homepage
Open menu
Go one level top
  • Train and Certify
    Train and Certify

    Immediately apply the skills and techniques learned in SANS courses, ranges, and summits

    • Overview
    • Courses
      • Overview
      • Full Course List
      • By Focus Areas
        • Cloud Security
        • Cyber Defense
        • Cybersecurity and IT Essentials
        • DFIR
        • Industrial Control Systems
        • Offensive Operations
        • Management, Legal, and Audit
      • By Skill Levels
        • New to Cyber
        • Essentials
        • Advanced
        • Expert
      • Training Formats
        • OnDemand
        • In-Person
        • Live Online
      • Course Demos
    • Training Roadmaps
      • Skills Roadmap
      • Focus Area Job Roles
        • Cyber Defence Job Roles
        • Offensive Operations Job Roles
        • DFIR Job Roles
        • Cloud Job Roles
        • ICS Job Roles
        • Leadership Job Roles
      • NICE Framework
        • Security Provisionals
        • Operate and Maintain
        • Oversee and Govern
        • Protect and Defend
        • Analyze
        • Collect and Operate
        • Investigate
        • Industrial Control Systems
      • European Skills Framework
    • GIAC Certifications
    • Training Events & Summits
      • Events Overview
      • Event Locations
        • Asia
        • Australia & New Zealand
        • Latin America
        • Mainland Europe
        • Middle East & Africa
        • Scandinavia
        • United Kingdom & Ireland
        • United States & Canada
      • Summits
    • OnDemand
    • Get Started in Cyber
      • Overview
      • Degree and Certificate Programs
      • Scholarships
    • Cyber Ranges
  • Manage Your Team
    Manage Your Team

    Build a world-class cyber team with our workforce development programs

    • Overview
    • Why Work with SANS
    • Group Purchasing
    • Build Your Team
      • Team Development
      • Assessments
      • Private Training
      • Hire Cyber Professionals
      • By Industry
        • Health Care
        • Industrial Control Systems Security
        • Military
    • Leadership Training
  • Security Awareness
    Security Awareness

    Increase your staff’s cyber awareness, help them change their behaviors, and reduce your organizational risk

    • Overview
    • Products & Services
      • Security Awareness Training
        • EndUser Training
        • Phishing Platform
      • Specialized
        • Developer Training
        • ICS Engineer Training
        • NERC CIP Training
        • IT Administrator
      • Risk Assessments
        • Knowledge Assessment
        • Culture Assessment
        • Behavioral Risk Assessment
    • OUCH! Newsletter
    • Career Development
      • Overview
      • Training & Courses
      • Professional Credential
    • Blog
    • Partners
    • Reports & Case Studies
  • Resources
    Resources

    Enhance your skills with access to thousands of free resources, 150+ instructor-developed tools, and the latest cybersecurity news and analysis

    • Overview
    • Webcasts
    • Free Cybersecurity Events
      • Free Events Overview
      • Summits
      • Solutions Forums
      • Community Nights
    • Content
      • Newsletters
        • NewsBites
        • @RISK
        • OUCH! Newsletter
      • Blog
      • Podcasts
      • Summit Presentations
      • Posters & Cheat Sheets
    • Research
      • White Papers
      • Security Policies
    • Tools
    • Focus Areas
      • Cyber Defense
      • Cloud Security
      • Digital Forensics & Incident Response
      • Industrial Control Systems
      • Cyber Security Leadership
      • Offensive Operations
  • Get Involved
    Get Involved

    Help keep the cyber community one step ahead of threats. Join the SANS community or begin your journey of becoming a SANS Certified Instructor today.

    • Overview
    • Join the Community
    • Work Study
    • Teach for SANS
    • CISO Network
    • Partnerships
    • Sponsorship Opportunities
  • About
    About

    Learn more about how SANS empowers and educates current and future cybersecurity practitioners with knowledge and skills

    • SANS
      • Overview
      • Our Founder
      • Awards
    • Instructors
      • Our Instructors
      • Full Instructor List
    • Mission
      • Our Mission
      • Diversity
      • Scholarships
    • Contact
      • Contact Customer Service
      • Contact Sales
      • Press & Media Enquiries
    • Frequent Asked Questions
    • Customer Reviews
    • Press
    • Careers
  • Contact Sales
  • SANS Sites
    • GIAC Security Certifications
    • Internet Storm Center
    • SANS Technology Institute
    • Security Awareness Training
  • Search
  • Log In
  • Join
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. SANS Challenge Coins: The Ultimate Recognition to Elite Cybersecurity Professionals
SANS_Filler_Avatar.jpg
SANS Institute

SANS Challenge Coins: The Ultimate Recognition to Elite Cybersecurity Professionals

Do you count yourself among the SANS Challenge Coin holders elite?

