2 More Days to Get Train-From-Home Tech with OnDemand Training: Apple TV + AirPods Pro

Cyber Defense Initiative® 2015

Washington, DC | Sat, Dec 12 - Sat, Dec 19, 2015
This event is over,
but there are more training opportunities.

Sa 12Su 13Mo 14Tu 15We 16Th 17Fr 18Sa 19
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Bryce Galbraith
NewMGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
AUD440: Critical Security Controls: Planning, Implementing, and Auditing
Instructor: Jason Fossen
HOSTED: Physical Penetration Testing
Instructor: The CORE Group
WaitlistSEC301: Intro to Information Security
Instructor: Keith Palmgren
SEC401: Security Essentials Bootcamp Style
Instructor: Paul A. Henry
WaitlistSEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Bryan Simon
SEC503: Intrusion Detection In-Depth
Instructor: Mike Poor
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling
Instructor: John Strand
SEC505: Securing Windows with PowerShell and the Critical Security Controls
Instructor: Jason Fossen
WaitlistSEC511: Continuous Monitoring and Security Operations
Instructor: Seth Misenar
WaitlistSEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
WaitlistSEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
SEC575: Mobile Device Security and Ethical Hacking  
WaitlistSEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: Stephen Sims
FOR408: Windows Forensic Analysis
Instructor: Ovie Carroll
WaitlistFOR508: Advanced Digital Forensics and Incident Response
Instructor: Alissa Torres
FOR572: Advanced Network Forensics and Analysis
Instructor: Philip Hagen
WaitlistFOR578: Cyber Threat Intelligence
Instructor: Jake Williams
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
WaitlistMGT414: SANS Training Program for CISSP® Certification
Instructor: Eric Conrad
WaitlistMGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
WaitlistMGT514: IT Security Strategic Planning, Policy, and Leadership
Instructor: Mark Williams
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: David Hoelzer
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
ICS410: ICS/SCADA Security Essentials
Instructor: Justin Searle
WaitlistICS515: ICS Active Defense and Incident Response
Instructor: Robert M. Lee
Core NetWars Tournament
Instructor: Jeff McJunkin
DFIR NetWars Tournament      
Registration Welcome Reception
Securing The Kids
Instructor: Lance Spitzner
General Session - Welcome to SANS
Instructor: Bryce Galbraith- Renaissance Washington, DC Downtown Hotel
General Session - Welcome to SANS
Instructor: Jason Fossen-Grand Hyatt Washington
Mike Assante talks on ICS Security Case Studies
Instructor: Mike Assante
What's New for Security in Windows 10 and Server 2016?
Instructor: Jason Fossen
Women's CONNECT Event in partnership with ISSA International Women In Security Special Interest Group (WIS SIG)
Automating Post-Exploitation with PowerShell
Instructor: James Tarala
Offensive Countermeasures, Active Defenses, and Internet Tough Guys
Instructor: John Strand
The Crazy New World of Cyber Investigations: Law, Ethics and Evidence
Instructor: Benjamin Wright
How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats...
Instructor: Bryce Galbraith
The Effectiveness of Microsoft's EMET
Instructor: Stephen Sims
ICS/SCADA Cyber Attacks - Fact vs. Fiction
Instructor: Robert M. Lee
Malware Analysis for Incident Responders: Getting Started
Instructor: Lenny Zeltser
The Tap House
Instructor: Phil Hagen
Debunking the Complex Password Myth
Instructor: Keith Palmgren
GIAC Program Overview
Instructor: Courtney Imbert
The Plinko Board of Modern Persistence Techniques
Instructor: Alissa Torres
NetWars Tournament of Champions
Instructor: Ed Skoudis, Tim Medin, and Jeff McJunkin
Building a Web Application Vulnerability Management Program
Instructor: Jason Pubal - Master's Degree Candidate
Card Fraud 101
Instructor: G. Mark Hardy
Evolving Threats
Instructor: Paul Henry
Information Security Risk Management - No Exceptions!
Instructor: Mark Williams
The 14 Absolute Truths of Security
Instructor: Keith Palmgren