5 Days Left to Save $200 on Automotive Cybersecurity Summit 2017

SANS 2014

Orlando, FL | Sat, Apr 5 - Mon, Apr 14, 2014
This event is over,
but there are more training opportunities.

Sa 5Su 6Mo 7Tu 8We 9Th 10Fr 11Sa 12Su 13Mo 14
NewMGT415: A Practical Introduction to Risk Assessment
Instructor: James Tarala
SEC401: Security Essentials Bootcamp Style
Instructor: Dr. Eric Cole
SEC504: Hacker Techniques, Exploits & Incident Handling
Instructor: John Strand
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
FOR408: Windows Forensic Analysis
Instructor: Ovie Carroll
SEC542: Web App Penetration Testing and Ethical Hacking
Instructor: Seth Misenar
SEC503: Intrusion Detection In-Depth
Instructor: Mike Poor
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam
Instructor: Eric Conrad
FOR508: Advanced Computer Forensic Analysis and Incident Response
Instructor: Rob Lee
SEC660: Advanced Penetration Testing, Exploits, and Ethical Hacking
Instructor: Stephen Sims
SEC505: Securing Windows with the Critical Security Controls
Instructor: Jason Fossen
SEC579: Virtualization and Private Cloud Security
Instructor: Dave Shackleford
AUD507: Auditing Networks, Perimeters, and Systems
Instructor: David Hoelzer
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Paul A. Henry
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
SEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses
Instructor: Larry Pesce
SEC575: Mobile Device Security and Ethical Hacking
Instructor: Joshua Wright
SEC301: Intro to Information Security
Instructor: Fred Kerby
DEV522: Defending Web Applications Security Essentials    
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
DEV541: Secure Coding in Java/JEE: Developing Defensible Applications
Instructor: Gregory Leonard
DEV544: Secure Coding in .NET: Developing Defensible Applications
Instructor: Eric Johnson
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep
Instructor: Jeff Frisk
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Eric Conrad
SEC546: IPv6 Essentials        
SEC642: Advanced Web App Penetration Testing and Ethical Hacking
Instructor: Justin Searle
MGT305: Technical Communication and Presentation Skills for Security Professionals
Instructor: G. Mark Hardy
MGT535: Incident Response Team Management
Instructor: Alissa Torres
FOR526: Memory Forensics In-Depth
Instructor: Alissa Torres
HOSTED: (ISC)2® Certified Secure Software Lifecycle Professional (CSSLP®) CBK® Education Program
Instructor: EJ Jones
Sold OutSEC561: Intense Hands-on Pen Testing Skill Development (with SANS NetWars)
Instructor: Tim Medin
Sold OutFOR572: Advanced Network Forensics and Analysis    
AUD444: Auditing Security and Controls of Active Directory and Windows       
AUD445: Auditing Security and Controls of Oracle Databases       
Core NetWars Experience
Instructors: Tim Medin, Ed Skoudis
DFIR NetWars Tournament
Instructor: Rob Lee
HOSTED: Physical Penetration Testing - Introduction
Instructor: Deviant Ollam
A Hands-on XML External Entity Vulnerability Training Module
Instructor: Carrie Roberts - Master's Degree Candidate
An Introduction to PowerShell for Security Assessments
Instructor: James Tarala
Analyzing a Second-Hand ATM (Automated Teller Machine)
Instructor: Erik Van Buggenhout
APT Attacks Exposed: Network, Host, Memory, and Malware Analysis
Instructor: Rob Lee, Ovie Carroll, Alissa Torres, Phil Hagen, and Lenny Zeltser
Building and Managing a PKI Solution for Small and Medium Size Business
Instructor: Wylie Shanks - Master's Degree Candidate
Continuous Ownage: Why you Need Continuous Monitoring
Instructor: Seth Misenar and Eric Conrad
Evolving VoIP Threats
Instructor: Paul A. Henry
General Session - Welcome to SANS
Instructor: Rob Lee
GIAC Program Overview
Instructor: Jeff Frisk
Hacking Back, Active Defense and Internet Tough Guys
Instructor: John Strand
How I Learned to Stop Worrying and be Agile!
Instructor: James Leyte-Vidal
How the West was Pwned
Instructor: G.Mark Hardy
How to Spy on your Employees with Memory Forensics
Instructor: Jacob Williams and Alissa Torres
Introduction to IDA Pro and Debugging
Instructor: Stephen Sims
Online Training Pool Party
OpenSSL "Heartbleed" Vulnerability
Instructor: Jake Williams
RapidTriage: An Automated Approach to System Intrusion Discovery
Instructor: Trenton Bond - Master's Degree Candidate
Registration Welcome Reception
RTC Security
Instructor: Jason Ostrom
SANS Technology Institute Open House
Instructor: Alan Paller
Securing The Kids
Instructor: Lance Spitzner
Security Awareness Metrics: Measuring Human Behavior
Instructor: Lance Spitzner
Security Static Vulnerable Devices
Instructor: Chris Farrell - Master's Degree Candidate
Social Engineering for Pentesters
Instructor: Dave Shackleford
The Law of Offensive Countermeasures, Active Defense or Whatever You Wanna Call It
Instructor: Benjamin Wright
The Security Onion Cloud Client: Network Security Monitoring for the Cloud
Instructor: Joshua Brower - Master's Degree Candidate
There's *GOLD* in Them Thar Package Management Databases!
Instructor: Phil Hagen
What is bWAPP? Web Application Penetration Testing with bWAPP
Instructor: Malik Mesellem
Windows Exploratory Surgery with Process Hacker
Instructor: Jason Fossen
Women in Technology Meet and Greet
Instructor: Karen Fioravanti