Global Information Assurance Certification Paper - GIAC Certifications

Page created by Sylvia Byrd
 
CONTINUE READING
Global Information Assurance Certification Paper

                           Copyright SANS Institute
                           Author Retains Full Rights
  This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission.

Interested in learning more?
Check out the list of upcoming events offering
"Security Essentials Bootcamp Style (Security 401)"
at http://www.giac.org/registration/gsec
Cricket … the next MRTG
               John J. Renwick
               30 March, 2001

               MRTG is the Multi Router Traffic Grapher tool from Tobias Oetiker which has been

                                                                                                s.
               available since 1995 http://ee-staff.ethz.ch/~oetiker/webtools/mrtg/ . Cricket is evolving

                                                                                             ht
               to be the next generation of Graphing tools. http://cricket.sourceforge.net/

                                                                                         rig
               Cricket was created due to a need to forecast network growth and plan ahead for

                                                                                     ull
               expansion. Cricket, like its predecessor MRTG, provides for instantaneous management
               features such as, is the link up, what is the status of the routers, and what is the traffic

                                                                                     f
               load? Also, like MRTG, Cricket features graphical displays of network traffic trends

                                                                                  ns
               overfingerprint
               Key  configurable   time periods
                               = AF19            with998D
                                         FA27 2F94    comparison   to otherF8B5
                                                            FDB5 DE3D       dates06E4
                                                                                  or times.
                                                                                        A169It 4E46
                                                                                               provides

                                                                               tai
               information for long-term analyses of traffic trends on a specific link or an entire

                                                                            re
               network.

                                                                        or
               The program, while looking much like MRTG, has been enhanced in many ways. It is

                                                                     th
               more configurable, uses a hierarchical configuration tree, gathers data from scripts,
               SNMP, Perl procedures, etc. It is made up of two modules, a collector and a grapher, the
                                                                 Au
               collector does the heart of the work, gathering the data while running out of cron and
               storing that data in Round Robin Database (RRD) files, which is then fed into the
                                                              2,

               graphing program. The graphing program for the RDD generates the display of that data,
                                                          00

               which results in graphs similar to those displayed by MRTG.
                                                       -2

               Cricket has taken its place as the evolutionary successor to MRTG, because in addition to
                                                   00

               graphing data, it also gathers application and host-based statistics and is able to monitor
                                                20

               such events as PVC states, cable modem signal strength, and router CPU load. While it
               displays much of the same information, the hierarchical configuration tree that it uses and
                                            te

               improved code allow it to perform many more tasks much faster.
                                          tu
                                       sti

               Quote from NETWORK WORLD FUSION FOCUS: 03/07/01
                                    In

               “It is a redesign of MRTG, which was mentioned last week. One reader mentioned that
                               NS

               Cricket is much more scaleable than MRTG. According to one reader, "we have
               completely replaced our Spectrum reports with those from Cricket."”
                           SA

               The program itself is a high performance, extremely flexible system which monitors
                        ©

               trends in time oriented data. The design of Cricket was expressly done to help
               overburdened network managers visualize and understand and react to the traffic on their
               networks.

               As stated
               Key        above,= Cricket
                    fingerprint           is made
                                  AF19 FA27       up998D
                                               2F94  of twoFDB5
                                                            modules,
                                                                  DE3D a collector
                                                                         F8B5 06E4 andA169
                                                                                       a grapher.
                                                                                            4E46The
               collector runs from cron at 5 minutes intervals, or it can be configured to run more often,
               or less often depending on the needs of the network manager, however you don’t want to
               set the interval too low as you need to be able to receive and store the data requested in

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                   Author retains full rights.
less than the interval set. It stores the data into a database managed by a RRD Tool, more
               on this tool later. When you want to review the data that has collected, you can simply
               use a web-browser to view graphs of the data.

