SANS Computer Forensic Instructors are real-world practitioners who specialize in the subjects they teach. All instructors undergo rigorous training and testing before earning SANS Certified Instructor status. This helps us guarantee that what you learn in class will be up-to-date and relevant to your job.

"The instructor was very helpful in making sure that the class has a good understanding of the information covered to date", - Debbie Moeker, 3M.

Rob Lee

Rob Lee

Rob Lee is an entrepreneur and consultant in the Boston area, specializing in information security, incident response, threat hunting, and digital forensics. Rob is currently the curriculum lead and author for digital forensic and incident response training at the SANS Institute in addition to owning his own firm. Rob has more than 18 years of experience in digital forensics, vulnerability and exploit discovery, intrusion detection/prevention, and incident response.
Rob graduated from the U.S. Air Force Academy and served in the U.S. Air Force as a founding member of the 609th Information Warfare Squadron, the first U.S. military operational unit focused on information operations. Later, he was a member of the Air Force Office of Special Investigations (AFOSI) where he led a team conducting computer crime investigations, incident response, and computer forensics. Prior to starting his own firm, he directly worked with a variety of government agencies, U.S. Department of Defense, and intelligence communities as the technical lead for a vulnerability discovery and an exploit development team, lead for a cyber forensics branch, and lead for a digital forensic and security software development team. Rob was also a director for MANDIANT, a company focused on investigating advanced adversaries, such as the APT, for five years prior to starting his own business.
Rob co-authored the book Know Your Enemy, 2nd Edition. Rob earned his MBA from Georgetown University in Washington DC. Rob is also a co-author of the MANDIANT threat intelligence report M-Trends: The Advanced Persistent Threat.

Here is What Students Say About Rob Lee:

"Mr. Lee is flawless. Great teaching style with an excellent delivery of the content." - Dusko Stjepanovic, JSOC

Matt Bromiley

Matt Bromiley

Matt Bromiley is a principal incident response consultant at a top digital forensics and incident response (DFIR) firm where he assists clients with incident response, digital forensics, and litigation support. He also serves as a SANS GIAC Advisory Board member, a subject-matter expert for the SANS Securing The Human Program, and a technical writer for the SANS Analyst Program.  Matt brings his passion for digital forensics to the classroom as a SANS instructor for FOR508: Digital Forensics, Incident Response, and Threat Hunting, and FOR572: Advanced Network Forensics, where he focuses on providing students with implementable tools and concepts. 

"SANS is the only organization where I have seen students bursting to get out of class to apply their newly acquired skills to current casework," he says.  

Matt fell into this career somewhat by accident, taking on a junior analyst role because the team was great and the work sounded exciting. "My first day, I was working a keylogger case that required me to examine various hardware, test information, extract USB information, and decode logged keys," he recalls. "I was hooked!" 

Since then, Matt has built a wide-ranging career that gives him a broad perspective on digital forensics. He has helped organizations of all types and sizes, from multinational conglomerates to small, regional companies. His skills run the gamut from disk, database and network forensics to malware analysis and classification, incident response/triage and threat intelligence, memory analysis, log analytics, and network security monitoring.  

Along with traditional database forensics, Matt has experience deploying such tools as Elasticsearch, Splunk, and Hadoop to assist in large-scale forensic investigations, network security monitoring, and rapid forensic analysis on over 100 systems and over 10TB of logs. He has a particular interest in database and Linux forensics, as well as in building scalable analysis tools using free and open-source software.  

Matt understands the importance of making the information he's teaching relatable to students. "It's easy to picture every scenario as an advanced persistent threat attack, but some students don't perform those investigations," he explains. So Matt looks for the common ground among all of the specific artifacts and the bigger picture that each artifact helps develop, thus enabling students to enhance their investigations and succeed in their day-to-day careers. 

His extensive experience in digital forensics shines through in his teaching. An energetic, enthusiastic instructor, Matt sees digital forensics as a puzzle that is begging to be solved. He loves piecing together artifacts to tell a vivid story about what has happened, and he strives to inspire his students to have the same passion for "completing the puzzle".

Outside of work, Matt loves spending time with his family, cooking Texas BBQ, and making his house as automated as possible in hopes that it will one day do work for him.

Summary of Qualifications:

  • More than six years in digital forensics and incident response
  • GIAC Advisory Board Member
  • Subject-matter expert for the SANS Securing The Human Program
  • SANS Analyst Program writer

Get to Know Matt Bromiley:

Here's what students are saying about SANS Instructor Matt Bromiley:

"I really valued your lectures, and most importantly, your enthusiasm and expertise on forensics." - Robert S., New York Metropolitan Transportation Authority

"Matt continues to demonstrate passion for the topics being taught. The real-world examples he provides are a great addition to supplement the content in the book." - Michael F., Macquarie Group

"FOR508 lead by Matt Bromiley has dramatically increased my DFIR skills in less than a week, anyone serious about incident response or windows forensics must take this course" - Joe V., Moran Towing Corporation

Rebekah Brown

Rebekah Brown

Rebekah Brown has helped develop threat intelligence programs at the highest levels of government and has had some exciting experiences along the way. She is a former National Security Agency network warfare analyst, U.S. Cyber Command training and exercise lead, and crypto-linguist and Cyber Unit Operations Chief for the U.S. Marine Corps. She's even provided a briefing at the White House.

But if you ask Rebekah what she's most proud of, she'll tell you it's the success of the students and co-workers she's mentored throughout her career.

Rebekah started out in traditional military intelligence work, focused on Chinese cryptologic linguistics. She was then selected to cross-train as a network warfare analyst, which provided the opportunity to fuse her understanding of language and culture with network defense. "I loved the ability to combine different aspects of intelligence and apply it in ways that many people in the intelligence community were just beginning to understand," she says.

Rebekah has since provided threat intelligence for all types of security programs ranging from national security operations to state and local governments and Fortune 500 companies.  She currently is the threat intelligence lead for Rapid7, where she supports incident and analytical response and global services and provides product support. She is also a course instructor and student mentor at SANS, where she teaches FOR578: Cyber Threat Intelligence, a course she co-authored. She is also co-author along with SANS Instructor Scott Roberts of the book Intelligence Driven Incident Response.

In her day-to-day work, Rebekah spends a lot of time focused on understanding intelligence sources, conducting multiple levels of analysis, and explaining what intelligence means and how it can be used to a variety of audiences.

"Regardless of their specific role, all three of these actions are things my students will have to do, most likely on a daily basis," says Rebekah. "Understanding intelligence and its implications and being able to convey that knowledge at different levels are skills that will help make any cyber threat intelligence analyst successful."

A highlight of Rebekah's career was providing a briefing at the White House on the future of cyber warfare and coordinated defensive and offensive cyber operations. "This coordination was something I strongly advocated during my time in DoD cyber operations with the Marine Corps," says Rebekah. "I'm happy to report that the idea has been widely adopted."

A dedicated mentor, Rebekah is most proud of the success achieved by the coworkers she supported throughout her career.  

"Intelligence work requires a team with diverse backgrounds to be successful, but I found that those without a strong background in computer science often felt that they did not have the experience needed to contribute to the team," she explains. "I love helping co-workers and students understand how their previous experience ties into what they are learning, and providing them with tools and resources that they can go back and use at their jobs on day one."

Rebekah has an associate's degree in Chinese Mandarin and a bachelor's degree in international relations, and she is finishing her master's degree in homeland security with a cybersecurity focus as well as a graduate certificate in intelligence analysis.

In her free time, Rebekah enjoys hiking, camping and snowboarding. She also plays the baritone ukulele and is an outfielder for her kickball league in Portland, Oregon. However, Rebekah is never too far from the work she loves. Hailing from a family of engineers, she notes that a common family discussion over Thanksgiving dinner might include implementation of PLCs in waste water treatment labs and the security needed for it!

Qualifications Summary

  • Former Operations Chief for the U.S. Marine Corps Cyber Unit
  • Current threat intelligence lead for Rapid7
  • 12+ years of threat intelligence experience
  •  Certified Information Systems Security Professional (CISSP)
  • SANS FOR578: Cyber Threat Intelligence instructor and co-author

Get to Know Rebekah Brown

Carlos Cajigas

Carlos Cajigas

Carlos Cajigas has his heart fully invested in his work. Following the terrorist attacks on September 11, 2001, Carlos was inspired to pursue a career in law enforcement in order to combine his passion for computers with his sense of duty to protect victims of cybercrime and make the world a safer place. Today, Carlos has expanded his pursuits to include being an instructor and blogger, enabling him to share his knowledge and experience with others interested in pursuing a career in digital forensics.

A native of San Juan, Puerto Rico, Carlos began his career with the West Palm Beach Police Department in Florida, first as a police officer and eventually as a digital forensics detective, examiner, and instructor specializing in computer crime investigations. During his law enforcement tenure, Carlos conducted examinations on hundreds of digital devices, from computers and mobile phones to GPS devices, and served as both a fact and expert witness in the State of Florida. In 2013, Carlos taught mobile forensic courses in Latin America for the U.S. State Department's Anti-Terrorism Assistance Program.   

Today, Carlos is a Senior Incident Response Consultant at DXC, where he is responsible for responding to computer and network security threats for clients located in North and South America. Carlos also teaches FOR500: Windows Forensic Analysis and FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting at the SANS Institute, where he brings his experience with law enforcement forensics and enterprise incident response to the classroom.

"My teaching philosophy is simple," Carlos says. "I strive to empower each student by developing their ability to conquer knowledge of a forensic technique, using demonstrations and the sharing of real-life applications and implications as to why a technique is important. I want my students to know which specific artifacts to analyze regardless of the tool chosen for the analysis."

Digital crime has increased dramatically in recent years, and hard drive sizes have expanded exponentially, greatly increasing the amount of cases and devices that need to be analyzed.

"The days of imaging and processing extremely large hard drives for hours before beginning analysis is a thing of the past," says Carlos. "Taking into consideration limited resources and manpower, today's examiners must be as efficient as possible in what we do and how we do it."

To help students overcome these challenges, Carlos shares techniques in his classes on how to directly target specific files and folders that can yield the biggest amount of answers in the least amount of time. "That way you can have answers within minutes rather than within hours," he says. 

Carlos has been involved in hundreds of cases and helped obtain numerous convictions using many of the techniques he teaches in class. As an investigator, he gets great satisfaction knowing that he did his part in protecting victims. As a teacher, seeing students grasp his explanation of an artifact can be just as satisfying, knowing that he is preparing them for the challenges of the future.

Carlos holds bachelor's and master's degrees from Palm Beach Atlantic University in Florida, and has completed numerous training courses, including courses offered by Guidance Software (EnCase), National White Collar Crime Center (NW3C), Access Data (FTK), United States Secret Service, the International Association of Computer Investigative Specialists (IACIS), and SANS.

Carlos also holds numerous certifications in the digital forensics field, including EnCase Certified Examiner (EnCE), Certified Digital Forensic Examiner (CDFE) from Mile2, Access Data Certified Examiner (ACE), Certified Forensic Computer Examiner (CFCE) from IACIS, and the GIAC Certified Forensic Analyst (GCFA), GIAC Certified Forensic Examiner (GCFE), GIAC Certified Incident Handler (GCIH), GIAC Advanced Smartphone Forensics (GASF), and GIAC Reverse Engineering Malware (GREM) from SANS. Carlos is a Florida Department of Law Enforcement (FDLE) certified instructor with experience teaching digital forensic classes. He is an active member of both the International Association of Computer Investigative Specialists (IACIS) and Miami Electronic Crimes Task Force (MECTF).

Carlos also maintains a computer forensics blog aimed at helping other digital forensic examiners use free open-source Linux-based tools to do their jobs. He hopes to develop and increase awareness in this area and believes that open-source tools can provide examiners with alternatives and/or supplement commercial software.

During his free time, Carlos throws his passion into his pursuit of designing and baking the best homemade pizza.

