**3 for 2 class promotion - register and pay for 2 students and receive the 3rd students tuition complimentary, over $4000 in savings. Email mentor@sans.org for details.**
Learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that you can directly apply when you get back to work. Learn tips and tricks from the experts so that you can win the battle against the wide range of cyber adversaries that want to harm your environment.
Is SEC401: Security Essentials Bootcamp Style the right course for you?
STOP and ask yourself the following questions:
If you do not know the answers to these questions, SEC401 course will provide the information security training you need in a bootcamp-style format that is reinforced with hands-on labs.
You Will Learn:
Learn to build a security roadmap that can scale today and into the future.
SEC401: Security Essentials Bootcamp Style is focused on teaching you the essential information security skills and techniques you need to protect and secure your organization's critical information assets and business systems. Our course will show you how to prevent your organization's security problems from being headline news in the Wall Street Journal!
"Prevention is Ideal but Detection is a Must."
With the rise in advanced persistent threats, it is almost inevitable that organizations will be targeted. Whether the attacker is successful in penetrating an organization's network depends on the effectiveness of the organization's defense. Defending against attacks is an ongoing challenge, with new threats emerging all of the time, including the next generation of threats. Organizations need to understand what really works in cybersecurity. What has worked, and will always work, is taking a risk-based approach to cyber defense. Before your organization spends a dollar of its IT budget or allocates any resources or time to anything in the name of cybersecurity, three questions must be answered:
Security is all about making sure you focus on the right areas of defense. In SEC401 you will learn the language and underlying theory of computer and information security. You will gain the essential and effective security knowledge you will need if you are given the responsibility for securing systems and/or organizations. This course meets both of the key promises SANS makes to our students: (1) You will learn up-to-the-minute skills you can put into practice immediately upon returning to work; and (2) You will be taught by the best security instructors in the industry.
Test your security knowledge with our free SANS Security Essentials Assessment Test.
Notice:
This course prepares you for the GSEC certification that meets the requirement of the DoD 8570 IAT Level 2.
Notice:
Please plan to arrive early on Day 1 (8:30AM-Local Time) for lab preparation and set-up. The additional time is needed as the labs require the installation of both a Linux and Windows Virtual Machine (VM) and extensive copying of files in order to run and complete the labs successfully. The Instructor will be available to assist students with lab prep and set-up from 8:30AM-9:00AM. Class lecture will start at 9AM. (Excludes vLive and Mentor)
Course Content Overlap Notice:
Please note that some course material for SEC401 and MGT512 may overlap. We recommend SEC401 for those interested in a more technical course of study, and MGT512 for those primarily interested in a leadership-oriented but less technical learning experience.
A key way that attackers gain access to a company's resources is through a network connected to the Internet. A company wants to try to prevent as many attacks as possible, but in cases where it cannot prevent an attack, it must detect it in a timely manner. Therefore, an understanding of how networks and the related protocols like TCP/IP work is critical to being able to analyze network traffic and determine what is hostile. It is just as important to know how to protect against these attacks using devices such as routers and firewalls. These essentials, and more, will be covered during this course day in order to provide a firm foundation for the consecutive days of training.
CPE/CMU Credits: 8
Setting Up a Lab with Virtual Machines
Network Fundamentals
IP Concepts
IP Behavior
Virtual Machines
To secure an enterprise network, you must have an understanding of the general principles of network security. In this course, you will learn about six key areas of network security. The day starts with information assurance foundations. Students look at both current and historical computer security threats, and how they have impacted confidentiality, integrity, and availability. The first half of the day also covers creating sound security policies and password management, including tools for password strength on both Unix and Windows platforms. The second half of the day is spent on understanding the information warfare threat and the six steps of incident handling. The day draws to a close by looking at attack strategies and how the offense operates.
CPE/CMU Credits: 8
Information Assurance Foundations
Computer Security Policies
Contingency and Continuity Planning
Access Control
Password Management
Incident Response (IR)
Offensive and Defensive Information Warfare (IW)
Attack Strategies and Methods
Military agencies, banks, and retailers offering electronic commerce programs, as well as dozens of other types of organizations, are striving to understand the threats they are facing and what they can do to address those threats. On day 3, you will be provided with a roadmap to help you understand the paths available to organizations that are considering deploying or planning to deploy various security devices and tools such as intrusion detection systems and firewalls. When it comes to securing your enterprise, there is no single technology that is going to solve all your security issues. However, by implementing an in-depth defense strategy that includes multiple risk-reducing measures, you can go a long way toward securing your enterprise.
CPE/CMU Credits: 8
Vulnerability Scanning and Remediation
Web Security
Firewalls and Perimeters
Honeypots
Host-based Protection
Network-based Intrusion Detection and Prevention
There is no silver bullet when it comes to security. However, there is one technology that would help solve a lot of security issues, though few companies deploy it correctly. This technology is cryptography. Concealing the meaning of a message can prevent unauthorized parties from reading sensitive information. Day 4 looks at various aspects of encryption and how it can be used to secure a company's assets. A related area called steganography, or information hiding, is also covered. The day finishes by looking at using the Critical Security Controls for metrics based dashboards and performing risk assessment across an organization.
CPE/CMU Credits: 8
Cryptography
Steganography
Critical Security Controls
Risk Assessment and Auditing
Windows is the most widely-used and hacked operating system on the planet. At the same time, the complexities of Active Directory, PKI, BitLocker, AppLocker, and User Account Control represent both challenges and opportunities. This section will help you quickly master the world of Windows security while showing you the tools that can simplify and automate your work. You will complete the day with a solid grounding in Windows security, by looking at automation, auditing and forensics.
