NewSEC504: Hacker Tools, Techniques, Exploits and Incident Handling | | | | | | | | |
NewMGT415: A Practical Introduction to Cyber Security Risk Management | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | |
WaitlistSEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | |
FOR408: Windows Forensic Analysis | | | | | | | | |
SEC503: Intrusion Detection In-Depth | | | | | | | | |
WaitlistMGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | |
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | |
WaitlistMGT414: SANS Training Program for CISSP® Certification | | | | | | | | |
WaitlistFOR508: Advanced Digital Forensics and Incident Response | | | | | | | | |
WaitlistSEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | | | | | | | | |
SEC505: Securing Windows with PowerShell and the Critical Security Controls | | | | | | | | |
AUD507: Auditing & Monitoring Networks, Perimeters & Systems | | | | | | | | |
WaitlistSEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | |
WaitlistSEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | |
WaitlistSEC301: Intro to Information Security | | | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | | | |
AUD440: Critical Security Controls: Planning, Implementing, and Auditing | | | | | | | | |
WaitlistMGT514: IT Security Strategic Planning, Policy, and Leadership | | | | | | | | |
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | |
WaitlistSEC511: Continuous Monitoring and Security Operations | | | | | | | | |
FOR572: Advanced Network Forensics and Analysis | | | | | | | | |
WaitlistFOR578: Cyber Threat Intelligence | | | | | | | | |
ICS410: ICS/SCADA Security Essentials | | | | | | | | |
WaitlistICS515: ICS Active Defense and Incident Response | | | | | | | | |
HOSTED: Physical Penetration Testing | | | | | | | | |
Core NetWars Tournament | | | | | | | | |
DFIR NetWars Tournament | | | | | | | | |
Automating Post-Exploitation with PowerShell Instructor: James Tarala | | | | | | | | |
Building a Web Application Vulnerability Management Program Instructor: Jason Pubal - Master's Degree Candidate | | | | | | | | |
Card Fraud 101 Instructor: G. Mark Hardy | | | | | | | | |
Debunking the Complex Password Myth Instructor: Keith Palmgren | | | | | | | | |
Evolving Threats Instructor: Paul Henry | | | | | | | | |
General Session - Welcome to SANS Instructor: Bryce Galbraith- Renaissance Washington, DC Downtown Hotel | | | | | | | | |
General Session - Welcome to SANS Instructor: Jason Fossen-Grand Hyatt Washington | | | | | | | | |
GIAC Program Overview Instructor: Courtney Imbert | | | | | | | | |
How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats... Instructor: Bryce Galbraith | | | | | | | | |
ICS/SCADA Cyber Attacks - Fact vs. Fiction Instructor: Robert M. Lee | | | | | | | | |
Information Security Risk Management - No Exceptions! Instructor: Mark Williams | | | | | | | | |
Malware Analysis for Incident Responders: Getting Started Instructor: Lenny Zeltser | | | | | | | | |
Mike Assante talks on ICS Security Case Studies Instructor: Mike Assante | | | | | | | | |
NetWars Tournament of Champions Instructor: Ed Skoudis, Tim Medin, and Jeff McJunkin | | | | | | | | |
Offensive Countermeasures, Active Defenses, and Internet Tough Guys Instructor: John Strand | | | | | | | | |
Registration Welcome Reception | | | | | | | | |
Securing The Kids Instructor: Lance Spitzner | | | | | | | | |
The 14 Absolute Truths of Security Instructor: Keith Palmgren | | | | | | | | |
The Crazy New World of Cyber Investigations: Law, Ethics and Evidence Instructor: Benjamin Wright | | | | | | | | |
The Effectiveness of Microsoft's EMET Instructor: Stephen Sims | | | | | | | | |
The Plinko Board of Modern Persistence Techniques Instructor: Alissa Torres | | | | | | | | |
The Tap House Instructor: Phil Hagen | | | | | | | | |
What's New for Security in Windows 10 and Server 2016? Instructor: Jason Fossen | | | | | | | | |
Women's CONNECT Event in partnership with ISSA International Women In Security Special Interest Group (WIS SIG) | | | | | | | | |