SANS Initiatives and Programs
Some of the programs of the SANS Institute are as follows:
- Information security training: intensive
This immersion training is designed to help you master the practical steps necessary for defending systems and networks against the most dangerous attacks. - The GIAC certification program
The Global Information Assurance Certification (GIAC) was founded in 1999 by SANS and offers certifications that address multiple specialty areas (security essentials, intrusion detection, incident handling, and more). - Consensus security awareness training
This training makes users aware that even a tightly secured system can be compromised when a user accidentally opens back doors that allow malicious code to enter the network. - SANS weekly bulletins and alerts
Newsletters and alerts are sent out to about 200,000 people. - SANS information security reading room
This area on the website contains more than 1,200 papers about up-to-date topics of interest to security professionals. - SANS Step-By-Step Guides
Security professionals have been working together to compile step-to-step guides for hardening operating systems and applications. - The SANS Security Policy Project
Here you can find a set of field-proven security policies. This part will be discussed in more detail in the next section. - Vendor-related resources
This section contains tools and outside support resources. - Information security glossary
This area offers a glossary of common terms. - Internet Storm Center
The Storm Center is a powerful tool for detecting rising Internet threats. The Storm Center uses advanced data correlation and visualization techniques to analyze data collected from more than 3,000 firewalls and intrusion detection systems in more than 60 countries. - SCORE
Security Consensus Operational Readiness Evaluation (SCORE) is a community of security professionals from a wide range of organizations and backgrounds working to develop consensus regarding minimum standards and best practice information. - SANS/FBI annual top 20 Internet security vulnerability list
This list covers over 230 well-known, often-exploited vulnerabilities. - Intrusion detection FAQ
These are frequently asked questions about intrusion detection and answers to those questions.