Need to justify a training request to your manager?
Use the sample request letters below, or elements of it, to justify the time and budget required to complete SANS training to your manager. Simply copy and paste text into an email to your manager, then make any necessary adjustments to personalize the information. Once you hit send, you’ll be one step closer to gaining the skills required to protect your organization and advance your career.
"This course will focus on two key areas: getting the data that have the answers and extracting the answers from the data. We look forward to seeing you in class!" - Eric Zimmerman | |
FOR500: Windows Forensic Analysis | GIAC Certified Forensic Examiner (GCFE)"No matter if you are new to the forensic community or have been doing forensics for years, FOR500 is a must-have course." - Ovie Carroll | |
FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics | GIAC Certified Forensic Analyst (GCFA)"Whether you are just moving into the incident response field or are already leading hunt teams, FOR508 facilitates learning from others' experiences and develops the necessary skills to take you to the next level." - Chad Tilbury | |
FOR509: Enterprise Cloud Forensics and Incident Response"FOR509 was written to give you a headstart in understanding, analyzing and solving cloud based investigations. Not only do we cover the most popular cloud solutions on the market we also help the student to understand now just how to interpret the data but how they can take their detection and response capabilities to the next level." - David Cowen | |
FOR518: Mac and iOS Forensic Analysis and Incident Response | GIAC iOS & MacOS Examiner (GIME)"While you may not work on a Mac or iOS investigation every day, the tools and techniques you learn in this course will help you with other investigations including Windows, Linux, and mobile." - Sarah Edwards | |
FOR585: Smartphone Forensic Analysis In-Depth | GIAC Advanced Smartphone Forensics (GASF)"FOR585: Smartphone Forensic Analysis In-Depth provides this required knowledge to beginners in mobile device forensics and to mobile device experts. This course has something to offer everyone! There is nothing out there that competes with this course and its associated GIAC certification." - Heather Mahalik | |
FOR578: Cyber Threat Intelligence | GIAC Cyber Threat Intelligence (GCTI)"The course will empower analysts of any technical background to think more critically and be prepared to face persistent and focused threats." - Robert M. Lee | |
FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response | GIAC Network Forensic Analyst (GNFA)"You will finish the course with valuable knowledge that you will use the first day back on the job, and with the methodologies that will help address future generations of adversaries' capabilities." - Phil Hagen | |
FOR608: Enterprise-Class Incident Response & Threat Hunting"Times have changed dramatically, and we face advanced adversaries who spread across entire enterprises aggressively and effectively. Often by the time an attack is detected you might find hundreds of systems compromised. It is important that we responders scale up our processes, using the tools and techniques available, to meet this threat. This is what FOR608 will help you achieve." - Mike Pilkington | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | GIAC Reverse Engineering Malware (GREM)"The FOR610 course is the on-ramp for professionals who wish to acquire such malware analysis, building upon the expertise they already have, to learn how to examine malicious software using a variety of practical techniques." - Lenny Zeltser | |
FOR710: Reverse-Engineering Malware: Advanced Code Analysis"Proficient reverse engineers must perform in-depth code analysis and employ automation to peel back the layers of code, characterize high-risk functionality and extract obfuscated indicators. This is what FOR710 will help you achieve." - Anuj Soni |