb/Taz_Wake_-370x370.jpg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Tarot (Taz) Wake\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Managing Director (Information Security)\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"With FOR577, Taz has authored the first course to systematize threat hunting on Linux systems. His operational leadership—from military intelligence to heading a FTSE100 CSIRT—has fortified global cyber defense capabilities across sectors.\"}],[[\"$\",\"$L20\",\"/profiles/tarot-wake\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/tarot-wake\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Managing Director (Information Security) | Speaker: Tarot (Taz) Wake\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"52:[\"$\",\"div\",\"12\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"Lenny Zeltser\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt9b13d6f31240b466/67f3d5195971250c058c08cb/Lenny_Portrait.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/blt9b13d6f31240b466/67f3d5195971250c058c08cb/Lenny_Portrait.jpg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Lenny Zeltser\"}],\"\"]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Lenny Zeltser is a leader in developing resilient security programs. His invaluable tools, like REMnux, a widely used Linux distribution for malware analysis, have become industry standards in combating malicious software. \"}],[[\"$\",\"$L20\",\"/profiles/lenny-zeltser\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/lenny-zeltser\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Person Card | Speaker: Lenny Zeltser\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"53:[\"$\",\"div\",\"13\",{\"className\":\"c-person-card-small person-card-small--small person-card--with-link\",\"children\":[\"$\",\"div\",null,{\"className\":\"person-card__layout\",\"children\":[[\"$\",\"header\",null,{\"className\":\"person-card-small__image-holder\",\"children\":[[[\"$\",\"div\",null,{\"className\":\"person-card-small__blurry-backdrop-filter\"}],[\"$\",\"$L32\",null,{\"alt\":\"Eric Zimmerman\",\"height\":370,\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltfa06e9f927b8ca88/67c5d6c5f10771adfb5d9d7b/370x370_Eric-Zimmerman.jpg\",\"width\":370,\"className\":\"person-card-small__image\"}],[\"$\",\"$L32\",null,{\"fill\":true,\"alt\":\"\",\"className\":\"person-card-small__blurry-bg-image\",\"src\":\"https://images.contentstack.io/v3/assets/bltabe50a4554f8e97f/bltfa06e9f927b8ca88/67c5d6c5f10771adfb5d9d7b/370x370_Eric-Zimmerman.jpg\"}]],\"$undefined\"]}],[\"$\",\"div\",null,{\"className\":\"person-card-small__text\",\"children\":[[\"$\",\"div\",null,{\"children\":[[\"$\",\"h3\",null,{\"className\":\"person-card__name\",\"children\":\"Eric Zimmerman\"}],[\"$\",\"span\",null,{\"className\":\"person-card__role\",\"children\":\"Senior Vice President\"}]]}],[\"$\",\"p\",null,{\"className\":\"person-card__description\",\"children\":\"Eric has redefined digital forensics with open-source tools like KAPE, now global standards for cybercrime investigations. He has directly enabled faster evidence analysis, rescued exploited children, and set new benchmarks in forensic response. \"}],[[\"$\",\"$L20\",\"/profiles/eric-zimmerman\",{\"asElement\":\"$21\",\"className\":\"person-card__cta-button person-card__cta-button--single\",\"href\":\"/profiles/eric-zimmerman\",\"icon\":\"arrow-right-heavy\",\"target\":\"$undefined\",\"variant\":\"tertiary\",\"dataLayer\":{\"event\":\"contentInteraction\",\"eventAction\":\"Selected: Speaker\",\"eventCategory\":\"Speaker Grid\",\"eventLabel\":\"Context: Senior Vice President | Speaker: Eric Zimmerman\"},\"children\":\"Learn more\"}]]]}]]}]}]\n"])</script><script>self.__next_f.push([1,"58:[\"$\",\"div\",null,{\"id\":\"faqs\",\"className\":\"c-grid c-accordion-section accordion-section--transparent grid--has-container grid--columns-1 grid--columns-tablet-3\",\"children\":[[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-1\",\"children\":[\"$\",\"$L30\",null,{\"children\":[\"$\",\"h2\",null,{\"className\":\"c-heading heading--is-h3 heading--is-h3-desktop\",\"children\":\"Frequently Asked Questions\"}]}]}],[\"$\",\"div\",null,{\"id\":\"$undefined\",\"className\":\"grid__item grid__item--col-span-1 grid__item--col-span-tablet-2\",\"children\":[\"$\",\"$L30\",null,{\"animation\":\"none\",\"children\":[[\"$\",\"$L59\",null,{\"type\":\"multiple\",\"children\":[[\"$\",\"$L5a\",\"0\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"0ms\"},\"summary\":\"What Is DFIR, And How Does It Differ From Threat Hunting?