{
	"id": "44022378-b3c1-48f6-80c8-c5f219d8aa70",
	"created_at": "2026-04-06T00:06:34.484939Z",
	"updated_at": "2026-04-10T13:12:02.592368Z",
	"deleted_at": null,
	"sha1_hash": "89c9d91e08278f647bd780153bea363acb8fb73e",
	"title": "Looks like the page you're looking for doesn't exist or has moved.",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 854754,
	"plain_text": "Looks like the page you're looking for doesn't exist or has moved.\r\nArchived: 2026-04-05 17:54:00 UTC\r\nTraining\r\nCourses\r\nBuild cyber prowess with training from renowned experts\r\nWays to Train\r\nMultiple training options to best fit your schedule and preferred learning style\r\nCyber Ranges\r\nHands-on training to keep you at the top of your game\r\nTraining Events \u0026 Summits\r\nExpert-led training at locations around the world\r\nCertifications\r\nDemonstrate cybersecurity expertise with GIAC certifications\r\nFree Training Events\r\nUpcoming workshops, webinars and local events\r\nWorkforce Security and Risk Training\r\nHarden enterprise security with end-user and role-based training\r\nMeet Our Instructors\r\nTrain with world-class cybersecurity experts who bring real-world expertise to class.\r\nFeatured CourseView All Courses\r\nSEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals\r\nSEC595Cyber Defense, Artificial Intelligence\r\nhttp://www.sans.org/reading-room/whitepapers/analyst/finding-hidden-threats-decrypting-ssl-34840\r\nPage 1 of 4\n\nView course detailsRegister\r\nGet a Free Hour of SANS Training\r\nExperience SANS training through course previews.\r\nLearn More\r\nLearning Paths\r\nBy Focus Area\r\nChart your path to job-specific training courses\r\nNew to Cyber\r\nGive your cybersecurity career the right foundation for success\r\nBy Job Role\r\nFind the courses and certifications that align with our current or desired role\r\nLeadership\r\nTraining designed to help security leaders reduce organizational risk\r\nBy Skills Framework or Directive\r\nExplore how SANS courses align with leading cybersecurity skills frameworks including NICE, ECSF and DoD\r\n8140\r\nDegree and Certificate Programs\r\nhttp://www.sans.org/reading-room/whitepapers/analyst/finding-hidden-threats-decrypting-ssl-34840\r\nPage 2 of 4\n\nGain the skills, certifications, and confidence to launch or advance your cybersecurity career.\r\nBy Skills Roadmap\r\nFind the right training path based on critical skills\r\nFeaturedView all Focus Areas\r\nNEW - AI Security Training\r\nCan't find what you are looking for?\r\nLet us help.\r\nContact us\r\nFree Resources\r\nWatch \u0026 ListenWebinarsSummit PresentationsPodcasts \u0026 Live StreamsOverview\r\nReadBlogNewslettersInternet Storm CenterOverview\r\nDownloadOpen Source ToolsPosters \u0026 Cheat SheetsPolicy TemplatesWhite PapersOverview\r\nSANS Community Benefits\r\nConnect, learn, and share with other cybersecurity professionals\r\nCustomer Case Studies\r\nDiscover how organizations and individual cyber practitioners use SANS training and GIAC certifications\r\nAI Risk \u0026 Readiness\r\nExplore expert-driven guidance, training, and tools to help defend against AI-powered threats and adopt AI\r\nsecurely\r\nJoin the SANS Community\r\nBecome a member for instant access to our free resources.\r\nSign Up\r\nFor Organizations\r\nTeam DevelopmentWhy Partner with SANSGroup PurchasesSkills \u0026 Talent AssessmentsPrivate \u0026 Custom\r\nTraining ProgramsOverview\r\nLeadership DevelopmentManagement Courses \u0026 AccreditationCyber Crisis ExercisesSANS Cyber Leaders\r\nNetworkOverview\r\nWorkforce Security \u0026 RiskSecurity Awareness TrainingCompliance TrainingRisk\r\nManagementServicesResourcesOverview\r\nhttp://www.sans.org/reading-room/whitepapers/analyst/finding-hidden-threats-decrypting-ssl-34840\r\nPage 3 of 4\n\nPublic Sector\r\nMission-focused cybersecurity training for government, defense, and education\r\nPartnerships\r\nExplore industry-specific programming and customized training solutions\r\nSponsorship Opportunities\r\nSponsor a SANS event or research paper\r\nInterested in developing a training plan to fit your organization’s needs?\r\nWe're here to help.\r\nContact Us\r\nSource: http://www.sans.org/reading-room/whitepapers/analyst/finding-hidden-threats-decrypting-ssl-34840\r\nhttp://www.sans.org/reading-room/whitepapers/analyst/finding-hidden-threats-decrypting-ssl-34840\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"http://www.sans.org/reading-room/whitepapers/analyst/finding-hidden-threats-decrypting-ssl-34840"
	],
	"report_names": [
		"finding-hidden-threats-decrypting-ssl-34840"
	],
	"threat_actors": [],
	"ts_created_at": 1775433994,
	"ts_updated_at": 1775826722,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/89c9d91e08278f647bd780153bea363acb8fb73e.pdf",
		"text": "https://archive.orkl.eu/89c9d91e08278f647bd780153bea363acb8fb73e.txt",
		"img": "https://archive.orkl.eu/89c9d91e08278f647bd780153bea363acb8fb73e.jpg"
	}
}