January 18, 2022

Hundreds of SANS Institute students have stepped up to the challenge and conquered. They’ve mastered the concepts and skills, beat out their classmates, and proven their prowess. These are the elite, the recipients of a SANS Challenge Coin, an award given to a select portion of the thousands of students that have taken any of theSANS courses.

The coins – more precisely, Round Metal Objects (RMO) – were initially created to recognize students who demonstrate exceptional talent and significantly contribute to, and lead, the cybersecurity profession and community. The coins are meant to be an honor; they're also intended to be rare. SANS Institute uses the coins to identify and honor those who excel at detecting and eradicating threats, those who understand the critical importance of cybersecurity and continually strive to further not only their own knowledge, but the knowledge of the entire cybersecurity field. These students actively share their experiences and encourage learning through participation in the community; they're typically leaders in the community.

The challenges through which students can earn a coin are typically held on the last day of class for a SANS course. Students compete in a Capture-the-Flag (CTF) or Capstone Challenge and must successfully overcome a number of obstacles to prove their proficiency during timed, hands-on incidents. The CTFs and Capstone Challenges are created by SANS’ top instructors – each one a cybersecurity practitioner, subject-matter expert, experienced teacher, and professional leader in their own right.

Each SANS Institute Curriculum features different coins:


Cyber Defense Curriculum

SANS Cyber Defense curriculum is broken down into Cyber Defense Essentials and Blue Team Operations courses.

SANS Cyber Defense Essentials

These courses build a solid foundation of core policies and practices to enable you and your security teams to practice proper incident response, then expand upon those crucial skills by adding advanced core techniques to help defend an enterprise from every angle.

Whether you’re new to security or need a broad overview of security topics, these courses support your effort to win the battle against the wide range of cyber adversaries that want to harm your environments.

Cyber Defense Essentials Course Challenge Coins 

SEC501 SANS Challenge Coin

SEC501: Advanced Security Essentials - Enterprise Defender

SEC573: Automating Information Security with Python

Blue Team Operations

SANS Blue Team Operations courses teach the critical skills required to defend your organization against cyber-attacks and improve its overall security posture.

Blue Team Operations Course Challenge Coins

SEC450 SANS Challenge Coin

SEC450: Blue Team Fundamentals – Security Operations and Analysis 

coin_mask_487_combined.png

SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis

SEC503 SANS Challenge Coin

SEC503: Intrusion Detection In-Depth

SEC505 SANS Challenge Coin

SEC505: Securing Windows and PowerShell Automation

SEC511 SANS Challenge Coin

SEC511: Continuous Monitoring and Security Operations

SEC530 SANS Challenge Coin

SEC530: Defensible Security Architecture and Engineering

SEC555 SANS Challenge Coin

SEC555: SIEM with Tactical Analysis



Offensive Operations Curriculum

SANS Offensive Operations leverages the vast experience of our esteemed faculty to produce the most thorough, cutting-edge offensive cyber security training content in the world. Our goal is to continually broaden the scope of our offensive-related course offerings to cover every possible attack vector.

SANS Offensive Operations Curriculum offers courses spanning topics ranging from introductory penetration testing and hardware hacking, all the way to advanced exploit writing and red teaming, as well as specialized training such as purple teaming, wireless or mobile device security, and more.

Offensive Operations Course Challenge Coins

SEC460 SANS Challenge Coin

SEC460: Enterprise Threat and Vulnerability Assessment

SEC504 SANS Challenge Coin

SEC504: Hacker Tools, Techniques, and Incident Handling

SEC542 SANS Challenge Coin

SEC542: Web App Penetration Testing and Ethical Hacking

SEC560.png

SEC560: Enterprise Penetration Testing

SEC565: Red Team Operations and Adversary Emulation

SEC575 SANS Challenge Coin

SEC575: Mobile Device Security and Ethical Hacking

SEC588 SANS Challenge Coin

SEC588: Cloud Penetration Testing

SEC599.png

SEC599: Defeating Advanced Adversaries - Purple Team Tactics & Kill Chain Defenses