Qualifications Summary

  • More than 12 years of experience in digital forensics, both as a law enforcement officer and as an incident responder for IBM.
  • Instructor for FOR500: Windows Forensic Analysis at the SANS Institute

Get to Know Carlos Cajigas

Here is What Students Say About Carlos Cajigas:

"The instructor has a great teaching style. He is able to balance course content with personal experience in an efficient manner (to not waste time in class). He explains complex concepts very well." - Luis Martinez, Westchester District Attorney's Office

"One of the best instructors I have had." - Patrick O'Leary, NCDOC  

"Carlos is a great instructor with a lot of energy to drive the point home." - Jason Hultman, Diplomat Pharmacy

"Great instructor, very experienced in teaching a wide audience." - Brian Plummer, CACI

"The instructor is one of the most exciting, knowledgeable and articulate teachers I've ever had." - Joe Michalek, PWC

Eric Capuano

Eric Capuano

Eric Capuano began his career in Information Security as a Tactics Developer for the United States Air Force, specializing later in intrusion detection signature development. Since departing active duty, Eric has lead cybersecurity operations in both private and government entities. He currently manages the Security Operations Center for the Texas Department of Public Safety, where he singlehandedly built the agency's first CSIRT. Eric routinely leverages Windows forensics skills in support of defensive and incident response operations as well as providing support to law enforcement. With this experience, Eric is able to provide real-world forensics experience not only for LE/investigative purposes, but also for identifying attack methods and infection timelines of compromised systems.

Eric continues to serves part-time in the Texas Air National Guard as a Cyber Warfare Operator. He also teaches Cyber Patriot and is a member of the Packet Hacking Village / Wall of Sheep at DEFCON each year. In his spare time, Eric enjoys tinkering in Python, analyzing malware, authoring threat signatures/IOCs, and developing/maintaining honeypots and deception systems. He has a passion for detailed threat analysis and uses those skills to bolster defensive postures by leveraging defense-in-depth methodologies.

Eric currently holds the following certifications: GIAC GCFE and GCFA, Certified Ethical Hacker, Security+, Linux+, LPIC-1, PCNSE, A+. On his blog, he shares opinions and techniques mostly centered around information security,

Ovie Carroll

Ovie Carroll

For Ovie Carroll, digital forensics is all about the hunt for evidence in digital places that are hiding critical clues, followed by deep analysis to prove something that the evidence was never intended to prove. That's why Ovie, a cybercrime expert and veteran law enforcement officer, loves teaching the SANS FOR500 Windows Forensic Analysis course.

"I love exposing students to how exciting digital investigative analysis is," Ovie says. "My passion is for digital evidence and digital investigative analysis. I leverage my abilities, expertise, and my current experience with the U.S. Department of Justice to see across investigative activities around the world, use that vantage point to see the whole picture of where we are in digital investigative analysis and cybercrime fighting, and identify the future challenges in both investigative practices and the courts. And I try to bring all of that to my students."

Ovie's students are clearly getting what he's bringing - many of them finish his classes with renewed career plans. "They leave my class saying that they originally had no intention of going into digital evidence but now see it is more exciting than any other aspect of cybercrime fighting or incident response," he says.

Ovie's teaching philosophy centers on sharing and demonstrating his passion for digital investigative analysis. Drawing on 31 years of law enforcement and cyber investigation experience, his dynamic presentations not only deliver the technical material but also show how each digital artifact can be used to help solve cases.     

Ovie's career in digital forensics has its roots in his years-long interest in computers - how they work and how they can and are being used in everyday life. Of particular interest is how companies are collecting, manipulating, analyzing, and monetizing people's every behavior online. "I am always interested in investigating how we can possibly tap into the information computers and companies are collecting to use it for good and to bring justice to victims," he explains.

In addition to teaching digital forensics at SANS and co-authoring the FOR500 Windows Forensic Analysis course, Ovie is the Director of the Cybercrime Lab of the Computer Crime and Intellectual Property Section (CCIPS) at the Department of Justice (DOJ). The lab provides advanced computer forensics, cybercrime investigation, and other technical assistance to DOJ prosecutors to support implementation of the department's national strategies for digital evidence and to combat electronic penetration, data theft, and cyberattacks on critical information systems. He also teaches two classes as an adjunct professor at George Washington University in Washington, DC.

Prior to joining the DOJ, Ovie was a Special Agent in Charge overseeing the Technical Crimes Unit of the Postal Inspector General's Office, where he was responsible for all computer intrusion investigations within the postal service network infrastructure and for providing all digital forensic analysis in support of criminal investigations and audits. He also served as a special agent in the Air Force Office of Special Investigations, investigating computer intrusions and working both general crimes and counterintelligence as well as conducting investigations into offenses including murder, rape, fraud, bribery, theft, and gangs and narcotics.

Computers are front and center in Ovie's free time as well, but he also enjoys plenty of offline activities, including public speaking, scuba diving, travel, and meeting new people.

Qualifications Summary:

  • 31 years of law enforcement experience and over 20 years of cyber investigative experience
  • Director of the Cybercrime Lab of the Computer Crime and Intellectual Property Section (CCIPS) at the Department of Justice (DOJ)
  • Adjunct professor at George Washington University
  • FOR500 Windows Forensic Analysis co-author and instructor

Get to Know Ovie Carroll:

Here is What Students Say About Ovie Carrol:

"Ovie is just an awesome instructor. He has a wealth of knowledge and really made the course a live and exciting joy." -  Mohamed Abdelsalam, Glencore

"Ovie has got this thing down, pat! He is informative, personal, very very knowledgeable, and, entertaining on top of it all! Really enjoy his teaching methods." -  Mike Bowden, Boeing

"Ovie is a great instructor, always has an answer to any question." - Brian Pitchford, Marriott

"He is wonderful. It is high energy. Keeps the student alert." - Selean Jones, Verizon

"Very energetic and extremely knowledgeable. Great instruction and content. Keep up the good work Ovie, it shows in the way you teach that you are very passionate about teaching forensics. I will take additional SANS DFIR classes, but for the money, I will make certain Ovie is teaching. You're just not gonna find an instructor as engaged/entertaining/knowledgable as Mr. Carroll. Very outstanding instruction." - Chad Gish, Metro Nashville PD.

"Great class! The hands on training exercises, SANS material, plus real-life examples have been a tremondous help especially since I have limited experience." - Jamie Schroeder, John Deere

David Cowen

David Cowen

David Cowen is a Certified SANS Instructor and a Partner at G-C Partners, LLC, where his team of expert digital forensics investigators pushes the boundaries of what is possible on a daily basis. He has been working in digital forensics and incident response since 1999 and has performed investigations covering thousands of systems in the public and private sector. Those investigations have involved everything from revealing insider threats to serving as an expert witness in civil litigation and providing the evidence to put cyber criminals behind bars.  
David has authored three series of books on digital forensics; Hacking Exposed Computer Forensics (1st-3rd editions), Infosec Pro Guide to Computer Forensics, and the Anti Hacker Toolkit (Third Edition). His research into file system journaling forensics has created a new area of analysis that is changing the industry. Combined with Triforce products, David's research enables examiners to go back in time to find previously unknown artifacts and system interactions.
David speaks about digital forensics and file system journaling forensics at DFIR and Infosec conferences across the United States. He has taught digital forensics both as a SANS instructor and as a graduate instructor at Southern Methodist University.
David is a Certified Information Systems Security Professional (CISSP) and a GIAC Certified Forensic Examiner. He is the winner of the first SANS DFIR NetWars and a SANS Lethal Forensicator whose passion for digital forensics can be seen in everything he does. He started in 1996 as a penetration tester and has kept up his information security knowledge by acting as the Red Team captain for the National Collegiate Cyber Defense Competition for the last nine years.
David is the host of the Forensic Lunch, a popular DFIR podcast and live YouTube show, and the author of the award winning Hacking Exposed Computer Forensics Blog. The blog ( contains some 448 articles on digital forensics.  David is a two-time Forensic 4cast award winner for both Digital Forensic Article of the Year and Digital Forensic Blog of the year. The Forensic 4cast award winners are nominated by their peers and voted on by the greater DFIR community.
When David is not researching, writing, testifying, or teaching about digital forensics he spends time with his family and working on mastering Texas BBQ.

Here is What Students Say About David Cowen:

"David Cowen rocks. He is funny. He is friendly and extremely knowledgeable."  -- Bob Akin, SAIC

"David was awesome, brilliant, and entertaining to learn from." -- Jonathan Reitnauer, Vanguard

Here is What Instructors Say About David Cowen:

"I have had the pleasure of teaching with David multiple times and working with him in the forensics field.  David's passion and knowledge has made him one of the leading minds and innovators in the digital forensics community.  I saw many students loving David's open approach to teaching and the fact you could tell he really cared that they learn and understand the material.  He is one of the finest instructors I have had the pleasure of working with.  He is one of the best I've seen."  --Rob Lee, SANS DFIR Lead

Listen to David Cowen's industry changing research, released on Windows USN Journal Analysis, for real-time tracking of a suspect's activity on a Windows system.

Learn more about David Cowen in this DFIR Hero interview on the SANS DFIR Blog.

Domenica Crognale

Domenica Crognale

Domenica "Lee" Crognale likes a challenge, and to her, finding flaws is the fun part of her job. "I actually prefer to take a look at the applications where the developer has marketed them as being totally secure," she says. "You almost say to yourself 'challenge accepted.'"

Early in her career, Domenica took a cybersecurity position focusing on mobile device security, and was hooked. Now with more than ten years of experience analyzing multiple operating systems (Windows, Mac, Linux) and working in the areas of mobile device security, Domenica has seen her share of exciting challenges. "I have been able to point out some very major application flaws on some very popular applications through testing and validation," she says.

At one former position, Domenica received recognition for assisting with the Osama Bin Laden media, a highlight of her career. In another position, she provided training to military special forces, the United States Coast Guard and other government agencies, and has tested and validated various mobile forensics utilities and provided security assessments for many mobile applications. At the State Department she evaluated applications, and realized how much data really isn't protected.

Domenica currently serves as a senior mobile forensic analyst at ManTech International where she dissects the plethora of interesting data left behind by third-party mobile applications.

Domenica is a co-author of SANS FOR585: Advanced Smartphone Forensics. As a co-author, she has been able to share some of her challenges and experiences with students who are interested in the field, something that's been a very rewarding experience. "One former student shared that the she appreciated all of the work that went into the Legacy BlackBerry section of the course, and mentioned that she was able to use the information that she learned in class to assist with prosecuting a subject," says Domenica. "This section was particularly challenging to author, so this feedback made me realize that what we are doing is truly helping make examiners better in the field. I also like that every single case is different. It's still growing and there are so many opportunities to make a difference in this field."

In her teaching, Domenica ensures her students know that it's okay if they don't have all of the answers. "I also stumble through some of this data trying to make sense of all of the millions of things you can find on these devices," she says. "This field will always keep you on your toes because there is always something new. It's your motivation to do research and testing that will set you apart from other examiners."

And even with her experience and wealth of knowledge, Domenica says she still treats every mobile device application the same way as she did her first examinations. "You are never too advanced to research," she says. Also, Domenica says that regardless of having all of the best books, notes and samples, this field requires the need for constant testing. "If you aren't prepared to create test data to verify your findings, you may still be missing a piece of the puzzle."

Domenica maintains multiple certifications including the GASF, EnCE, CCE, and CISSP. She is also a IACIS CFCE mentor and coach, providing mentorship to candidates enrolled in the IACIS certification process.

When she's not investigating, teaching and mentoring, Domenica enjoys spending time with friends and family and her two adopted rescue pups, who make a few appearances in the course material! Luckily, she says, they are willing subjects.