CPE/CMU Credits: 8
Security Infrastructure
Service Packs, Patches, and Backups
Permissions and User Rights
Security Policies and Templates
Securing Network Services
Auditing and Automation
While organizations do not have as many Unix/Linux systems, those that they do have are often some of the most critical systems that need to be protected. Day 6 provides step-by-step guidance to improve the security of any Linux system. The course combines practical "how to" instructions with background information for Linux beginners, as well as security advice and best practices for administrators of all levels of expertise.
CPE/CMU Credits: 6
Linux Landscape
Permissions and User Accounts
Linux OS Security
Maintenance, Monitoring, and Auditing Linux
Linux Security Tools
| Date | Time | Instructor |
|---|---|---|
| Mon Sep 11th, 2017 | 7:00 PM - 9:00 PM | Kenneth May |
| Thu Sep 14th, 2017 | 7:00 PM - 9:00 PM | Kenneth May |
| Mon Sep 18th, 2017 | 7:00 PM - 9:00 PM | Kenneth May |
| Thu Sep 21st, 2017 | 7:00 PM - 9:00 PM | Kenneth May |
| Mon Sep 25th, 2017 | 7:00 PM - 9:00 PM | Kenneth May |
| Thu Sep 28th, 2017 | 7:00 PM - 9:00 PM | Kenneth May |
| Mon Oct 2nd, 2017 | 7:00 PM - 9:00 PM | Kenneth May |
| Thu Oct 5th, 2017 | 7:00 PM - 9:00 PM | Kenneth May |
| Mon Oct 9th, 2017 | 7:00 PM - 9:00 PM | Kenneth May |
| Thu Oct 12th, 2017 | 7:00 PM - 9:00 PM | Kenneth May |
To give you an idea of the effectiveness of the course, here is what a few former students have said about it:
"SEC401 provides an excellent overview of security fundamentals delivered by experienced industry professionals." - Jathan Watso, Department of Finance
"Excellent material for security professionals wanting a deeper level of knowledge on how to implement security policies, procedures, and defensive mechanisms in an org." - Brandon Smit, Dynetics
"SEC401 took what I thought I knew and truly explained everything to me. Now, I also UNDERSTAND the security essentials fundamentals and how/why we apply them. Loved the training, cannot wait to come back for more." - Nicholas Blanton, ManTech International
Security 401: Security Essentials Bootcamp Style consists of course instructions and hands-on sessions. To reinforce the skills covered in class and gain experience with the tools needed to implement effective security, there are hands-on labs every day. These lab sessions are designed to enable students to use the knowledge gained throughout the course in an instructor-led environment. Students will have the opportunity to install, configure, and utilize the tools and techniques that they have learned. In class you will receive a USB drive with 2 virtual machines, but it is critical that you have a properly configured system prior to class.
IMPORTANT: You can use any 64-bit version of Windows, Mac OSX, or Linux as your core operating system that also can install and run VMware virtualization products. You also must have a minimum of 8 GB of RAM or higher for the VM's to function properly in the class. A VMware product must also be installed prior to coming to class. Verify that under BIOS, Virtual Support is ENABLED.
Mandatory System Requirements
Mandatory Downloads prior to coming to class:
It is critical that your CPU and operating system support 64-bit so that our 64-bit guest virtual machine will run on your laptop. VMware provides a free tool for Windows and Linux that will detect whether or not your host supports 64-bit guest virtual machines. For further troubleshooting, this article also provides good instructions for Windows users to determine more about the CPU and OS capabilities. For Macs, please use this support page from Apple to determine 64-bit capability.
Please download and install VMware Workstation 11, VMware Fusion 7, or VMware Workstation Player 7 or higher versions on your system prior to class beginning. If you do not own a licensed copy of VMware Workstation or Fusion, you can download a free 30-day trial copy from VMware. VMware will send you a time-limited serial number if you register for the trial at their website.
SEC401 Checklist
I have confirmed that:
If you have additional questions about the laptop specifications, please contact laptop_prep@sans.org.
Anyone who works in security, is interested in security, or has to understand security should take this course, including:
SEC401 Security Essentials Bootcamp Style covers all of the core areas of security and assumes a basic understanding of technology, networks, and security. For those who are brand new to the field with no background knowledge, SEC301: Intro to Information Security would be the recommended starting point. While SEC301 is not a prerequisite, it will provide the introductory knowledge that will help maximize the experience with SEC401.
For those who are more advanced, SEC501: Enterprise Defender might be the more appropriate course to take.
SEC401 is an interactive hands-on training course. The following are some of the lab activities that students will carry out:
"One of the things I love to hear from students after teaching Security 401 is 'I have worked in security for many years and after taking this course I realized how much I did not know.' With the latest version of Security Essentials and the Bootcamp, we have really captured the critical aspects of security and enhanced those topics with examples to drive home the key points. After you have attended Security 401, I am confident you will walk away with solutions to problems you have had for a while, plus solutions to problems you did not even know you had."
- Eric Cole
| Paid by Aug 14 | Paid by Aug 28 | Paid after Aug 28 | Options |
|---|---|---|---|
| 4,620 USD | 4,820 USD | 5,020 USD | |
|
|||