Last Day to Save $400 on SANS Albuquerque 2014

Network Security 2013

Las Vegas, NV | Sat Sep 14 - Mon Sep 23, 2013

Welcome to Network Security 2013

  • 43 Courses
  • 40 Instructors
  • 6 Disciplines

Caesars Palace

SANS Network Security will once again be held at the world-famous Caesars Palace.
1 2
 

I'm pleased to invite you and your colleagues to attend SANS Network Security 2013 when we return to the magnificent Caesars Palace, Las Vegas, on September 14-23. Network Security is your annual networking opportunity! SANS will bring you the best in network security training, certification, and up-to-the-minute research on the most important topics in the industry today. Read More

Available Courses
Title Certification Instructor
NEW: SEC561: Intense Hands-on Pen Testing Skill Development (with SANS NetWars)
Joshua Wright
NEW: SEC573: Python for Penetration Testers
Mark Baggett
NEW: HOSTED: (ISC)2 Securing Information Systems Before and After an Incident
Douglas Leece
SEC301: Intro to Information Security GISF Fred Kerby
SEC401: Security Essentials Bootcamp Style GSEC Dr. Eric Cole
SEC434: Log Management In-Depth: Compliance, Security, Forensics, and Troubleshooting
Dr. Eric Cole
SEC464: Hacker Guard: Security Baseline Training for IT Administrators and Operations with Continuing Education
John Strand
SEC501: Advanced Security Essentials - Enterprise Defender GCED Bryce Galbraith
SEC502: Perimeter Protection In-Depth GCFW Seth Misenar
SEC503: Intrusion Detection In-Depth GCIA Mike Poor
SEC504: Hacker Techniques, Exploits & Incident Handling GCIH John Strand
SEC505: Securing Windows and Resisting Malware GCWN Jason Fossen
SEC506: Securing Linux/Unix GCUX Hal Pomeranz
SEC509: Securing Oracle Databases
Tanya Baccam
SEC542: Web App Penetration Testing and Ethical Hacking GWAPT Kevin Johnson
SEC546: IPv6 Essentials
Johannes Ullrich, Ph.D.
SEC560: Network Penetration Testing and Ethical Hacking GPEN Ed Skoudis
Tim Medin
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
James Tarala
SEC575: Mobile Device Security and Ethical Hacking GMOB Christopher Crowley
SEC579: Virtualization and Private Cloud Security
Dave Shackleford
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Bryce Galbraith
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses GAWN Larry Pesce
SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking GXPN Stephen Sims
James Lyne
DEV522: Defending Web Applications Security Essentials GWEB Johannes Ullrich, Ph.D.
DEV541: Secure Coding in Java/JEE: Developing Defensible Applications GSSP-JAVA Gregory Leonard
DEV544: Secure Coding in .NET: Developing Defensible Applications GSSP-.NET James Jardine
FOR408: Computer Forensic Investigations - Windows In-Depth GCFE Rob Lee
FOR508: Advanced Computer Forensic Analysis and Incident Response GCFA Chad Tilbury
FOR526: Windows Memory Forensics In-Depth
Alissa Torres
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques GREM Lenny Zeltser
MGT305: Technical Communication and Presentation Skills for Security Professionals
G. Mark Hardy
MGT414: SANS +S Training Program for the CISSP® Certification Exam GISP Eric Conrad
MGT433: Securing The Human: Building and Deploying an Effective Security Awareness Program
Lance Spitzner
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression GSLC G. Mark Hardy
MGT514: IT Security Strategic Planning, Policy and Leadership
Mark Williams
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep GCPM Jeff Frisk
MGT535: Incident Response Team Management
Christopher Crowley
AUD444: Auditing Security and Controls of Active Directory and Windows
Bryan Simon
AUD507: Auditing Networks, Perimeters, and Systems GSNA David Hoelzer
LEG523: Law of Data Security and Investigations GLEG Benjamin Wright
NetWars - Tournament
Tim Medin
HOSTED: (ISC)²® Certified Secure Software Lifecycle Professional (CSSLP®) CBK® Education Program
Frank Shirmo
HOSTED: SCADA Security Training
Jonathan Pollet
HOSTED: Onapsis: Securing SAP Platforms - Hands-on Security Techniques to Protect Business-Critical Infrastructure from Cyber-attacks
Juan Perez-Etchegoyen
Mariano Nunez