Qualifications Summary

  • Cyber security engineer specializing in mobile devices
  • More than 10 years of experience in the field
  • Senior mobile forensic analyst at ManTech International
  • Co-author of SANS FOR585: Advanced Smartphone Forensics
  • IACIS CFCE mentor and coach


  • CISSP (Certified Information Systems Security Professional)
  • GASF (GIAC Advanced Smartphone Forensics Certification)
  • EnCE (EnCase Certified Examiner)
  • CCE (Certified Computer Examiner)

Sarah Edwards

Sarah Edwards

A self-described Mac nerd, Sarah Edwards is a forensic analyst, author, speaker, and both author and instructor of SANS FOR518: Mac Forensic Analysis.  She has been a devoted user of Apple devices for many years and has worked specifically in Mac forensics since 2004, carving out a niche for herself when this area of forensics was still new. Although Sarah appreciates digital forensics in all platforms, she has a passion for working within Apple environments and is well known for her work with cutting-edge Mac OS X and iOS, and for her forensic file system expertise.   

Sarah's dynamic classroom and presentation skills have been heralded by both her students and colleagues. She keeps students interested and engaged.  Sarah has more than 12 years of experience in digital forensics, and her passion for teaching is fueled by the ever-increasing presence of Mac devices in today's digital forensic investigations. Given the complexity of most cases and the high probability that an OS X or iOS will be a part of an investigation, deep knowledge of these Operating Systems is crucial to ensure that forensic analysts grasp all the information required in a case and not omit valuable data. 

"Apple devices will continue to grow in popularity, and digital forensic investigators and analysts must start paying more attention to them," Sarah explains. "Windows analysis is the base education in the field of digital forensics, and any additional skills you can acquire set you apart from the crowd, whether it is Mac, mobile, memory, or malware analysis."

Sarah has worked with federal law enforcement agencies on a variety of high-profile investigations in such areas as computer intrusions, criminal cases, counter-intelligence, counter-narcotics, and counter-terrorism.  Her research and analytical interests include Mac forensics, mobile device forensics, digital profiling, and malware reverse engineering.

A frequent presenter, Sarah has spoken at industry conferences including Shmoocon, Enfuse (formerly known as CEIC), DEF CON, BSides New Orleans, BSides Las Vegas, and the SANS DFIR Summit. She has a bachelor's degree in information technology from the Rochester Institute of Technology and a master's in information assurance from Capitol College. Beyond her deep interest in digital forensics and anything Mac, Sarah loves cooking, reading tech books, traveling anywhere, and "making things work".

Here is What Students Say About Sarah Edwards:

"Sarah knows her stuff.  This course gets better each day.  Very useful information.  Well-formed course." - Anthony Cifaretto, Verizon

"Sarah gave another great day of presentations - her knowledge is impressive." - Ben Keck, Ciena

"Very comprehensive in-depth coverage of the course topic.  Excellent reference materials as a take- away." - Jennifer Barnes, Indiana State Police

"Sarah Edwards has spent the last several months putting the (FOR518) material together and I have to say that it is fantastic. The content is very detailed and provides excellent information. I have a fair amount of experience investigating Apple systems. In fact, Apple products appear to be the core (get it?) of what we do these days. As such I would not have expected to learn as much as I did but there were times this week when my jaw dropped at one of Sarah's revelations or one of Hal Pomeranz's demonstrations. I learned a great deal and am delighted at the fact that I was able to attend." - Lee Whitfield, 4:cast

Here is What Instructors Say About Sarah Edwards:

"Sarah's expertise in authorship and instructing has led to the successful addition of the FOR518 Mac course to our lineup.  Sarah's classroom and presentation skills continuously pull in record scores.  She is absolutely the best at her trade." - Rob Lee, SANS Fellow and DFIR Curriculum Lead

"Sarah is clearly the Mac subject-matter expert who has designed a top-notch course. She handles student questions with the expertise and grace of the seasoned instructor she is." - Ovie Carroll, SANS Certified Instructor

"Sarah did an amazing job producing an incredibly detailed technical course on Mac Forensics. And then she shows up every time to teach and knocks it out of the park. Students can't help but respond to her total mastery of the material and enthusiasm for the subject matter." - Hal Pomeranz, SANS Fellow

Qualifications Summary:

  • More than 12 years of Mac forensics experience
  • More than 8 years' experience teaching in digital forensics
  • FOR518 Mac Forensics Analysis course and author statement

Get to Know Sarah Edwards"

Mathias Fuchs

Mathias Fuchs

"Renaissance man" may be the most fitting description of SANS instructor Mathias Fuchs, who is the Head of Cyberdefense at the Swiss firm InfoGuard AG as well as a volunteer paramedic and a pilot.

Mathias began his career teaching Linux administration and general IT security and quickly moved into penetration testing and red teaming. As his skills improved (and as breaking into customer systems got more repetitive and less demanding), Mathias sought new challenges that would expand his IT security acumen. So, he moved over to digital forensics and incident response, a field where the attacker unintentionally sets the pace and partly controls what an investigator needs to do - rather than that being dictated by the customer or the investigator.

"Any well-funded advanced persistent threat group makes sure that an investigator never runs out of new challenges," Mathias notes.

The exciting pace of the field continues to inspire Mathias. "As an investigator, you get to see the newest kinds of attacks and the best malware available," he explained, adding that he also is constantly expanding his knowledge base as he learns about each customer's business.

At InfoGuard, Mathias is focused on building the incident response practice. He uses his knowledge and experience to shape his team and proactively mediate pitfalls that are more difficult to change later. Taking on these challenges gives him perspective as a SANS instructor, as many students are still getting up to speed and are in the initial phases of preparing their organization to address potential threats.

Prior to InfoGuard, Mathias was a principal consultant at Mandiant, where he led large-scale cybersecurity investigations all over the world. Before that, Mathias served as a lead security architect at Deutsche Telecom subsidiary T-Systems while working in tandem as a security consultant for international clients in the telecommunications, automotive, pharmaceutical, and petroleum industries.

As an instructor for SANS FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting, Mathias draws both on his roots in teaching as well as his experience in the field to frame the subject matter with real-world examples. He believes in teaching by example, and tries to work labs as he would a real-life case. Students in the course need to dig into the smallest pieces of the puzzle but still focus on the big picture in an enterprise-wide investigation.

The starting point for each individual student is different, and Mathias loves leveraging all the knowledge available in class - both his own and that of his students.

"In the end, I want my students to be able to question their procedures and their security products to improve how they do incident response by making them more efficient and effective," he says.

To help students deal with bigger cases than they have ever dealt with before, Mathias shares his mistakes as well as his successes. "While there's no substitute for experience, I want my students to be very conscious of the typical risks when running big investigations," he explains. "Besides, I have a ton of cool stories to tell!"

In one particularly extensive case during his time at Mandiant, Mathias was investigating networks with 100,000+ endpoints. "I quickly figured out that the attacker had only been there for two weeks and we were able to completely record and track every single operation he did," says Mathias. The investigators eventually kicked the attacker out after four weeks when he got too aggressive, and the process provided weeks of valuable intelligence for future cases.

In another investigation, Mathias was able to access a crash dump of the RDP server process when it crashed during the attack. "Dissecting this crash dump gave me a lot of information about the attacker group and was key to further investigation, as it helped to quickly find 50 more machines the attacker accessed without installing any malware."

Mathias stays active even when he?s not teaching or in the midst of an investigation, using his pilot's license to fly small airplanes over the Alps, hiking, mountain biking, snowboarding, and volunteering as a paramedic for his local ambulance service.

Qualifications Summary

Get to Know Mathias Fuchs


  • Recipient of the Lethal Forensicator Coin


  • GCFA - GIAC Certified Forensic Analyst
  • CISA - Certified Information Systems Auditor
  • ITIL v3 Foundation
  • ITIL v2 Foundation
  • PCI Qualified Security Assessor (QSA)

Here is What Students Say About Mathias Fuchs:

"Mathias has very good teaching skills, gives examples from recent news what is invaluable" - Barakat Rita, Gemalto

"He is experienced, cool, and delivers solid knowledge in the classroom." - Erich Lerch, BIT

"Mathias has great knowledge and provides relevant real-world examples." - Ian Jones, Lastline

Jess Garcia

Jess Garcia

Jess Garcia is the founder and technical lead of One eSecurity, a global Information Security company specialised in Incident Response and Digital Forensics.

With near 20 years in the field, and an active researcher in the area of innovation for Digital Forensics, Incident Response and Malware Analysis, Jess is today an internationally recognised Digital Forensics and Cybersecurity expert, having led the response and forensic investigation of some of the world's biggest incidents in recent times.

In his career Jess has worked in a miriad of highly sensitive projects with top global customers in sectors such as financial & insurance, corporate, media, health, communications, law firms or government, in other Cybersecurity areas as well such as Security Architecture Design and Review, Penetration Tests, Vulnerability Assessments, etc.

A Principal SANS Instructor with almost 15 years of SANS instructing experience, Jess is also a regular invited speaker at Security and DFIR conferences worldwide.

Previously, Jess worked for 10 years as a systems, network and security engineer in the Spanish Space Agency, where he collaborated as a security advisor with the European Space Agency, NASA, and other international organisations.

Jess holds a Masters of Science in Telecommunications Engineering + Computer Science from the Univ. Politecnica de Madrid.

Here is What Students Say About Jess Garcia:

"Overall Jess is an amazing instructor - broadly experienced, and methodologically and didactically competent." - Thomas Sülzle, Bundeswehr

Philip Hagen

Philip Hagen

For Phil Hagen, a career in information security chose him even before the movies War Games and Sneakers spurred his broader interest in the field. Phil has been captivated since the early days, working on information security projects since the mid-1990s, but networking grabbed his attention even before that.

"Since installing a 2400bps modem into an Apple //e around 1988, every computer I've used has been able to communicate with others," he says. "Of course the systems themselves are becoming more and more varied, making network analysis a critical component of the investigative process today."

Phil began his studies at the U.S. Air Force Academy's Computer Science Department, where he focused on network security and was an inaugural member of the computer security extracurricular group. He served in the Air Force as a communications officer at Beale AFB and the Pentagon. In 2003, Phil moved over to a position with a government contractor, providing technical services for various IT and information security projects.

Today, Phil's career has spanned the full attack life cycle - tool development, deployment, operations, and the investigative aftermath - giving him rare and deep insight into the artifacts left behind. Phil has covered deep technical tasks, managed an entire computer forensic services portfolio, and handled executive responsibilities. He's supported systems that demanded 24x7x365 functionality, managed a team of 85 computer forensic professionals in the national security sector, and provided forensic consulting services for law enforcement, government, and commercial clients. All of that brings Phil to his role today as the DFIR strategist at Red Canary, where he supports the firm's managed threat detection service.

Phil is also a senior instructor for the SANS Institute, and is the course lead and author of FOR572: Advanced Network Forensics and Analysis. This six-day course provides a hands-on curriculum to learn the skills necessary to perform investigations of network-based incidents, where the hard drives or memory of compromised systems are often missing.

"In each class, I take care to explain the relevance of the concepts to cases I've worked and scenarios I've encountered in the past," says Phil. "In FOR572, our classwork and hands-on materials are all taken from real-world experiences and cases. Our week in class is jam-packed and we deliberately focus our attention on adversary behaviors that have been actively observed in the wild."

Phil also spends time developing and maintaining the SOF-ELK distribution, a virtual appliance that is preconfigured with the ELK stack (Elasticsearch, Logstash, and Kibana). "This takes a lot of time investment, but it's very rewarding to hear from the DFIR community at large when they've used SOF-ELK in their own environments and cases to boost efficiency and effectiveness," he says.

Phil has always been a mentor and teacher at heart, and his relationships with former colleagues and students constitute one of his biggest sources of professional pride. "In my previous job at a large defense contractor, I was responsible for managing the entire computer forensic division," says Phil. "The division consisted of many people in various critical roles, including an exceptional team of site managers that I relied heavily on. Years later, I still stay in touch with most of those managers and many other people from the overall team. They have all grown professionally and it's amazing to see what roles they've taken on. It's humbling to see so many people really pursue the trajectory they set for themselves so many years ago."

