NewSEC503: Intrusion Detection In-Depth | | | | | | | | |
NewMGT415: A Practical Introduction to Risk Assessment | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | |
SEC504: Hacker Techniques, Exploits & Incident Handling | | | | | | | | |
FOR408: Computer Forensic Investigations - Windows In-Depth | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | |
WaitlistMGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | |
WaitlistMGT414: SANS® +S™ Training Program for the CISSP® Certification Exam | | | | | | | | |
FOR508: Advanced Computer Forensic Analysis and Incident Response | | | | | | | | |
SEC505: Securing Windows and Resisting Malware | | | | | | | | |
AUD507: Auditing Networks, Perimeters, and Systems | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | |
WaitlistSEC617: Wireless Ethical Hacking, Penetration Testing, and Defenses | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | |
Sold OutSEC301: Intro to Information Security | | | | | | | | |
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | |
AUD444: Auditing Security and Controls of Active Directory and Windows | | | | | | | | |
AUD445: Auditing Security and Controls of Oracle Databases | | | | | | | | |
Core NetWars Tournament | | | | | | | | |
DFIR NetWars Tournament | | | | | | | | |
A Predictive Security Model Using Bayesian Networks Instructor: Dan Lyon-Master's Degree Candidate | | | | | | | | |
Active Deception to Augment Intrusion Detection Instructor: Josh Johnson- Master's Degree Candidate | | | | | | | | |
An Introduction to PowerShell for Security Assessments Instructor: James Tarala | | | | | | | | |
APT: It is Time to Act Instructor: Dr. Eric Cole | | | | | | | | |
Booting a Write-blocked Drive to a VM Using Linux (Ubuntu) Instructor: Carlos Cajigas | | | | | | | | |
Closing the Door on Web Shells Instructor: Anuj Soni | | | | | | | | |
Continuous Ownage: Why you Need Continuous Monitoring Instructor: Eric Conrad and Seth Misenar | | | | | | | | |
Discovering Security Events of Interest Using Splunk Instructor: Carrie Roberts-Master's Degree Candidate | | | | | | | | |
Effective Phishing that Employees Like Instructor: Lance Spitzner | | | | | | | | |
General Session - Welcome to SANS Instructor: Dr. Eric Cole | | | | | | | | |
GIAC Program Overview Instructor: Jeff Frisk | | | | | | | | |
Hacking Back, Active Defense, and Internet Tough Guys Instructor: John Strand | | | | | | | | |
Have no fear - DFIR is here! Instructor: Rob Lee, Chad Tilbury, Alissa Torres, and Lenny Zeltser | | | | | | | | |
NetWars Tournament of Champions Instructor: Yori Kvitchko | | | | | | | | |
New School Forensics: Latest Tools and Techniques in Memory Analysis Instructor: Chad Tilbury | | | | | | | | |
Privacy and Peace of Mind While Accessing the Internet Via a Free/Public Access Point Through the Use of Your Very Own SOHO VPN Server. Easy as Pie... Raspberry Pi. Instructor: Eric Jodoin - STI Master’s Degree Candidate | | | | | | | | |
SANS Technology Institute Open House Instructor: Alan Paller, President of the SANS Technology Institute | | | | | | | | |
Securing The Kids Instructor: Lance Spitzner | | | | | | | | |
Security Onion: Installed and Now What? Instructor: Chris Mohan | | | | | | | | |
Sharing Without Borders: Attacking and Testing SharePoint Instructor: Kevin Johnson | | | | | | | | |
Who's Watching the Watchers? Instructor: Mike Poor | | | | | | | | |
Windows Exploratory Surgery with Process Hacker Instructor: Jason Fossen | | | | | | | | |