The archive for this Training Event no longer exists. We apologize for any inconvenience.
For a list of all upcoming training see www.sans.org/training_events/.
Absolutely wonderful, both in presentation and content -Don Seymour, TerpSys
Absolutely wonderful, both in presentation and content
Let's face it, you are probably compromised. What next?By Jonathan Thyer
Energy and Utilities Defense Response based on 2014 Attack PatternBy Adi Sitnica
New Threats Drive Improved Practices: State of Cybersecurity in Health Care OrganizationsBy Barbara Filkins
#windowssecurity "Implementing the 20 Critical Controls on a [...]December 18, 2014 - 8:18 PM
#EndpointSecurity Survey: Which activity in your detection/r [...]December 18, 2014 - 7:35 PM
.@phenrycissp feat in SearchCloudSecurity [@cloudsecuritytt] [...]December 18, 2014 - 5:30 PM
(301) 654-SANS (7267)
Mon-Fri 9am - 8pm EST/EDT
"Because of the use of real-world examples it's easier to apply what you learn."- Danny Hill, Friedkin Companies, Inc.
"The amount of knowledge conveyed and technical diving by practical hands-on was well balanced."- Aaron Moore, Maricopa County
"Just amazing content and instruction, it's really a 'must do' for any info sec professional."- Mark Austin, PHH Mortgage