In one of his most exciting cases, Phil provided forensic examination and overall investigative support to a law enforcement case involving hundreds of millions of dollars of fraudulent transactions committed against victims around the world. The case lasted several years and involved more than a hundred pieces of media from 10 countries, as well as numerous operating systems, filesystems, and criminal actors. With the ultimate arrest of two subjects high up in the organizational "food chain", the investigative team was successful in completely decapitating the fraudulent scheme itself, due to comprehensively scoping the architecture they used.

When he's not cyber-sleuthing and mentoring students, Phil is an avid runner who has completed two half-marathons and dozens of 5k and 10k races. He tries to run every other day even when he's teaching in order to keep his thoughts clear and his brain geared up.  "I get 'rungry' (run hungry) when I skip a day," he says. Phil also enjoys craft beer because of the passion and creativity that today's craft brewers put into their product. Wherever he travels he searches out the local favorite to sample.

Qualifications Summary:

Get to Know Phil Hagen:

Here is What Students Say About Philip Hagen:

"Philip's speaking style draws you in and he's very personable. Useful tools and nice tour of technology which I was not previously aware of." - Frank J. Quinn

"Even by SANS standards, Phil clearly 'goes the extra mile' in depth of information, especially on exercises." -  Dai Morgan, Visa Europe

"I really like how Phil incorporates real-life examples into the material. It really helps me visualize it!" -  Ryan Nelson, Motorola

Here is What Instructors Say About Philip Hagen:

"Phil Hagen and I have worked very closely together for many years.  His understanding of networks, underlying technology, and hacker techniques was critical to many operational successes.  Phil managed to begin leading several key operational components while at a defense and intelligence community contractor and was soon running the division with over 85 employees and contracts totaling tens of millions of dollars. Phil has never lost his technical edge and was a key asset while working directly with federal law enforcement tracking organized criminals using cyber as a way to commit financial and credit card attacks." -  Rob Lee, SANS Fellow and DFIR Curriculum Lead

"Phil is an incredibly gifted author, instructor, and member of the DFIR team!  He is well versed in networking protocols and principles, investigative methodology, and advanced analytical techniques.  Phil's teaching skills come from his deep experience in supporting military, government agencies, and Fortune 500 clients over the many years of work in information security. He is able to establish a great rapport with his students and delivers the high-quality classroom experience that SANS attendees have come to appreciate." -  Heather Mahalik, Senior Instructor and FOR585 Course Lead

Paul A. Henry

Paul A. Henry

Paul Henry is a Senior Instructor with the SANS Institute and one of the world's foremost global information security and computer forensic experts with more than 30 years of experience covering all 10 domains of network security. Paul began his career in critical infrastructure / process control supporting power generation and currently manages security initiatives and incident response for Global 2000 enterprises and government organizations worldwide.

Paul is a principal at vNet Security, LLC and is keeping a finger on the pulse of network security as the security and forensic analyst at Lumension Security and as a retained security expert for multiple financial and healthcare firms.

Throughout his career, Paul has played a key strategic role in launching new network security initiatives to meet our ever-changing threat landscape. Paul also advises and consults on some of the world's most challenging and high-risk information security projects, including the National Banking System in Saudi Arabia, the Reserve Bank of Australia, the Department of Defense's Satellite Data Project (USA), and both government as well as telecommunications projects throughout Southeast Asia.

Paul is frequently cited by major and trade print publications as an expert in perimeter security, incident response / computer forensics and general security trends and serves as an expert commentator for network broadcast outlets, such as FOX, NBC, CNN, and CNBC. In addition, Paul regularly authors thought leadership articles on technical security issues, and his expertise and insight help shape the editorial direction of key security publications, such as the Information Security Management Handbook, where he is a consistent contributor. Paul serves as a featured and keynote speaker at seminars and conferences worldwide, delivering presentations on diverse topics including anti-forensics, network access control, cyber crime, DDoS attack risk mitigation, perimeter security, and incident response.

Listen to Paul discuss "Incident Response and Forensics in the Cloud" in this SANS webcast that every DFIR professional should listen to.

Here is What Students Say About Paul A. Henry:

"Paul is an excellent instructor, his experiences in the field of security makes this course even better." - Bhavesh Bhudia, Bloomberg, LP

"Paul is a fantastic instructor. I really liked his real-life stories and shared experiences." - Manuel Duron, VMWare

Jason Jordaan

Jason Jordaan

Jason is passionate forensicator, who has been practicing digital forensics since 1998 in both the law enforcement and private sectors. He has testified on several occasion in the South African High Court as an expert witness. He is the founder and managing director of DFIRLABS, an independent, private digital forensics and incident response laboratory. Jason has also been involved in training, lecturing, and mentoring in the field of digital forensics since 2010. Besides his training for SANS, he currently teaches the digital forensics and incident response class at Rhodes University in South Africa for their Masters Degree in Information Security. He is also an active researcher and writer and has been published in several textbooks and academic journals.

Prior to founding DFIRLABS, Jason was the national head of the Cyber Forensic Laboratory of the Special Investigating Unit in South Africa, which was an elite law enforcement agency with jurisdiction into white collar crimes involving government institutions, which included cyber crime targeting them.

He remains very active in the law enforcement community through the mentoring of law enforcement officials around the globe as part of IACIS, and has mentored law enforcement officers in New Zealand, Australia, Hong Kong, and Finland.

Jason has a Masters degree in Computer Science (Cum Laude), a Masters degree in Forensic Investigation, an Honors degree in Information Systems, a Bachelors degree in Criminal Justice Computer Science, and a Bachelors degree in Policing. He holds the CFCE, GCFE, and CFE certifications

Nick Klein

Nick Klein

Nick is the Director of Klein & Co. Computer Forensics, the leading independent computer forensic team from Sydney, Australia. He has over fifteen years of IT experience, specialising in forensic technology investigations and presenting expert evidence in legal and other proceedings. Nick and his team have been engaged as experts in hundreds of cases including commercial litigation and electronic discovery, criminal prosecution and defence, financial fraud, corruption, employee misconduct, theft of intellectual property, computer hacking and system intrusion.

He was previously a senior director in Deloitte Forensic and a team leader in the High Tech Crime Team of the Australian Federal Police, where he worked on international police investigations and intelligence operations including counter terrorism, online child abuse, computer hacking, and traditional crimes facilitated by new technologies.

Nick has presented expert evidence in civil and criminal matters in Australia and overseas, including providing expert testimony in the Bali bombing trials in Indonesia in 2003. He has appeared before Australian State and Commonwealth Parliamentary Committees and participated in Government working groups on cybercrime issues including the Fraud Taskforce of the Australian Banking Association and the Critical Infrastructure Protection forum of the Australian Commonwealth Government. Nick is a regularly presenter at industry forums and a guest lecturer at several institutions including the School of Law at the University of New South Wales and the Centre for Transnational Crime Prevention, Faculty of Law at the University of Wollongong.

Listen to Nick discuss methods to reconstruct anti-forensics in a critical case all DFIR professionals should listen to.

Here is What Students Say About Nick Klein:

"Nick has a natural delivery style which shows his comprehension and integrated knowledge across several management domains." - Scott Reid, Victoria Police

Robert M. Lee

Robert M. Lee

SANS certified instructor Robert M. Lee brings to the classroom one of the most valuable and respected of credentials: real-world experience. Robert is the CEO and founder of his own company, Dragos, Inc., that provides cyber security solutions for industrial control system networks. Consider the 2015 attack on the Ukraine power grid when for the first time in history a power grid went down due to an intentional cyberattack. Robert and a few others formed a specialized team to analyze the event and passed information to the impacted parties as well as the U.S. government and private sector. "I was the first in the industry to publicly confirm the attack and wrote the industry standard report on the attack exploring how it occurred, the lessons learned, and what must be done to protect other infrastructure sites," Robert says. He and his team also analyzed the malware from the 2016 cyber attack on Ukraine's Kiev substation and dubbed it CRASHOVERRIDE as the first ever malware tailored to specifically disrupt electric grid operations.

That experience is what forms his teaching philosophy. "I make it my teaching philosophy to constantly bring in new material into the classroom through my personal experiences and the successes and failures of those I've seen in the industry," says Robert. This augments the traditional classroom material students receive to ensure they get the most relevant and cutting-edge concepts in the industry. But Robert's real-world experience also keeps things interesting. "I enjoy telling and sharing in case studies and stories from the field, looping in bigger concepts into the technical material, and setting a humorous tone so that no matter the seriousness of the topic we all have fun together."

Robert got his start in information security making small control systems for humanitarian missions. He joined the United States Air Force and became a cyberspace warfare operations officer in the U.S. intelligence community. In that role, he created and led a mission examining nation-states targeting ICS, the first mission of its kind in the U.S. intelligence community. For Robert, that intermixing of defense, intrusion analysis, and threat intelligence provided the ultimate thrill.

Robert has worked offense, defense, and intelligence in various government teams. "My time on the offense helped me better appreciate defense and how sometimes we simply get it wrong: defense is not necessarily harder than offense and there are many opportunities we have to defend and make the world a better place," he says.

Robert joined SANS for myriad reasons. He had long been aware of the organization, and followed the career and workings of SANS fellow and DFIR curriculum lead Rob Lee. Also, ongoing encouragement to attend SANS conferences and consider teaching from a number of friends and colleagues such as Dave Shackelford convinced him to give it SANS a shot. His first pitch - a five-day class on identifying and responding to industrial control systems (ICS) attacks - was well-received, and as Robert says, "the rest is history." Today he teaches SANS ICS515: ICS Active Defense and Incident Response, the industry's first and only incident response and threat hunting class for ICS and FOR578: Cyber Threat Intelligence, the industry standard course for threat intelligence training. "The SANS family is amazing, the students are world class, and teaching is what keeps me constantly refreshed and excited in the industry."

In fact, authoring ICS515 and FOR578 have been highlights in his career, Robert says. Industrial control system security as well as cyber threat intelligence are both exciting topics that receive a lot of hype and misconceptions. "I love destroying hype while giving the students the most blunt and actionable information possible," Robert explains, adding that his experiences "gives me a robust view into the problem space and the solutions needed at various levels. My experiences and hard work have afforded me the chance to significantly advance students' skill sets and the way they view the problem."

Central to helping students succeed in their day-to-day careers is ensuring that they understand the big picture, Robert says. That's more than just understanding what command to run on a specific tool or how to use that tool during an incident. Its' about know the larger context of a security strategy is, all its moving pieces, and how to use analysis to help fill knowledge gaps. "This ensures that students who take my classes are not only technically prepared but are also prepared to think differently about the hard challenges their organizations must face when facing the adversary," says Robert.

Robert has a master's degree in cybersecurity and computer forensics from Utica College as well as cyber and warfare training through the U.S. Air Force, and he's pursuing his doctorate in war studies from King's College London. He was named one of Forbes' 30 under 30 in Enterprise Technology in 2016, was awarded EnergySec's 2015 Cyber Security Professional of the Year and named one of Passcode's "Influencers."

Outside of teaching, Robert enjoys running his company Dragos and working with customers in the industrial community. "It allows me to constantly stay relevant, challenge and grow my skills, and directly help people." He also enjoys writing papers and blogs for the industry, and looks for opportunities to travel, snowboard, and play a Steam game or two whenever he can.

Qualifications Summary

Get to Know Robert M. Lee

Publications and Papers

Awards and Honors

  • 2016: Forbes' 30 under 30 in the area of Enterprise Technology
  • 2015: Energy Sector Cyber Security Professional of the Year, awarded by EnergySec
  • 2014: Colonel Sparky Baird Award, awarded by AFCEA
  • 2014: Air Force Association Gill Robb Wilson Award - Air Force Nominee
  • 2013: Air Force Association Gill Robb Wilson Award - Air Force Nominee
  • 2013: AF Information Dominance Award for Outstanding Cyberspace Operations CGO - 693 ISR Gp
  • 2013: Junior Officer (Operator Category) of the Year - Europe/Africa
  • 2013: Military Performer of the Year - Threat Operations Center
  • 2013: CGO of the Year - 693d ISR Gp
  • 2012: Distinguished Young AFCEAN Officer - Central Europe
  • 2012: Outstanding ISR Officer Contributor of the Year - 693rd ISR Group
  • 2011: AFCEA Intelligence Professional of the Year - 693 ISR Group

Here is What Students Say About Robert M. Lee:

"Real-world practical insight and the technical skills and tools to create meaningful change." - Billy Glen, Pacific Gas & Electric

"Great teaching style - humor - keeps the atmosphere light." - Tim Sanguinett, NCPA

"Good pace, kept things moving, stayed enthusiastic the entire day." - Michael Nowatkowsk, Army Cyber Institute

Joshua Lemon

Joshua Lemon

Josh Lemon is a Director at in their international Computer Security Incident Response Team (CSIRT) managing their APAC team. He also heads up their Advanced Incident Response service that provides tactical support for complicated incidents. Prior to Salesforce, Josh was the CSIRT Manager for the Commonwealth Bank of Australia leading one of the largest dedicated incident response teams in the Australian commercial sector. He has previously worked as a Managing Consult for BAE Systems Applied Intelligence, where he was responsible for all technical cybersecurity services for the Asia Pacific region, included overseeing large and complex incident response and offensive security engagements.
Josh has provided incident response, digital forensics and penetration testing services to Government, Law Enforcement, and the Commercial sector. He was one of the co-creators for SecTalks in Sydney Australia, a monthly information security community event dedicated to presenting and teaching technical information security skills to others.
Josh has a varied background in the cybersecurity industry ranging from; Project Management, Lead Incident Responder, Forensics Analysis, Reverse Engineer, Penetration Testing, Secure Network Design, and Software Development. He currently holds a GREM, GCFA, GNFA, GCIH, GPEN, GPYC and lectures on investigating cyber attacks at Universities in Sydney and to international audiences for the SANS Institute.

Heather Mahalik

Heather Mahalik

To say that digital forensics is central to Heather Mahalik's life is quite the understatement. Heather has worked on high-stress and high-profile cases, investigating everything from child exploitation to Osama Bin Laden's media. She has helped law enforcement, eDiscovery firms, and the federal government extract and manually decode artifacts used in solving investigations around the world. Heather began working in digital forensics in 2002, and has been focused on mobile forensics since 2010 - there's hardly a device or platform she hasn't researched or examined or a commercial tool she hasn't used.

These days Heather is the Director of Forensic Engineering at ManTech CARD.  At the SANS Institute she is a senior instructor and the course lead for FOR585: Advanced Smartphone Forensics. As if that isn't a full enough schedule, Heather also maintains, where she blogs and hosts work from the digital forensics community. She is the co-author of Practical Mobile Forensics (1st and 2nd editions), currently a best seller from Pack't Publishing, and the technical editor for Learning Android Forensics from Pack't Publishing.

Heather is passionate about digital forensics because she loves always having to learn something new. "This field moves so quickly. It is literally impossible to get bored," she says. "If you find yourself bored, branch into another realm of digital forensics. The possibilities are endless and so is the fun! I love digging for artifacts and solving the puzzle."

Heather particularly likes working on mobile and third-party applications, a focus of her work. "I love cracking and hacking into apps that are supposed to be secure," she explains.

She cites her role as a SANS instructor as one of the most fulfilling achievements of her career. Heather loves it when students reach out to tell her that, thanks to her course, they put a criminal away for many years. As she says: "Nothing compares to knowing that the effort you put into writing and maintaining a course makes the world a better and safer place. SANS gives me the opportunity to share that with others."

Heather's background in digital forensics and e-discovery covers smartphone, mobile device, and Windows forensics, including acquisition, analysis, advanced exploitation, vulnerability discovery, malware analysis, application reverse-engineering, and manual decoding, as well as instruction on mobile devices, smartphones, and computers covering Windows, Linux and Macintosh operating systems.

What's her favorite topic to teach from that impressive résumé? "Decrypting and decoding the unparsed data!" she says. "I spend almost 90 percent of my day job trying to crack into the tough stuff, and my experience naturally flows into the classroom."

Heather previously led the mobile device team for Basis Technology, where she focused on mobile device exploitation in support of the federal government. She also worked as a forensic examiner at Stroz Friedberg and the U.S. State Department Computer Investigations and Forensics Lab, where she handled a number of high-profile cases. She has also developed and implemented forensic training programs and standard operating procedures.

Outside of work, Heather puts her passions into being a mom, cooking, reading, riding her horse, and drinking fine wine and bourbon.

Summary of Qualifications:

Get to Know Heather Mahalik:

Here's what students are saying about Heather Mahalik:

"I have been working with phones since 2009, and Heather very casually showed me how much I don't know. Excellent!" - Harbin Combee, Metropolitan Police Department, Washington, DC

"I am learning so much, it's exciting. Heather is an excellent instructor. Very smart. Knows her stuff." - Tris Matthews, Goodhue County Sheriff's Office

"Heather is a great instructor. The only downside will be not being able to bring her back to my office so we can pick her brain every day!" - C. McCollom, Clark County Sheriff's Office

"Smartphone Forensics course is the only unbiased course in the world for mobile forensics, it is for those who really want to take their skill to the next level and go beyond what their vendor/tool gives them. Heather is an incredible instructor, regarding mobile forensics, she knows it." - David Bernal, SCTIUM

Here is What Instructors Say About Heather Mahalik:

"Heather's cool demeanor and patience with her students shows across the board.  Her expertise shows in her passion for teaching and her interactions with her students.  Her work and connections in government space save lives and are critically important to our nation's security.  I feel very fortunate to have her as part of our DFIR instructor family." Rob Lee, SANS Fellow and DFIR Curriculum Lead

"Heather is one of the most knowledgeable and engaging instructors I've ever had the chance to learn from, let alone work with.  Her ability to present complex topics at an understandable level without compromising the technical details is amazing.  In the classroom, she brings the concepts home with extensive real-world experience - you'll never wonder why a topic is getting coverage - it's because you also know the impact to prior casework. Whether you take one of Heather's classes live in person, live online, or via recording, you'll get a solid learning experience." Phil Hagen, FOR572 author and Certified Instructor

Cindy Murphy

Cindy Murphy

Cindy Murphy served in law enforcement for more than thirty years, including twenty-five years at the Madison, Wisconsin Police Department, where she worked as a detective and a certified digital forensics examiner. While at MPD, she had the opportunity to serve as a detective and as a certified digital forensics examiner for over seventeen years. During her time as an investigator, she saw firsthand the emergence of mobile devices as the primary source of evidence in investigations. This pushed her to grow into the mobile forensics expert she is today and enabled her to co-author the SANS FOR585 Advanced Smartphone Forensics course.  Just recently, Cindy took a leave of absence from the Madison Police Department to launch Gillware Digital Forensics, where she is co-owner and serves as president and lead examiner. As a life-long police officer, Cindy knows the transition from the public to the private sector to private will present new challenges, but she's looking forward to broadening her professional experience even further, which will benefit both Cindy and her students.

Throughout her career, Cindy has always looked for opportunities to help in meaningful ways.  In one recent case, experts spent a year trying to unlock the phone of a 16-year-old girl who was killed in a tragic traffic accident. As the family prepared to spread the girl's ashes in a ceremony a year after her death, Cindy was given the victim's locked phone. She was able to unlock it, enabling the family to see their daughter's last photos. The family sent Cindy a thank you note that said: "We so appreciate this opportunity you've given us to hold onto a piece of our daughter's life we were sure was lost to us."

Digital devices have a huge impact in our world today, and Cindy believes mobile phones have become the diaries of people's lives. That's why mobile forensics is such a vital field. A thorough knowledge of these devices is thus crucial to investigations, since they can provide indispensable evidence that law enforcement can't afford to miss. Cindy knows the tools and programs that support digital forensics, has trained officers how to handle cell phone evidence, and knows how to take care of herself and others when working through tough cases like child pornography. Her extensive experience has given her both the real-world experience and the foundation in training that it takes to excel in the mobile forensics field and share her knowledge with others.

Cindy has been teaching digital forensics since 2002. In 2006, she helped develop the curriculum for a certificate program at Madison Area Technical College. Cindy has served as guest faculty for the National District Attorney's Association, testified as a computer forensics expert in state and federal court on numerous occasions, presented internationally on digital forensics topics, and written frequent articles and whitepapers.  She as a master's degree in science degree in forensic computing and cyber crime investigation from University College in Dublin. Cindy is also a military veteran, a mother, an activist in defense of First Amendment rights, a musician (banjo, cello, tenor guitar, mandolin, and ukulele), and a Brittany Spaniel enthusiast. 

Here is What Students Say About Cindy Murphy:

"Cindy Murphy is a force to be reckoned with! Very happy I signed up for this class." - Reza Z., DirectTV

"Cindy is Awesome! She fully understands what is happening in the field and how to do our job better." - John P., Shell Oil 

"Good, real-world experience. Clearly, Cindy has been there, done that." - Chris Mallow, University of Oklahoma

Here is What Instructors Say About Cindy Murphy:

"Cindy has told me multiple times that teaching others how to do this job was some of the most rewarding work that she can do.  Cindy truly believes that her material, instruction, and experience could make a difference in helping stop bad guys around the world.  She gets how important the role of our work is in developing additional investigators and responders in law enforcement, media exploitation, and information security fields." - Rob Lee, SANS Fellow & DFIR Curriculum Lead

"Cindy is one of the most dedicated people in the field of digital forensics.  She spends tireless hours making herself better at the trade and always gives back to the community through white papers, forensic instruction, conference speaking events, and now through SANS.  Cindy is able to take her law enforcement experience and spin it in a way that dazzles the students with her stories and real-life experience. Anyone can speak to slides ? Cindy can add value to the content and gives the material meaning." - Heather Mahalik, SANS Senior Instructor & FOR585 Advanced Smartphone Forensics Course Lead

Qualifications Summary:

Get to know Cindy Murphy:

Mike Pilkington

Mike Pilkington

Curiosity wins the day! That is Mike Pilkington's teaching philosophy, because from his perspective, you have to be inspired and excited about solving difficult cases if you want to be great at forensics. As Mike says, "you have to be willing to search for the answers that others can't or won't find." Mike's infectious enthusiasm for digital forensics comes through in his work, in his classes, and in his day-to-day life. It's clear that his hobby and his job are one in the same. 

Mike has been an instructor for the SANS Institute since 2008. He currently teaches Windows Forensics In-Depth (FOR500) and Advanced Digital Forensics and Incident Response (FOR508). In addition to teaching, Mike is a dedicated researcher and has published numerous articles for the SANS Forensics Blog.

After spending much of his career as an analyst and incident responder for Halliburton, Mike recently joined the team at Shell. His background working in a large corporate environment gives him a unique perspective among SANS instructors. Mike is also a researcher at heart and will spend hours unraveling the answer to a complicated case or a question from a student. He'll delve deeply into forensic conundrums to identify the best solutions, and then document that knowledge to share with the digital forensics community.

In his current role as a senior incident analyst at Shell, Mike regularly deals with malware and intrusion cases. His work ranges from evaluating and implementing both commercial and open-source forensic tools to consulting with internal groups to resolve intrusions. He has accumulated a broad range of technical expertise, having spent significant time performing software quality assurance, Windows systems administration, LAN and WAN network administration, firewall and IDS/IPS security administration, computer forensic analysis, and incident response. As a forensic analyst, he worked numerous human resource investigations, including cases involving intellectual property theft, inappropriate use of the Internet, employee hacking, IT administrator privilege abuse, and illegal downloading of copyrighted materials.

Mike holds a bachelor's degree in mechanical engineering from the University of Texas, as well as numerous IT security certifications, including the CISSP, EnCE, GCFE, GCFA, and GREM.