SEC617 SANS Challenge Coin

SEC617: Wireless Penetration Testing and Ethical Hacking

SEC660 SANS Challenge Coin

SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking

SEC670: Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control

SANS-Security-699-Coin_Frontsml.png

SEC699: Purple Team Tactics - Adversary Emulation for Breach Prevention & Detection

SEC760 SANS Challenge Coin

SEC760: Advanced Exploit Development for Penetration Testers



Digital Forensics & Incident Response Curriculum

Whether you're seeking to maintain a trail of evidence on host or network systems or hunting for threats using similar techniques, larger organizations are in need of specialized professionals who can move beyond first-response incident handling to analyze an attack and develop an appropriate remediation and recovery plan. The DFIR curriculum will teach you how to detect compromised systems, identify how and when a breach occurred, understand what attackers took or changed, and successfully contain and remediate incidents.

DFIR Course Challenge Coins

FINAL_CLEAN_small_web.png

FOR308: Digital Forensics Essentials
Scientia Vincit – Knowledge is Key

FOR498 SANS Challenge Coin

FOR498: Battlefield Forensics & Data Acquisition
Consector Scientia Intro Strepitus – Seek Knowledge in the Noise

FOR500 SANS Challenge Coin

FOR500: Windows Forensic Analysis
Ex Umbra in Solem – From the Shadows into the Light

FOR508 SANS Challenge Coin

FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
Non Potestis Celare – You Cannot Hide

FOR509_coin_340x340.png

FOR509: Enterprise Cloud Forensics and Incident Response
Inveniere Nubes Tempestate – Find the Storm in the Cloud

FOR518 SANS Challenge Coin

FOR518: Mac and iOS Forensic Analysis and Incident Response
Impera magis. Aliter cogita – Command more. Think differently

FOR528_coin_340x340.png

FOR528: Ransomware for Incident Responders
Venator Repetundarum –  Extortion Hunter

SANS-FOR532-FINAL-front.png

FOR532:  Enterprise Memory Forensics In-Depth
Memento Omnia – Remember All

FOR585 SANS Challenge Coin

FOR585: Smartphone Forensic Analysis In-Depth
Omnis Tactus Vestigium Relinquit – Every Contact Leaves a Trace

FOR572 SANS Challenge Coin

FOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response
Malum Loquitur, Bonum Auscultat – Evil Must Talk, So Good Must Listen

FOR578 SANS Challenge Coin

FOR578: Cyber Threat Intelligence
Hominem unius libri timeo – I Fear the Man of One Book

FOR608_coin_340x340.png

FOR608: Enterprise-Class Incident Response & Threat Hunting
Challenges Abound - Knowledge to Overcome

FOR610 SANS Challenge Coin

FOR610: Reverse-Engineering Malware
R.E.M. – Reverse-Engineering Master

FOR710_coin_340x340.png

FOR710: Reverse-Engineering Malware: Advanced Code Analysis
Dive Deeper! – Deobfuscate, Automate, Correlate



Industrial Control Systems (ICS)

The SANS ICS curriculum provides hands-on training courses focused on attacking and defending ICS environments. These courses equip both security professionals and control system engineers with the knowledge and skills they need to safeguard our critical infrastructures.

Industrial Control Systems Course Challenge Coins

ICS410 SANS Challenge Coin

ICS410: ICS/SCADA Security Essentials
"Defend Critical Infrastructure"

ICS456 SANS Challenge Coin

ICS456: Essentials for NERC Critical Infrastructure Protection
"Develop and maintain a defensible compliance program"

ICS515 SANS Challenge Coin

ICS515: ICS Active Defense and Incident Response
"Defense is Doable"

ICS612 SANS Challenge Coin

ICS612: ICS Cybersecurity In-Depth
"Hands On Cyber Physical"




Cybersecurity Leadership

Security leaders need both technical knowledge and management skills to gain the respect of technical team members, understand what technical staff are actually doing, and appropriately plan and manage security projects and initiatives. This is a big and important job that requires an understanding of a wide array of security topics. The SANS Cybersecurity Leadership curriculum develops cyber leaders who have the practical skills to build and lead security teams, communicate with technical and business leaders alike, and develop capabilities that build your organization’s success.

Cybersecurity Leadership Course Challenge Coins

AUD507 SANS Challenge Coin

AUD507: Auditing & Monitoring Networks, Perimeters, and Systems
Controls that Matter. Controls that Work.

