NewSEC562: CyberCity Hands-on Kinetic Cyber Range Exercise | | | | | | | | | | |
Sold OutSEC401: Security Essentials Bootcamp Style | | | | | | | | | | |
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling | | | | | | | | | | |
Sold OutFOR408: Windows Forensic Analysis | | | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | | | |
SEC503: Intrusion Detection In-Depth | | | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | | | |
WaitlistFOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | | | |
WaitlistMGT414: SANS® +S™ Training Program for the CISSP® Certification Exam | | | | | | | | | | |
FOR508: Advanced Digital Forensics and Incident Response | | | | | | | | | | |
WaitlistSEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | | | | | | | | | | |
SEC505: Securing Windows with the Critical Security Controls | | | | | | | | | | |
WaitlistAUD507: Auditing & Monitoring Networks, Perimeters & Systems | | | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | | | |
Sold OutSEC575: Mobile Device Security and Ethical Hacking | | | | | | | | | | |
WaitlistSEC301: Intro to Information Security | | | | | | | | | | |
SEC524: Cloud Security Fundamentals | | | | | | | | | | |
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program | | | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | | | |
MGT535: Incident Response Team Management | | | | | | | | | | |
Sold OutFOR526: Memory Forensics In-Depth | | | | | | | | | | |
MGT415: A Practical Introduction to Risk Assessment | | | | | | | | | | |
ICS410: ICS/SCADA Security Essentials | | | | | | | | | | |
HOSTED: Physical Penetration Testing - Introduction | | | | | | | | | | |
Core NetWars Experience | | | | | | | | | | |
Sold OutDFIR NetWars Tournament | | | | | | | | | | |
A Night of Crypto Instructor: G. Mark Hardy | | | | | | | | | | |
An Introduction to PowerShell for Security Assessments Instructor: James Tarala | | | | | | | | | | |
Attacking and Defending Building Automation Systems at Scale: A Case Study Instructor: Billy Rios | | | | | | | | | | |
Continuous Ownage: Why you Need Continuous Monitoring Instructor: Eric Conrad | | | | | | | | | | |
Debunking the Complex Password Myth Instructor: Keith Palmgren | | | | | | | | | | |
Everything They Told Me About Security Was Wrong Instructor: John Strand | | | | | | | | | | |
General Session- Welcome to SANS Instructor: Dr. Eric Cole | | | | | | | | | | |
Gone in 60 Minutes: Have You Patched Your System Today? Instructor: David Hoelzer | | | | | | | | | | |
Home-Field Advantage: Hunting the Advanced Persistent Threat by Interdicting their Tactics with Network Traps & Snares Instructor: Matthew Toussain - Master's Degree Candidate | | | | | | | | | | |
Introduction to IDA Pro and Debugging Instructor: Stephen Sims | | | | | | | | | | |
IT Security meets Research: Lessons from NASA's Science Labs Instructor: Joel Offenberg, Vantage Systems, Inc. | | | | | | | | | | |
NetWars Tournament of Champions Instructor: Ed Skoudis & Tim Medin | | | | | | | | | | |
SANS Technology Institute Graduation Instructor: Alan Paller, Sally Vandeven | | | | | | | | | | |
SANS Technology Institute Reception and Information Session Instructor: Bill Lockhart, Executive Director, SANS Technology Institute | | | | | | | | | | |
Securing The Kids Instructor: Lance Spitzner | | | | | | | | | | |
Security Awareness Metrics: Measuring Human Behavior Instructor: Lance Spitzner | | | | | | | | | | |
The 13 Absolute Truths of Security Instructor: Keith Palmgren | | | | | | | | | | |
The Threat Landscape of PKI: System and Cryptographic Security of X.509, Algorithms, and their Implementations. Instructor: Blaine Hein- Master's Degree Candidate | | | | | | | | | | |
Windows Exploratory Surgery with Process Hacker Instructor: Jason Fossen | | | | | | | | | | |
Women In Technology Reception | | | | | | | | | | |