Qualifications Summary:

·       Deep background in corporate cybersecurity

·       SANS instructor since 2008

·       Professional qualifications: GCFA, GCFE, GREM, EnCE, CISSP

Get to Know Mike Pilkington:

·       Mike's DFIR blog is available at

·       Mike co-authored the SANS Forensics "Find Evil" poster

·       Mike created an example forensics report for SANS FOR500 students (available upon request)

·       In addition to regularly presenting six-day SANS forensics classes, Mike's additional speaking engagements include the SANS DFIR Summit, SANS conferences, MIRcon, ISSA, and HTCIA

Listen to Mike discuss Privileged Domain Account Protection: How to Limit Credentials Exposure in this SANS webcast.

Here is What Students Say About Mike Pilkington:

"The level of detail and knowledge that Mike has is above excellent." - Oz Bogovac, JCI

"Once again, Mike's command-line knowledge really became valuable when we tried to stump him with questions. He knew everything!"  - Mike DeZenzo, EY

"The instructor helps by sharing his knowledge in a way it can be understood by the student." - Joseph Selph, IBM

"Very knowledgeable." - William Martin, NYSP

Here is What Instructors Say About Mike Pilkington:

"Mike's perspective is unique and extremely valuable to our instructor team. He sees things differently as a result of directly fighting adversaries in his larger multinational corporate environment daily, and he isn't afraid to share his experiences with the class. Mike is also a researcher at heart, and his research has directly resulted in our material being updated, corrected, and expanded. It has made our courses at SANS the best and brimming full of information that make SANS truly on the "cutting edge" and not just words we use in marketing."  - Rob Lee, SANS Fellow

"Mike is accomplished, wicked smart, and very passionate about our field. He is that rare individual who doesn't just report a problem - he takes it upon himself to find a solution. As an example, Mike encountered a number of students during his early teaching engagements who were having difficulties grasping the fundamentals of report writing. He took it upon himself to create a sample report that could be shared among instructors. His SANS blog posts are some of my favorites, as he regularly takes it upon himself to look deeper into nagging forensic unknowns and document clever solutions."  - Chad Tilbury, SANS Senior Instructor

"I have watched Mike present and have been thoroughly impressed with his smooth delivery, his ability to competently deliver highly technical material in a way that makes it easy for students to understand, and his ability to handle questions. Mike's background in IT brings a highly valuable perspective to the forensic program and inspires students." -  Ovie Carroll, SANS Certified Instructor

Hal Pomeranz

Hal Pomeranz

"Sometimes there's a moment in a case where I find a crucial piece of evidence hidden away where not many investigators would think to look. And I think to myself, 'I'm glad I was the one to work on this case, because this finding was important.' That's how I know I'm in the right field." ~ Hal Pomeranz

Hal Pomeranz is an independent digital forensic investigator who has consulted on cases ranging from intellectual property theft, to employee sabotage, to organized cybercrime and malicious software infrastructures. He has worked with law enforcement agencies in the United States and Europe, and with global corporations.

While perfectly at home in the Windows and Mac forensics world, Hal is a recognized expert in the analysis of Linux and Unix systems, and has made key contributions in this domain. His EXT3 file recovery tools are used by investigators worldwide. His research on EXT4 file system forensics provided a basis for the development of open source forensic support for this file system. Hal has also contributed a popular tool for automating Linux memory acquisition and analysis. But Hal is fundamentally a practitioner, and that's what drives his research. His EXT3 file recovery tools were the direct result of an investigation, recovering data that led to multiple indictments and successful prosecutions.

Raised in the Open Source tradition, Hal shares his most productive tools and techniques with the community via his GitHub and blogging activity. And nobody can show you how to forensicate with Open Source tools like Hal!

Hal is a SANS faculty fellow and the creator and primary instructor for the Securing Linux/Unix (SEC506) course. In the SANS DFIR curriculum he teaches Advanced Digital Forensics, Incident Response, and Threat Hunting (FOR508), Advanced Network Forensics and Analysis (FOR572), Mac Forensics Analysis (FOR518), and Reverse-Engineering Malware: Malware Analysis Tools and Techniques (FOR610). Hal holds the GIAC certification for the following courses: GCUX, GCFA, GNFA, and GREM.

Hal is a regular contributor to the SANS Digital Forensics and Incident Response blog and co-author of the Command Line Kung Fu blog. He's a former board member for USENIX, BayLISA and BackBayLISA; former technical editor for Sys Admin Magazine; and a respected author and highly rated instructor at industry gatherings worldwide. Hal is an avid baseball fan, so in the summer you'll usually find him at his local minor league ballpark or catching up on major league games. He enjoys travel, theatre, and food (both cooking and eating), but his first priority is keeping up with the interests of his kids: Disney, gymnastics, Legos, and video games.

Get to Know Hal

  • Over 25 years of industry experience
  • Founder and Principal Consultant for Deer Run Associates
  • GIAC Certified Forensic Analyst (GCFA), Network Forensic Analyst (GFNA), Malware Analyst (GREM), and Unix Administrator (GCUX)
  • SANS Faculty Fellow and SANS' longest tenured instructor
  • Hal is a contributor to the SANS Digital Forensics and Incident Response blog

Learn more about Hal Pomeranz in this DFIR Hero interview on the SANS DFIR Blog.

Here's What Students Are Saying about Hal Pomeranz:

"Hal is one of the finest instructors I've ever had the pleasure the take a class from. He possesses the rare ability to bring information on cutting edge techniques to the classroom and present it in a way that makes his students comfortable with these techniques as if they were old hat." - Chris Calabrese, Medco Health Solutions, Inc.

Listen to Hal discuss Incident Response Event Log Analysis.

Scott Roberts

Scott Roberts

Scott Roberts has always had an unquenchable curiosity to understand how things work. As a child, he tore apart electronics and mechanical bits to find answers. As he grew older, spy novels by Tom Clancy and John Le Carré fed his investigative mindset.

Today, Scott gets to live those stories in real life through his work as an incident responder, manager, and developer at GitHub, the world's code collaborative development platform.  As a specialist in incident response, intrusion detection, and cyber threat intelligence operations, Scott often works on high-profile projects that routinely show up on the news.

Throughout his career, Scott has worked on major investigations involving criminal fraud and abuse and nation-state espionage with Symantec, Mandiant, and other organizations. 

At SANS, Scott took on the SANS 504: Hacker Tools, Techniques, Exploits & Incident Handling course from SANS Fellow Ed Skodius and was inspired to learn everything he could.

"I saw Ed's passion and depth of knowledge and wanted to do the same thing," says Scott. Teaching that course prompted Scott to further pursue teaching and to work to inspire his students as much as Ed had inspired him.

Now, as an instructor for FOR578: Cyber Threat Intelligence, Scott aims to ignite "rabid curiosity," something he sees as essential to success in this field, and encourage students to tap into their own desire to understand and beat the adversary. Key to Scott's success in teaching FOR578 is adapting to each student?s needs, a perspective he's gained through a wide variety and depth of experiences in Cyber Threat Intelligence (CTI) and Digital Forensics & Incident Response (DFIR).

"I think the toughest thing about FOR578 is the breadth of the course, the topic, and the variety of ways students will use what they learn depending on their organization," he says.  Although CTI threats may seem daunting, Scott works to instill confidence in his students that it can be accomplished with hard work, the right training, and passion for their work.

Scott is a sought-after speaker, having presented on threat intelligence and incident response for SANS, various Silicon Valley firms, and at BSides events. He is an author of O'Reilly's upcoming book, Intelligence Driven Incident Response, and serves as a member of the SANS CTI Summit and New York University Poly Cyber Security Awareness Week advisory boards.

Scott is a subject-matter expert on network security monitoring, incident response, and threat intelligence. He specializes in network security, Unix client and server security, Windows client security, active directory, group policy, vulnerability assessment, and network, host and wireless auditing.

When he's not cyber-sleuthing for GitHub and teaching at SANS, Scott spends a lot of time working on projects involving CTI and DFIR, blogging, planning conferences, speaking, working on books, and writing CTI software, one of his biggest passions.

In his down time, Scott enjoys riding road bikes, playing board games, cooking, learning about wine, and sampling whiskey.

Qualifications Summary

Publications and Papers

  • Author of O'Reilly's upcoming Intelligence Driven Incident Response


  • Member of the SANS CTI Summit advisory board
  • Member of the NYU Poly Cyber Security Awareness Week advisory board


  • ArcSight Certified Security Analyst
  • DoD NSTISSI No. 4011
  • GIAC Certified Incident Handler

Get to Know Scott Roberts

Anuj Soni

Anuj Soni

Anuj Soni initially pursued a career fighting cybercrime for the thrill of the hunt.

"The rush of tracking bad guys and gals, uncovering their tools, and understanding their motives is just way too fun," he says. "I simply can't get enough of it."

These days, Anuj feeds his passion for technical analysis through his role as a Senior Threat Researcher at Cylance, where he performs malware research and reverse engineering. Anuj also brings his problem-solving abilities to his position as a SANS Certified Instructor, which gives him the opportunity to impart his deep technical knowledge and practical skills to students. As a co-author and instructor for Reverse-Engineering Malware (FOR610) and instructor for Advanced Digital Forensics and Incident Response (FOR508), Anuj emphasizes establishing goals for analysis, creating and following a process, and prioritizing tasks.

"Tools come and go, but if you develop a process that works for you and are patient with yourself, creativity will flow," he says. "Automate what can be automated and enjoy working through the hard stuff" - that is, the actual analysis.

Since entering the information security field in 2005, Anuj has performed numerous intrusion investigations to help government and commercial clients mitigate attacks against the enterprise. His malware hunting and technical analysis skills have resulted in the successful identification, containment, and remediation of multiple threat actor groups. Anuj has analyzed hundreds of malware samples to assess function, purpose, and impact, and his recommendations have improved the security posture of numerous organizations. Highly sought after as a technical thought leader and adviser, Anuj excels not only in delivering rigorous forensic analysis, but also in process development, knowledge management, and team leadership to accelerate incident response efforts. 

In addition to teaching SANS courses, Anuj frequently presents at industry events such as the U.S. Cyber Crime Conference, SANS DFIR Summit, and the Computer and Enterprise Investigations Conference (CEIC). He has bachelor's and master's degrees from Carnegie Mellon University and holds certifications in GIAC Reverse Engineering Malware (GREM) and as a EnCase Certified Examiner (EnCE) and Certified Information Systems Security Professional (CISSP).

When not consumed by the excitement of his day job, Anuj spends time with his growing family and enjoys photography, hitting the gym, and mixing up creative cocktails.

Qualifications Summary:

  • More than a decade of experience performing forensic, malware, and network analysis.

Get to Know Anuj Soni:

Here's What Students Are Saying about SANS Certified Instructor Anuj Soni:

  • "Anuj is by far the most upbeat instructor. The excitement in class is infectious." - Divyashree Joshi, DIRECTV LLC
  • "I value the time Anuj takes to make sure each student is progressing." - Shaun Gatherum, NuScale Power
  • "He's very well spoken and very knowledgeable. He kept us on task and any sidebars were related to info being taught." - Ryan Gibson, Qualcomm 

Here is What Students Say About Anuj Soni:

"Anuj's technical achievements are outstanding.  As an expert in the field, he works on some really critical areas for the government, but he still has time to write for the SANS DFIR blog, tweet, and provide suggestions to improve courses.  Anuj's teaching style is extremely engaging and easily show his love of the material.  He is one of our highest rated instructors." -Rob Lee, DFIR Curriculum Lead

"I've had the opportunity to see and hear Anuj share his knowledge of malware, incident response and forensics with attendees at several SANS events. Not only does he have deep expertise in these areas, he is also a wonderful teacher. His presentation style, the manner in which he breaks down difficult concepts, and his overall demeanor resonate strongly with his listeners. Even when he covered challenging techniques, students could not escape the grip of his logic and clarity of his explanation. It shows Anuj's inherent talents as an instructor." - Lenny Zeltser, SANS Senior Instructor

Chad Tilbury

Chad Tilbury

"The real voyage of discovery consists not in seeing new sights, but in looking with new eyes." - Proust

This favorite quote of Chad Tilbury has proven to be a recurrent theme throughout his career. When Chad attended the U.S. Air Force Academy, his interest was piqued early on by the thrill and challenge of engaging adversaries in new domains. Chad grew up enthralled by spy novels, so battling real spies with counter-espionage techniques was particularly appealing. A career in computer crime investigations was the perfect fit.

