Digital Forensic Investigations and Media Exploitation
SANS Penetration Testing and Ethical Hacking training courses teach the methodologies, techniques, and tactical tools of modern adversaries. Offensively-focused hands-on education is an essential foundation for all information security practitioners; knowing how to attack gives keen insight into proper defensive, vulnerability assessment, forensic and incident response processes. For seasoned and skilled penetration testing professionals, SANS offers advanced and intensive hands-on training of exploitation development, Metasploit kung-fu, wireless and mobile device hacking, and coding custom payloads in Python for penetration testing.
SANS Penetration Testing and Ethical Hacking training is where you will learn to properly and professionally break things, figure out how and why they work, and put them back together to make them better than before.
"Once again SANS has exceeded my expectations and successfully re-focused my view of threats and risks. I recommend this course because it is very enlightening." - Charles Allen, EM Solutions, Inc
The SANS Promise is "You will be able to apply our information security training the day you get back to the office!"
Incident Response and Threat Hunting
Incident response tactics and procedures have evolved rapidly over the past several years. Adversaries are no longer compromising one or two systems in your enterprise; they are compromising hundreds. Your team can no longer afford antiquated incident response training courses that fail to properly identify compromised systems, provide ineffective containment of the breach, and ultimately fail to rapidly remediate the incident.
SANS Core Incident Response Training Courses will teach you to find and stop hackers:
Additional Incident Response training courses are listed below:
Secure Software Development
Learn the versatile skills and master the tools and techniques required to perform a comprehensive IT audit immediately upon returning to work. SANS hands-on IT audit training courses will deliver the "value-add" organizations are seeking from auditors by providing direct experience auditing technologies important for all aspects of enterprise IT operations. Our courses will develop and expand your audit knowledge of security and controls to properly identify and categorize risks and achieve audit objectives when auditing Applications, Active Directory, Databases, and Networks.