                                                                                                  s.
               Cricket’s operation is governed by a set of config files called a config tree. The config

                                                                                               ht
               tree defines everything Cricket needs to know about the types of data to be collected,

                                                                                           rig
               where to get the data, and how to get it. The config tree is compact and easy to manage
               and was designed to minimize redundant information. Think of a config tree as a set of

                                                                                       ull
               configuration files organized into a tree architecture, the hierarchical structure allows us
               to be able to use inheritance to reduce repeated information in this configuration. To

                                                                                     f
               implement the tree in an easy to understand directory structure we don’t allow

                                                                                  ns
               complicated
               Key           or tricky
                    fingerprint = AF19concepts  such998D
                                         FA27 2F94   as multiple
                                                           FDB5 inheritance.
                                                                  DE3D F8B5 06E4 A169 4E46

                                                                               tai
                                                                            re
               The rules that are present at the end of the branch is the compilation of all the rules sets in
               all the branches on a path leading from the trunk of the config tree to the end of the

                                                                        or
               branch. (See Figure 1) Lower rules always override higher rules, Rules that all of the

                                                                     th
               system will share are located in the trunk of the config tree. In this example, the length of
               the polling interval is set there. At the next level, we set attributes that will be restricted
                                                                 Au
               to the current branch. At this level, typically you will find the target type. Finally at the
               highest level we set things that will vary on a machine basis. For this example, we set the
                                                              2,

               interface or machine name that we are trying to measure here. By using the rules of
                                                          00

               inheritance, you avoid repeating the rules at the top of the config tree in the trunk of the
                                                       -2

               config tree. This three level config tree in the example is a very simple layout, and in real
               network operations you will want to develop a more complex tree structure, for instance
                                                   00

               separating different sites, or operations to be in different branches. There is a sample
                                                 20

               config tree that comes with Cricket that is just a starting point in time. There are no built-
               in limits on the shape or the architecture of the config tree, but too complex of a tree can
                                             te

               be a configuration management nightmare.
                                          tu
                                       sti

                    NT                                                                  HP
                                    In

                                        Host
                                                                                                     SUN
                               NS

                                                         Switch
                           SA

                                        Router                                  Host                     NT
                         ©

                                                           5 Min
               Key fingerprint = AF19 FA27 2F94 998D        Poll
                                                           FDB5    DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002                As part of GIAC practical repository.                    Author retains full rights.
Figure 1
                                                                     Con fig Tree
               Cricket is written entirely in Perl and was developed on Solaris machines running under
               Apache. It is known to work on Linux, HP-UX, variants of BSD, and some other
               operating systems.

                                                                                                         s.
                                                                                                      ht
               RRD Tool is written in C for speed, and comes in both a Perl module and a command

                                                                                                  rig
               line version, which means it can be used interactively or across a pipe from scripts it is
               what does all the database work for Cricket. RRD achieves its high performance by using

                                                                                              ull
               binary files to minimize I/O during the common update operation. RRD Tool stores and
               normalizes the data after the collector retrieves it, and outputs the data into the graphical

                                                                                               f
               format when the grapher asks for it. The way that RDDtool accesses the data is in a

                                                                                            ns
               circular
               Key      data buffering
                    fingerprint = AF19method   that makes
                                       FA27 2F94            the I/ODE3D
                                                    998D FDB5        two toF8B5
                                                                            three06E4
                                                                                  timesA169
                                                                                        faster4E46
                                                                                               than in

                                                                                         tai
               MRTG. RDDtool can also keep an arbitrary number of data arrays; each fed at a
               different rate. For example, you can take 1680 samples taken every 5 minutes for an

                                                                                         re
               entire weeks worth of data alongside 720 samples taken every 30 minutes for an entire

                                                                                    or
               months worth of data.

                                                                                    th
               If you are familiar with MRTG, you can see the parallel between of RRDtool and of
                                                                               Au
               MRTGs graphing and logging features. It is significantly faster and more flexible than
               MRTG, and that is where it’s strength lays. RRD is more flexible than MRTG in at least
                                                                           2,
               two aspects. Number one, and probably it’s strongest attribute is that it can take data from
                                                                       00

               an arbitrary number of data sources, MRTG was limited to only two datasources, one for
               input bandwidth and one for output bandwidth. RRD is a system to store and display
                                                                   -2

               time-series data which would be, network bandwidth, machine-room temperature, server
                                                              00

               load average, router loads etc. It stores the data in a very compact non-expanding method,
               utilizing a fixed size database which grows linearly with the number of monitored
                                                          20

               devices, not time and it displays the detailed graphs by processing the data to enforce a
               certain data density. It is used with either shell or Perl scripts or by various frontends that
                                                      te

               poll the different network devices using a friendly Graphical User Interface (GUI)
                                                  tu
                                              sti

               RRDtool is available from http://eestaff.ethz.ch/~oetiker/webtools/rrdtool/
                                          In

               It is available for various UNIX and LINX platforms and Windows NT and 2000.
                                    NS