Chad has nearly 20 years of experience working with government agencies, defense contractors, and Fortune 500 companies. And his case list looks like it's been pulled straight from those spy novels he grew up reading: murder, abduction, espionage, fraud, hacking, intellectual property theft, child exploitation, terrorism, and computer intrusions. 

He has served as a Special Agent with the Air Force Office of Special Investigations, where he investigated and conducted computer forensics for a variety of crimes and ushered counter-espionage techniques into the digital age. Chad has also led international forensic teams and was selected to provide computer forensic support to the United Nations Weapons Inspection Team.

In addition, Chad has worked as a computer security engineer and forensic lead for a major defense contractor and served as the vice president of worldwide Internet enforcement for the Motion Picture Association of America. In that role, he managed Internet anti-piracy operations for the seven major Hollywood studios in over 60 countries.

"With so many different skills and cultural perspectives on that team, I learned more about the dark underpinnings of the Internet than I ever could have imagined," says Chad.

Today, Chad brings his wealth of experience to his role as technical director at CrowdStrike, where he specializes in incident response, corporate espionage, and computer forensics. Here at SANS, Chad is a senior instructor and co-author for two six-day courses:  FOR500: Windows Forensics, which focuses on the core skills required to become a certified forensic practitioner, and FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting, which teaches sophisticated computer intrusion analysis and advanced threat hunting techniques.

Chad's experience brings immeasurable depth to his classes. He focuses not only on tools and techniques, but also on understanding how those artifacts can be used to prove or disprove questions students are asked to investigate in their daily jobs. As Chad says, "Forensics is both an art and a science, and I find that hearing about real-world applications provides new perspectives and can help unlock a student's ability to think unconventionally."  

Chad keeps his class goals simple: teach and lead discussions on the most important topics and make sure students have as much time as possible to work on the exercises. "I'm a big believer in hands-on learning," he says, "and we work hard to ensure the exercises in our classes are as realistic as possible. When students put all the pieces of a forensic investigation together themselves, it leads to those 'aha' moments that are so valuable."

The methodologies Chad teaches in his courses are the same ones he has used successfully on countless examinations. "Our exercises are months in the making, and provide realistic, real-world evidence samples on which to practice," says Chad. "I have had numerous students report going back to their teams, blowing them away with a new technique, and promptly becoming the trainer themselves."

One of Chad's most memorable experiences in the classroom brought that immediacy of techniques to a whole new level.

"I was teaching some of my latest research on browser artifacts, recently added to the FOR500 class.  Research showed that a specific browser database could be missing a day or more of information if not properly handled. There happened to be a law enforcement officer in class who was investigating a murder, and in his examination of the suspect's computer he had noted missing data during a critical 24-hour period. From our class discussion, the officer now had a tool and technique to recover the missing data in his case. Not surprisingly, he left class early!"

In addition to being a graduate of the U.S. Air Force Academy, Chad holds B.S. and M.S. degrees in computer science, as well as GCFA, GCIH, GREM, and ENCE certifications.

In his free time, Chad loves to travel and takes full advantage of the unique destinations his career takes him. He spends much of his time at home mountain biking, skiing, snowboarding, and mountaineering. Chad recently took a ski mountaineering trip to Antarctica, about as far away from a Wi-Fi signal as you can get!

Qualifications Summary

Get to Know Chad Tilbury

Here is What Students Say About Chad Tilbury:

"Chad Tilbury is hands down the best instructor that I ever had in my 20 years of military service. Excellent job. Very relevant and up-to-date. An industry leader in this field." - Dannie Walters, U.S. Army

"Chad's real-world examples are a key part of the training. It really helps to have a knowledgeable instructor who currently works in the industry." - Roger Szulc, MDA

"I had the immense pleasure of learning from Chad during the SANS Computer Forensics and Investigation course. Chad's ability to break down complex, technically challenging topics and teach them in an understandable manner is second to none. He has helped countless numbers of people including myself gain the GCFA certificate and I wholeheartedly believe he is a true asset to any organization." - Ali Emirlioglu, Senior Security Operations Analyst at Datacom TSS

Alissa Torres

Alissa Torres

Alissa Torres is an explorer at heart. Uncovering the full story of an attacker's exploits requires digging into known and unknown forensic artifacts, and this excavation is exactly what intrigues her. With more than 15 years of experience in computer and network security spanning government, academic, and corporate environments, Alissa has the deep experience and technical savvy to take on even the most difficult computer forensics challenges that come her way. Her current role as an Incident Response Manager at Cargill provides daily challenges "in the trenches" and demands constant technical growth. Alissa is also founder of her own firm, Sibertor Forensics, and has taught internationally in more than 10 countries.

Memory forensics is a bleeding-edge field of Digital Forensics & Incident Response (DFIR), and Alissa is the lead author as well as an instructor of FOR526: Memory Forensics In-Depth and co-author of the SANS Memory Forensics Poster. She also teaches  FOR500: Windows Forensic Analysis; FOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting; and SEC504: Hacker Tools, Techniques, Exploits and Incident Handling.

Alissa was introduced to digital forensics during her four years of service in the U.S. Marine Corps. She moved on to various technical roles at KEYW Corporation, Northrop Grumman Information Systems, and as part of Mandiant's computer incident response team (MCIRT). Alissa has worked as an instructor at the U.S. Cyber Challenge Camps and at the Defense Cyber Investigations Training Academy (DCITA), delivering incident response and network basics to security professionals entering the forensics community. She is passionate about sharing knowledge, presenting annually at regional and national industry conferences and encouraging women's participation in science, technology, engineering, and math through regional outreach programs.

As both an investigator and instructor, Alissa has a constant and infectious desire to always learn more and question everything, an ethos embodied in the SANS DFIR classes. "Our curriculum ensures students gain an understanding of why an artifact matters and how the tools interpret the data." Alissa explains. An inquisitive nature can be the determining factor in investigative success, as Alissa learned when she identified a critical error in one of her team's web proxy timeline procedures. This discovery allowed for the correction of contractual fraud investigations involving the U.S.  government.  Sharing personal success stories like this one gives students real-world applications for the material they are learning and inspires them to evaluate and optimize their own investigative processes, whether in incident response, digital forensic investigations, or internal offensive reconnaissance.

As attackers learn how forensic investigators work, they become increasingly more sophisticated at leaving fewer traces behind. "We are in an arms race where the key difference is training," says Alissa. Toward that end, she encourages her students to ask more questions, grow the common body of knowledge, and make a difference in the digital forensics community. Her teaching style is best described as a type of "exposure therapy" that introduces concepts but then pushes students to get behind the keyboard and apply these concepts themselves.

Alissa's true passion is memory forensics, a rapidly evolving area of expertise for both attackers and defenders. As malware strives for a minimal footprint on the host, the battlefield exists in system memory. Alissa's students take the skills taught in FOR526 and move their investigations forward, in some cases even uncovering new details in their cases before the week-long class ends.

Alissa has a B.S from the University of Virginia and a M.S. in information technology from the University of Maryland. She is a GIAC Certified Forensic Analyst (GCFA), and holds the GCFE, GCIH, GSEC, CISSP, and EnCE certifications. Alissa has served as a member of the GIAC Advisory Board since 2013 and was recognized by SC Magazine as one of its "2016 Women to Watch." Needless to say, she stays pretty busy. When not enmeshed in metadata and memory structures, Alissa catches every soccer game she can, cheering at her kids' games and scheming to attend matches of her favorite team, Everton. In what time she has left from constant cybersecurity vigilance, Alissa enjoys hiking in the Puerto Rican rain forest and scaling rocks at Big Sur.

Qualifications Summary


  • GIAC Security Essentials Certification (GSEC), June 2015
  • GIAC Certified Incident Handler (GCIH), June 2014
  • GIAC Reverse Engineering Malware (GREM), July 2013
  • GIAC Certified Forensic Examiner (GCFE), January 2013
  • Certified Forensic Computer Examiner (CFCE), December 2012
  • GIAC Certified Penetration Tester (GPEN), July 2012
  • GIAC Certified Forensic Analyst (GCFA), November 2011
  • Certified Information Systems Security Professional (CISSP), December 2010
  • EnCase Certified Examiner (EnCE), July 2010 - July 2019

Here is What Students Say About Alissa Torres:

"I love the energy of Alissa Torres' presentation style." - Scott S., US Govt.

"Alissa kept it interesting by pulling from her past experience and demonstrated great passion for the subject." - Matt Leach

"Alissa's teaching skills are remarkable - she is great." - Serge Tumba, GE Capital

"Fantastic- Energetic- Knowledgeable" - Dennis Mooney, Vanguard

"I highly recommend Alissa and SANS computer forensics courses. In April 2015 I attended the SANS Forensics 508: Advanced Digital Forensics and Incident Response (FOR508) course. I had high expectations for the course based on my team lead's recommendation. Alissa and the course exceeded my expectations. Alissa is an outstanding instructor, and SANS FOR508 was the best information security course I have attended. She mixed energy, knowledge, and experience to keep the content productive, relevant, and interesting. I look forward to attending more SANS courses instructed by Alissa." - Chad Rager,  Computer Forensic Engineer at ManTech

"This course is known throughout the industry as THE advanced IR and Threat Hunting course. This combined with Alissa's awesome teaching style makes it worth every penny! Alissa's subject matter expertise, enthusiasm, and insights are second to none! Her personalized attention to simulcast viewers was particularly nice because it felt like we were part of the class."  - Will Harmon, Trustwave

"Instructors like Alissa are why people keep coming back to SANS. Awesomeness and non-stop energy. She is one of my favorite instructors I've had from SANS, right up there with the likes of Ed Skoudis, John Strand, and Eric Cole. A brilliant presenter who keeps it fun, informative, and turns what other people could make sleep inducing, into non-stop engaging." - Eric Donaldson, Discover Financial Services

Jake Williams

Jake Williams

When a complex cyber attack put a private equity investment of more than $700 million on hold, the stakes couldn't have been higher. But that's exactly the kind of challenge that motivates Jake Williams, a computer science and information security expert, U.S. Army veteran, certified SANS instructor and co-author of FOR526: Memory Forensics In-Depth and FOR578: Cyber Threat Intelligence. To help mitigate the attack, Jake plied his information security expertise, discovered that not one but three different attackers had compromised the firm's network, and went about countering their moves.

Jake relishes the idea of meeting adversaries on the cyber battlefield. "I went into this field because I wanted a challenge," he says. "Infosec is like a game of chess to me. The attacker plays their moves and you play yours."

Jake started his information security career doing classified work with the U.S. government and was awarded the National Security Agency (NSA) Exceptional Civilian Service Award, which is given to fewer than 20 people annually. "I am immensely proud of the things I've accomplished," Jake says. "I'm positive the world is a safer place because of my work."

Today, Jake runs a successful Infosec consultancy. He's been involved in high-profile public sector cases including the malware analysis for the 2015 cyber attack on the Ukraine power grid. He's also tackled a variety of cases in the private sector. In one, Jake discovered attackers compromising a custom service the client had distributed to all its endpoints. Leveraging experience and insight with advanced persistent threats helped Jake "think like the attacker" and determine the attacker's likely hiding spots.

Jake's work has led to his invention of DropSmack, a proof-of-concept tool for highlighting the danger that cloud-based file sharing services pose to corporate networks, and the creation of ADD (Attention Deficit Disorder), a publicly-available memory anti-forensics toolkit.

Jake's work also led him to teaching. "I chose to be a SANS instructor because they are the very best in the business. Others talk about being the best, but SANS actually is the best," he says. "I love teaching people, but it goes beyond teaching for me. With many students, I'm making lasting professional relationships. Students come back again and again and have a lifelong learning relationship with SANS." 

