homepage
Open menu
Go one level top
  • Train and Certify
    Train and Certify

    Immediately apply the skills and techniques learned in SANS courses, ranges, and summits

    • Overview
    • Courses
      • Overview
      • Full Course List
      • By Focus Areas
        • Cloud Security
        • Cyber Defense
        • Cybersecurity and IT Essentials
        • DFIR
        • Industrial Control Systems
        • Offensive Operations
        • Management, Legal, and Audit
      • By Skill Levels
        • New to Cyber
        • Essentials
        • Advanced
        • Expert
      • Training Formats
        • OnDemand
        • In-Person
        • Live Online
      • Course Demos
    • Training Roadmaps
      • Skills Roadmap
      • Focus Area Job Roles
        • Cyber Defence Job Roles
        • Offensive Operations Job Roles
        • DFIR Job Roles
        • Cloud Job Roles
        • ICS Job Roles
        • Leadership Job Roles
      • NICE Framework
        • Security Provisionals
        • Operate and Maintain
        • Oversee and Govern
        • Protect and Defend
        • Analyze
        • Collect and Operate
        • Investigate
        • Industrial Control Systems
      • European Skills Framework
    • GIAC Certifications
    • Training Events & Summits
      • Events Overview
      • Event Locations
        • Asia
        • Australia & New Zealand
        • Latin America
        • Mainland Europe
        • Middle East & Africa
        • Scandinavia
        • United Kingdom & Ireland
        • United States & Canada
      • Summits
    • OnDemand
    • Get Started in Cyber
      • Overview
      • Degree and Certificate Programs
      • Scholarships
    • Cyber Ranges
  • Manage Your Team
    Manage Your Team

    Build a world-class cyber team with our workforce development programs

    • Overview
    • Why Work with SANS
    • Group Purchasing
    • Build Your Team
      • Team Development
      • Assessments
      • Private Training
      • Hire Cyber Professionals
      • By Industry
        • Health Care
        • Industrial Control Systems Security
        • Military
    • Leadership Training
  • Security Awareness
    Security Awareness

    Increase your staff’s cyber awareness, help them change their behaviors, and reduce your organizational risk

    • Overview
    • Products & Services
      • Security Awareness Training
        • EndUser Training
        • Phishing Platform
      • Specialized
        • Developer Training
        • ICS Engineer Training
        • NERC CIP Training
        • IT Administrator
      • Risk Assessments
        • Knowledge Assessment
        • Culture Assessment
        • Behavioral Risk Assessment
    • OUCH! Newsletter
    • Career Development
      • Overview
      • Training & Courses
      • Professional Credential
    • Blog
    • Partners
    • Reports & Case Studies
  • Resources
    Resources

    Enhance your skills with access to thousands of free resources, 150+ instructor-developed tools, and the latest cybersecurity news and analysis

    • Overview
    • Webcasts
    • Free Cybersecurity Events
      • Free Events Overview
      • Summits
      • Solutions Forums
      • Community Nights
    • Content
      • Newsletters
        • NewsBites
        • @RISK
        • OUCH! Newsletter
      • Blog
      • Podcasts
      • Summit Presentations
      • Posters & Cheat Sheets
    • Research
      • White Papers
      • Security Policies
    • Tools
    • Focus Areas
      • Cyber Defense
      • Cloud Security
      • Digital Forensics & Incident Response
      • Industrial Control Systems
      • Cyber Security Leadership
      • Offensive Operations
  • Get Involved
    Get Involved

    Help keep the cyber community one step ahead of threats. Join the SANS community or begin your journey of becoming a SANS Certified Instructor today.

    • Overview
    • Join the Community
    • Work Study
    • Teach for SANS
    • CISO Network
    • Partnerships
    • Sponsorship Opportunities
  • About
    About

    Learn more about how SANS empowers and educates current and future cybersecurity practitioners with knowledge and skills

    • SANS
      • Overview
      • Our Founder
      • Awards
    • Instructors
      • Our Instructors
      • Full Instructor List
    • Mission
      • Our Mission
      • Diversity
      • Scholarships
    • Contact
      • Contact Customer Service
      • Contact Sales
      • Press & Media Enquiries
    • Frequent Asked Questions
    • Customer Reviews
    • Press
    • Careers
  • Contact Sales
  • SANS Sites
    • GIAC Security Certifications
    • Internet Storm Center
    • SANS Technology Institute
    • Security Awareness Training
  • Search
  • Log In
  • Join
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. The NEW ICS418 Course: Step Up, Step Over, In Place - ICS Security Essentials for Managers
SANS ICS

The NEW ICS418 Course: Step Up, Step Over, In Place - ICS Security Essentials for Managers

This blog describes the newest offering from SANS targeted specifically to managers involved in keeping industrial control systems (ICS) safe.

October 4, 2021

SANS ICS418: ICS Security Essentials for Managers is an intense two-day course that provides techniques to address a manager’s biggest concern: keeping industrial processes secure.

NOTE: THE SECOND BETA RUN OF THIS COURSE IS NOW OPEN FOR REGISTRATION. REGISTER HERE.


Building Tomorrow's Leaders for Industrial Security

Industrial security has evolved rapidly over the past decade. Originally seen as an afterthought, industrial security is increasingly cited by executives and boards as a key ICS cyber risk to their organization. This is largely due to the prominence of real-world events, increased threats, and the tangible impacts of industrial cyber attacks—including stalled production, equipment damage, and even loss of life.

Over the past decade, SANS has specifically focused on providing ICS practitioners with hands-on learning that leverages actionable techniques and tools. The SANS ICS curriculum, which started in 2013 with ICS410: ICS/SCADA Security Essentials, today features four technical courses, each more advanced than the next. The course series culminates with the in-person ICS612: Cybersecurity in-Depth, which leverages an ICS test lab and network to defend based on real-world incidents.

All of these courses share a vision outlined by Mike Assante and the SANS ICS team to arm and train capable defenders with the skills needed to protect the essential services that enable our modern world to function:

1.png

A critical part of Mike’s vision is to develop leaders who can in turn enable technical practitioners, create a vision for ICS security, and measure the success of that vision across their team.

That is where ICS418 comes in. This new course blends ICS security essentials with advanced management techniques to train leaders, regardless of their background or prior experience with ICS, security, or engineering and operations.

Why This Course and Why Now?

ICS security is an ever-changing field that requires practitioners to continually adapt defense strategics to meet new challenges and threats. To compound the challenge, any security changes need to be 100% tested in order to ensure and maintain the safety and reliability of industrial operations.

The terms “critical infrastructure” and “operators of essential services” refer to countless industrial organizations across the globe. Some of them are lifelines for our modern society, such as water, energy, food processing, and critical manufacturing. Regardless of the field in which they operate, all industrial facilities must know that their processes are secure and safe. With increased threats, new trends in technology, and evolving workforce demands, it is vital that security managers in operational technology (OT) be trained in techniques to defend their facilities and their teams.

ICS418 fills the identified gap among leaders working across critical infrastructure and OT environments. It equips both new and experienced managers responsible for OT/ICS or converged IT/OT cybersecurity. The course provides the experience and tools to address industry pressures to manage cyber risk in a way that prioritizes the business side as well as the safety and reliability of operations. ICS leaders will leave the course with a firm understanding of the drivers and constraints in these cyber-physical environments and will gain a nuanced understanding of how to manage the people, processes, and technologies in their organizations.

Security Management Roles Targeted by ICS418

Screen_Shot_2021-10-01_at_12.56.17_PM.png

ICS418 is aimed at managers of personnel responsible for securing the day-to-day operations across an organization’s OT and ICS environments. This includes distributed control systems (DCS) and supervisory control and data acquisition (SCADA) systems. Managers of these teams often come from diverse backgrounds with a focus either on management skills, with minimal understanding of ICS environments, or on technical skills, with minimal management skills.

The course is designed to bridge the gap between those two skill sets by following the axiom that a “rising tide lifts all boats” when it comes to ICS security managers. The course addresses the needs of the full range of managers, including:

  • Managers asked to "Step-Over"
    • Traditional information technology (IT) security managers who must create, lead, or refine an ICS security program
  • Practitioner to Manager "Step-Ups
    • Industrial engineers, operators, or ICS security practitioners promoted to a manager position to create, lead, or refine an ICS security program
  • "In-Place" Managers
    • Existing ICS security managers who need to further develop their leadership skills specific to industrial security

Screen_Shot_2021-10-01_at_1.02.08_PM.png


Security Management Goals of ICS418

Unlike IT systems, ICS and their corresponding industrial facilities require considerations beyond traditional cybersecurity controls. Within IT networks, the main security concerns may revolve around exfiltration of data (such as customer or employee records) or the destruction/unavailability of data (as in a ransomware attack). In OT environments, on the other hand, the loss or manipulation of visibility, control, or safety can lead to physical impacts in the tangible world. These sorts of scenarios highlight the importance of preventing and detecting cybersecurity incidents, but what can you do with devices that may be 30+ years old and are generally incapable of providing access controls, end point protection, or system hardening? How do you build a team of defenders who need to understand both security and engineering? What do you do when your organization spends more on its website than on industrial security?

ICS418 is designed to address these concerns —and many more. An ICS418 course graduate will be able to:

  • Articulate the value of ICS security and tie cyber risk to business risk decisions
  • Trend current and future technology changes to address business needs
  • Measure successes in industrial cyber risk management, complete with metrics for executives and boards of directors
  • Use best practices to enable ICS security incident detection and response for their teams
  • Leverage external information, including threat intelligence, to guide their ICS security program
  • Provide governance, oversight, execution, and support across industrial facilities for ICS security initiatives and projects
  • Develop their security workforce to address gaps in hiring, training, and retention
  • Apply advanced techniques to help shape and shift their organization’s culture of security

Takeaways Beyond the Course

It wouldn’t be a SANS class without considering what happens after the course is over—in this case, what we might call “Day 3.” That’s right: a two-day course where we address what to do next in the days and months after the course is finished. Beyond the hours of content, we have loaded ICS418 with extra material to apply to your current (and future) ICS security strategy. Bonus material includes handouts for forecasting, tools for ICS security assessments, and much more! You can take the applied guided discussions and labs and tailor them based on your unique operating environment—essentially a gift from SANS to the students and the larger ICS security community.

ICS418 Course Layout

We have filled this course to the brim with a combination of technical and managerial skill development tailored specifically for industrial organizations. Broken into two days, ICS418 is designed to “short circuit” the needed skills for ICS security leaders both in terms of covering topics specifically relevant to ICS, as well as developing abilities to manage people, processes, and technologies.

Day 1: Developing and Sustaining ICS Security Programs

  • The course starts with a level-setting on the capabilities and risks associated with industrial control systems. The course day is equally mapped between managers new to ICS and experienced ICS professionals looking to sharpen their edge on current technology trends, threats, and vulnerabilities. With a clear foundation of what skills are required, students will get hands-on experience with unique tools designed to demonstrate unique industrial cyber risks, while also highlighting the need to manage and sustain our security efforts.

Day 2: Leading ICS Security Teams

  • Building on the topics of what is required for a successful ICS security program, the second day dives into overall governance, oversight, execution, and support of those topics—including how to hire, train, and retain skilled ICS security teams. Unlike industrial equipment, people have feelings (and dreams and ambitions), and leaders must enable their teams to be successful. Based on the popular techniques in the SANS Management curriculum, day 2 of ICS418 blends the “best of” SANS tailored to unique concerns in OT environments.

Labs

  • As with all SANS courses, ICS418 students will not be attending a “death by PowerPoint” training session. The course has a half-dozen hands-on labs with real security applications that involve leveraging practical techniques. By merging technical with managerial topics, we’re also introducing more than 10 “leadership drills” that provide handouts and worksheets students can use to tailor their learning experience based on their unique operational needs.

    Industrial Cyber 42

    • Those familiar with the Cyber42 cybersecurity leadership simulation game (https://www.sans.org/blog/cyber42/) may have learned about it when taking SANS Management courses. SANS has extended this awesome tool for ICS418 by introducing Cyber42: Industrial Edition, which borrows many features from the traditional Cyber42. The scenarios are specific to industrial control systems, and of course safety is added to the mix of industrial cyber incidents. In Industrial Cyber43, the object of the game is to finish with the highest safety culture.
    • Beyond ICS418, OT/ICS professionals or teams can participate in various forms of Industrial Cyber42 via “Game Days” at various times throughout the year. Different scenarios of Industrial Cyber42 can also be explored through the SANS Ranges (https://www.sans.org/cyber-ranges/) for private OT/ICS Game Days to suit your facility’s needs.
    Screen_Shot_2021-10-01_at_1.11.42_PM.png
    The Industrial OT/ICS Cyber42 Version for ICS418

    Screen_Shot_2021-10-01_at_1.11.55_PM.png
    Example: Specific OT/ICS Scenarios Include Safety

    Are You Ready to Lead ICS Security? 

    Then join us for ICS418! REGISTRATION IS NOW OPEN FOR BETA 2 - TAKING PLACE APRIL 4 & 5, LIVE ONLINE. REGISTER HERE.


    ICS418 Course Authors

    Picture1.png
    Dean Parsons B.SC., GICSP, GRID, CISSP®, GSLC, GCIA Critical Infrastructure & ICS Cybersecurity Leader
    jd.png
    Jason D. Christopher, Principal Cyber Risk Advisor for Dragos, Inc.

    Certified ICS SANS Instructor for ICS515: ICS Visibility, Detection, and Response

    Certified ICS SANS Instructor for ICS456: Essentials for NERC Critical Infrastructure Protection

    Dean brings over 20 years of technical and management experience to the classroom. He has worked in both information technology and industrial control system (ICS) cyber defense in critical infrastructure sectors such as telecommunications, electricity generation, transmission, distribution, and oil and gas refineries, storage, and distribution. Dean is an ambassador for defending industrial systems and an advocate for the safety, reliability, and cyber protection of critical infrastructure. His mission as an instructor is to empower each of his students, and he earnestly preaches that “Defense is Do-able!” Over the course of his career, Dean’s accomplishments include establishing ICS security programs for critical infrastructure sectors, building and managing converged IT/OT incident response and threat hunt teams, and conducting ICS cyber defense assessments.

    In his role at Dragos, Jason Christopher focuses on ICS monitoring technology, threat intelligence, and incident response. Previously he was the Chief Technology Officer for Axio. His experience includes providing technical leadership on security and resilience issues, and developing technology platforms for security metrics and benchmarking.

    Prior to Axio, Jason led cybersecurity metrics and information assurance research at the Electric Power Research Institute. He has also served as the technical lead for cybersecurity capability and risk management at the U.S. Department of Energy, where he managed the Cybersecurity for Energy Delivery Systems Operations Program that included the Cybersecurity Capability Maturity Model and other collaborative efforts.


    Author's Statement

    “Now, more than ever, it is important to train and equip ICS security leaders with the skills and knowledge they need to protect critical infrastructure. This course is the culmination of decades of experience in building and managing OT/ICS security teams -- and it is the course we wish was available to us when we started on our ICS security journey. We’ve drawn across our roles in different industrial sectors and teams-- as former company executives, team leads, incident responders, and managers-- to create a course empowering leaders facing the greatest challenge of our time: industrial control system cybersecurity.”

    – Jason D. Christopher & Dean C. Parsons


    Share:
    TwitterLinkedInFacebook
    Copy url Url was copied to clipboard
    Subscribe to SANS Newsletters
    Receive curated news, vulnerabilities, & security awareness tips
    United States
    Canada
    United Kingdom
    Spain
    Belgium
    Denmark
    Norway
    Netherlands
    Australia
    India
    Japan
    Singapore
    Afghanistan
    Aland Islands
    Albania
    Algeria
    American Samoa
    Andorra
    Angola
    Anguilla
    Antarctica
    Antigua and Barbuda
    Argentina
    Armenia
    Aruba
    Austria
    Azerbaijan
    Bahamas
    Bahrain
    Bangladesh
    Barbados
    Belarus
    Belize
    Benin
    Bermuda
    Bhutan
    Bolivia
    Bonaire, Sint Eustatius, and Saba
    Bosnia And Herzegovina
    Botswana
    Bouvet Island
    Brazil
    British Indian Ocean Territory
    Brunei Darussalam
    Bulgaria
    Burkina Faso
    Burundi
    Cambodia
    Cameroon
    Cape Verde
    Cayman Islands
    Central African Republic
    Chad
    Chile
    China
    Christmas Island
    Cocos (Keeling) Islands
    Colombia
    Comoros
    Cook Islands
    Costa Rica
    Croatia (Local Name: Hrvatska)
    Curacao
    Cyprus
    Czech Republic
    Democratic Republic of the Congo
    Djibouti
    Dominica
    Dominican Republic
    East Timor
    East Timor
    Ecuador
    Egypt
    El Salvador
    Equatorial Guinea
    Eritrea
    Estonia
    Ethiopia
    Falkland Islands (Malvinas)
    Faroe Islands
    Fiji
    Finland
    France
    French Guiana
    French Polynesia
    French Southern Territories
    Gabon
    Gambia
    Georgia
    Germany
    Ghana
    Gibraltar
    Greece
    Greenland
    Grenada
    Guadeloupe
    Guam
    Guatemala
    Guernsey
    Guinea
    Guinea-Bissau
    Guyana
    Haiti
    Heard And McDonald Islands
    Honduras
    Hong Kong
    Hungary
    Iceland
    Indonesia
    Iraq
    Ireland
    Isle of Man
    Israel
    Italy
    Jamaica
    Jersey
    Jordan
    Kazakhstan
    Kenya
    Kiribati
    Korea, Republic Of
    Kosovo
    Kuwait
    Kyrgyzstan
    Lao People's Democratic Republic
    Latvia
    Lebanon
    Lesotho
    Liberia
    Liechtenstein
    Lithuania
    Luxembourg
    Macau
    Macedonia
    Madagascar
    Malawi
    Malaysia
    Maldives
    Mali
    Malta
    Marshall Islands
    Martinique
    Mauritania
    Mauritius
    Mayotte
    Mexico
    Micronesia, Federated States Of
    Moldova, Republic Of
    Monaco
    Mongolia
    Montenegro
    Montserrat
    Morocco
    Mozambique
    Myanmar
    Namibia
    Nauru
    Nepal
    Netherlands Antilles
    New Caledonia
    New Zealand
    Nicaragua
    Niger
    Nigeria
    Niue
    Norfolk Island
    Northern Mariana Islands
    Oman
    Pakistan
    Palau
    Palestine
    Panama
    Papua New Guinea
    Paraguay
    Peru
    Philippines
    Pitcairn
    Poland
    Portugal
    Puerto Rico
    Qatar
    Reunion
    Romania
    Russian Federation
    Rwanda
    Saint Bartholemy
    Saint Kitts And Nevis
    Saint Lucia
    Saint Martin
    Saint Vincent And The Grenadines
    Samoa
    San Marino
    Sao Tome And Principe
    Saudi Arabia
    Senegal
    Serbia
    Seychelles
    Sierra Leone
    Sint Maarten
    Slovakia
    Slovenia
    Solomon Islands
    South Africa
    South Georgia and the South Sandwich Islands
    South Sudan
    Sri Lanka
    St. Helena
    St. Pierre And Miquelon
    Suriname
    Svalbard And Jan Mayen Islands
    Swaziland
    Sweden
    Switzerland
    Taiwan
    Tajikistan
    Tanzania
    Thailand
    Togo
    Tokelau
    Tonga
    Trinidad And Tobago
    Tunisia
    Turkey
    Turkmenistan
    Turks And Caicos Islands
    Tuvalu
    Uganda
    Ukraine
    United Arab Emirates
    United States Minor Outlying Islands
    Uruguay
    Uzbekistan
    Vanuatu
    Vatican City
    Venezuela
    Vietnam
    Virgin Islands (British)
    Virgin Islands (U.S.)
    Wallis And Futuna Islands
    Western Sahara
    Yemen
    Yugoslavia
    Zambia
    Zimbabwe

    By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    Recommended Training

    • ICS612: ICS Cybersecurity In-Depth
    • SEC511: Continuous Monitoring and Security Operations
    • MGT512: Security Leadership Essentials for Managers

    Tags:
    • Industrial Control Systems Security
    • Security Management, Legal, and Audit

    Related Content

    Blog
    ICS_blog_-_ICS_Security_Management_VS._ICS_Attack_Targeting2.jpg
    Industrial Control Systems Security
    September 7, 2022
    ICS Security Management VS. ICS Attack Targeting
    ICS/OT security managers can build an effective team and take an effective approach to risk management.
    DeanParsons_340x340.png
    Dean Parsons
    read more
    Blog
    ICS_blog_-_Developing_ICS_OT_Engineering_Cyber_Defense_Teams2.jpg
    Industrial Control Systems Security
    August 17, 2022
    Developing ICS/OT Engineering Cyber Defense Teams
    ICS security managers don't get to choose if they're a target of a cyber attack, but do get to choose many things about their OT security program.
    DeanParsons_340x340.png
    Dean Parsons
    read more
    Blog
    ICS_Blog_Series-_A_Look_into_ICS-Part_22.jpg
    Industrial Control Systems Security
    April 4, 2022
    A Look Into ICS612: ICS Cybersecurity In-Depth: Part 2
    In OT security, you'll eventually be placed in an environment where you'll face the pressures of dealing with a process that's not responding.
    370x370_jeffrey-shearer.jpg
    Jeffrey Shearer
    read more
    • Register to Learn
    • Courses
    • Certifications
    • Degree Programs
    • Cyber Ranges
    • Job Tools
    • Security Policy Project
    • Posters & Cheat Sheets
    • White Papers
    • Focus Areas
    • Cyber Defense
    • Cloud Security
    • Cybersecurity Leadership
    • Digital Forensics
    • Industrial Control Systems
    • Offensive Operations
    Subscribe to SANS Newsletters
    Receive curated news, vulnerabilities, & security awareness tips
    United States
    Canada
    United Kingdom
    Spain
    Belgium
    Denmark
    Norway
    Netherlands
    Australia
    India
    Japan
    Singapore
    Afghanistan
    Aland Islands
    Albania
    Algeria
    American Samoa
    Andorra
    Angola
    Anguilla
    Antarctica
    Antigua and Barbuda
    Argentina
    Armenia
    Aruba
    Austria
    Azerbaijan
    Bahamas
    Bahrain
    Bangladesh
    Barbados
    Belarus
    Belize
    Benin
    Bermuda
    Bhutan
    Bolivia
    Bonaire, Sint Eustatius, and Saba
    Bosnia And Herzegovina
    Botswana
    Bouvet Island
    Brazil
    British Indian Ocean Territory
    Brunei Darussalam
    Bulgaria
    Burkina Faso
    Burundi
    Cambodia
    Cameroon
    Cape Verde
    Cayman Islands
    Central African Republic
    Chad
    Chile
    China
    Christmas Island
    Cocos (Keeling) Islands
    Colombia
    Comoros
    Cook Islands
    Costa Rica
    Croatia (Local Name: Hrvatska)
    Curacao
    Cyprus
    Czech Republic
