Don't Miss Pen Test Hackfest Summit & Training, November 2-9 near DC!

SANS 2013

Orlando, FL | Fri, Mar 8 - Fri, Mar 15, 2013
This event is over,
but there are more training opportunities.

Fr 8Sa 9Su 10Mo 11Tu 12We 13Th 14Fr 15
FOR508: Advanced Computer Forensic Analysis and Incident Response New
Instructors: Rob Lee, Richard Salgado
MGT415: A Practical Introduction to Risk Assessment New
Instructor: James Tarala
SEC401: Security Essentials Bootcamp Style
Instructor: Dr. Eric Cole
SEC504: Hacker Techniques, Exploits & Incident Handling
Instructor: John Strand
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
FOR408: Computer Forensic Investigations - Windows In-Depth
Instructor: Chad Tilbury
SEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Kevin Johnson
SEC503: Intrusion Detection In-Depth
Instructor: Mike Poor
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques Sold Out
Instructor: Lenny Zeltser
MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam
Instructor: Eric Conrad
SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking
Instructor: Stephen Sims
SEC505: Securing Windows and Resisting Malware
Instructor: Jason Fossen
SEC579: Virtualization and Private Cloud Security Waitlist
Instructor: Dave Shackleford
AUD507: Auditing Networks, Perimeters, and Systems
Instructor: David Hoelzer
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Bryce Galbraith
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses
Instructor: Larry Pesce
SEC575: Mobile Device Security and Ethical Hacking
Instructor: Joshua Wright
SEC301: Intro to Information Security
Instructor: Fred Kerby
DEV522: Defending Web Applications Security Essentials  
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
DEV541: Secure Coding in Java/JEE: Developing Defensible Applications
Instructor: Frank Kim
SEC506: Securing Linux/Unix
Instructor: Hal Pomeranz
DEV544: Secure Coding in .NET: Developing Defensible Applications    
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
SEC524: Cloud Security Fundamentals
Instructor: Dave Shackleford
MGT514: IT Security Strategic Planning, Policy and Leadership Waitlist   
MGT433: Securing The Human: Building and Deploying an Effective Security Awareness Program
Instructor: Lance Spitzner
SEC546: IPv6 Essentials
Instructor: Eric Conrad
SEC642: Advanced Web App Penetration Testing and Ethical Hacking Waitlist
Instructor: Seth Misenar
MGT305: Technical Communication and Presentation Skills for Security Professionals
Instructor: G. Mark Hardy
AUD521: Meeting the Minimum: PCI/DSS 2.0: Becoming and Staying Compliant
Instructor: David Hoelzer
MGT535: Incident Response Team Management       
FOR526: Memory Forensics In-Depth   
HOSTED: (ISC)²® Certified Secure Software Lifecycle Professional (CSSLP®) CBK® Education Program
Instructor: Don Franke
HOSTED: Offensive Countermeasures: The Art of Active Defenses
Instructor: John Strand
AUD444: Auditing Security and Controls of Active Directory and Windows     
AUD445: Auditing Security and Controls of Oracle Databases
Instructor: Tanya Baccam
Core NetWars Experience
Instructors: Ed Skoudis, Tim Medin
HOSTED: Physical Penetration Testing - Introduction
Instructor: Deviant Ollam
"Hall of Shame" Apps in the Apple App Store and Google Play
Instructor: Tom Eston
APT: It is Not Time to Pray, It is Time to Act
Instructor: Dr. Eric Cole
Finding Unknown Malware
Instructor: Alissa Torres
General Session - Welcome to SANS
Instructor: Dr. Eric Cole
GIAC Program Overview
Instructor: Jeff Frisk, GIAC Program Director
Hacking Your Friends and Neighbors For Fun
Instructor: Joshua Wright
Honeypots For Home Use
Instructor: James Leyte-Vidal
Human Nature and Information Security: Irrational and Extraneous Factors That Matter
Instructor: Lenny Zeltser
Hunting and Sniper Forensics
Instructor: Jason Lawrence
InfoSec in the Financial World: War Stories and Lessons Learned
Instructor: Bryan Simon
Introduction to Windows Kernel Exploitation
Instructor: Stephen Sims
Knock-off Phone Forensics -Some Handsets Aren't What They Appear To Be
Instructor: Heather Mahalik
Open Mic Night
Instructor: Brought to you by SANS Online Training
Over-Zealous Social Media Investigations: Beware the Privacy Monster
Instructor: Ben Wright
Panel - How Do We Secure The Human
Instructor: Panel Members
Phish Stories: Technical Intervention when Humans Fail
Instructor: Rich Graves
Physical Repair of Mobile Devices - Practical Tips & Tricks For When Good Evidence Gets Broken
Instructor: Det. Cindy Murphy
Please Keep Your Brain Juice Off My Enigma: a True Story
Instructor: Ed Skoudis & Josh Wright
Project Management Approach to Yearly PCI Compliance Validation
Instructor: Michael Hoehl
SANS Technology Institute Open House
Instructor: Ray Davidson
Securing the Kids
Instructor: Lance Spitzner and Rich Wistocki
Small Business: The New Target -- What Can They Do?
Instructor: Robert L Comella
Social Zombies: Rise of the Mobile Dead
Instructor: Kevin Johnson & Tom Eston
Tales from the Crypt: TrueCrypt Analysis
Instructor: Hal Pomeranz
Who's Watching the Watchers?
Instructor: Mike Poor
Why Our Defenses Are Failing Us. One Click Is All It Takes...
Instructor: Bryce Galbraith
Women in Technology Meet and Greet
Instructor: Karen Fioravanti
You Can Panic Now. Host Protection is (Mostly) Dead.
Instructor: Rob Lee