\",\"value\":\"0\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"Digital Forensics and Incident Response (DFIR) focuses on investigating cyber incidents, collecting evidence, and mitigating damage after an attack. Threat Hunting is a proactive approach to identifying hidden threats before they trigger an incident by analyzing behaviors, anomalies, and adversary tactics. \"}]]}]}]]}]}],[\"$\",\"$L5a\",\"1\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"100ms\"},\"summary\":\"Why Is Threat Hunting Important If We Already Have Security Monitoring? \",\"value\":\"1\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"Traditional security tools rely on known indicators of compromise (IOCs), but sophisticated attackers use stealthy techniques to evade detection. Threat Hunting helps identify adversaries using behavioral analysis, hypothesis-driven investigations, and proactive detection methods.\"}]]}]}]]}]}],[\"$\",\"$L5a\",\"2\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"200ms\"},\"summary\":\"What Are The Key Skills Required For DFIR Professionals?\",\"value\":\"2\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"DFIR professionals need expertise in forensic analysis, memory and malware analysis, network investigations, threat intelligence, incident response, and threat hunting methodologies. Hands-on experience with forensic tools and scripting (Python, PowerShell) is also valuable. \"}]]}]}]]}]}],[\"$\",\"$L5a\",\"3\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"300ms\"},\"summary\":\"How Does Ransomware Impact DFIR Investigations? \",\"value\":\"3\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"Ransomware encrypts critical data, disrupts business operations, and often prohibits access to critical forensic evidence. DFIR experts analyze ransom tactics, identify the attack vector, conduct memory forensics, and work on containment, recovery, and attribution of the attack.\"}]]}]}]]}]}],[\"$\",\"$L5a\",\"4\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"400ms\"},\"summary\":\"What Are Common Tactics, Techniques, And Procedures (TTPs) That Threat Hunters Look For? \",\"value\":\"4\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"Threat Hunters analyze anomalies such as unusual login attempts, persistence mechanisms, process injections, beaconing activity, unauthorized privilege escalation, suspicious network traffic patterns, and many, many other things to detect hidden threats.\"}]]}]}]]}]}],[\"$\",\"$L5a\",\"5\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"500ms\"},\"summary\":\" How Can Organizations Improve Their DFIR And Threat Hunting Capabilities?\",\"value\":\"5\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"Organizations should invest in continuous training, advanced forensic tools, real-world simulations, and proactive threat intelligence integration. Building a strong incident response plan and conducting regular threat hunts can significantly enhance detection and response effectiveness. \"}]]}]}]]}]}],\"$L5b\",\"$L5c\"]}],\"$undefined\"]}]}]]}]\n"])</script><script>self.__next_f.push([1,"5b:[\"$\",\"$L5a\",\"6\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"600ms\"},\"summary\":\"Why Is DFIR Important/Critical Today?\",\"value\":\"6\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"DFIR (Digital Forensics and Incident Response) is critical today because organizations face a growing range of digital threats, from cyberattacks and insider misuse to data leaks and fraud. It provides the investigative tools and techniques needed to uncover what happened, how it happened, and who was involved. DFIR helps identify impacted systems, recover lost data, and support legal or regulatory action. Beyond response, it plays a vital role in strengthening defenses and preparing for future incidents by turning evidence into actionable insights. \"}]]}]}]]}]}]\n"])</script><script>self.__next_f.push([1,"5c:[\"$\",\"$L5a\",\"7\",{\"closeButton\":{\"label\":\"Close\"},\"style\":{\"transitionDelay\":\"700ms\"},\"summary\":\"What Topics Are Covered In SANS DFIR Training? \",\"value\":\"7\",\"children\":[\"$\",\"div\",null,{\"className\":\"c-rich-text\",\"children\":[[\"$\",\"$1\",\"0\",{\"children\":[\"$\",\"p\",null,{\"children\":[[\"$\",\"$1\",\"0\",{\"children\":\"SANS DFIR training builds the skills needed to investigate a wide range of digital incidents — from data breaches and ransomware to insider threats and nation-state attacks. It covers digital forensics, threat hunting, malware analysis, cloud investigations, dark web investigations, and network forensics across Windows, Linux, and mobile environments. You'll also learn how to analyze logs, reconstruct attacker activity, and use threat intelligence to guide response. \"}]]}]}]]}]}]\n"])</script></body></html>