    Democratic Republic of the Congo
    Djibouti
    Dominica
    Dominican Republic
    East Timor
    East Timor
    Ecuador
    Egypt
    El Salvador
    Equatorial Guinea
    Eritrea
    Estonia
    Ethiopia
    Falkland Islands (Malvinas)
    Faroe Islands
    Fiji
    Finland
    France
    French Guiana
    French Polynesia
    French Southern Territories
    Gabon
    Gambia
    Georgia
    Germany
    Ghana
    Gibraltar
    Greece
    Greenland
    Grenada
    Guadeloupe
    Guam
    Guatemala
    Guernsey
    Guinea
    Guinea-Bissau
    Guyana
    Haiti
    Heard And McDonald Islands
    Honduras
    Hong Kong
    Hungary
    Iceland
    Indonesia
    Iraq
    Ireland
    Isle of Man
    Israel
    Italy
    Jamaica
    Jersey
    Jordan
    Kazakhstan
    Kenya
    Kiribati
    Korea, Republic Of
    Kosovo
    Kuwait
    Kyrgyzstan
    Lao People's Democratic Republic
    Latvia
    Lebanon
    Lesotho
    Liberia
    Liechtenstein
    Lithuania
    Luxembourg
    Macau
    Macedonia
    Madagascar
    Malawi
    Malaysia
    Maldives
    Mali
    Malta
    Marshall Islands
    Martinique
    Mauritania
    Mauritius
    Mayotte
    Mexico
    Micronesia, Federated States Of
    Moldova, Republic Of
    Monaco
    Mongolia
    Montenegro
    Montserrat
    Morocco
    Mozambique
    Myanmar
    Namibia
    Nauru
    Nepal
    Netherlands Antilles
    New Caledonia
    New Zealand
    Nicaragua
    Niger
    Nigeria
    Niue
    Norfolk Island
    Northern Mariana Islands
    Oman
    Pakistan
    Palau
    Palestine
    Panama
    Papua New Guinea
    Paraguay
    Peru
    Philippines
    Pitcairn
    Poland
    Portugal
    Puerto Rico
    Qatar
    Reunion
    Romania
    Russian Federation
    Rwanda
    Saint Bartholemy
    Saint Kitts And Nevis
    Saint Lucia
    Saint Martin
    Saint Vincent And The Grenadines
    Samoa
    San Marino
    Sao Tome And Principe
    Saudi Arabia
    Senegal
    Serbia
    Seychelles
    Sierra Leone
    Sint Maarten
    Slovakia
    Slovenia
    Solomon Islands
    South Africa
    South Georgia and the South Sandwich Islands
    South Sudan
    Sri Lanka
    St. Helena
    St. Pierre And Miquelon
    Suriname
    Svalbard And Jan Mayen Islands
    Swaziland
    Sweden
    Switzerland
    Taiwan
    Tajikistan
    Tanzania
    Thailand
    Togo
    Tokelau
    Tonga
    Trinidad And Tobago
    Tunisia
    Turkey
    Turkmenistan
    Turks And Caicos Islands
    Tuvalu
    Uganda
    Ukraine
    United Arab Emirates
    United States Minor Outlying Islands
    Uruguay
    Uzbekistan
    Vanuatu
    Vatican City
    Venezuela
    Vietnam
    Virgin Islands (British)
    Virgin Islands (U.S.)
    Wallis And Futuna Islands
    Western Sahara
    Yemen
    Yugoslavia
    Zambia
    Zimbabwe

    By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
    • © 2023 SANS™ Institute
    • Privacy Policy
    • Contact
    • Careers
    • Twitter
    • Facebook
    • Youtube
    • LinkedIn