               RRDtool does not fully replace MRTG, and there is a very good reason for that as it
                               SA

               allows other frontends to be used to interface to it, which allows for a much more robust
               tool that was never envisioned by MRTG. It provides an excellent basis for building
                           ©

               tools, which work much better than MRTG. It is my understanding that MRTG-3 will
               also utilize the RRDtool, therefore you can get a head start by utilizing the existing
               frontends written to take advantage of RRDtool, or you can program your own
               application specific frontends.
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
               Frontends:

               The following frontends are available from Tobi Oetiker’s webpage:
               http://ee-staff.eth z.ch/ ~o etiker/webtools/ rrdto ol/ frontends/

© SANS Institute 2000 - 2002                         As part of GIAC practical repository.               Author retains full rights.
Big Sister
                       The Big Sister system and network monitor concentrates on detecting failing
                       services and systems, displaying status overviews and alarming. As a means of
                       providing diagnostic information to the system administrator Big Sister also

                                                                                                     s.
                       collects trend data and uses RRDtool as a powerful and easy-to-use utility for

                                                                                                  ht
                       storing and visualizing collected data.

                                                                                              rig
                       Big Sister's features include:

                                                                                          ull
                      • detection of service or system failure via an agent alarming

                                                                                           f
                      • display of consolidated and/or detailed status overviews

                                                                                        ns
                      • collection
               Key fingerprint = AF19
                                    andFA27 2F94 998D
                                        visualization    FDB5 DE3D
                                                      of system       F8B5 06E4
                                                                performance       A169
                                                                             data via   4E46
                                                                                      RRDTool

                                                                                     tai
                      • interconnection of different Big Sister sites

                                                                                  re
                       http://bigsister.graeff. com/

                                                                              or
                                                                           th
                                                                       Au
                       Ntop
                                                                    2,

                       Ntop is a web-based application for both Unix and Win32 that reports information
                                                                00

                       about network traffic, similar to what the popular Unix top command does. Main
                                                             -2

                       ntop features include:
                                                         00

                       •   Sort network traffic according to many (IP and non-IP) protocols
                       •
                                                       20

                           Display traffic statistics
                       •   Show IP traffic distribution among the various protocols
                                                   te

                       •   Analyze IP traffic and sort it according to the source/destination
                                               tu

                       •   Display IP Traffic Subnet matrix (who's talking to who?)
                       •
                                           sti

                           Identify network security violations
                       •   Ability to browse data from a WAP phone
                                        In

                       •   Ability to access data from remote using popular languages such as Perl and
                                  NS

                           PHP
                             SA

                       By means of the ntop Perl API, it is possible to extract live traffic data from ntop
                       and easily store them into the RRDtool. Thanks to the RRDtool, network
                           ©

                       administrators can perform advanced and long-term traffic trend analysis
                       statistics. An early prototype of ntop+RRDTool can be found at
                       http://www.ntop.org/RRD/.

                       http://www.ntop.org/
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                      Remstats
                      Remstats is a statistics gathering and graphing system. The idea behind remstat is
                      to run

© SANS Institute 2000 - 2002                      As part of GIAC practical repository.              Author retains full rights.
little data collection agents on remote machines and poll them from a central
                       server where the data is kept. The data presentation happens on the fly with
                       automatically generated rrdcgi scripts which create the necessary graphs on
                       demand. Graphs can also be created statically if running rrdcgi is not possible.

                                                                                                      s.
                       http://silverlo ck.dgim.crc.ca/remst ats/release/

                                                                                                   ht
                                                                                               rig
                      RRGrapher
                      RRGrapher is a front-end for RRDtool that allows you to interactively build

                                                                                           ull
                      graphs
                      of your own design. It allows you the freedom to use any combination of other

                                                                                            f
                      RRDtool frond-ends such as MRTG, Cricket, and 14all to create and maintain the

                                                                                         ns
                      .rrd files,= but
               Key fingerprint     AF19generate graphs998D
                                         FA27 2F94     containing from any
                                                           FDB5 DE3D       of those
                                                                        F8B5   06E4sources in the same
                                                                                    A169 4E46

                                                                                      tai
                      graphs.

                                                                                   re
                       Unlike other RRDtool front-ends, RRGrapher doesn't produce ".rrd" files, it is

                                                                               or
                       used in conjunction with other popular front-ends, or custom front-ends of your
                       own devising.