MGT512 SANS Challenge Coin

MGT512: Security Leadership for Managers
One Coin to Lead Them All

MGT514 SANS Challenge Coin

MGT514: Security Strategic Planning, Policy, and Leadership
Decipher, Develop, Deliver

sans_coin_516_FRONT.png

MGT516: Managing Security Vulnerabilities: Enterprise & Cloud

Stop Treating the Symptoms. Cure the Disease.

SANS_MGT551_Front-FINAL.png

MGT551: Building and Leading Security Operations Centers

Prevent. Detect. Respond. | People. Process. Technology.




Cloud Security Curriculum

SANS Cloud Security curriculum ingrains security into the minds of cloud, architecture, operations, and software engineers by providing world-class educational resources to design, develop, build, deploy, and monitor cloud resources.

Cloud Security Course Challenge Coins

SEC488-Front-Back.png

SEC488: Cloud Security Essentials
License to Learn Cloud Security

SEc510-front-back-coin.png

SEC510: Public Cloud Security: AWS, Azure, & GCP
Multiple Clouds Require Multiple Solutions

SEC522_coins.png

SEC522: Application Security: Securing Web Apps, APIs, and Microservices
Not a matter of "if" but "when". Be prepared for a web attack. We'll teach you how.

SEC540coins.png

SEC540: Cloud Security and DevSecOps Automation

The cloud moves fast. Automate to keep up. 


SANS_SEC541_FRONT-transparent.png

SEC541: Cloud Security Monitoring and Threat Detection

Attackers can run by not hide. Our radar sees all threats.


Those who are awarded SANS Challenge coins are also bestowed special privileges and recognition, including participation in the well-regarded “coin check” challenge and response.

A coin check typically begins by a challenger holding his or her coin in the air or slamming it on a table and yelling “coin check!” All those within earshot must respond by showing their coins to the challenger within 10 seconds. Anyone who fails to do so must buy those who successfully returned the coin check a round of drinks. If all the challenged coin holders produce their coin, the challenger must buy the round of drinks. (Also, if anyone accidentally drops their coin and it makes an audible sound on impact, they have "accidentally" initiated a coin check. There are no exceptions to the rules -- get those coins out or you're buying!)

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Swaziland
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Yugoslavia
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Cybersecurity Insights

Related Content

Blog
Blog_-_The_New_Financial_Metric_for_Cybersecurity_-_340x340_Thumb.jpg
Security Management, Legal, and Audit, Cybersecurity Insights
March 17, 2023
The New Financial Metric for Cybersecurity
Elevating your workforce with a profit-centric mindset
brieentel_headshot.jpg
Brie Entel
read more
Blog
Cybersecurity Insights
March 3, 2023
글로벌 보안 기업들은 왜 GIAC 자격증을 선호할까요?
GIAC 자격증을 취득하면, 담당 업무를 수행할 수 있는 보안기술을 습득했음을 입증하는 것입니다. 정보보안 전문가 Aaron Lancaster씨는 "GIAC 자격증을 취득한다는 것은 해당 보안 도메인에 대한 깊은 기술적 지식과 이해력을 보유하고 있는 것을 나타내며, 이는 분야 전문가들로부터 신뢰와 인정을 받게 되는 것입니다”라고 추천합니다.우리는 사이버 보안 산업에서 자격증이 중요한 가치를 가진다는 것을 잘 알고 있습니다. 현재 전세계적으로 정보 보안 자격시험은 대표적으로 국내에서도 유명한 CISA, CISSP, EnCE 등 그...
SANS_Filler_Avatar.jpg
SANS Institute
read more
Blog
Cybersecurity Insights
March 9, 2021
The Ultimate List of SANS Cheat Sheets
Need help cutting through the noise? SANS has a massive list of Cheat Sheets available for quick reference.
SANS_Filler_Avatar.jpg
SANS Institute
read more
  • Register to Learn
  • Courses
  • Certifications
  • Degree Programs
  • Cyber Ranges
  • Job Tools
  • Security Policy Project
  • Posters & Cheat Sheets
  • White Papers
  • Focus Areas
  • Cyber Defense
  • Cloud Security
  • Cybersecurity Leadership
  • Digital Forensics
  • Industrial Control Systems
  • Offensive Operations
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Macedonia
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Swaziland
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Yugoslavia
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • © 2023 SANS™ Institute
  • Privacy Policy
  • Contact
  • Careers
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn