One Week Only! Get an iPad Air with Smart Keyboard, Surface Go, or $300 Off with OnDemand or vLive Training!

Boston Summer 2020

Boston, MA | Mon, Aug 3 - Sat, Aug 8, 2020
Live Event starts in 240 Days
 

Cyber Security Training in Boston

Cyber Security Training in Boston

  • 11 hands-on, immersion-style courses VIEW COURSES
  • Immersive training without home or office distractions
  • Direct access to world-renowned SANS instructors
 
 

Accelerate your career with hands-on cyber security training in Boston

Threats approach from every direction and SANS delivers reliable, professional information security training for every member of your organization – leaving no one unprepared.

  • Training on the cutting edge: All courses are designed to align with dominant security team roles, duties, and disciplines. Explore the Training Roadmap to find the right courses for your immediate cyber security skill development.
  • Learn from the best: SANS instructors are active security practitioners who bring their extensive knowledge and real-world experiences to the classroom.
  • GIAC Certification: Nine certifications align with SANS Boston Summer 2020 training courses, validating student mastery for professional use in critical, specialized InfoSec domains, and job-specific roles.
  • A superior investment: Focused, immersion learning without distractions. Opportunities to network with and learn from other professionals and the chance to attend SANS@Night events and many other activities.
  • The SANS Promise: You will be able to apply the skills and techniques you’ve learned as soon as you return to work.

What attendees say about their live training experience:

“As a security manager of many years, this training delivered material of great value that I can immediately apply to make a difference at my company.” - Dave Ferguson, CareFirst, Inc.

“The best part of SANS training is the absolute knowledge of the instructors. They bring real-world examples to the forefront and have their thumb on the pulse of current tactics used by attackers.” - Jessie Prevost, Trend Micro