                                                                              th
                       RRGrapher's features include:
                                                                           Au
                                                                         2,

                       • A simple installation - RRGrapher is just a single CGI script.
                                                                   00

                       • The ability to create graphs from data sources stored in many ".rrd" files, even
                                                               -2

                         those created by any number of different RRDTOOL front-ends.
                       • "Bookmark-able" URLs for your web browser - RRGrapher generates URLs
                                                          00

                         which contain all the information needed to reproduce your custom graph,
                                                       20

                         allowing you to produce them on-demand in the future.
                       • Display of an rrdtool command-line that you could use to generate the graph -
                                                   te

                         RRGrapher could help you to learn how to use RRDTOOL, or will at least
                                               tu

                         provide a command line which you can cut-and-paste to generate your graph
                         in "batch" mode, for instance to display on a web page.
                                           sti
                                       In

                       http://net.doit.wisc.ed u/~pl onk a/RRGraph er/
                                 NS

                       NRG
                       NRG (aka Network Resource Grapher) is the result of work at WiscNet to design
                             SA

                       and implement a highly automated and scalable MRTG-like system.
                         ©

                       http://nrg.hep. wisc.edu/

                      FwGold
                      A tool to graphically display Checkpoint Firewall-1® logging statistical data
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                      Snapshots of graphics produced using FwGold can be seen here:
                       http://rotoni.com/FwGold/ example.htm

                   FwGold's features include:

© SANS Institute 2000 - 2002                       As part of GIAC practical repository.              Author retains full rights.
•  Firewall access statistics logging and graphics
                   •  Keep graphics of last day, week, month and year statistical data
                   •  RRDtool based (stores data into non growing round robin databases)
                   •  Completely Perl written (uses RRDs perl module)

                                                                                                     s.
                   •  Client/Server structure (the server runs on the fw-1 management module, the

                                                                                                  ht
                      client can be anywhere perhaps where a Web server runs, the communication

                                                                                              rig
                      TCP port is configurable)
                  • Both client and server sides don't need to run as 'root'

                                                                                          ull
                  • Fully configurable (users can freely define criteria’s to match when filtering the

                                                                                           f
                      FW log and which db and graphics to generate, which graphic's format, colors and

                                                                                        ns
                      labels, which file names etc.)
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                  • Automatic generation of DBs, graphics and html files

                                                                                     tai
                  • Automatic prevention of spikes in case of counter resets due to server restarts

                                                                                  re
                  • Automatic detection of missed data
                  • Automatic detection of configuration errors

                                                                              or
                  • Default configuration file to generate common firewall statistics (total

                                                                           th
                      connections, connections per protocol, total accepted connections per protocol,
                      etc.)                                            Au
                  • Detailed installation and configuration instructions
                                                                    2,
                                                                00

                   http://rotoni.com/FwGold
                                                             -2
                                                           00

                   Hoth
                   Hoth is an IP accounting tool exclusively for Linux 2.2, as it relies on the IPChains
                                                      20

                   firewalling code (it will be ported to 2.4 once the kernel is stable). Hoth has the
                   ability to account per source/destination IP, source/destination port, protocol, and
                                                   te

                   interface just like the real ipchains. Furthermore you can stack every accounted data.
                                               tu
                                           sti

                   Hoth consists of an .ini style like config file, scripts for creating the firewall rules out
                                        In

                   of the config file and a CGI script to view the accounted data as graphics, which are
                   created realtime.
                                  NS

                   http://joker.rhwd.de/soft ware/ hoth/
                             SA

                   NMIS
                          ©

                   NMIS is a Network Management System which performs multiple functions from the
                   OSI Network Management Functional Areas, mainly Fault and Performance
                   Management. The idea being to make use of all that polling for performance stats and
                   get fault management for free.
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                  Sample pages are available on the NMIS home page.

                   NMIS features include:

© SANS Institute 2000 - 2002                      As part of GIAC practical repository.                Author retains full rights.
•  The entire network is summarized into a single metric, which indicates
                      reachability, availability and health of all network devices being managed by
                      NMIS.
                  • Summary page for entire network with reachability, availability, health, response
                      time metrics

                                                                                                 s.
                  • Summary pages of devices including device information, health graph, and

                                                                                              ht
                      interface summary

                                                                                          rig
                  • Color coded events, status for at a glance interpretation.
                  • Graphing of Interface, CPU, Memory stats for Cisco Routers and Switches.

                                                                                      ull
                  • Graphs can be drilled into.
                  • Graphs produced on the fly.

                                                                                       f
                                                                                    ns
                  • Graphs can have varying lengths from 2hours to 1 year
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
                  • Interface statistics are returned in Utilization not just bits per second

                                                                                 tai
                  • Response time graphed and metrics for health and availability generated from

                                                                              re
                      statistics collected
                  • Integrated Fault and Performance Management

                                                                          or
                  • Threshold engine which send alerts on certain thresholds.

                                                                       th
                  • Alert events are issued for device down or interface down
                                                                   Au
                  • Event levels are set according to how important the device is
                  • Events are "State full" including thresholds, meaning that an event is only issued
                                                                2,

                      once.
                                                            00

                  • Notification engine can be expanded to handle any "command line" notification
                                                         -2

                      method, including email, paging, signs, speakers, etc
                  • A list of current events is available and there is an escalation level and time the
                                                       00

                      event has been active.
                  • Events are logged
                                                   20

                  • Outage time calculated for each down event
                                                  te

                  • Planned outages can be put in so alerts are not issued
                                            tu

                  • Reports for utilization, outages, etc
                                         sti

                  • Find functions which search based on strings in interface types and descriptions.
                  • Dynamic handling of if Index changes and difficult SNMP interface handling
                                     In

                  • Integrated logging facility to view events and syslog messages.
                                NS

                   http://www.sins.com.au/nmis/
                            SA

                   Bronc
                         ©

                   Bronc aims to be the fastest front-end available for RRDtool. It is written in Perl,
                   using
                   Mason as a template/component engine and mod_perl to speed things up. Bronc
                   features...
               Key•fingerprint
                      a SNMP=collector,
                               AF19 FA27  2F94
                                        which   998DSNMP-capable
                                              queries FDB5 DE3D F8B5  06E4
                                                                 devices andA169  4E46
                                                                             stores
                      measurements in RRDtool databases
                  • on-the-fly graphing using BRONC::Grapher, which runs under mod_perl

© SANS Institute 2000 - 2002                  As part of GIAC practical repository.                 Author retains full rights.
•    a extensible, Perl-based configuration file, which allows for quick configuration
                        of complex graphs

                   http://bron c.blueasp en.com

                                                                                                                 s.
                   Orca

                                                                                                              ht
                   Orca is a tool useful for plotting arbitrary data from text files onto a directory on a

                                                                                                          rig
                   Web server.

                                                                                                      ull
                   http://www.gps. calt ech.edu/ ~blai r/orca/

                                                                                                  f
                  SLAMon

                                                                                               ns
               KeySLAMon
                   fingerprintis =a AF19
                                    front-end
                                          FA27for2F94
                                                  RRDTool
                                                      998D that
                                                           FDB5 allows
                                                                   DE3Dyou to calculate
                                                                         F8B5  06E4 A169working
                                                                                           4E46hour and

                                                                                            tai
                  24-by-7 availability for anything that you're currently monitoring with RRDTool. The
                  graphs and reports can cover any time period you're interested in: daily, monthly,

                                                                                        re
                  yearly, etc.

                                                                                    or
                   Currently SLAMon doesn't directly do any monitoring itself. For that you need

                                                                                th
                   another front-end, to create and update RRD files for each resource. The
                                                                           Au
                   measurements contained in these files are used as input by SLAMon to calculate
                   availability and update the corresponding availability RRDs.
                                                                        2,
                                                                    00

                   http://slamon.sourcefo rg e.net
                                                                 -2

               References
                                                            00

               Allen, Jeff R. “About Cricket” http://cricket.sourceforge.net/
                                                         20

               Allen, Jeff R. “Driving by the Rear-View Mirror: Managing a Network with Cricket“
                                                     te

               First Conference on Network Administration Santa Clara, California, April 7-10, 1999
                                                  tu

               http://www.us enix.org/publi cations/lib rary/p roceedings/n et a99/ full_papers/all en/all en_html/index.html
                                            sti

               Kramp, Bill “Beyond MRTG” SysAdmin, March 2000, Vol. 9 Issue 3
                                         In

               Oetiker, Tobias “mrtg - What is MRTG”
                                   NS

               http://ee-staff.ethz.ch/~oetiker/webtools/mrtg/mrtg.html
                              SA

