Kick off the New Year with SANS Security East 2017 in New Orleans (January 9-14)

Network Security 2014

Las Vegas, NV | Sun, Oct 19 - Mon, Oct 27, 2014
This event is over,
but there are more training opportunities.

Su 19Mo 20Tu 21We 22Th 23Fr 24Sa 25Su 26Mo 27
SEC760: Advanced Exploit Development for Penetration Testers New
Instructor: Stephen Sims
HOSTED: Embedded Device Security Assessments For The Rest Of Us New
Instructor: Paul Asadoorian
SEC401: Security Essentials Bootcamp Style
Instructor: Bryce Galbraith
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling
Instructor: John Strand
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
FOR408: Windows Forensic Analysis
Instructor: Chad Tilbury
SEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Seth Misenar
SEC503: Intrusion Detection In-Depth
Instructor: Mike Poor
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam
Instructor: Dr. Eric Cole
FOR508: Advanced Computer Forensic Analysis and Incident Response
Instructor: Rob Lee
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: James Lyne
SEC505: Securing Windows with the Critical Security Controls
Instructor: Jason Fossen
SEC579: Virtualization and Private Cloud Security
Instructor: Dave Shackleford
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: David Hoelzer
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses
Instructor: Larry Pesce
SEC575: Mobile Device Security and Ethical Hacking   
SEC301: Intro to Information Security    
DEV522: Defending Web Applications Security Essentials   
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
DEV541: Secure Coding in Java/JEE: Developing Defensible Applications
Instructor: Gregory Leonard
SEC440: Critical Security Controls: Planning, Implementing and Auditing
Instructor: James Tarala
SEC506: Securing Linux/Unix
Instructor: Hal Pomeranz
DEV544: Secure Coding in .NET: Developing Defensible Applications
Instructor: Eric Johnson
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
MGT514: IT Security Strategic Planning, Policy and Leadership Sold Out
Instructor: Frank Kim
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Eric Conrad
SEC546: IPv6 Essentials       
MGT305: Technical Communication and Presentation Skills for Security Professionals
Instructor: David Hoelzer
FOR526: Memory Forensics In-Depth
Instructor: Alissa Torres
HOSTED: (ISC)2® Certified Secure Software Lifecycle Professional (CSSLP®) CBK® Education Program
Instructor: Mano Paul
HOSTED: Offensive Countermeasures: The Art of Active Defenses       
SEC511: Continuous Monitoring and Security Operations Sold Out
Instructor: Eric Conrad
SEC561: Immersive Hands-on Hacking Techniques
Instructor: Tim Medin
SEC573: Python for Penetration Testers
Instructor: Mark Baggett
FOR572: Advanced Network Forensics and Analysis
Instructor: Philip Hagen
FOR585: Advanced Smartphone Forensics
Instructor: Heather Mahalik
MGT415: A Practical Introduction to Risk Assessment
Instructor: James Tarala
ICS410: ICS/SCADA Security Essentials
Instructor: Justin Searle
Core NetWars Experience
Instructor: Ed Skoudis
DFIR NetWars Tournament
Instructor: Rob Lee
HOSTED: Physical Penetration Testing - Introduction
Instructor: Deviant Ollam
Know Thyself: Brian Krebs is a Nice Guy But You Don't Want Him Writing About You
Instructor: Ryan Johnson
An Introduction to PowerShell for Security Assessments
Instructor: James Tarala
Analysis of Meterpreter During Post-Exploitation
Instructor: Kiel Wadner - Master's Degree Candidate
APT: It is Time to Act
Instructor: Dr. Eric Cole
Compli-promised: Balancing with Risk Mgt
Instructor: My-Ngoc Nguyen
Debunking the Complex Password Myth
Instructor: Keith Palmgren
Evolving Threats
Instructor: Paul A. Henry
Finding the Wolf in Sheepâs Clothing: Integrating Identity into Intrusion Detection
Instructor: Courtney Imbert - Master's Degree Candidate
General Session - Welcome to SANS
Instructor: Dr. Eric Cole
GIAC Program Overview
Instructor: Jeff Frisk
How Not to Suck at Pentesting
Instructor: John Strand
Logs, Logs, Every Where / Nor Any Byte to Grok
Instructor: Phil Hagen
Malware Analysis Essentials Using REMnux
Instructor: Lenny Zeltser
Registration Welcome Reception
Risky Business
Instructor: Robert Sorensen - Master's Degree Candidate
SANS 8 Mobile Device Security Steps
Instructor: Chris Crowley
SANS Technology Institute Open House
Instructor: Bill Lockhart, Executive Director, SANS Technology Institute
Securing The Kids
Instructor: Lance Spitzner
Security Awareness Metrics: Measuring Human Behavior
Instructor: Lance Spitzner
Straddling the Next Frontier: How Quantum Technologies Have Already Begun Impacting the Cyber Security Landscape.
Instructor: Eric Jodoin - Master's Degree Candidate
Sushi-grade Smartphone Forensics on a Ramen Noodle Budget
Instructor: Heather Mahalik
The 13 Absolute Truths of Security
Instructor: Keith Palmgren
The Bot Inside the Machine
Instructor: Johannes Ullrich
The Cost of Bad Project Management
Instructor: George Khalil - Master's Degree Candidate
The Great Browser Schism: How to Analyze IE10 & IE11
Instructor: Chad Tilbury
The Law of Offensive Countermeasures, Active Defense or Whatever You Wanna Call It
Instructor: Benjamin Wright
Weaponizing Digital Currency
Instructor: G. Mark Hardy
Windows Exploratory Surgery with Process Hacker-
Instructor: Jason Fossen
Women in Technology Meet and Greet