Last Chance: MacBook Air, Dell XPS 13 or $600 off with SANS Online Training Ends December 7

Network Security 2014

Las Vegas, NV | Sun, Oct 19 - Mon, Oct 27, 2014
This event is over,
but there are more training opportunities.

Course
Oct
Su 19Mo 20Tu 21We 22Th 23Fr 24Sa 25Su 26Mo 27
SEC760: Advanced Exploit Development for Penetration Testers New
Instructor: Stephen Sims
   
HOSTED: Embedded Device Security Assessments For The Rest Of Us New
Instructor: Paul Asadoorian
       
SEC401: Security Essentials Bootcamp Style
Instructor: Bryce Galbraith
   
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling
Instructor: John Strand
   
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
   
FOR408: Windows Forensic Analysis
Instructor: Chad Tilbury
   
SEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Seth Misenar
   
SEC503: Intrusion Detection In-Depth
Instructor: Mike Poor
   
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
    
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
   
MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam
Instructor: Dr. Eric Cole
   
FOR508: Advanced Computer Forensic Analysis and Incident Response
Instructor: Rob Lee
   
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: James Lyne
   
SEC505: Securing Windows with the Critical Security Controls
Instructor: Jason Fossen
   
SEC579: Virtualization and Private Cloud Security
Instructor: Dave Shackleford
   
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: David Hoelzer
   
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
   
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
    
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses
Instructor: Larry Pesce
   
SEC575: Mobile Device Security and Ethical Hacking   
SEC301: Intro to Information Security    
DEV522: Defending Web Applications Security Essentials   
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
    
DEV541: Secure Coding in Java/JEE: Developing Defensible Applications
Instructor: Gregory Leonard
     
SEC440: Critical Security Controls: Planning, Implementing and Auditing
Instructor: James Tarala
       
SEC506: Securing Linux/Unix
Instructor: Hal Pomeranz
   
DEV544: Secure Coding in .NET: Developing Defensible Applications
Instructor: Eric Johnson
     
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
   
MGT514: IT Security Strategic Planning, Policy and Leadership Sold Out
Instructor: Frank Kim
    
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
       
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Eric Conrad
       
SEC546: IPv6 Essentials       
MGT305: Technical Communication and Presentation Skills for Security Professionals
Instructor: David Hoelzer
        
FOR526: Memory Forensics In-Depth
Instructor: Alissa Torres
   
HOSTED: (ISC)2® Certified Secure Software Lifecycle Professional (CSSLP®) CBK® Education Program
Instructor: Mano Paul
    
HOSTED: Offensive Countermeasures: The Art of Active Defenses       
SEC511: Continuous Monitoring and Security Operations Sold Out
Instructor: Eric Conrad
   
SEC561: Immersive Hands-on Hacking Techniques
Instructor: Tim Medin
   
SEC573: Python for Penetration Testers
Instructor: Mark Baggett
    
FOR572: Advanced Network Forensics and Analysis
Instructor: Philip Hagen
   
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
   
MGT415: A Practical Introduction to Risk Assessment
Instructor: James Tarala
        
ICS410: ICS/SCADA Security Essentials
Instructor: Justin Searle
    
Core NetWars Experience
Instructor: Ed Skoudis
       
DFIR NetWars Tournament
Instructor: Rob Lee
       
HOSTED: Physical Penetration Testing - Introduction
Instructor: Deviant Ollam
       
Know Thyself: Brian Krebs is a Nice Guy But You Don't Want Him Writing About You
Instructor: Ryan Johnson
An Introduction to PowerShell for Security Assessments
Instructor: James Tarala
Analysis of Meterpreter During Post-Exploitation
Instructor: Kiel Wadner - Master's Degree Candidate
APT: It is Time to Act
Instructor: Dr. Eric Cole
Compli-promised: Balancing with Risk Mgt
Instructor: My-Ngoc Nguyen
Debunking the Complex Password Myth
Instructor: Keith Palmgren
Evolving Threats
Instructor: Paul A. Henry
Finding the Wolf in Sheep’s Clothing: Integrating Identity into Intrusion Detection
Instructor: Courtney Imbert - Master's Degree Candidate
General Session - Welcome to SANS
Instructor: Dr. Eric Cole
GIAC Program Overview
Instructor: Jeff Frisk
How Not to Suck at Pentesting
Instructor: John Strand
Logs, Logs, Every Where / Nor Any Byte to Grok
Instructor: Phil Hagen
Malware Analysis Essentials Using REMnux
Instructor: Lenny Zeltser
Registration Welcome Reception
Risky Business
Instructor: Robert Sorensen - Master's Degree Candidate
SANS 8 Mobile Device Security Steps
Instructor: Chris Crowley
SANS Technology Institute Open House
Instructor: Bill Lockhart, Executive Director, SANS Technology Institute
Securing The Kids
Instructor: Lance Spitzner
Security Awareness Metrics: Measuring Human Behavior
Instructor: Lance Spitzner
Straddling the Next Frontier: How Quantum Technologies Have Already Begun Impacting the Cyber Security Landscape.
Instructor: Eric Jodoin - Master's Degree Candidate
Sushi-grade Smartphone Forensics on a Ramen Noodle Budget
Instructor: Heather Mahalik
The 13 Absolute Truths of Security
Instructor: Keith Palmgren
The Bot Inside the Machine
Instructor: Johannes Ullrich
The Cost of Bad Project Management
Instructor: George Khalil - Master's Degree Candidate
The Great Browser Schism: How to Analyze IE10 & IE11
Instructor: Chad Tilbury
The Law of Offensive Countermeasures, Active Defense or Whatever You Wanna Call It
Instructor: Benjamin Wright
Weaponizing Digital Currency
Instructor: G. Mark Hardy
Windows Exploratory Surgery with Process Hacker-
Instructor: Jason Fossen
Women in Technology Meet and Greet