               Rasmussen, Audrey “Your favorite tools, Part 2” Network World Network Systems
               Management Newsletter, 03/07/01
                          ©

               http://www.nwfusion.com/newsletters/nsm/2001/00477466.html

               Wilson, Brian “Apache Server Page Load Monitoring With Cricket” Web Review,
               02/25/00 http://www.webreview.com/2000/02_25/designers/02_25_00_2.shtml
               Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

© SANS Institute 2000 - 2002                         As part of GIAC practical repository.                              Author retains full rights.
Last Updated: January 3rd, 2021

       Upcoming Training

Amazon Web Services (AWS) SEC401                   Seattle, WA             Jan 04, 2021 - Jan 09, 2021   CyberCon

SANS Security East 2021                            ,                       Jan 11, 2021 - Jan 16, 2021   CyberCon

SANS Security Fundamentals 2021                    , Netherlands           Jan 18, 2021 - Jan 29, 2021   CyberCon

Cyber Threat Intelligence Summit & Training 2021   Virtual - US Eastern,   Jan 21, 2021 - Feb 01, 2021   CyberCon

SANS Cyber Security West: Feb 2021                 ,                       Feb 01, 2021 - Feb 06, 2021   CyberCon

Open-Source Intelligence Summit & Training 2021    Virtual - US Eastern,   Feb 08, 2021 - Feb 23, 2021   CyberCon

SANS Essentials Australia 2021 - Live Online       , Australia             Feb 15, 2021 - Feb 20, 2021   CyberCon

SANS Essentials Australia 2021                     Melbourne, Australia    Feb 15, 2021 - Feb 20, 2021   Live Event

SANS London February 2021                          , United Kingdom        Feb 22, 2021 - Feb 27, 2021   CyberCon

SANS Secure Japan 2021                             , Japan                 Feb 22, 2021 - Mar 13, 2021   CyberCon

SANS Scottsdale: Virtual Edition 2021              ,                       Feb 22, 2021 - Feb 27, 2021   CyberCon

SANS Cyber Security East: March 2021               ,                       Mar 01, 2021 - Mar 06, 2021   CyberCon

SANS Secure Asia Pacific 2021                      Singapore, Singapore    Mar 08, 2021 - Mar 20, 2021   Live Event

SANS Secure Asia Pacific 2021                      , Singapore             Mar 08, 2021 - Mar 20, 2021   CyberCon

SANS Cyber Security West: March 2021               ,                       Mar 15, 2021 - Mar 20, 2021   CyberCon

SANS Riyadh March 2021                             , Kingdom Of Saudi      Mar 20, 2021 - Apr 01, 2021   CyberCon
                                                   Arabia
SANS Secure Australia 2021                         Canberra, Australia     Mar 22, 2021 - Mar 27, 2021   Live Event

SANS Secure Australia 2021 Live Online             , Australia             Mar 22, 2021 - Mar 27, 2021   CyberCon

SANS 2021                                          ,                       Mar 22, 2021 - Mar 27, 2021   CyberCon

SANS Munich March 2021                             , Germany               Mar 22, 2021 - Mar 27, 2021   CyberCon

SANS Cyber Security Mountain: April 2021           ,                       Apr 05, 2021 - Apr 10, 2021   CyberCon

SANS London April 2021                             , United Kingdom        Apr 12, 2021 - Apr 17, 2021   CyberCon

SANS Autumn Australia 2021 - Live Online           , Australia             Apr 12, 2021 - Apr 17, 2021   CyberCon

SANS Autumn Australia 2021                         Sydney, Australia       Apr 12, 2021 - Apr 17, 2021   Live Event

SANS SEC401 (In Spanish) April 2021                , Spain                 Apr 12, 2021 - Apr 23, 2021   CyberCon

SANS Cyber Security East: April 2021               ,                       Apr 12, 2021 - Apr 17, 2021   CyberCon

SANS Secure India 2021                             , Singapore             Apr 19, 2021 - Apr 24, 2021   CyberCon

SANS Baltimore Spring: Virtual Edition 2021        ,                       Apr 26, 2021 - May 01, 2021   CyberCon

SANS Cyber Security Central: May 2021              ,                       May 03, 2021 - May 08, 2021   CyberCon

SANS Security West 2021                            ,                       May 10, 2021 - May 15, 2021   CyberCon

SANS In French May 2021                            , France                May 31, 2021 - Jun 05, 2021   CyberCon
You can also read