SEC546: IPv6 Essentials | | | | | | | | | | |
MGT433: Securing The Human: Building and Deploying an Effective Security Awareness Program | | | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | | | |
SEC503: Intrusion Detection In-Depth | | | | | | | | | | |
SEC504: Hacker Techniques, Exploits & Incident Handling | | | | | | | | | | |
SEC505: Securing Windows and Resisting Malware | | | | | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | | | |
SEC642: Advanced Web App Penetration Testing and Ethical Hacking | | | | | | | | | | |
FOR408: Computer Forensic Investigations - Windows In-Depth | | | | | | | | | | |
NewFOR508: Advanced Computer Forensic Analysis and Incident Response | | | | | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | | | |
MGT414: SANS® +S™ Training Program for the CISSP® Certification Exam | | | | | | | | | | |
AUD507: Auditing Networks, Perimeters, and Systems | | | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | | | |
Core NetWars Tournament | | | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | | | |
General Session - Welcome to SANS Instructor: Dr. Eric Cole | | | | | | | | | | |
Future Trends in Network Security Instructor: Eric Cole, Ph.D. | | | | | | | | | | |
Forensic Campus Open House inviting non-attendees to reception | | | | | | | | | | |
Women in Technology Meet and Greet | | | | | | | | | | |
Top 8 Steps for Effective Mobile Security Instructor: Josh Wright, Ed Skoudis | | | | | | | | | | |
Building a Portable Private Cloud Instructor: Paul Henry | | | | | | | | | | |
Forensic Campus - "Malware Analysis Essentials using REMnux" Instructor: Lenny Zeltser | | | | | | | | | | |
Forensic Campus - "Detecting Persistence Mechanisms" Instructor: Alissa Torres | | | | | | | | | | |
Gone In 60 Minutes Instructor: David Hoelzer | | | | | | | | | | |
Unleashing the Dogs of (cyber) War Instructor: Ed Skoudis | | | | | | | | | | |
Knock-off Phone Forensics -Some Handsets Aren't What They Appear To Be Instructor: Heather Mahalik | | | | | | | | | | |
SANS Technology Institute Open House Instructor: Chancellor Toby Gouker | | | | | | | | | | |
SANS Technology Institute Master's Presentation Instructor: Jim Horwath | | | | | | | | | | |
Gamification: Hacking Your Brain for Better Learning Instructor: Yori Kvitchko | | | | | | | | | | |
GIAC Certification Program Overview Instructor: Scott Cassity | | | | | | | | | | |
NetWars Tournament of Champions Instructor: Ed Skoudis, Yori Kvitchko | | | | | | | | | | |
Forensic Campus - "Intelligence-driven Response for Combating the Advanced Persistent Threat". Instructor: Mike Cloppert | | | | | | | | | | |
Securing the Kids Instructor: Lance Spitzner | | | | | | | | | | |
Why Our Defenses Are Failing Us. One Click is All it Takes... Instructor: Bryce Galbraith | | | | | | | | | | |
Forensic Campus - "How memory forensics will help you lose weight and look ten years younger" Instructor: Jesse Kornblum | | | | | | | | | | |
Information Assurance Metrics: Practical Steps to Measurement Instructor: James Tarala | | | | | | | | | | |
Securing the Human Instructor: Lance Spitzner | | | | | | | | | | |
Tactical SecOps: A Guide to Precision Security Operations Instructor: Kevin Johnson | | | | | | | | | | |
SANS Technology Institute Master's Presentation Instructor: Michael Hoehl | | | | | | | | | | |
Security Onion: One Step Closer to a Safer Network with Almost no Budget Instructor: Chris Mohan | | | | | | | | | | |
What's New in Server 2012 and Windows 8 Instructor: Jason Fossen | | | | | | | | | | |