Jake teaches a variety of classes (SEC503, SEC504, SEC660, SEC760, FOR508, FOR526, FOR578, FOR610) and prefers an active learning approach, using demos rather than slides to teach lessons. "It takes me back to my first exploits and I get the chance to relive that magical feeling all over again," he explains.

More importantly, Jake wants students to walk out of class being able to critically analyze a problem, discover a solution, and do something they couldn't do before. "I don't teach button-clicking steps, my goal is to ensure students understand how to take concepts from the class and apply them to their own cases and engagements."

Given his accomplishments, it should come as no surprise that Jake lives, sleeps, and breathes Infosec. When he's not teaching, he's consulting. He's a regular speaker at industry conferences including DC3, BSides (including BSides Las Vegas), DEFCON, Blackhat, Shmoocon, EnFuse, ISSA Summits, ISACA Summits, SANS Summits, and Distributech.  He has also presented security topics to a number of Fortune 100 executives.

Jake is also a two-time victor at the annual DC3 Digital Forensics Challenge. He drew on his passion for hands-on capture-the-flag events to design the critically acclaimed NetWars challenges for the SANS malware reversing and memory forensics courses.

Qualifications Summary:

GIAC Certifications:

  • GIAC Security Expert (GSE), March 2016
  • GIAC Security Essentials Certification (GSEC), June 2015
  • GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), March 2015
  • GIAC Certified Forensic Analyst (GCFA), October 2013
  • GIAC Penetration Tester (GPEN), January 2013
  • GIAC Certified Incident Handler (GCIH), January 2013
  • GIAC Certified Intrusion Analyst (GCIA), December 2012
  • GIAC Certified Windows Security Administrator (GCWN), November 2012
  • GIAC Reverse Engineering Malware (GREM), October 2012
  • GIAC Certified Forensic Examiner (GCFE), September 2012
  • GIAC Systems and Network Auditor (GSNA), February 2012

Get to Know Jake Williams:

Jake teaches the following courses for SANS:

Here's What Students Are Saying about Instructor Jake Williams:

"Jake's teaching style and practical experience totally make the course." - Andrew Nelson, Chevron

"Jake is awesome! The experience is massive!" - Late Adodo Placca, iProcess International

"Provides great balance between structured analytical approaches and technical analysis." -  Ladell Marshall, Goldman Sachs

"Jake goes off-book in a good way, sharing useful tools & information in addition to the already-included useful tools & info." - Robin Stuart, Salesforce

Lenny Zeltser

Lenny Zeltser

Aptly called the "Yoda" of malware analysis by his students, Lenny Zeltser keeps his eye on the big picture and focuses on the sum of events rather than individual occurrences. He lives by that philosophy and brings it to his job and classroom.  "Even those professional moments that seem insignificant by themselves can be an important piece of the progressive journey that, hopefully, takes us toward our career objectives and honors our ideals," says Lenny. "And you may not even see the value in those moments until you look back on the path."

A seasoned business and technology leader with extensive information security expertise, Lenny started his professional journey in a variety of technical infosec roles before serving as the national lead of the U.S. security consulting practice at a major cloud services provider. Later in his career he oversaw a portfolio of security services at a Fortune 500 technology company. Today, as VP of Products at Minerva Labs, Lenny designs and builds designs creative anti-malware products. Lenny is also a senior instructor at SANS and the primary author of FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques, a course he designed as an on-ramp into the malware analysis field. The course helps students expand and systematize their approaches to examining malicious software using a variety of techniques.

"My goal is to make this topic as accessible to people as possible," says Lenny. "There is indeed much one needs to know to understand the inner workings of malicious code, but the good news is that people can begin learning how to do this work by building on the technical skills they already have, whether they are grounded in system administration, network security, software development or other aspects of IT."

Like many of his students, Lenny's career path began in an IT role, which lends unique strengths to his information security expertise.

"My first job in IT was Unix system administration, then I moved onto Windows sysadmin, and then I spent a bit of time on software development," Lenny explains. "I found myself gravitating toward the information security aspects of these jobs. For me, Infosec exists at the intersection of many disciplines, and working in this field allows me to make use of the skills and interests I've acquired across various aspects of IT."

Along the way, Lenny earned the prestigious GIAC Security Expert professional designation, and he currently serves on the Board of Directors of SANS Technology Institute. Lenny holds a bachelor's degree in computer science from the University of Pennsylvania and a master's in business administration from MIT Sloan.

A co-author of four books on malware, network security, and digital forensics, Lenny also developed the Linux toolkit REMnux to make it easier to use a variety of freely available malware analysis tools, many of which run well on Linux but can be difficult to find and install. REMnux has grown to become a very popular toolkit and today is used by malware analysts throughout the world. The FOR610 course that Lenny teaches covers many of the tools installed on REMnux.

Lenny gives his students more than technical tools, however, and he says that the most important lesson he teaches his students is: "You can do it."

"It's easy to get discouraged when you run into professional challenges that you're not equipped to handle," Lenny explains. "But when you participate in SANS training, you encounter many new tools and concepts that you will be able to attach to the techniques you already know from prior experience in the field. Much of what you learn will occur after you finish the course and begin applying the concepts to your work outside the classroom. I strive to give students the confidence and the core skills they need to keep learning about and curtailing malware threats even after the class ends."

In his free time, Lenny indulges his love of food both as chef and consumer.  "Eating a delicious meal in good company is always time well spent for me," he says. Lenny also loves to cook as a way to clear his mind, disconnect from the day-to-day challenges of business and IT, and connect with family and friends. Lenny subscribes to several food and cooking magazines and enjoys experimenting with new recipes, ingredients, and spices. "Not everything I cook turns into a great dish- sometimes experiments lead towards unfavorable results- so I keep reminding myself to think about this process as a journey, not as a destination."

Qualifications Summary

  • Senior instructor and member of the Board of Directors at SANS
  • VP of Products & Advisory Board Member at Minerva Labs
  • Recipient of the GIAC Security Expert (GSE) professional designation
  • Co-author of several books on information security, including: Malware: Fighting Malicious Code, Inside Network Perimeter Security: The Definitive Guide to Firewalls, VPNs, Routers, and Intrusion Detection Systems, and CyberForensics: Understanding Information Security Investigations
  • Developed and maintains the REMnux Linux Distribution, a toolkit of free malware analysis tools that makes it easier to start analyzing malware
  • Has worked in the information security industry for more than two decades

Get to Know Lenny Zeltser

Here is What Students Say About Lenny Zeltser:

"Lenny presented a wealth of knowledge, tied it together smoothly, and I am leaving with exponentially more knowledge." - David Werden, NGIS

"Last week, myself and three of my associates attended SANS GREM training. Based on previous recommendations by prior students, we explicitly attended this session given Lenny was the instructor. As someone who has been responsible for development and delivery of training and education services, Lenny is the best instructor I have ever encountered in my professional life. His approachable demeanor, passion for the learning process, and empathy for his students was just as impressive as his mastery of the curriculum. This praise was unanimous among my three associates." - Colin Sheppard, Vice President of Cyber Security & Fraud, International at First Data Corporation

"Lenny is one of the reasons why it's fun to be in the information security community. His extraordinary intellect and talent for research and innovation is matched by his communication and teaching skills. He's a fantastic writer and a wonderful instructor who has mastered the ability to teach complex concepts in a very approachable manner. Lenny is also one of the nicest people you'll ever run into in our field or any other." - Eric Huber, Cyber Fraud Subject-Matter Expert

"Lenny Zeltser is another one of those people you read about in magazines and think "Man, I wish I was that guy." A true leader in information security and a great guy all around. Lenny once actually paid me a compliment when I was teaching for SANS, along the lines of being inspired at the time by me being one the folks who happily stood up to teach in front of large crowds (we were both new to the game at the time). I found this humorous since I felt only awe at his own amount of knowledge. I still have the copy of Network Perimeter Security, which he personally sent me to get my opinion of it. I recall that I didn't end up providing my feedback since I felt beneath the ability to comment on it at the time!" - Ed Luck, Principal Consultant, Solutions at Dimension Data

"I was part of the group that attended and reviewed Lenny's try-out session as a SANS instructor, and was blown away by the energy, expertise, and focus he displayed. Where others have at times failed to properly handle interruptions, especially from people who were trying to lead them astray and/or force them to stumble, Lenny remained focused, put the interrupter nicely but firmly in his place, and postponed further discussion to the Q&A session at the end of the class. When audience members asked targeted questions, inquiring about their understanding of recent developments in information security, he was able to elaborate on each of the topics and help them improve their grasp on various hot topics. Lenny displays lots of dedication, is very intelligent, has a solid grasp of information security, and is capable of explaining complicated technical concepts in easily understandable terms." - Roland Grefer, Principal, Global Support Services Group

Eric Zimmerman

Eric Zimmerman

When Eric Zimmerman was a Special Agent with the FBI, one of his responsibilities was managing on-scene triage. He identified several gaps in an existing process and started creating solutions to address them. What began as building and expanding a few live response tools took Eric down a path that eventually led to him writing more than 50 programs that are now used by nearly 8,800 law enforcement officers in over 80 countries.

Much of Eric's work involved designing and building software related to investigations of sexual abuse of children. In a single year, Eric's programs led to the rescue of hundreds of these children. As a result, in May 2012, Eric was given a National Center for Missing and Exploited Children's Award, which honors outstanding law enforcement professionals who have performed above and beyond the call of duty. Eric was also presented with the U.S. Attorney's Award for Excellence in Law Enforcement in 2013.

Today, Eric serves as a Senior Director at Kroll in the company's cybersecurity and investigations practice. At SANS, he teaches the FOR508: Advanced Digital Forensics, Incident Response and Threat Hunting course, and is a two-time winner of the SANS DFIR NetWars Tournament (2014, 2015). Eric is also the award-winning author of X-Ways Forensics Practitioner's Guide, and has created many world-class, open-source forensic tools.

Eric is a sought-after instructor and speaker who brings expertise in the cyber realm, complex law enforcement investigations, computer forensics, expert witness testimony, computer systems design, and application architecture to his work and classroom.  

"I enjoy teaching this material because of how much potential there is in it to move cases forward quickly," says Eric. "With the pace at which computer storage continues to grow, it will become more and more important for people to understand the most cost-effective artifacts and techniques so these can be leveraged to move through data more quickly."

Eric's teaching philosophy focuses on the long-term gains achieved by not only understanding the nuts and bolts of how to run a tool and consume output, but also getting a deeper understanding of how tools work "under the hood." Those "a-ha" moments are what has kept Eric coming back to the classroom since 2008. His focus on understanding the big picture of digital forensics prepares students to perform better analysis, do new research of their own, and identify the best tools or techniques to perform successful investigations - all skills that will have a lifelong impact.

And even though work brings him great rewards, Eric understands the value of work/life balance. In his spare time, he enjoys spending time with his family, hiking, going to amusement parks with his two sons, and even fitting in a bit of video gaming when possible.

Qualifications Summary: 

  • Former Federal Bureau of Investigation (FBI) Special Agent
  • Creates and maintains many free world-class, open-source forensic tools
  • Award-winning author of X-Ways Forensics Practitioner's Guide
  • Recipient of the National Center for Missing and Exploited Children's Award and the U.S. Attorney's Award for Excellence in Law Enforcement

Get to Know Eric Zimmerman:

Here is What Students Say About Eric Zimmerman:

"It is easy to see how much passion Eric has for the topics he teaches" - Ken Saganowski, Kroll

"Deep knowledge - insightful. Gets questions answered thoroughly." - Daniel Lightfoot, PennyMac

"Good pace and content, he emphasis on important points." -  Rueben Rubio, Lord Abbett

"Eric epitimizes what it means to be a subject matter expert in this field. He really knows this material inside and out. Thank you for the high quality training." - Daniel Huynh

"The fact that SANS has managed to land someone like Eric Zimmerman, speaks volumes about the credibility they carry. Top notch."  - Chris Shandro, Blue Shield of California