DFIRCON - Live Online: The ALL Digital Forensics, Threat Hunting and Incident Response Training Event. Save $300 thru 10/7.

Cyber Defense Initiative® 2015

Washington, DC | Sat, Dec 12 - Sat, Dec 19, 2015
This event is over,
but there are more training opportunities.

Sa 12Su 13Mo 14Tu 15We 16Th 17Fr 18Sa 19
SEC580: Metasploit Kung Fu for Enterprise Pen Testing
Instructor: Bryce Galbraith
MGT415: A Practical Introduction to Cyber Security Risk Management
Instructor: James Tarala
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program
Instructor: Lance Spitzner
AUD440: Critical Security Controls: Planning, Implementing, and Auditing
Instructor: Jason Fossen
HOSTED: Physical Penetration Testing
Instructor: The CORE Group
SEC301: Intro to Information Security
Instructor: Keith Palmgren
SEC401: Security Essentials Bootcamp Style
Instructor: Paul A. Henry
SEC501: Advanced Security Essentials - Enterprise Defender
Instructor: Bryan Simon
SEC503: Intrusion Detection In-Depth
Instructor: Mike Poor
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling
Instructor: John Strand
SEC505: Securing Windows with PowerShell and the Critical Security Controls
Instructor: Jason Fossen
SEC511: Continuous Monitoring and Security Operations
Instructor: Seth Misenar
SEC560: Network Penetration Testing and Ethical Hacking
Instructor: Ed Skoudis
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth
Instructor: James Tarala
SEC575: Mobile Device Security and Ethical Hacking  
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
Instructor: Stephen Sims
FOR408: Windows Forensic Analysis
Instructor: Ovie Carroll
FOR508: Advanced Digital Forensics and Incident Response
Instructor: Alissa Torres
FOR572: Advanced Network Forensics and Analysis
Instructor: Philip Hagen
FOR578: Cyber Threat Intelligence
Instructor: Jake Williams
FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques
Instructor: Lenny Zeltser
MGT414: SANS Training Program for CISSP® Certification
Instructor: Eric Conrad
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™
Instructor: G. Mark Hardy
MGT514: IT Security Strategic Planning, Policy, and Leadership
Instructor: Mark Williams
AUD507: Auditing & Monitoring Networks, Perimeters & Systems
Instructor: David Hoelzer
LEG523: Law of Data Security and Investigations
Instructor: Benjamin Wright
ICS410: ICS/SCADA Security Essentials
Instructor: Justin Searle
ICS515: ICS Active Defense and Incident Response
Instructor: Robert M. Lee
Core NetWars Tournament
Instructor: Jeff McJunkin
DFIR NetWars Tournament      
Registration Welcome Reception
Securing The Kids
Instructor: Lance Spitzner
General Session - Welcome to SANS
Instructor: Bryce Galbraith- Renaissance Washington, DC Downtown Hotel
General Session - Welcome to SANS
Instructor: Jason Fossen-Grand Hyatt Washington
Mike Assante talks on ICS Security Case Studies
Instructor: Mike Assante
What's New for Security in Windows 10 and Server 2016?
Instructor: Jason Fossen
Women's CONNECT Event in partnership with ISSA International Women In Security Special Interest Group (WIS SIG)
Automating Post-Exploitation with PowerShell
Instructor: James Tarala
Offensive Countermeasures, Active Defenses, and Internet Tough Guys
Instructor: John Strand
The Crazy New World of Cyber Investigations: Law, Ethics and Evidence
Instructor: Benjamin Wright
How to bring some Advanced Persistent Trickery to your fight against Advanced Persistent Threats...
Instructor: Bryce Galbraith
The Effectiveness of Microsoft's EMET
Instructor: Stephen Sims
ICS/SCADA Cyber Attacks - Fact vs. Fiction
Instructor: Robert M. Lee
Malware Analysis for Incident Responders: Getting Started
Instructor: Lenny Zeltser
The Tap House
Instructor: Phil Hagen
Debunking the Complex Password Myth
Instructor: Keith Palmgren
GIAC Program Overview
Instructor: Courtney Imbert
The Plinko Board of Modern Persistence Techniques
Instructor: Alissa Torres
NetWars Tournament of Champions
Instructor: Ed Skoudis, Tim Medin, and Jeff McJunkin
Building a Web Application Vulnerability Management Program
Instructor: Jason Pubal - Master's Degree Candidate
Card Fraud 101
Instructor: G. Mark Hardy
Evolving Threats
Instructor: Paul Henry
Information Security Risk Management - No Exceptions!
Instructor: Mark Williams
The 14 Absolute Truths of Security
Instructor: Keith Palmgren