Browse Definitions :
Definition

SANS Institute

The SANS Institute is a private, for-profit organization that offers information security and cybersecurity training and certification in 90 cities around the world.

The Institute was founded in 1989 as a cooperative dedicated to IT security research and education. SANS maintains the largest repository of security information in the world and is also the largest certification body. The organization makes a large collection of security research documents freely available and operates an Internet warning system: The Internet Storm Center.

Resources offered by SANS:

  • SANS Information Security Reading Room offers over 2520 research papers in 96 categories.
  • SANS Weekly Bulletins and Alerts provides security news and vulnerability alerts.
  • SANS Security Policy Project offers security policy templates.
  • Vendor-Related Resources
  • Information Security Glossary includes brief definitions of security terms and acronyms.
  • Internet Storm Center
  • S.C.O.R.E. - A mechanism designed to help industry members agree on tools to secure common software and systems.
  • CIS Critical Security Controls provides a consensus-based ranking of the most effective security controls.
  • Intrusion Detection FAQ (frequently-asked questions).
  • SANS Press Room - Resources to help media cover the industry.

The SANS Institute’s GIAC (Global Information Assurance Certification) program provides a standards-based means to ensure the knowledge and abilities of a security professional. The program encourages continuous learning through its work-study program which provides teaching credits that can be redeemed for a reduced rate on classes.

This was last updated in May 2016

Continue Reading About SANS Institute

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close